id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
57.2k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2022-31645
Potential vulnerabilities have been identified in the system BIOS of certain HP PC products, which might allow arbitrary code execution, escalation of privilege, denial of service, and information disclosure.
[ "cpe:2.3:o:hp:dragonfly_folio_g3_2-in-1_firmware:01.01.03:*:*:*:*:*:*:*", "cpe:2.3:h:hp:dragonfly_folio_g3_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_dragonfly_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_dragonfly:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_dragonfly_g3_firmware:01.03.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_dragonfly_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_dragonfly_g2_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_dragonfly_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_dragonfly_max_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_dragonfly_max:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_folio_2-in-1_firmware:not_impacted:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_folio_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_x2_1012_g1_firmware:1.57:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_x2_1012_g1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_x2_1012_g2_firmware:1.43:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_x2_1012_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_x2_1013_g3_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_x2_1013_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_x2_g4_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_x2_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_x2_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_x2_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_x360_1040_g9_2-in-1_firmware:01.03.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_x360_1040_g9_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_x360_830_g9_2-in-1_firmware:01.03.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_x360_830_g9_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_1030_g1_firmware:1.57:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_1030_g1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_1040_g9_firmware:01.03.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_1040_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_1040_g3_firmware:1.57:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_1040_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_1040_g4_firmware:1.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_1040_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_1050_g1_firmware:01.22.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_1050_g1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_630_g9_firmware:01.04.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_630_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_640_g9_firmware:01.04.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_640_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_645_g9_firmware:01.08.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_645_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_650_g9_firmware:01.04.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_650_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_655_g9_firmware:01.08.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_655_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_735_g5_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_735_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_735_g6_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_735_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_745_g5_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_745_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_745_g6_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_745_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_755_g5_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_755_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_830_g9_firmware:01.03.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_830_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_830_g5_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_830_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_830_g6_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_830_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_830_g7_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_830_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_830_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_830_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_835_g9_firmware:01.02.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_835_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_835_g7_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_835_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_835_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_835_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_836_g5_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_836_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_836_g6_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_836_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_840_g9_firmware:01.03.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_840_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_840_aero_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_840_aero_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_840_g5_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_840_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_840_g6_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_840_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_840_g7_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_840_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_840_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_840_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_840r_g4_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_840r_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_845_g9_firmware:01.02.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_845_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_845_g7_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_845_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_845_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_845_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_846_g5_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_846_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_850_g5_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_850_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_850_g6_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_850_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_850_g7_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_850_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_850_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_850_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_855_g7_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_855_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_855_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_855_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_860_g9_firmware:01.03.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_860_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_865_g9_firmware:01.02.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_865_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_1030_g3_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_1030_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_1030_g4_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_1030_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_1030_g7_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_1030_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_1030_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_1030_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_1040_g5_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_1040_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_1040_g6_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_1040_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_1040_g7_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_1040_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_1040_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_1040_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_830_g5_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_830_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_830_g6_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_830_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_830_g7_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_830_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_830_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_830_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:pro_x360_fortis_g10_firmware:01.03.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:pro_x360_fortis_g10:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:pro_x360_fortis_g9_firmware:01.03.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:pro_x360_fortis_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_430_g5_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_430_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_430_g6_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_430_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_430_g7_firmware:01.14.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_430_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_430_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_430_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_440_g9_firmware:01.04.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_440_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_440_g5_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_440_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_440_g6_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_440_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_440_g7_firmware:01.14.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_440_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_440_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_440_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_445_g9_firmware:01.08.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_445_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_445_g6_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_445_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_445_g7_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_445_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_445_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_445_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_445r_g6_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_445r_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_450_g9_firmware:01.04.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_450_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_450_g5_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_450_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_450_g6_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_450_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_450_g7_firmware:01.14.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_450_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_450_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_450_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_455_g9_firmware:01.08.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_455_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_455_g5_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_455_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_455_g6_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_455_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_455_g7_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_455_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_455_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_455_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_455r_g6_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_455r_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_470_g5_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_470_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_630_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_630_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_635_aero_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_635_aero_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_640_g4_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_640_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_640_g5_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_640_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_640_g7_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_640_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_640_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_640_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_645_g4_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_645_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_650_g4_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_650_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_650_g5_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_650_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_650_g7_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_650_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_650_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_650_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_fortis_g10_firmware:01.03.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_fortis_g10:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_fortis_g9_firmware:01.03.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_fortis_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_x360_11_g3_ee_firmware:01.20.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_x360_11_g3_ee:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_x360_11_g4_ee_firmware:01.16.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_x360_11_g4_ee:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_x360_11_g5_ee_firmware:01.11.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_x360_11_g5_ee:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_x360_11_g6_ee_firmware:01.12.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_x360_11_g6_ee:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_x360_11_g7_ee_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_x360_11_g7_ee:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_x360_435_g7_firmware:01.10.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_x360_435_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_x360_435_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_x360_435_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_x360_440_g1_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_x360_440_g1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_14u_g5_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_14u_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_14u_g6_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_14u_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_15_g5_firmware:01.21.02:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_15_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_15_g6_firmware:01.21.02:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_15_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_15u_g5_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_15u_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_15u_g6_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_15u_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_17_g5_firmware:01.21.02:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_17_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_17_g6_firmware:01.21.02:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_17_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_create_g7_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_create_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_firefly_14_g7_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_firefly_14_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_firefly_14_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_firefly_14_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_firefly_14_g9_firmware:01.03.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_firefly_14_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_firefly_15_g7_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_firefly_15_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_firefly_15_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_firefly_15_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_firefly_16_g9_firmware:01.03.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_firefly_16_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_fury_15_g7_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_fury_15_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_fury_15_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_fury_15_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_fury_16_g9_firmware:01.03.02:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_fury_16_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_fury_17_g7_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_fury_17_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_fury_17_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_fury_17_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_power_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_power_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_power_g9_firmware:01.03.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_power_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_power_g7_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_power_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_studio_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_studio_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_studio_g9_firmware:01.03.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_studio_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_studio_g5_firmware:01.21.02:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_studio_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_studio_g7_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_studio_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_studio_x360_g5_firmware:01.21.02:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_studio_x360_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_13_g2_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_13_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_14_g2_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_14_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_14_g3_firmware:01.14.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_14_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_14_g4_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_14_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_g5_firmware:01.04.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_15_g2_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_15_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_15_g3_firmware:01.14.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_15_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_a_14_g3_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_a_14_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_a_14_g4_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_a_14_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_a_14_g5_firmware:01.08.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_a_14_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_g1_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_g1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_x_13_g2_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_x_13_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_mini_600_g9_firmware:02.05.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_mini_600_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_mini_800_g9_firmware:02.05.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_mini_800_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_sff_600_g9_firmware:02.05.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_sff_600_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_sff_800_g9_firmware:02.05.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_sff_800_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_slice_firmware:2.59:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_slice:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_slice_g2_firmware:2.59:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_slice_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_tower_600_g9_firmware:02.05.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_tower_600_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_tower_680_g9_firmware:02.05.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_tower_680_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_tower_800_g9_firmware:02.05.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_tower_800_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_tower_880_g9_firmware:02.05.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_tower_880_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_705_g3_firmware:2.41:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_705_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_705_g4_desktop_mini_firmware:02.20.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_705_g4_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_705_g4_microtower_firmware:02.20.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_705_g4_microtower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_705_g4_small_form_factor_firmware:02.20.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_705_g4_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_705_g4_workstation_firmware:02.19.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_705_g4_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_705_g5_desktop_mini_firmware:02.15.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_705_g5_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_705_g5_small_form_factor_firmware:02.15.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_705_g5_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_35w_g2_desktop_mini_firmware:2.59:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_35w_g2_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_35w_g3_desktop_mini_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_35w_g3_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_35w_g4_desktop_mini_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_35w_g4_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_65w_g2_desktop_mini_firmware:2.59:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_65w_g2_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_65w_g3_desktop_mini_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_65w_g3_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_65w_g4_desktop_mini_firmware:02.20.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_65w_g4_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_95w_g4_desktop_mini_firmware:02.20.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_95w_g4_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g2_small_form_factor_firmware:2.59:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g2_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g3_small_form_factor_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g3_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g3_tower_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g3_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g4_small_form_factor_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g4_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g4_tower_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g4_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g4_workstation_firmware:02.20.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g4_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g5_desktop_mini_firmware:02.15.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g5_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g5_small_form_factor_firmware:02.15.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g5_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g5_tower_firmware:02.15.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g5_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g6_desktop_mini_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g6_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g6_small_form_factor_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g6_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g6_tower_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g6_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g8_desktop_mini_firmware:02.09.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g8_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g8_small_form_factor_firmware:02.09.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g8_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g8_tower_firmware:02.09.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g8_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_805_g6_desktop_mini_firmware:02.09.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_805_g6_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_805_g6_small_form_factor_firmware:02.09.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_805_g6_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_805_g8_desktop_mini_firmware:02.05.02:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_805_g8_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_805_g8_small_form_factor_firmware:02.05.02:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_805_g8_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_880_g3_tower_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_880_g3_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_880_g4_tower_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_880_g4_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_880_g5_tower_firmware:02.15.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_880_g5_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_880_g6_tower_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_880_g6_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_880_g8_tower_firmware:02.09.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_880_g8_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_1000_g1_23.8-in_all-in-one_business_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_1000_g1_23.8-in_all-in-one_business:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_1000_g1_23.8-in_touch_all-in-one_business_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_1000_g1_23.8-in_touch_all-in-one_business:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_1000_g1_27-in_4k_uhd_all-in-one_business_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_1000_g1_27-in_4k_uhd_all-in-one_business:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_1000_g1_34-in_curved_all-in-one_business_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_1000_g1_34-in_curved_all-in-one_business:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_1000_g2_23.8-in_all-in-one_business_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_1000_g2_23.8-in_all-in-one_business:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_1000_g2_23.8-in_touch_all-in-one_business_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_1000_g2_23.8-in_touch_all-in-one_business:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_1000_g2_27-in_4k_uhd_all-in-one_business_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_1000_g2_27-in_4k_uhd_all-in-one_business:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_1000_g2_34-in_curved_all-in-one_business_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_1000_g2_34-in_curved_all-in-one_business:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g2_23-inch_non-touch_all-in-one_firmware:2.59:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g2_23-inch_non-touch_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g2_23-inch_touch_all-in-one_firmware:2.59:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g2_23-inch_touch_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g3_23.8_non-touch_all-in-one_business_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g3_23.8_non-touch_all-in-one_business:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g3_23.8-inch_non-touch_all-in-one_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g3_23.8-inch_non-touch_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g3_23.8-inch_non-touch_gpu_all-in-one_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g3_23.8-inch_non-touch_gpu_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g3_23.8-inch_touch_all-in-one_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g3_23.8-inch_touch_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g3_23.8-inch_touch_gpu_all-in-one_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g3_23.8-inch_touch_gpu_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g4_23.8-in_all-in-one_business_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g4_23.8-in_all-in-one_business:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_non-touch_all-in-one_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_non-touch_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_non-touch_gpu_all-in-one_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_non-touch_gpu_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_touch_all-in-one_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_touch_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_touch_gpu_all-in-one_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_touch_gpu_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g5_23.8-in_all-in-one_firmware:02.15.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g5_23.8-in_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g5_23.8-inch_all-in-one_firmware:02.15.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g5_23.8-inch_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g6_24_all-in-one_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g6_24_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g6_27_all-in-one_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g6_27_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g8_24_all-in-one_firmware:02.09.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g8_24_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g8_27_all-in-one_firmware:02.09.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g8_27_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_840_23.8_inch_g9_all-in-one_firmware:02.06.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_840_23.8_inch_g9_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:pro_mini_400_g9_firmware:02.05.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:pro_mini_400_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:pro_sff_400_g9_firmware:02.05.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:pro_sff_400_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:pro_tower_400_g9_firmware:02.05.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:pro_tower_400_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:pro_tower_480_g9_firmware:02.05.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:pro_tower_480_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g3_desktop_mini_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g3_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g4_desktop_mini_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g4_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g4_microtower_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g4_microtower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g4_small_form_factor_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g4_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g5_desktop_mini_firmware:02.15.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g5_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g5_microtower_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g5_microtower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g5_small_form_factor_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g5_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g6_desktop_mini_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g6_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g6_microtower_firmware:02.15.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g6_microtower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g6_small_form_factor_firmware:02.15.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g6_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g7_microtower_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g7_microtower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g7_small_form_factor_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g7_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_405_g4_desktop_mini_firmware:02.20.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_405_g4_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_405_g4_small_form_factor_firmware:02.20.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_405_g4_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_405_g6_desktop_mini_firmware:02.09.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_405_g6_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_405_g6_small_form_factor_firmware:02.09.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_405_g6_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_405_g8_desktop_mini_firmware:02.05.02:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_405_g8_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_405_g8_small_form_factor_firmware:02.05.02:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_405_g8_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_480_g4_microtower_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_480_g4_microtower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_480_g5_microtower_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_480_g5_microtower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_480_g6_microtower_firmware:02.15.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_480_g6_microtower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_480_g7_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_480_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g2_desktop_mini_firmware:2.59:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g2_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g2_microtower_firmware:2.59:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g2_microtower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g2_small_form_factor_firmware:2.59:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g2_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g3_desktop_mini_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g3_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g3_microtower_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g3_microtower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g3_small_form_factor_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g3_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g4_desktop_mini_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g4_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g4_microtower_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g4_microtower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g4_small_form_factor_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g4_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g5_desktop_mini_firmware:02.15.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g5_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g5_microtower_firmware:02.15.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g5_microtower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g5_small_form_factor_firmware:02.15.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g5_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g6_desktop_mini_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g6_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g6_microtower_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g6_microtower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g6_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g6_small_form_factor_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g6_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_680_g2_microtower_firmware:2.59:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_680_g2_microtower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_680_g3_microtower_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_680_g3_microtower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_680_g4_microtower_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_680_g4_microtower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_680_g6_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_680_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_400_g2_20-inch_non-touch_all-in-one_firmware:2.59:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_400_g2_20-inch_non-touch_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_400_g2_20-inch_touch_all-in-one_firmware:2.59:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_400_g2_20-inch_touch_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_400_g3_20-inch_non-touch_all-in-one_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_400_g3_20-inch_non-touch_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_400_g3_20-inch_touch_all-in-one_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_400_g3_20-inch_touch_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_400_g4_20-inch_non-touch_all-in-one_business_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_400_g4_20-inch_non-touch_all-in-one_business:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_400_g4_23.8-inch_non-touch_all-in-one_business_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_400_g4_23.8-inch_non-touch_all-in-one_business:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_400_g5_20-inch_all-in-one_business_firmware:02.15.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_400_g5_20-inch_all-in-one_business:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_400_g5_23.8-inch_all-in-one_business_firmware:02.15.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_400_g5_23.8-inch_all-in-one_business:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_400_g6_20_all-in-one_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_400_g6_20_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_400_g6_24_all-in-one_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_400_g6_24_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_440_23.8_inch_g9_all-in-one_firmware:02.05.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_440_23.8_inch_g9_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_440_g4_23.8-inch_non-touch_all-in-one_business_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_440_g4_23.8-inch_non-touch_all-in-one_business:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_440_g5_23.8-in_all-in-one_business_firmware:02.15.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_440_g5_23.8-in_all-in-one_business:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_440_g6_24_all-in-one_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_440_g6_24_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_480_g3_20-inch_non-touch_all-in_one_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_480_g3_20-inch_non-touch_all-in_one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_600_g2_21.5-inch_non-touch_all-in-one_firmware:2.59:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_600_g2_21.5-inch_non-touch_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_600_g2_21.5-inch_touch_all-in-one_firmware:2.59:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_600_g2_21.5-inch_touch_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_600_g3_21.5-inch_non-touch_all-in-one_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_600_g3_21.5-inch_non-touch_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_600_g4_21.5-inch_touch_all-in-one_business_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_600_g4_21.5-inch_touch_all-in-one_business:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_600_g5_21.5-in_all-in-one_business_firmware:02.15.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_600_g5_21.5-in_all-in-one_business:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_600_g6_22_all-in-one_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_600_g6_22_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z1_g8_tower_firmware:02.09.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z1_g8_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z1_g9_tower_firmware:02.05.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z1_g9_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_g3_22_all-in-one_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_g3_22_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_g3_24_all-in-one_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_g3_24_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:engage_flex_mini_retail_system_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:engage_flex_mini_retail_system:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:engage_flex_pro_retail_system_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:engage_flex_pro_retail_system:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:engage_flex_pro-c_retail_system_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:engage_flex_pro-c_retail_system:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:engage_go_10_mobile_system_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:engage_go_10_mobile_system:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:engage_go_mobile_system_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:engage_go_mobile_system:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:engage_one_aio_system_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:engage_one_aio_system:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:engage_one_pro_aio_system_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:engage_one_pro_aio_system:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:mp9_g2_retail_system_firmware:2.59:*:*:*:*:*:*:*", "cpe:2.3:h:hp:mp9_g2_retail_system:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:mp9_g4_retail_system_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:mp9_g4_retail_system:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:rp9_g1_retail_system_firmware:2.59:*:*:*:*:*:*:*", "cpe:2.3:h:hp:rp9_g1_retail_system:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z1_entry_tower_g5_workstation_firmware:02.15.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z1_entry_tower_g5_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z1_entry_tower_g6_workstation_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z1_entry_tower_g6_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z2_mini_g4_workstation_firmware:01.08.03:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z2_mini_g4_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z2_mini_g5_workstation_firmware:01.04.07:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z2_mini_g5_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z2_small_form_factor_g4_workstation_firmware:01.08.03:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z2_small_form_factor_g4_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z2_small_form_factor_g5_workstation_firmware:01.04.07:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z2_small_form_factor_g5_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z2_small_form_factor_g8_workstation_firmware:01.06.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z2_small_form_factor_g8_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z2_tower_g4_workstation_firmware:01.08.03:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z2_tower_g4_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z2_tower_g5_workstation_firmware:01.04.07:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z2_tower_g5_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z2_tower_g8_workstation_firmware:01.06.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z2_tower_g8_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:mt44_mobile_thin_client_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:mt44_mobile_thin_client:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:mt45_mobile_thin_client_firmware:01.21.10:*:*:*:*:*:*:*", "cpe:2.3:h:hp:mt45_mobile_thin_client:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:mt46_mobile_thin_client_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:mt46_mobile_thin_client:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2024-35183
wolfictl leaks GitHub tokens to remote non-GitHub git servers
wolfictl is a command line tool for working with Wolfi. A git authentication issue in versions prior to 0.16.10 allows a local user’s GitHub token to be sent to remote servers other than `github.com`. Most git-dependent functionality in wolfictl relies on its own `git` package, which contains centralized logic for implementing interactions with git repositories. Some of this functionality requires authentication in order to access private repositories. A central function `GetGitAuth` looks for a GitHub token in the environment variable `GITHUB_TOKEN` and returns it as an HTTP basic auth object to be used with the `github.com/go-git/go-git/v5` library. Most callers (direct or indirect) of `GetGitAuth` use the token to authenticate to github.com only; however, in some cases callers were passing this authentication without checking that the remote git repository was hosted on github.com. This behavior has existed in one form or another since commit 0d06e1578300327c212dda26a5ab31d09352b9d0 - committed January 25, 2023. This impacts anyone who ran the `wolfictl check update` commands with a Melange configuration that included a `git-checkout` directive step that referenced a git repository not hosted on github.com. This also impacts anyone who ran `wolfictl update <url>` with a remote URL outside of github.com. Additionally, these subcommands must have run with the `GITHUB_TOKEN` environment variable set to a valid GitHub token. Users should upgrade to version 0.16.10 to receive a patch.
[ "cpe:2.3:a:wolfi-dev:wolfictl:*:*:*:*:*:*:*:*" ]
null
4.4
null
null
CVE-2025-39989
x86/mce: use is_copy_from_user() to determine copy-from-user context
In the Linux kernel, the following vulnerability has been resolved: x86/mce: use is_copy_from_user() to determine copy-from-user context Patch series "mm/hwpoison: Fix regressions in memory failure handling", v4. ## 1. What am I trying to do: This patchset resolves two critical regressions related to memory failure handling that have appeared in the upstream kernel since version 5.17, as compared to 5.10 LTS. - copyin case: poison found in user page while kernel copying from user space - instr case: poison found while instruction fetching in user space ## 2. What is the expected outcome and why - For copyin case: Kernel can recover from poison found where kernel is doing get_user() or copy_from_user() if those places get an error return and the kernel return -EFAULT to the process instead of crashing. More specifily, MCE handler checks the fixup handler type to decide whether an in kernel #MC can be recovered. When EX_TYPE_UACCESS is found, the PC jumps to recovery code specified in _ASM_EXTABLE_FAULT() and return a -EFAULT to user space. - For instr case: If a poison found while instruction fetching in user space, full recovery is possible. User process takes #PF, Linux allocates a new page and fills by reading from storage. ## 3. What actually happens and why - For copyin case: kernel panic since v5.17 Commit 4c132d1d844a ("x86/futex: Remove .fixup usage") introduced a new extable fixup type, EX_TYPE_EFAULT_REG, and later patches updated the extable fixup type for copy-from-user operations, changing it from EX_TYPE_UACCESS to EX_TYPE_EFAULT_REG. It breaks previous EX_TYPE_UACCESS handling when posion found in get_user() or copy_from_user(). - For instr case: user process is killed by a SIGBUS signal due to #CMCI and #MCE race When an uncorrected memory error is consumed there is a race between the CMCI from the memory controller reporting an uncorrected error with a UCNA signature, and the core reporting and SRAR signature machine check when the data is about to be consumed. ### Background: why *UN*corrected errors tied to *C*MCI in Intel platform [1] Prior to Icelake memory controllers reported patrol scrub events that detected a previously unseen uncorrected error in memory by signaling a broadcast machine check with an SRAO (Software Recoverable Action Optional) signature in the machine check bank. This was overkill because it's not an urgent problem that no core is on the verge of consuming that bad data. It's also found that multi SRAO UCE may cause nested MCE interrupts and finally become an IERR. Hence, Intel downgrades the machine check bank signature of patrol scrub from SRAO to UCNA (Uncorrected, No Action required), and signal changed to #CMCI. Just to add to the confusion, Linux does take an action (in uc_decode_notifier()) to try to offline the page despite the UC*NA* signature name. ### Background: why #CMCI and #MCE race when poison is consuming in Intel platform [1] Having decided that CMCI/UCNA is the best action for patrol scrub errors, the memory controller uses it for reads too. But the memory controller is executing asynchronously from the core, and can't tell the difference between a "real" read and a speculative read. So it will do CMCI/UCNA if an error is found in any read. Thus: 1) Core is clever and thinks address A is needed soon, issues a speculative read. 2) Core finds it is going to use address A soon after sending the read request 3) The CMCI from the memory controller is in a race with MCE from the core that will soon try to retire the load from address A. Quite often (because speculation has got better) the CMCI from the memory controller is delivered before the core is committed to the instruction reading address A, so the interrupt is taken, and Linux offlines the page (marking it as poison). ## Why user process is killed for instr case Commit 046545a661af ("mm/hwpoison: fix error page recovered but reported "not ---truncated---
[]
null
null
null
null
RHSA-2022:1566
Red Hat Security Advisory: container-tools:2.0 security update
podman: Default inheritable capabilities for linux container should be empty buildah: Default inheritable capabilities for linux container should be empty
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
4.8
null
null
GHSA-9f58-q6j7-m5vv
In the Linux kernel, the following vulnerability has been resolved:drm/msm/dpu: check dpu_plane_atomic_print_state() for valid ssppSimilar to the r_pipe sspp protect, add a check to protect the pipe state prints to avoid NULL ptr dereference for cases when the state is dumped without a corresponding atomic_check() where the pipe->sspp is assigned.Patchwork: https://patchwork.freedesktop.org/patch/628404/
[]
null
5.5
null
null
RHSA-2019:0275
Red Hat Security Advisory: rh-haproxy18-haproxy security update
haproxy: Mishandling of priority flag in short HEADERS frame by HTTP/2 decoder allows for crash
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
null
7.5
null
CVE-2020-4183
IBM Security Guardium 11.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 174739.
[ "cpe:2.3:a:ibm:security_guardium:11.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" ]
null
null
6.1
null
GHSA-v5gv-3mwr-6223
An issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow.
[]
null
8.8
null
null
GHSA-9pcm-jqv9-fpv6
Sliced Invoices plugin for WordPress 3.8.2 and earlier allows unauthenticated information disclosure and authenticated SQL injection via core/class-sliced.php.
[]
null
null
null
null
GHSA-4qxg-68vm-h4qh
Vulnerabilities in the web-based management interface of ClearPass Policy Manager could allow an authenticated remote attacker to conduct SQL injection attacks against the ClearPass Policy Manager instance. An attacker could exploit these vulnerabilities to obtain and modify sensitive information in the underlying database potentially leading to complete compromise of the ClearPass Policy Manager cluster in Aruba ClearPass Policy Manager version(s): ClearPass Policy Manager 6.10.x: 6.10.7 and below and ClearPass Policy Manager 6.9.x: 6.9.12 and below.
[]
null
8.8
null
null
GHSA-fmr7-cqjx-qmxg
An issue was discovered in Jave2 version 3.3.1, allows attackers to execute arbitrary code via the FFmpeg function.
[]
null
8.8
null
null
GHSA-cgfw-8cxg-3rx5
ARM Trusted Firmware-A allows information disclosure.
[]
null
5.3
null
null
CVE-2023-7236
Backup Bolt <= 1.3.0 - Sensitive Data Exposure
The Backup Bolt WordPress plugin through 1.3.0 is vulnerable to Information Exposure via the unprotected access of debug logs. This makes it possible for unauthenticated attackers to retrieve the debug log which may contain information like system errors which could contain sensitive information.
[]
null
4.7
null
null
GHSA-wqw3-6p9p-84x8
Insufficient input validation in the Marvin Minsky 1967 implementation of the Universal Turing Machine allows program users to execute arbitrary code via crafted data. For example, a tape head may have an unexpected location after the processing of input composed of As and Bs (instead of 0s and 1s). NOTE: the discoverer states "this vulnerability has no real-world implications."
[]
null
null
null
null
GHSA-x989-5p93-53qj
Adobe Substance 3D Stager versions 2.1.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
5.5
null
null
RHSA-2020:0851
Red Hat Security Advisory: python-virtualenv security update
python-requests: Redirect from HTTPS to HTTP does not remove Authorization header python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
6.5
null
CVE-2014-4801
Cross-site scripting (XSS) vulnerability in IBM Rational Quality Manager 2.x through 2.0.1.1, 3.x before 3.0.1.6 iFix 4, 4.x before 4.0.7 iFix 2, and 5.x before 5.0.1 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.
[ "cpe:2.3:a:ibm:rational_quality_manager:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:2.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:2.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:3.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:3.0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:3.0.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:3.0.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:3.0.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:3.0.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:4.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:4.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:4.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:4.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:5.0.0:*:*:*:*:*:*:*" ]
null
null
null
3.5
GHSA-qj3r-x7hh-xq49
In all android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, existing checks in place on partition size are incomplete and can lead to heap overwrite vulnerabilities while loading a secure application from the boot loader.
[]
null
null
7.8
null
GHSA-qc4p-7g72-jqrq
An uninitialized memory use vulnerability exists in Tinyproxy 1.11.1 while parsing HTTP requests. In certain configurations, a specially crafted HTTP request can result in disclosure of data allocated on the heap, which could contain sensitive information. An attacker can make an unauthenticated HTTP request to trigger this vulnerability.
[]
null
5.9
null
null
CVE-2025-42599
Active! mail 6 BuildInfo: 6.60.05008561 and earlier contains a stack-based buffer overflow vulnerability. Receiving a specially crafted request created and sent by a remote unauthenticated attacker may lead to arbitrary code execution and/or a denial-of-service (DoS) condition.
[]
null
null
9.8
null
GHSA-9m9w-fffc-45mm
The login routine of the web console in the Zoom On-Premise Meeting Connector before version 4.6.239.20200613, Zoom On-Premise Meeting Connector MMR before version 4.6.239.20200613, Zoom On-Premise Recording Connector before version 3.8.42.20200905, Zoom On-Premise Virtual Room Connector before version 4.4.6344.20200612, and Zoom On-Premise Virtual Room Connector Load Balancer before version 2.5.5492.20200616 fails to validate that a NULL byte was sent while authenticating. This could lead to a crash of the login service.
[]
null
null
null
null
CVE-2014-0482
The contrib.auth.middleware.RemoteUserMiddleware middleware in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3, when using the contrib.auth.backends.RemoteUserBackend backend, allows remote authenticated users to hijack web sessions via vectors related to the REMOTE_USER header.
[ "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.6:-:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.6:beta1:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.6:beta2:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.6:beta3:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.6:beta4:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.4:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.4.10:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.4.11:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.4.12:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.7:beta1:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.7:beta2:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.7:beta3:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.7:beta4:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.7:rc1:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.7:rc2:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.5:alpha:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.5:beta:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:djangoproject:django:1.5.8:*:*:*:*:*:*:*" ]
null
null
null
6
CVE-2014-1670
The Microsoft Bing application before 4.2.1 for Android allows remote attackers to install arbitrary APK files via vectors involving a crafted DNS response.
[ "cpe:2.3:a:microsoft:bing:*:-:-:*:-:android:*:*" ]
null
null
null
6.8
RHSA-2024:3203
Red Hat Security Advisory: systemd security update
systemd-resolved: Unsigned name response in signed zone is not refused when DNSSEC=yes
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
5.9
null
null
CVE-2021-36668
URL injection in Driva inSync 6.9.0 for MacOS, allows attackers to force a visit to an arbitrary url via the port parameter to the Electron App.
[ "cpe:2.3:a:druva:insync_client:*:*:*:*:*:linux:*:*", "cpe:2.3:a:druva:insync_client:*:*:*:*:*:macos:*:*", "cpe:2.3:a:druva:insync_client:*:*:*:*:*:windows:*:*" ]
null
7.8
null
4.6
GHSA-7p4q-fv59-h67q
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word for Mac 2011, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2 and 2013 SP1, and Office Web Apps Server 2010 SP2 and 2013 SP1 allow remote attackers to execute arbitrary code via a crafted RTF document, aka "Microsoft Office Memory Corruption Vulnerability."
[]
null
7.8
null
null
CVE-2021-38353
Dropdown and scrollable Text <= 2.0 Reflected Cross-Site Scripting
The Dropdown and scrollable Text WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the content parameter found in the ~/index.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 2.0.
[ "cpe:2.3:a:webodid:dropdown_and_scrollable_text:*:*:*:*:*:wordpress:*:*" ]
null
6.1
null
null
CVE-2009-0463
PHP remote file inclusion vulnerability in includes/header.php in Groone GLinks 2.1 allows remote attackers to execute arbitrary PHP code via a URL in the abspath parameter.
[ "cpe:2.3:a:groonesworld:glinks:2.1:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2022-42139
Delta Electronics DVW-W02W2-E2 1.5.0.10 is vulnerable to Command Injection via Crafted URL.
[ "cpe:2.3:o:deltaww:dvw-w02w2-e2_firmware:2.42:*:*:*:*:*:*:*", "cpe:2.3:h:deltaww:dvw-w02w2-e2:-:*:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-vx4j-8qgw-52j3
Integer overflow in the systrace_preprepl function (STRIOCREPLACE) in systrace in OpenBSD 3.9 and NetBSD 3 allows local users to cause a denial of service (crash), gain privileges, or read arbitrary kernel memory via large numeric arguments to the systrace ioctl.
[]
null
null
null
null
GHSA-v842-8rq8-6j89
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Key4ce osTicket Bridge allows Reflected XSS. This issue affects Key4ce osTicket Bridge: from n/a through 1.4.0.
[]
null
7.1
null
null
GHSA-7r5q-7rq4-xmm9
A crafted NTFS image can trigger an out-of-bounds access, caused by an unsanitized attribute length in ntfs_inode_lookup_by_name, in NTFS-3G < 2021.8.22.
[]
null
7.8
null
null
CVE-2017-8082
concrete5 8.1.0 has CSRF in Thumbnail Editor in the File Manager, which allows remote attackers to disable the entire installation by merely tricking an admin into viewing a malicious page involving the /tools/required/files/importers/imageeditor?fID=1&imgData= URI. This results in a site-wide denial of service making the site not accessible to any users or any administrators.
[ "cpe:2.3:a:concretecms:concrete_cms:8.1.0:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
GHSA-vp2x-m8xv-v82v
Adobe Acrobat and Reader versions 2019.010.20098 and earlier, 2019.010.20098 and earlier, 2017.011.30127 and earlier version, and 2015.006.30482 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution .
[]
null
null
9.8
null
GHSA-495g-cj2m-hr56
A vulnerability in Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to access sensitive information on an affected device. The vulnerability is due to improper inclusion of sensitive information in downloadable files. An attacker could exploit this vulnerability by authenticating to an affected device and issuing a specific set of commands. A successful exploit could allow the attacker to obtain hashed credentials of system users. To exploit this vulnerability an attacker would need to have valid user credentials with elevated privileges.
[]
null
4.9
null
null
CVE-2005-1754
JavaMail API 1.1.3 through 1.3, as used by Apache Tomcat 5.0.16, allows remote attackers to read arbitrary files via a full pathname in the argument to the Download parameter. NOTE: Sun and Apache dispute this issue. Sun states: "The report makes references to source code and files that do not exist in the mentioned products.
[ "cpe:2.3:a:apache_tomcat:apache_tomcat:5.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:sun:javamail:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:sun:javamail:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:sun:javamail:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:sun:javamail:1.3.2:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-g5x4-6wrj-6j37
Missing Authorization vulnerability in Tips and Tricks HQ, wptipsntricks Stripe Payments allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Stripe Payments: from n/a through 2.0.79.
[]
null
8.2
null
null
RHSA-2023:3394
Red Hat Security Advisory: pki-core:10.6 security update
pki-core: When using the caServerKeygen_DirUserCert profile, user can get certificates for other UIDs by entering name in Subject field pki-core: access to external entities when parsing XML can lead to XXE
[ "cpe:/a:redhat:rhel_eus:8.6::appstream" ]
null
7.5
null
null
CVE-2018-0294
A vulnerability in the write-erase feature of Cisco FXOS Software and Cisco NX-OS Software could allow an authenticated, local attacker to configure an unauthorized administrator account for an affected device. The vulnerability exists because the affected software does not properly delete sensitive files when certain CLI commands are used to clear the device configuration and reload a device. An attacker could exploit this vulnerability by logging into an affected device as an administrative user and configuring an unauthorized account for the device. The account would not require a password for authentication and would be accessible only via a Secure Shell (SSH) connection to the device. A successful exploit could allow the attacker to configure an unauthorized account that has administrative privileges, does not require a password for authentication, and does not appear in the running configuration or the audit logs for the affected device. This vulnerability affects Firepower 4100 Series Next-Generation Firewalls, Firepower 9300 Security Appliance, Nexus 1000V Series Switches, Nexus 1100 Series Cloud Services Platforms, Nexus 2000 Series Fabric Extenders, Nexus 3500 Platform Switches, Nexus 4000 Series Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, UCS 6100 Series Fabric Interconnects, UCS 6200 Series Fabric Interconnects, UCS 6300 Series Fabric Interconnects. Cisco Bug IDs: CSCvd13993, CSCvd34845, CSCvd34857, CSCvd34862, CSCvd34879, CSCve35753.
[ "cpe:2.3:o:cisco:nx-os:7.3\\(2\\)n1\\(0.354\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_5000:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_5010:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_5020:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_5548p:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_5548up:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_5596t:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_5596up:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_56128p:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_5624q:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_5648q:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_5672up:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_5696q:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:5.2\\(1\\)sv3\\(1.10\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_1000v:-:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:o:cisco:nx-os:8.8\\(3.5\\)s0:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_92160yc-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_92304qc:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9236c:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9272q:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_93180yc-ex:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_n9k-c9508-fm-r:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_n9k-x9636c-r:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_n9k-x9636q-r:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i2\\(4a\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_172tq-xl:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3016:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3064-32t:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3064-t:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3064-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3100-v:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_31128pq:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3132c-z:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3132q:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3132q-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3132q-xl:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3164q:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3172pq:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3172pq-xl:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3172tq:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3172tq-32t:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3232c:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3264c-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3264q:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_34180yc:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3524-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3524-xl:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3548-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3548-xl:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_3636c-r:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_c36180yc-r:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ucs_6120xp:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ucs_6140xp:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ucs_6248up:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ucs_6296up:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ucs_6324:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ucs_6332:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:fxos:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:firepower_4110:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:firepower_4120:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:firepower_4140:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:firepower_4150:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:firepower_9300_security_appliance:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:4.1\\(2\\)e1\\(1a\\):*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_4001:-:*:*:*:*:*:*:*" ]
null
null
6.7
7.2
GHSA-8wp6-p8r2-jh2m
Missing Authorization vulnerability in HM Plugin WordPress Stripe Donation and Payment Plugin allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WordPress Stripe Donation and Payment Plugin: from n/a through 3.2.3.
[]
null
5.3
null
null
CVE-2022-20357
In writeToParcel of SurfaceControl.cpp, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12LAndroid ID: A-214999987
[ "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-f6mr-g7jq-gx82
Improper Input Validation vulnerability in The Document Foundation LibreOffice allows Windows Executable hyperlink targets to be executed unconditionally on activation.This issue affects LibreOffice: from 24.8 before < 24.8.5.
[]
7.2
null
null
null
GHSA-f775-fgwg-5qvw
Memory safety bugs present in Firefox 60. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 61.
[]
null
null
9.8
null
CVE-2012-1084
Cross-site scripting (XSS) vulnerability in the BE User Switch (beuserswitch) extension 0.0.1 for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:typo3:beuserswitch:0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-9vc6-7j3x-7x4v
neon before 0.28.6, when expat is used, does not properly detect recursion during entity expansion, which allows context-dependent attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document containing a large number of nested entity references, a similar issue to CVE-2003-1564.
[]
null
null
null
null
CVE-2020-26534
An issue was discovered in Foxit Reader and PhantomPDF before 10.1. There is an Opt object use-after-free related to Field::ClearItems and Field::DeleteOptions, during AcroForm JavaScript execution.
[ "cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*", "cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-3p9p-h6x6-85gg
The issue was addressed with improved memory handling. This issue is fixed in Safari 16.2, tvOS 16.2, macOS Ventura 13.1, iOS 15.7.2 and iPadOS 15.7.2, iOS 16.2 and iPadOS 16.2, watchOS 9.2. Processing maliciously crafted web content may result in the disclosure of process memory.
[]
null
6.5
null
null
GHSA-j5xg-f9fp-j9cm
In telephony, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06511058; Issue ID: ALPS06511058.
[]
null
5.5
null
null
GHSA-cf89-r95f-3mf7
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, and CVE-2016-6931.
[]
null
null
9.8
null
CVE-2000-1082
The xp_enumresultset function in SQL Server and Microsoft SQL Server Desktop Engine (MSDE) does not properly restrict the length of a buffer before calling the srv_paraminfo function in the SQL Server API for Extended Stored Procedures (XP), which allows an attacker to cause a denial of service or execute arbitrary commands, aka the "Extended Stored Procedure Parameter Parsing" vulnerability.
[ "cpe:2.3:a:microsoft:data_engine:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:data_engine:2000:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:2000:*:*:*:*:*:*:*" ]
null
null
null
4.6
GHSA-wmcm-5h3j-97jg
Stored XSS in EspoCRM before 5.6.4 allows remote attackers to execute malicious JavaScript and inject arbitrary source code into the target pages. The attack begins by storing a new stream message containing an XSS payload. The stored payload can then be triggered by clicking a malicious link on the Notifications page.
[]
null
null
6.1
null
CVE-2023-40177
XWiki Platform privilege escalation (PR) from account through AWM content fields
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any registered user can use the content field of their user profile page to execute arbitrary scripts with programming rights, thus effectively performing rights escalation. This issue is present since version 4.3M2 when AppWithinMinutes Application added support for the Content field, allowing any wiki page (including the user profile page) to use its content as an AWM Content field, which has a custom displayer that executes the content with the rights of the ``AppWithinMinutes.Content`` author, rather than the rights of the content author. The vulnerability has been fixed in XWiki 14.10.5 and 15.1RC1. The fix is in the content of the AppWithinMinutes.Content page that defines the custom displayer. By using the ``display`` script service to render the content we make sure that the proper author is used for access rights checks.
[ "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", "cpe:2.3:a:xwiki:xwiki:4.3:milestone2:*:*:*:*:*:*", "cpe:2.3:a:xwiki:xwiki:15.0:-:*:*:*:*:*:*", "cpe:2.3:a:xwiki:xwiki:15.0:rc1:*:*:*:*:*:*" ]
null
9.9
null
null
CVE-2000-0697
The administration interface for the dwhttpd web server in Solaris AnswerBook2 allows interface users to remotely execute commands via shell metacharacters.
[ "cpe:2.3:a:sun:solaris_answerbook2:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:sun:solaris_answerbook2:1.4:*:*:*:*:*:*:*", "cpe:2.3:a:sun:solaris_answerbook2:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:sun:solaris_answerbook2:1.4.2:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-g4q8-qvc6-px3p
Dell BSAFE Crypto-C Micro Edition, versions before 4.1.5, and Dell BSAFE Micro Edition Suite, versions before 4.6, contain a Use of Insufficiently Random Values Vulnerability.
[]
null
9.8
null
null
RHSA-2013:1843
Red Hat Security Advisory: Red Hat JBoss Portal 6.1.0 security update
GateIn: XSS due to improper url escaping
[ "cpe:/a:redhat:jboss_enterprise_portal_platform:6.1.0" ]
null
null
null
null
CVE-2024-44217
A permissions issue was addressed by removing vulnerable code and adding additional checks. This issue is fixed in iOS 18 and iPadOS 18. Password autofill may fill in passwords after failing authentication.
[ "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*" ]
null
9.1
null
null
CVE-2015-6064
Microsoft Internet Explorer 10 and 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Microsoft Browser Memory Corruption Vulnerability," a different vulnerability than CVE-2015-6084 and CVE-2015-6085.
[ "cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*" ]
null
null
null
9.3
CVE-2022-28808
An issue was discovered in Open Design Alliance Drawings SDK before 2023.3. An Out-of-Bounds Read vulnerability exists when reading DWG files in a recovery mode. An attacker can leverage this vulnerability to execute code in the context of the current process.
[ "cpe:2.3:a:opendesign:drawings_sdk:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2017-1277
IBM Rational Quality Manager and IBM Rational Collaborative Lifecycle Management 5.0 through 5.0.2 and 6.0 through 6.0.5 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 124752.
[ "cpe:2.3:a:ibm:rational_quality_manager:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:6.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:6.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_quality_manager:6.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_collaborative_lifecycle_management:6.0.5:*:*:*:*:*:*:*" ]
null
null
5.4
null
GHSA-2322-g7g4-r84v
Unspecified vulnerability in MyBB (aka MyBulletinBoard) 1.1.4, related has unspecified impact and attack vectors related to "user group manipulation."
[]
null
null
null
null
GHSA-jv4p-f6mv-66w4
The CClient::ProcessServerPacket method in engine/client/client.cpp in Teeworlds before 0.6.4 allows remote servers to write to arbitrary physical memory locations and possibly execute arbitrary code via vectors involving snap handling.
[]
null
9.8
null
null
GHSA-2w87-6hh6-mqrj
On Windows a directory returned by tempfile.mkdtemp() would not always have permissions set to restrict reading and writing to the temporary directory by other users, instead usually inheriting the correct permissions from the default location. Alternate configurations or users without a profile directory may not have the intended permissions.If you’re not using Windows or haven’t changed the temporary directory location then you aren’t affected by this vulnerability. On other platforms the returned directory is consistently readable and writable only by the current user.This issue was caused by Python not supporting Unix permissions on Windows. The fix adds support for Unix “700” for the mkdir function on Windows which is used by mkdtemp() to ensure the newly created directory has the proper permissions.
[]
null
7.1
null
null
GHSA-w825-9xqr-f6q3
In the Linux kernel, the following vulnerability has been resolved:bpf: Track subprog poke descriptors correctly and fix use-after-freeSubprograms are calling map_poke_track(), but on program release there is no hook to call map_poke_untrack(). However, on program release, the aux memory (and poke descriptor table) is freed even though we still have a reference to it in the element list of the map aux data. When we run map_poke_run(), we then end up accessing free'd memory, triggering KASAN in prog_array_map_poke_run():[...] [ 402.824689] BUG: KASAN: use-after-free in prog_array_map_poke_run+0xc2/0x34e [ 402.824698] Read of size 4 at addr ffff8881905a7940 by task hubble-fgs/4337 [ 402.824705] CPU: 1 PID: 4337 Comm: hubble-fgs Tainted: G I 5.12.0+ #399 [ 402.824715] Call Trace: [ 402.824719] dump_stack+0x93/0xc2 [ 402.824727] print_address_description.constprop.0+0x1a/0x140 [ 402.824736] ? prog_array_map_poke_run+0xc2/0x34e [ 402.824740] ? prog_array_map_poke_run+0xc2/0x34e [ 402.824744] kasan_report.cold+0x7c/0xd8 [ 402.824752] ? prog_array_map_poke_run+0xc2/0x34e [ 402.824757] prog_array_map_poke_run+0xc2/0x34e [ 402.824765] bpf_fd_array_map_update_elem+0x124/0x1a0 [...]The elements concerned are walked as follows:The access to size_poke_tab is a 4 byte read, verified by checking offsets in the KASAN dump:[ 402.825004] The buggy address belongs to the object at ffff8881905a7800 which belongs to the cache kmalloc-1k of size 1024 [ 402.825008] The buggy address is located 320 bytes inside of 1024-byte region [ffff8881905a7800, ffff8881905a7c00)The pahole output of bpf_prog_aux:struct bpf_prog_aux { [...] /* --- cacheline 5 boundary (320 bytes) --- */ u32 size_poke_tab; /* 320 4 */ [...]In general, subprograms do not necessarily manage their own data structures. For example, BTF func_info and linfo are just pointers to the main program structure. This allows reference counting and cleanup to be done on the latter which simplifies their management a bit. The aux->poke_tab struct, however, did not follow this logic. The initial proposed fix for this use-after-free bug further embedded poke data tracking into the subprogram with proper reference counting. However, Daniel and Alexei questioned why we were treating these objects special; I agree, its unnecessary. The fix here removes the per subprogram poke table allocation and map tracking and instead simply points the aux->poke_tab pointer at the main programs poke table. This way, map tracking is simplified to the main program and we do not need to manage them per subprogram.This also means, bpf_prog_free_deferred(), which unwinds the program reference counting and kfrees objects, needs to ensure that we don't try to double free the poke_tab when free'ing the subprog structures. This is easily solved by NULL'ing the poke_tab pointer. The second detail is to ensure that per subprogram JIT logic only does fixups on poke_tab[] entries it owns. To do this, we add a pointer in the poke structure to point at the subprogram value so JITs can easily check while walking the poke_tab structure if the current entry belongs to the current program. The aux pointer is stable and therefore suitable for such comparison. On the jit_subprogs() error path, we omit cleaning up the poke->aux field because these are only ever referenced from the JIT side, but on error we will never make it to the JIT, so its fine to leave them dangling. Removing these pointers would complicate the error path for no reason. However, we do need to untrack all poke descriptors from the main program as otherwise they could race with the freeing of JIT memory from the subprograms. Lastly, a748c6975dea3 ("bpf: propagate poke des ---truncated---
[]
null
7.8
null
null
RHSA-2019:1880
Red Hat Security Advisory: curl security and bug fix update
curl: NTLM password overflow via integer overflow
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.5
null
GHSA-q97v-2cp6-jv6p
Transient DOS as modem reset occurs when an unexpected MAC RAR (with invalid PDU length) is seen at UE.
[]
null
7.5
null
null
GHSA-jq64-pj79-mg78
Intellian Satellite TV antennas t-Series and v-Series, firmware version 1.07, uses non-random default credentials of: ftp/ftp or intellian:12345678. A remote network attacker can gain elevated access to a vulnerable device.
[]
null
null
9.8
null
RHSA-2013:0241
Red Hat Security Advisory: xen security update
xen: Xen domain builder Out-of-memory due to malicious kernel/ramdisk
[ "cpe:/a:redhat:rhel_virtualization:5::server", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
GHSA-4pjg-3rwx-hmxx
An issue was discovered on URayTech IPTV/H.264/H.265 video encoders through 1.97. Attackers can log in as root via the password that is hard-coded in the executable file.
[]
null
null
null
null
CVE-2018-12930
ntfs_end_buffer_async_read in the ntfs.ko filesystem driver in the Linux kernel 4.15.0 allows attackers to trigger a stack-based out-of-bounds write and cause a denial of service (kernel oops or panic) or possibly have unspecified other impact via a crafted ntfs filesystem.
[ "cpe:2.3:o:linux:linux_kernel:4.15:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04.4:*:*:*:lts:*:*:*" ]
null
null
7.8
7.2
CVE-2021-46990
powerpc/64s: Fix crashes when toggling entry flush barrier
In the Linux kernel, the following vulnerability has been resolved: powerpc/64s: Fix crashes when toggling entry flush barrier The entry flush mitigation can be enabled/disabled at runtime via a debugfs file (entry_flush), which causes the kernel to patch itself to enable/disable the relevant mitigations. However depending on which mitigation we're using, it may not be safe to do that patching while other CPUs are active. For example the following crash: sleeper[15639]: segfault (11) at c000000000004c20 nip c000000000004c20 lr c000000000004c20 Shows that we returned to userspace with a corrupted LR that points into the kernel, due to executing the partially patched call to the fallback entry flush (ie. we missed the LR restore). Fix it by doing the patching under stop machine. The CPUs that aren't doing the patching will be spinning in the core of the stop machine logic. That is currently sufficient for our purposes, because none of the patching we do is to that code or anywhere in the vicinity.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-7hgf-pcvc-hj4r
Unspecified vulnerability on Cisco Adaptive Security Appliances (ASA) 5500 Series and PIX Security Appliances 7.2 before 7.2(4)26, 8.0 before 8.0(4)22, and 8.1 before 8.1(2)12, when SQL*Net inspection is enabled, allows remote attackers to cause a denial of service (traceback and device reload) via a series of SQL*Net packets.
[]
null
null
null
null
CVE-2022-35136
Boodskap IoT Platform v4.4.9-02 allows attackers to make unauthenticated API requests.
[ "cpe:2.3:a:boodskap:iot_platform:4.4.9-02:*:*:*:*:*:*:*" ]
null
6.5
null
null
CVE-2018-18211
PbootCMS 1.2.1 has SQL injection via the HTTP POST data to the api.php/cms/addform?fcode=1 URI.
[ "cpe:2.3:a:pbootcms:pbootcms:1.2.1:*:*:*:*:*:*:*" ]
null
null
8.1
6.8
CVE-2023-45688
Information leak via path traversal in Titan MFT and Titan SFTP servers
Lack of sufficient path validation in South River Technologies' Titan MFT and Titan SFTP servers on Linux allows an authenticated attacker to get the size of an arbitrary file on the filesystem using path traversal in the ftp "SIZE" command
[ "cpe:2.3:a:southrivertech:titan_mft_server:*:*:*:*:*:linux:*:*", "cpe:2.3:a:southrivertech:titan_sftp_server:*:*:*:*:*:linux:*:*" ]
null
4.3
null
null
CVE-2024-8553
Foreman: read-only access to entire db from templates
A vulnerability was found in Foreman's loader macros introduced with report templates. These macros may allow an authenticated user with permissions to view and create templates to read any field from Foreman's database. By using specific strings in the loader macros, users can bypass permissions and access sensitive information.
[ "cpe:/a:redhat:satellite:6.13::el8", "cpe:/a:redhat:satellite_capsule:6.13::el8", "cpe:/a:redhat:satellite_utils:6.13::el8", "cpe:/a:redhat:satellite_maintenance:6.13::el8", "cpe:/a:redhat:satellite_capsule:6.14::el8", "cpe:/a:redhat:satellite:6.14::el8", "cpe:/a:redhat:satellite_utils:6.14::el8", "cpe:/a:redhat:satellite_utils:6.15::el8", "cpe:/a:redhat:satellite:6.15::el8", "cpe:/a:redhat:satellite_capsule:6.15::el8", "cpe:/a:redhat:satellite_capsule:6.16::el8", "cpe:/a:redhat:satellite_maintenance:6.16::el8", "cpe:/a:redhat:satellite_utils:6.16::el8", "cpe:/a:redhat:satellite_maintenance:6.16::el9", "cpe:/a:redhat:satellite:6.16::el9", "cpe:/a:redhat:satellite_capsule:6.16::el9", "cpe:/a:redhat:satellite:6.16::el8", "cpe:/a:redhat:satellite_utils:6.16::el9" ]
null
6.3
null
null
GHSA-c2jj-rr3q-vvv8
The Admin side data storage for Contact Form 7 plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1.1. This is due to missing or incorrect nonce validation on the settings update function. This makes it possible for unauthenticated attackers to update the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
null
4.3
null
null
GHSA-cvj5-pqcm-39fq
SQL injection vulnerability in modules/myalbum/viewcat.php in the myAlbum-P 2.0 and earlier module for Xoops allows remote attackers to execute arbitrary SQL commands via the cid parameter.
[]
null
null
null
null
RHSA-2020:3868
Red Hat Security Advisory: SDL security update
SDL: buffer over-read in IMA_ADPCM_nibble in audio/SDL_wave.c SDL: heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c SDL: heap-based buffer over-read in IMA_ADPCM_decode in audio/SDL_wave.c SDL: heap-based buffer overflow in MS_ADPCM_decode in audio/SDL_wave.c SDL: heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c SDL: buffer over-read in SDL_LoadWAV_RW in audio/SDL_wave.c SDL: heap-based buffer over-read in InitIMA_ADPCM in audio/SDL_wave.c SDL: heap-based buffer over-read in Blit1to4 in video/SDL_blit_1.c SDL: heap-based buffer over-read in SDL_GetRGB in video/SDL_pixels.c SDL: heap-based buffer overflow in SDL_FillRect in video/SDL_surface.c SDL: heap-based buffer over-read in Map1toN in video/SDL_pixels.c
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
8.4
null
GHSA-79jx-q243-6wc7
An issue in Univention UCS v.5.0 allows a local attacker to execute arbitrary code and gain privileges via the check_univention_joinstatus function.
[]
null
7.9
null
null
CVE-2024-12475
WP Multi Store Locator <= 2.4.1 - Authenticated (Contributor+) Stored Cross-Site Scripting
The WP Multi Store Locator plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 2.4.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
GHSA-3pww-pqg2-m2hm
A Use-After-Free vulnerability in the management of an SNP guest context page may allow a malicious hypervisor to masquerade as the guest's migration agent resulting in a potential loss of guest integrity.
[]
null
3.3
null
null
GHSA-33c2-986r-8vm4
A vulnerability in the web-based management interface of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the targeted user. If the user has administrative privileges, the attacker could alter the configuration, execute commands, or cause a denial of service (DoS) condition on an affected device.
[]
null
null
null
null
GHSA-5mqx-6pmx-647m
vox2mesh 1.0 has stack-overflow in main.cpp, this is stack-overflow caused by incorrect use of memcpy() funciton. The flow allows an attacker to cause a denial of service (abort) via a crafted file.
[]
null
5.5
null
null
GHSA-489v-cqqf-vxgv
The vmx_set_uc_mode function in Xen 3.3 through 4.3, when disabling caches, allows local HVM guests with access to memory mapped I/O regions to cause a denial of service (CPU consumption and possibly hypervisor or guest kernel panic) via a crafted GFN range.
[]
null
null
null
null
GHSA-5prg-h6vm-wxcf
A post-authenticated server-side request forgery (SSRF) vulnerability in Trend Micro Apex Central 2019 (lower than build 6481) could allow an attacker to interact with internal or local services directly.Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.This is a similar, but not identical vulnerability as CVE-2023-38625.
[]
null
5.4
null
null
CVE-2024-1901
Denial of service in PAM password rotation during the check-in process in Devolutions Server 2023.3.14.0 allows an authenticated user with specific PAM permissions to make PAM credentials unavailable.
[]
null
4.3
null
null
ICSA-18-114-01
Vecna VGo Robot (Update A)
An attacker may be able to capture firmware updates through the adjacent network.CVE-2018-8860 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). User accounts may be able to execute commands that are outside the scope of their privileges and within the scope of an admin account. If an attacker has access to VGo XAMPP Client credentials, they may be able to execute admin commands on the connected robot.CVE-2018-17933 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). If an attacker has physical access to the VGo Robot they may be able to alter scripts, which may allow code execution with root privileges.CVE-2018-17931 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). If an attacker has access to the firmware they may be able to extract credentials.CVE-2018-8858 has been assigned to this vulnerability. A CVSS v3 base score of 4.7 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N)
[]
null
null
4.7
null
GHSA-g7cg-jg33-rrhv
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 is vulnerable to a denial of service as the server may crash when using a specially crafted subquery. IBM X-Force ID: 249196.
[]
null
5.3
null
null
CVE-2022-2870
laravel deserialization
A vulnerability was found in laravel 5.1 and classified as problematic. This issue affects some unknown processing. The manipulation leads to deserialization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-206501 was assigned to this vulnerability.
[ "cpe:2.3:a:laravel:laravel:*:*:*:*:*:*:*:*" ]
null
4.1
null
null
CVE-2021-45613
Certain NETGEAR devices are affected by command injection by an unauthenticated attacker. This affects CBR40 before 2.5.0.24, CBR750 before 4.6.3.6, D7000v2 before 1.0.0.74, LAX20 before 1.1.6.28, MK62 before 1.0.6.116, MR60 before 1.0.6.116, MS60 before 1.0.6.116, MR80 before 1.1.2.20, MS80 before 1.1.2.20, RAX15 before 1.0.3.96, RAX20 before 1.0.3.96, RAX200 before 1.0.4.120, RAX45 before 1.0.3.96, RAX50 before 1.0.3.96, RAX43 before 1.0.3.96, RAX40v2 before 1.0.3.96, RAX35v2 before 1.0.3.96, RAX75 before 1.0.4.120, RAX80 before 1.0.4.120, RBK752 before 3.2.17.12, RBR750 before 3.2.17.12, RBS750 before 3.2.17.12, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, RBS850 before 3.2.17.12, and XR1000 before 1.0.0.58.
[ "cpe:2.3:o:netgear:cbr40_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:cbr40:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:cbr750_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:cbr750:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:d7000v2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d7000v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:lax20_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:lax20:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:mk62_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:mk62:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:mr60_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:mr60:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:ms60_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:ms60:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rax15_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rax15:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rax20_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rax20:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rax200_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rax200:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rax35v2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rax35v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rax40v2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rax40v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rax43_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rax43:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rax45_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rax45:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rax50_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rax50:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rax75_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rax75:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rax80_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rax80:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbk752_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbk752:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbk852_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbk852:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbr750_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbr750:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbr850_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbr850:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbs750_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbs750:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbs850_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbs850:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:xr1000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:xr1000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:mr80_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:mr80:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:ms80_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:ms80:-:*:*:*:*:*:*:*" ]
null
9.6
null
null
GHSA-c6ch-8c92-7xrf
In Artica Pandora FMS version 7.0, an Attacker with write Permission can create an agent with an XSS Payload; when a user enters the agent definitions page, the script will get executed.
[]
null
null
5.4
null
CVE-2024-46263
cute_png v1.05 was discovered to contain a stack overflow via the cp_dynamic() function at cute_png.h.
[ "cpe:2.3:a:cute_png:cute_png:1.05:*:*:*:*:*:*:*", "cpe:2.3:a:randygaul:cute_png:1.05:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-75gp-f39c-g44v
Tenda AC6 v2.0 V15.03.06.50 was discovered to contain a buffer overflow in the function 'formSetPPTPServer'.
[]
null
8.8
null
null
CVE-2021-43786
API token verification can be bypassed
Nodebb is an open source Node.js based forum software. In affected versions incorrect logic present in the token verification step unintentionally allowed master token access to the API. The vulnerability has been patch as of v1.18.5. Users are advised to upgrade as soon as possible.
[ "cpe:2.3:a:nodebb:nodebb:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2019-10018
An issue was discovered in Xpdf 4.01.01. There is an FPE in the function PostScriptFunction::exec at Function.cc for the psOpIdiv case.
[ "cpe:2.3:a:xpdfreader:xpdf:4.01.01:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*" ]
null
5.5
null
4.3
GHSA-v783-rccm-cpr3
Atos Unify OpenScape UC Web Client 1.0 allows remote attackers to obtain sensitive information. By iterating the value of conferenceId to getMailFunction in the JSON API, one can enumerate all conferences scheduled on the platform, with their numbers and access PINs.
[]
null
7.5
null
null
CVE-2024-0130
NVIDIA UFM Enterprise, UFM Appliance, and UFM CyberAI contain a vulnerability where an attacker can cause an improper authentication issue by sending a malformed request through the Ethernet management interface. A successful exploit of this vulnerability might lead to escalation of privileges, data tampering, denial of service, and information disclosure.
[]
null
8.8
null
null
CVE-2024-0399
WooCommerce Customers Manager < 29.7 - Subscriber+ SQL Injection
The WooCommerce Customers Manager WordPress plugin before 29.7 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to an SQL injection exploitable by Subscriber+ role.
[ "cpe:2.3:a:woocommerce:woocommerce_customers_manager:*:*:*:*:*:*:*:*" ]
null
8.1
null
null
GHSA-qhc8-285g-r82q
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in DonnellC Global Gateway e4 | Payeezy Gateway.This issue affects Global Gateway e4 | Payeezy Gateway: from n/a through 2.0.
[]
null
8.6
null
null
CVE-2002-1221
BIND 8.x through 8.3.3 allows remote attackers to cause a denial of service (crash) via SIG RR elements with invalid expiry times, which are removed from the internal BIND database and later cause a null dereference.
[ "cpe:2.3:a:isc:bind:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.2:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:8.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:4.4:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:4.5:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:4.6:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:4.7:*:*:*:*:*:*:*", "cpe:2.3:o:openbsd:openbsd:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:*", "cpe:2.3:o:openbsd:openbsd:3.2:*:*:*:*:*:*:*" ]
null
null
null
5