id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
4.89k
|
---|---|---|---|
CVE-2023-2122 | Image Optimizer by 10web < 1.0.27 - Reflected Cross-Site Scripting | The Image Optimizer by 10web WordPress plugin before 1.0.27 does not sanitise and escape the iowd_tabs_active parameter before rendering it in the plugin admin panel, leading to a reflected Cross-Site Scripting vulnerability, allowing an attacker to trick a logged in admin to execute arbitrary javascript by clicking a link. | [
"cpe:2.3:a:10web:image_optimizer:*:*:*:*:*:wordpress:*:*"
]
|
CVE-2023-41630 | eSST Monitoring v2.147.1 was discovered to contain a remote code execution (RCE) vulnerability via the Gii code generator component. | [
"cpe:2.3:a:esst:esst_monitoring:*:*:*:*:*:*:*:*"
]
|
|
CVE-2022-26103 | Under certain conditions, SAP NetWeaver (Real Time Messaging Framework) - version 7.50, allows an attacker to access information which could lead to information gathering for further exploits and attacks. | [
"cpe:2.3:a:sap:netweaver_application_server_java:7.50:*:*:*:*:*:*:*"
]
|
|
GHSA-p5x9-86p5-59w4 | Fuji Electric Monitouch V-SFT V9C File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of V9C files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24503. | []
|
|
CVE-2020-1951 | A carefully crafted or corrupt PSD file can cause an infinite loop in Apache Tika's PSDParser in versions 1.0-1.23. | [
"cpe:2.3:a:apache:tika:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:business_process_management_suite:12.2.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:business_process_management_suite:12.2.1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_messaging_server:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_private_banking:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_private_banking:12.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
]
|
|
CVE-2024-23747 | The Moderna Sistemas ModernaNet Hospital Management System 2024 is susceptible to an Insecure Direct Object Reference (IDOR) vulnerability. This vulnerability resides in the system's handling of user data access through a /Modernanet/LAUDO/LAU0000100/Laudo?id= URI. By manipulating this id parameter, an attacker can gain access to sensitive medical information. | [
"cpe:2.3:a:modernasistemas:modernanet_hospital_management_system_2024:-:*:*:*:*:*:*:*"
]
|
|
GHSA-hjp8-8h3r-gwg6 | Multiple cross-site request forgery (CSRF) vulnerabilities in Apache Archiva 1.3.9 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) add new repository proxy connectors via the token parameter to admin/addProxyConnector_commit.action, (2) new repositories via the token parameter to admin/addRepository_commit.action, (3) edit existing repositories via the token parameter to admin/editRepository_commit.action, (4) add legacy artifact paths via the token parameter to admin/addLegacyArtifactPath_commit.action, (5) change the organizational appearance via the token parameter to admin/saveAppearance.action, or (6) upload new artifacts via the token parameter to upload_submit.action. | []
|
|
CVE-2021-3439 | HP has identified a potential vulnerability in BIOS firmware of some Workstation products. Firmware updates are being released to mitigate these potential vulnerabilities. | [
"cpe:2.3:o:hp:340_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:340_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:340_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:340_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:346_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:346_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:346_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:346_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:348_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:348_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:348_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:348_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_dragonfly_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_dragonfly:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_dragonfly_g2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_dragonfly_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_dragonfly_max_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_dragonfly_max:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_x2_1012_g1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_x2_1012_g1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_x2_1012_g1_tablet_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_x2_1012_g1_tablet:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_x2_1012_g2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_x2_1012_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_x2_1013_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_x2_1013_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_x2_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_x2_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_1030_g1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_1030_g1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_1040_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_1040_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_1040_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_1040_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_1050_g1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_1050_g1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_820_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_820_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_820_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_820_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_828_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_828_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_828_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_828_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_830_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_830_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_830_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_830_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_830_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_830_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_836_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_836_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_836_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_836_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840_g5_healthcare_edition_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840_g5_healthcare_edition:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840_g6_healthcare_edition_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840_g6_healthcare_edition:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840r_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840r_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_846_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_846_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_848_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_848_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_848_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_848_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_850_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_850_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_850_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_850_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_850_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_850_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_850_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_850_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_850_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_850_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_folio_g1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_folio_g1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1020_g2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1020_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1030_g2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1030_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1030_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1030_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1030_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1030_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1030_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1030_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1030_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1030_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1040_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1040_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1040_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1040_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1040_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1040_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1040_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1040_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_830_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_830_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_830_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_830_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_830_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_830_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_x2_612_g2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_x2_612_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_11_g2_education_edition_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_11_g2_education_edition:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_430_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_430_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_430_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_430_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_430_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_430_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_430_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_430_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_430_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_430_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_430_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_430_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_440_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_440_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_440_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_440_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_440_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_440_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_440_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_440_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_440_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_440_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_440_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_440_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_446_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_446_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_450_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_450_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_450_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_450_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_450_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_450_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_450_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_450_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_450_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_450_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_450_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_450_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_470_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_470_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_470_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_470_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_470_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_470_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_630_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_630_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_640_g2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_640_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_640_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_640_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_640_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_640_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_640_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_640_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_640_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_640_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_640_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_640_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_650_g2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_650_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_650_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_650_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_650_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_650_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_650_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_650_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_650_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_650_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_650_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_650_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_11_g2_education_edition_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_x360_11_g2_education_edition:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_11_g3_education_edition_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_x360_11_g3_education_edition:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_11_g4_education_edition_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_x360_11_g4_education_edition:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_11_g5_education_edition_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_x360_11_g5_education_edition:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_11_g6_education_edition_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_x360_11_g6_education_edition:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_440_g1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_x360_440_g1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_14u_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_14u_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_14u_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_14u_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_14u_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_14u_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_15_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_15_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_15_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_15_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_15_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_15_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_15_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_15_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_15u_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_15u_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_15u_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_15u_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_15u_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_15u_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_15u_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_15u_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_17_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_17_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_17_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_17_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_17_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_17_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_17_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_17_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_create_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_create_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_firefly_14_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_firefly_14_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_firefly_15_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_firefly_15_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_fury_15_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_fury_15_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_fury_17_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_fury_17_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_power_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_power_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_studio_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_studio_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_studio_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_studio_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_studio_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_studio_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_studio_x360_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_studio_x360_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_x2_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_x2_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_13_g2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_13_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_14_g2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_14_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_14_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_14_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_14_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_14_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_15_g2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_15_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_15_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_15_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_g1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_g1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_x_13_g2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_x_13_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:240_g4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:240_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:240_g5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:240_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:240_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:240_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:240_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:240_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:246_g4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:246_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:246_g5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:246_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:246_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:246_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:246_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:246_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:250_g4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:250_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:250_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:250_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:250_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:250_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:250_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:250_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:256_g4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:256_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:256_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:256_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:256_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:256_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:256_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:256_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:258_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:258_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:258_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:258_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:340_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:340_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:340_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:340_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:340s_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:340s_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:348_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:348_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:348_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:348_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:470_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:470_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:spectre_pro_13_g1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:spectre_pro_13_g1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:spectre_pro_x360_g2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:spectre_pro_x360_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:stream_11_pro_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:stream_11_pro_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:stream_11_pro_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:stream_11_pro_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_15v_g5_mobile_workstation_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_15v_g5_mobile_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:218_pro_g5_microtower_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:218_pro_g5_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:260_g2_desktop_mini_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:260_g2_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:260_g3_desktop_mini_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:260_g3_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:260_g4_desktop_mini_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:260_g4_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:280_g3_microtower_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:280_g3_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:280_g3_pci_microtower_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:280_g3_pci_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:280_pro_g3_microtower_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:280_pro_g3_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:282_pro_g3_microtower_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:282_pro_g3_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:288_pro_g3_microtower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:288_pro_g3_microtower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:290_g1_microtower_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:290_g1_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:406_microtower_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:406_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:desktop_pro_300_g3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:desktop_pro_300_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:desktop_pro_g2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:desktop_pro_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:desktop_pro_g2_microtower_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:desktop_pro_g2_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:desktop_pro_g3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:desktop_pro_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:desktop_pro_g3_microtower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:desktop_pro_g3_microtower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:desktop_pro_microtower_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:desktop_pro_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_slice_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_slice:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_slice_for_meeting_rooms_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_slice_for_meeting_rooms:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_slice_g2_-_audio_ready_with_zoom_rooms_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_slice_g2_-_audio_ready_with_zoom_rooms:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_slice_g2_-_partner_ready_with_microsoft_teams_rooms_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_slice_g2_-_partner_ready_with_microsoft_teams_rooms:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_slice_g2_with_microsoft_teams_rooms_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_slice_g2_with_microsoft_teams_rooms:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_slice_g2_with_intel_unite_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_slice_g2_with_intel_unite:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_slice_g2_with_zoom_rooms_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_slice_g2_with_zoom_rooms:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_35w_g2_desktop_mini_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_35w_g2_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_35w_g3_desktop_mini_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_35w_g3_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_35w_g4_desktop_mini_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_35w_g4_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_65w_g2_desktop_mini_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_65w_g2_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_65w_g3_desktop_mini_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_65w_g3_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_65w_g4_desktop_mini_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_65w_g4_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_95w_g4_desktop_mini_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_95w_g4_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g2_small_form_factor_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g2_small_form_factor_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g2_tower_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g2_tower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g3_small_form_factor_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g3_small_form_factor_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g3_tower_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g3_tower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g4_small_form_factor_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g4_small_form_factor_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g4_tower_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g4_tower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g4_workstation_edition_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g4_workstation_edition:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g5_desktop_mini_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g5_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g5_small_form_factor_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g5_small_form_factor_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g5_tower_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g5_tower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g6_desktop_mini_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g6_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g6_small_form_factor_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g6_small_form_factor_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g6_tower_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g6_tower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_880_g2_tower_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_880_g2_tower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_880_g3_tower_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_880_g3_tower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_880_g4_tower_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_880_g4_tower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_880_g5_tower_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_880_g5_tower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_880_g6_tower_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_880_g6_tower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_1000_g1_23.8-in_all-in-one_business_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_1000_g1_23.8-in_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_1000_g1_23.8-in_touch_all-in-one_business_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_1000_g1_23.8-in_touch_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_1000_g1_27-in_4k_uhd_all-in-one_business_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_1000_g1_27-in_4k_uhd_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_1000_g1_34-in_curved_all-in-one_business_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_1000_g1_34-in_curved_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_1000_g2_23.8-in_all-in-one_business_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_1000_g2_23.8-in_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_1000_g2_23.8-in_touch_all-in-one_business_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_1000_g2_23.8-in_touch_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_1000_g2_27-in_4k_uhd_all-in-one_business_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_1000_g2_27-in_4k_uhd_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_1000_g2_34-in_curved_all-in-one_business_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_1000_g2_34-in_curved_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g2_23-inch_non-touch_all-in-one_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g2_23-inch_non-touch_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g2_23-inch_touch_all-in-one_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g2_23-inch_touch_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g3_23.8_non-touch_healthcare_edition_all-in-one_business_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g3_23.8_non-touch_healthcare_edition_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g3_23.8-inch_non-touch_all-in-one_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g3_23.8-inch_non-touch_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g3_23.8-inch_non-touch_gpu_all-in-one_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g3_23.8-inch_non-touch_gpu_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g3_23.8-inch_touch_all-in-one_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g3_23.8-inch_touch_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g3_23.8-inch_touch_gpu_all-in-one_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g3_23.8-inch_touch_gpu_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g4_23.8-in_healthcare_edition_all-in-one_business_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g4_23.8-in_healthcare_edition_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_non-touch_all-in-one_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_non-touch_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_non-touch_gpu_all-in-one_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_non-touch_gpu_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_touch_all-in-one_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_touch_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_touch_gpu_all-in-one_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_touch_gpu_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g5_23.8-in_healthcare_edition_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g5_23.8-in_healthcare_edition_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g5_23.8-inch_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g5_23.8-inch_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g6_24_all-in-one_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g6_24_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g6_27_all-in-one_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g6_27_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g2_desktop_mini_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g2_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g3_desktop_mini_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g3_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g4_desktop_mini_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g4_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g4_microtower_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g4_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g4_small_form_factor_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g4_small_form_factor_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g5_desktop_mini_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g5_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g5_microtower_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g5_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g5_small_form_factor_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g5_small_form_factor_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g6_desktop_mini_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g6_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g6_microtower_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g6_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g6_small_form_factor_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g6_small_form_factor_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g7_microtower_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g7_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g7_small_form_factor_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g7_small_form_factor_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_480_g4_microtower_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_480_g4_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_480_g5_microtower_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_480_g5_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_480_g6_microtower_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_480_g6_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_480_g7_pci_microtower_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_480_g7_pci_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g2_desktop_mini_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g2_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g2_microtower_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g2_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g2_small_form_factor_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g2_small_form_factor_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g3_desktop_mini_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g3_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g3_microtower_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g3_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g3_small_form_factor_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g3_small_form_factor_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g4_desktop_mini_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g4_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g4_microtower_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g4_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g4_small_form_factor_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g4_small_form_factor_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g5_desktop_mini_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g5_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g5_microtower_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g5_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g5_microtower_pc_\\(with_pci_slot\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g5_microtower_pc_\\(with_pci_slot\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g5_small_form_factor_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g5_small_form_factor_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g6_desktop_mini_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g6_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g6_microtower_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g6_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g6_pci_microtower_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g6_pci_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g6_small_form_factor_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g6_small_form_factor_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_680_g2_microtower_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_680_g2_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_680_g3_microtower_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_680_g3_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_680_g4_microtower_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_680_g4_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_680_g4_microtower_pc_\\(with_pci_slot\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_680_g4_microtower_pc_\\(with_pci_slot\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_680_g6_pci_microtower_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_680_g6_pci_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g2_20-inch_non-touch_all-in-one_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g2_20-inch_non-touch_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g2_20-inch_touch_all-in-one_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g2_20-inch_touch_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g3_20-inch_non-touch_all-in-one_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g3_20-inch_non-touch_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g3_20-inch_touch_all-in-one_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g3_20-inch_touch_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g4_20-inch_non-touch_all-in-one_business_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g4_20-inch_non-touch_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g4_23.8-inch_non-touch_all-in-one_business_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g4_23.8-inch_non-touch_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g5_20-inch_all-in-one_business_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g5_20-inch_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g5_23.8-inch_all-in-one_business_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g5_23.8-inch_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g6_20_all-in-one_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g6_20_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g6_24_all-in-one_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g6_24_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_440_g4_23.8-inch_non-touch_all-in-one_business_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_440_g4_23.8-inch_non-touch_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_440_g5_23.8-in_all-in-one_business_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_440_g5_23.8-in_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_440_g6_24_all-in-one_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_440_g6_24_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_480_g3_20-inch_non-touch_all-in_one_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_480_g3_20-inch_non-touch_all-in_one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_600_g2_21.5-inch_non-touch_all-in-one_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_600_g2_21.5-inch_non-touch_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_600_g2_21.5-inch_touch_all-in-one_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_600_g2_21.5-inch_touch_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_600_g3_21.5-inch_non-touch_all-in-one_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_600_g3_21.5-inch_non-touch_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_600_g4_21.5-inch_touch_all-in-one_business_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_600_g4_21.5-inch_touch_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_600_g5_21.5-in_all-in-one_business_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_600_g5_21.5-in_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_600_g6_22_all-in-one_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_600_g6_22_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_g1_microtower_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_g1_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_g1_r_microtower_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_g1_r_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_g3_22_all-in-one_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_g3_22_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_g3_24_all-in-one_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_g3_24_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_86_pro_g1_microtower_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_86_pro_g1_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:200_g3_all-in-one_\\(rom_family_ssid_8431\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:200_g3_all-in-one_\\(rom_family_ssid_8431\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:200_g3_all-in-one_\\(rom_family_ssid_84de\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:200_g3_all-in-one_\\(rom_family_ssid_84de\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:200_g4_22_all-in-one_pc_\\(rom_family_ssid_86f0\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:200_g4_22_all-in-one_pc_\\(rom_family_ssid_86f0\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:200_g4_22_all-in-one_pc_\\(rom_family_ssid_86f8\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:200_g4_22_all-in-one_pc_\\(rom_family_ssid_86f8\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:200_pro_g4_22_all-in-one_pc_\\(rom_family_ssid_86f0\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:200_pro_g4_22_all-in-one_pc_\\(rom_family_ssid_86f0\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:200_pro_g4_22_all-in-one_pc_\\(rom_family_ssid_86f8\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:200_pro_g4_22_all-in-one_pc_\\(rom_family_ssid_86f8\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:205_g4_22_all-in-one_pc_\\(rom_family_ssid_86f0\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:205_g4_22_all-in-one_pc_\\(rom_family_ssid_86f0\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:205_g4_22_all-in-one_pc_\\(rom_family_ssid_86f8\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:205_g4_22_all-in-one_pc_\\(rom_family_ssid_86f8\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:205_pro_g4_22_all-in-one_pc_\\(rom_family_ssid_86f0\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:205_pro_g4_22_all-in-one_pc_\\(rom_family_ssid_86f0\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:205_pro_g4_22_all-in-one_pc_\\(rom_family_ssid_86f8\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:205_pro_g4_22_all-in-one_pc_\\(rom_family_ssid_86f8\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:280_g3_small_form_factor_\\(rom_family_ssid_843f\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:280_g3_small_form_factor_\\(rom_family_ssid_843f\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:280_g4_microtower_\\(rom_family_ssid_843c\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:280_g4_microtower_\\(rom_family_ssid_843c\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:280_g4_small_form_factor_\\(rom_family_ssid_86e9\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:280_g4_small_form_factor_\\(rom_family_ssid_86e9\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:280_g4_small_form_factor_\\(rom_family_ssid_8768\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:280_g4_small_form_factor_\\(rom_family_ssid_8768\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:280_g5_microtower_\\(rom_family_ssid_877e\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:280_g5_microtower_\\(rom_family_ssid_877e\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:280_g5_small_form_factor_\\(rom_family_ssid_86e9\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:280_g5_small_form_factor_\\(rom_family_ssid_86e9\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:280_pro_g3_small_form_factor_\\(rom_family_ssid_843f\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:280_pro_g3_small_form_factor_\\(rom_family_ssid_843f\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:280_pro_g4_microtower_\\(rom_family_ssid_843c\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:280_pro_g4_microtower_\\(rom_family_ssid_843c\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:280_pro_g6_microtower_\\(rom_family_ssid_8948\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:280_pro_g6_microtower_\\(rom_family_ssid_8948\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:282_pro_g4_microtower_\\(rom_family_ssid_843c\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:282_pro_g4_microtower_\\(rom_family_ssid_843c\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:282_pro_g5_microtower_\\(rom_family_ssid_86e9\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:282_pro_g5_microtower_\\(rom_family_ssid_86e9\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:282_pro_g6_microtower_\\(rom_family_ssid_8948\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:282_pro_g6_microtower_\\(rom_family_ssid_8948\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:288_pro_g4_microtower_\\(rom_family_ssid_843c\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:288_pro_g4_microtower_\\(rom_family_ssid_843c\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:288_pro_g5_microtower_\\(rom_family_ssid_86e9\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:288_pro_g5_microtower_\\(rom_family_ssid_86e9\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:288_pro_g6_microtower_\\(rom_family_ssid_877e\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:288_pro_g6_microtower_\\(rom_family_ssid_877e\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:288_pro_g6_microtower_\\(rom_family_ssid_8948\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:288_pro_g6_microtower_\\(rom_family_ssid_8948\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:290_g1_small_form_factor_\\(rom_family_ssid_843f\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:290_g1_small_form_factor_\\(rom_family_ssid_843f\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:290_g2_microtower_\\(rom_family_ssid_843c\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:290_g2_microtower_\\(rom_family_ssid_843c\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:290_g2_small_form_factor_\\(rom_family_ssid_86e9\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:290_g2_small_form_factor_\\(rom_family_ssid_86e9\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:290_g2_small_form_factor_\\(rom_family_ssid_8768\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:290_g2_small_form_factor_\\(rom_family_ssid_8768\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:290_g3_\\(rom_family_ssid_86e9\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:290_g3_\\(rom_family_ssid_86e9\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:290_g4_microtower_\\(rom_family_ssid_877e\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:290_g4_microtower_\\(rom_family_ssid_877e\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:290_g4_microtower_\\(rom_family_ssid_8948\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:290_g4_microtower_\\(rom_family_ssid_8948\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:desktop_pro_g1_microtower_\\(rom_family_ssid_843c\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:desktop_pro_g1_microtower_\\(rom_family_ssid_843c\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_440_g3_\\(rom_family_ssid_81b7\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_440_g3_\\(rom_family_ssid_81b7\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_440_g3_\\(rom_family_ssid_82dc\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_440_g3_\\(rom_family_ssid_82dc\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_490_g3_\\(rom_family_ssid_81b7\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_490_g3_\\(rom_family_ssid_81b7\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_490_g3_\\(rom_family_ssid_82dc\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_490_g3_\\(rom_family_ssid_82dc\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_86_pro_g2_microtower_\\(rom_family_ssid_843c\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_86_pro_g2_microtower_\\(rom_family_ssid_843c\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_99_pro_g1_microtower_\\(rom_family_ssid_843c\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_99_pro_g1_microtower_\\(rom_family_ssid_843c\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:engage_flex_pro_retail_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:engage_flex_pro_retail_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:engage_flex_pro-c_retail_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:engage_flex_pro-c_retail_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:engage_gomobile_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:engage_gomobile_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:engage_one_all-in-one_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:engage_one_all-in-one_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:engage_one_pro_aio_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:engage_one_pro_aio_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:mp9_g2_retail_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:mp9_g2_retail_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:mp9_g4_retail_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:mp9_g4_retail_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:rp9_g1_retail_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:rp9_g1_retail_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z_vr_backpack_g1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z_vr_backpack_g1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z1_all-in-one_g3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z1_all-in-one_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z1_entry_tower_g5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z1_entry_tower_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z1_entry_tower_g6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z1_entry_tower_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_mini_g3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_mini_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_mini_g4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_mini_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_mini_g5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_mini_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_small_form_factor_g4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_small_form_factor_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_small_form_factor_g5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_small_form_factor_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_tower_g4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_tower_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_tower_g5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_tower_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z238_microtower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z238_microtower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z240_small_form_factor_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z240_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z240_tower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z240_tower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z4_g4_workstation_\\(core-x\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z4_g4_workstation_\\(core-x\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z4_g4_workstation_\\(xeon_w\\)_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z4_g4_workstation_\\(xeon_w\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z440_workstation_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z440_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z6_g4_workstation_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z6_g4_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z640_workstation_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z640_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z8_g4_workstation_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z8_g4_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z840_workstation_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z840_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zcentral_4r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zcentral_4r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:sprout_pro_by_g2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:sprout_pro_by_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:t430_thin_client_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:t430_thin_client:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:t638_thin_client_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:t638_thin_client:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:mt20_thin_client_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:mt20_thin_client:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:mt21_thin_client_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:mt21_thin_client:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:mt22_thin_client_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:mt22_thin_client:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:mt31_thin_client_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:mt31_thin_client:-:*:*:*:*:*:*:*"
]
|
|
CVE-2012-1444 | The ELF file parser in eSafe 7.0.17.0, Prevx 3.0, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an ELF file with a modified abiversion field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations. | [
"cpe:2.3:a:aladdin:esafe:7.0.17.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortinet_antivirus:4.2.254.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pandasecurity:panda_antivirus:10.0.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:prevx:prevx:3.0:*:*:*:*:*:*:*"
]
|
|
CVE-2018-17907 | When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior and tampering with the value of an offset, an attacker can force the application to read a value outside of an array. | [
"cpe:2.3:a:omron:cx-supervisor:*:*:*:*:*:*:*:*"
]
|
|
CVE-2024-6795 | Vulnerability in Baxter Connex Health Portal | In Connex health portal released before8/30/2024, SQL injection vulnerabilities were found that could have allowed an unauthenticated attacker to gain unauthorized access to Connex portal's database.
An attacker could have submitted a crafted payload to Connex portal that could have resulted in modification and disclosure of database content
and/or perform administrative operations including shutting down the database. | [
"cpe:2.3:a:hillrom:connex_health_portal:*:*:*:*:*:*:*:*",
"cpe:2.3:a:baxter:connex_health_portal:*:*:*:*:*:*:*:*"
]
|
GHSA-vq2f-wpjw-qjm7 | A vulnerability was found in code-projects Pharmacy Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /manage_customer.php of the component Manage Customer Page. The manipulation of the argument suppliers_name/address leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions contradicting files to be affected. Other parameters might be affected as well. | []
|
|
CVE-2002-1610 | Unknown vulnerability in ping in HP Tru64 UNIX 5.1a, 5.1, 5.0a, 4.0g, and 4.0f allows local users to cause a denial of service. | [
"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11.04:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11.22:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:4.0f:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:4.0g:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.0a:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:tru64:5.1a:*:*:*:*:*:*:*"
]
|
|
CVE-2001-1535 | Slashcode 2.0 creates new accounts with an 8-character random password, which could allow local users to obtain session ID's from cookies and gain unauthorized access via a brute force attack. | [
"cpe:2.3:a:open_source_development_network:slashcode:2.0:*:*:*:*:*:*:*"
]
|
|
GHSA-2q67-rw6p-rcj4 | In the Linux kernel, the following vulnerability has been resolved:usb: udc: remove warning when queue disabled epIt is possible trigger below warning message from mass storage function,WARNING: CPU: 6 PID: 3839 at drivers/usb/gadget/udc/core.c:294 usb_ep_queue+0x7c/0x104
pc : usb_ep_queue+0x7c/0x104
lr : fsg_main_thread+0x494/0x1b3cRoot cause is mass storage function try to queue request from main thread,
but other thread may already disable ep when function disable.As there is no function failure in the driver, in order to avoid effort
to fix warning, change WARN_ON_ONCE() in usb_ep_queue() to pr_debug(). | []
|
|
GHSA-h6j7-2w2f-q5rm | Improper authentication vulnerability exists in KB-AHR series and KB-IRIP series. If this vulnerability is exploited, an arbitrary OS command may be executed on the product or the device settings may be altered. Affected products and versions are as follows: KB-AHR04D versions prior to 91110.1.101106.78, KB-AHR08D versions prior to 91210.1.101106.78, KB-AHR16D versions prior to 91310.1.101106.78, KB-IRIP04A versions prior to 95110.1.100290.78A, KB-IRIP08A versions prior to 95210.1.100290.78A, and KB-IRIP16A versions prior to 95310.1.100290.78A. | []
|
|
CVE-2018-4046 | An exploitable denial-of-service vulnerability exists in the helper service of Clean My Mac X, version 4.04, due to improper input validation. A user with local access can use this vulnerability to terminate a privileged helper application. An attacker would need local access to the machine for a successful exploit. | [
"cpe:2.3:a:macpaw:cleanmymac_x:4.04:*:*:*:*:*:*:*"
]
|
|
GHSA-6436-83pc-5gxw | Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | []
|
|
GHSA-2jrp-x33g-47h4 | Untrusted search path vulnerability in Installer of MagicConnect Client program distributed before 2021 March 1 allows an attacker to gain privileges and via a Trojan horse DLL in an unspecified directory and to execute arbitrary code with the privilege of the user invoking the installer when a terminal is connected remotely using Remote desktop. | []
|
|
CVE-2025-1458 | Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid, Carousel and Remote Arrows) <= 5.10.29 - Authenticated (Contributor+) Stored Cross-Site Scripting | The Element Pack Addons for Elementor – Free Templates and Widgets for Your WordPress Websites plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several widgets like Dual Button, Creative Button, Image Stack and more in all versions up to, and including, 5.10.29 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | []
|
CVE-2018-15718 | Open Dental before version 18.4 transmits the entire user database over the network when a remote unauthenticated user accesses the command prompt. This allows the attacker to gain access to usernames, password hashes, privilege levels, and more. | [
"cpe:2.3:a:opendental:opendental:*:*:*:*:*:*:*:*"
]
|
|
GHSA-w8h8-rjcr-f483 | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Libsyn Libsyn Publisher Hub.This issue affects Libsyn Publisher Hub: from n/a through 1.4.4. | []
|
|
CVE-2005-2445 | SQL injection vulnerability in viewPrd.asp in Product Cart 2.6 allows remote attackers to execute arbitrary SQL commands via the idcategory parameter. | [
"cpe:2.3:a:early_impact:product_cart:2.6:*:*:*:*:*:*:*"
]
|
|
GHSA-g85g-p29m-3jgf | Unspecified vulnerability in the Workspace Manager component in Oracle Database 9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.3, and 11.1.0.6 allows remote authenticated users to affect confidentiality and integrity, related to SYS.LT and WMSYS.LT, a different vulnerability than CVE-2008-3982 and CVE-2008-3984. | []
|
|
CVE-2019-20609 | An issue was discovered on Samsung mobile devices with P(9.0) software. Attackers can use Smartwatch to view Secure Folder notification content. The Samsung ID is SVE-2019-13899 (April 2019). | [
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*"
]
|
|
CVE-2021-0187 | Improper access control in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable an escalation of privilege via local access. | [
"cpe:2.3:o:intel:xeon_gold_6342_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6342:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6346_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6346:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6330_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6330:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8360y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8360y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6354_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6354:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6314u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6314u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6338n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6338n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_silver_4314_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4314:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_silver_4316_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4316:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5318y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5318y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5317_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5317:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6334_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6334:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6326_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6326:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_silver_4309y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4309y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6348_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6348:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_silver_4310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4310:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6338t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6338t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5318s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5318s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6336y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6336y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5318n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5318n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6312u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6312u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_silver_4310t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4310t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5320t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5320t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5320_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5315y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5315y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8352m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8352m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8362_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8362:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8368_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8368:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8358_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8358:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8352y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8352y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6338_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6338:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6330n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6330n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8351n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8351n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8368q_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8368q:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8352s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8352s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8358p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8358p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8352v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8352v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8360hl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8360hl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8360h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8360h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8356h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8356h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6330h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6330h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8380h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8380h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5318h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5318h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6328h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6328h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5320h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5320h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8353h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8353h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8354h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8354h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6348h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6348h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8376h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8376h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8376hl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8376hl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8380hl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8380hl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6328hl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6328hl:-:*:*:*:*:*:*:*"
]
|
|
CVE-2012-10013 | Kau-Boy Backend Localization Plugin backend_localization.php cross site scripting | A vulnerability was found in Kau-Boy Backend Localization Plugin up to 1.6.1 on WordPress. It has been rated as problematic. This issue affects some unknown processing of the file backend_localization.php. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 2.0 is able to address this issue. The patch is named 43dc96defd7944da12ff116476a6890acd7dd24b. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-227231. | [
"cpe:2.3:a:kau-boys:backend_localization:*:*:*:*:*:wordpress:*:*"
]
|
CVE-2023-24504 | Electra Central AC unit – Adjacent attacker may cause the unit to connect to unauthorized update server | Electra Central AC unit – Adjacent attacker may cause the unit to connect to unauthorized update server. | [
"cpe:2.3:o:electra-air:central_ac_unit_firmware:v7:*:*:*:*:*:*:*",
"cpe:2.3:o:electra-air:central_ac_unit_firmware:v8:*:*:*:*:*:*:*",
"cpe:2.3:h:electra-air:central_ac_unit:-:*:*:*:*:*:*:*"
]
|
CVE-2002-1939 | FlashFXP 1.4 prints FTP passwords in plaintext when there are transfers in the queue, which allows attackers to obtain FTP passwords of other users by editing the queue properties. | [
"cpe:2.3:a:flashfxp:flashfxp:1.4:*:*:*:*:*:*:*"
]
|
|
GHSA-2cgv-9p9x-26g8 | Possible out of bound access due to lack of validation of page offset before page is inserted in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile | []
|
|
CVE-2017-0072 | Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to execute arbitrary code via a crafted web site, aka "Uniscribe Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0083, CVE-2017-0084, CVE-2017-0086, CVE-2017-0087, CVE-2017-0088, CVE-2017-0089, and CVE-2017-0090. | [
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
]
|
|
GHSA-q3q5-2v5f-27x5 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Intuitive Design GDReseller allows DOM-Based XSS.This issue affects GDReseller: from n/a through 1.6. | []
|
|
CVE-2001-1423 | Advanced Poll before 1.61, when using a flat file database, allows remote attackers to gain privileges by setting the logged_in parameter. | [
"cpe:2.3:a:advanced_poll:advanced_poll:*:*:*:*:*:*:*:*"
]
|
|
CVE-2025-26320 | t0mer BroadlinkManager v5.9.1 was discovered to contain an OS command injection vulnerability via the IP Address parameter at /device/ping. | []
|
|
GHSA-rwcm-6g7j-g9xh | IBM InfoSphere Information Server 11.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 218370. | []
|
|
CVE-2021-29262 | Misapplied Zookeeper ACLs can result in leakage of configured authentication and authorization settings | When starting Apache Solr versions prior to 8.8.2, configured with the SaslZkACLProvider or VMParamsAllAndReadonlyDigestZkACLProvider and no existing security.json znode, if the optional read-only user is configured then Solr would not treat that node as a sensitive path and would allow it to be readable. Additionally, with any ZkACLProvider, if the security.json is already present, Solr will not automatically update the ACLs. | [
"cpe:2.3:a:apache:solr:*:*:*:*:*:*:*:*"
]
|
GHSA-w5p3-xgv8-w45f | Cross-site scripting vulnerability in Bulletin of Cybozu Garoon 4.6.0 to 5.0.2 allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors. | []
|
|
CVE-2008-4537 | Cross-site scripting (XSS) vulnerability in EC-CUBE Ver1 1.4.6 and earlier, Ver1 Beta 1.5.0-beta and earlier, Ver2 2.1.2a and earlier, Ver2 Beta(RC) 2.1.1-beta and earlier, Community Edition 1.3.4 and earlier, and Community Edition Nightly-Build r17336 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different issue than CVE-2008-4535 and CVE-2008-4536. | [
"cpe:2.3:a:ec-cube:ec-cube:*:unknown:community_edition:*:*:*:*:*",
"cpe:2.3:a:ec-cube:ec-cube:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ec-cube:ec-cube:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ec-cube:ec-cube:1.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ec-cube:ec-cube:1.5.0:b2:*:*:*:*:*:*"
]
|
|
CVE-2017-15257 | IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to execute arbitrary code or cause a denial of service via a crafted .pdf file, related to "Data from Faulting Address controls Code Flow starting at PDF!xmlParserInputRead+0x000000000009174a." | [
"cpe:2.3:a:irfanview:pdf:4.43:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:4.44:*:*:*:*:*:x86:*"
]
|
|
GHSA-4953-8925-rqj6 | Buffer overflow in some Intel(R) SSD Tools software before version mdadm-4.2-rc2 may allow a privileged user to potentially enable escalation of privilege via local access. | []
|
|
GHSA-4r8q-m228-4jmx | The search function in cgi-lib/user-lib/search.pl in web-app.net WebAPP before 20060909 allows remote attackers to read internal forum posts via certain requests, possibly related to the $info{'forum'} variable. | []
|
|
GHSA-5pcg-j55g-mp2w | A vulnerability, which was classified as critical, has been found in 1000 Projects Human Resource Management System 1.0. This issue affects some unknown processing of the file /employeeview.php. The manipulation of the argument search leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | []
|
|
CVE-2024-26032 | Adobe Experience Manager | Cross-site Scripting (DOM-based XSS) (CWE-79) | Adobe Experience Manager versions 6.5.19 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable web pages. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable script. This could result in arbitrary code execution in the context of the victim's browser. Exploitation of this issue requires user interaction. | [
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*"
]
|
GHSA-4mvq-x4cx-mm94 | The Hogs Fly Crazy (aka com.pedrojayme.hogsflycrazy) application 1.0.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | []
|
|
CVE-2019-2995 | Vulnerability in the Oracle Marketing product of Oracle E-Business Suite (component: Marketing Administration). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Marketing. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Marketing, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Marketing accessible data as well as unauthorized update, insert or delete access to some of Oracle Marketing accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). | [
"cpe:2.3:a:oracle:marketing:*:*:*:*:*:*:*:*"
]
|
|
CVE-2021-42171 | Zenario CMS 9.0.54156 is vulnerable to File Upload. The web server can be compromised by uploading and executing a web-shell which can run commands, browse system files, browse local resources, attack other servers, and exploit the local vulnerabilities, and so forth. | [
"cpe:2.3:a:tribalsystems:zenario:9.0.54156:*:*:*:*:*:*:*"
]
|
|
GHSA-4m8v-pj3j-wc3q | Secure Elements Class 5 AVR client (aka C5 EVM) before 2.8.1 generates predictable CEIDs, which allows remote attackers to determine the CEID of a protected asset, which can be used in other attacks against AVR. | []
|
|
CVE-2022-29006 | Multiple SQL injection vulnerabilities via the username and password parameters in the Admin panel of Directory Management System v1.0 allows attackers to bypass authentication. | [
"cpe:2.3:a:phpgurukul:directory_management_system:1.0:*:*:*:*:*:*:*"
]
|
|
GHSA-2mgj-rr5x-hxrj | Hospital Management System 1.0 was discovered to contain a SQL injection vulnerability via the doc_number parameter at his_admin_view_single_employee.php. | []
|
|
CVE-2007-2078 | PHP remote file inclusion vulnerability in index.php in Maian Weblog 3.1 allows remote attackers to execute arbitrary PHP code via a URL in the path_to_folder parameter. NOTE: this issue was disputed by a third party researcher, since the path_to_folder variable is initialized before use | [
"cpe:2.3:a:maian:weblog:3.1:*:*:*:*:*:*:*"
]
|
|
GHSA-5fjm-4xr4-5vjj | CMS ISWEB 3.5.3 is vulnerable to multiple SQL injection flaws. An attacker can inject malicious queries into the application and obtain sensitive information. | []
|
|
CVE-2021-3189 | The slashify package 1.0.0 for Node.js allows open-redirect attacks, as demonstrated by a localhost:3000///example.com/ substring. | [
"cpe:2.3:a:google:slashify:1.0.0:*:*:*:*:node.js:*:*"
]
|
|
GHSA-c5f5-pj8m-xqgq | A vulnerability in live_mfg.shtml of WAVLINK AERIAL X 1200M M79X3.V5030.191012 allows attackers to obtain sensitive router information via execution of the exec cmd function. | []
|
|
CVE-2017-12259 | A vulnerability in the implementation of Session Initiation Protocol (SIP) functionality in Cisco Small Business SPA51x Series IP Phones could allow an unauthenticated, remote attacker to cause an affected device to become unresponsive, resulting in a denial of service (DoS) condition. The vulnerability is due to the improper handling of SIP request messages by an affected device. An attacker could exploit this vulnerability by sending malformed SIP messages to an affected device. A successful exploit could allow the attacker to cause the affected device to become unresponsive, resulting in a DoS condition that persists until the device is restarted manually. This vulnerability affects Cisco Small Business SPA51x Series IP Phones that are running Cisco SPA51x Firmware Release 7.6.2SR1 or earlier. Cisco Bug IDs: CSCvc63982. | [
"cpe:2.3:o:cisco:small_business_ip_phone_firmware:*:sr1:*:*:*:*:*:*",
"cpe:2.3:h:cisco:small_business_ip_phone:spa510:*:*:*:*:*:*:*"
]
|
|
GHSA-vqqp-v94p-424f | NETGEAR R7000 devices before 1.0.11.116 are affected by disclosure of sensitive information. | []
|
|
GHSA-rhm5-jg35-jp78 | Directory traversal vulnerability in k23productions TFTPUtil GUI 1.2.0 and 1.3.0 allows remote attackers to read arbitrary files outside the TFTP root directory via directory traversal sequences in a GET request. | []
|
|
GHSA-59fm-p4x5-qvjv | lsassd in Likewise Open /Enterprise 5.3 before build 7845, Open 6.0 before build 8325, and Enterprise 6.0 before build 178, as distributed in VMware ESXi 4.1 and ESX 4.1 and possibly other products, allows remote attackers to cause a denial of service (daemon crash) via an Active Directory login attempt that provides a username containing an invalid byte sequence. | []
|
|
CVE-2019-14054 | Improper permissions in XBL_SEC region enable user to update XBL_SEC code and data and divert the RAM dump path to normal cold boot path in Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking in Kamorta, MSM8998, QCS404, QCS605, SDA660, SDA845, SDM630, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SM8150, SXR1130, SXR2130 | [
"cpe:2.3:o:qualcomm:kamorta_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:kamorta:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8998_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8998:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs404_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs404:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm636_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm636:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm670_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm670:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr1130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr1130:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*"
]
|
|
CVE-2022-31003 | Heap-based Buffer Overflow and Out-of-bounds Write in Sofia-SIP | Sofia-SIP is an open-source Session Initiation Protocol (SIP) User-Agent library. Prior to version 1.13.8, when parsing each line of a sdp message, `rest = record + 2` will access the memory behind `\0` and cause an out-of-bounds write. An attacker can send a message with evil sdp to FreeSWITCH, causing a crash or more serious consequence, such as remote code execution. Version 1.13.8 contains a patch for this issue. | [
"cpe:2.3:a:signalwire:sofia-sip:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
]
|
CVE-2018-18566 | The SIP service in Polycom VVX 500 and 601 devices 5.8.0.12848 and earlier allow remote attackers to obtain sensitive phone configuration information by leveraging use with an on-premise installation with Skype for Business. | [
"cpe:2.3:o:polycom:unified_communications_software:*:*:*:*:*:*:*:*",
"cpe:2.3:o:polycom:vvx_601_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:polycom:vvx_601:-:*:*:*:*:*:*:*",
"cpe:2.3:o:polycom:vvx_500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:polycom:vvx_500:-:*:*:*:*:*:*:*"
]
|
|
GHSA-fq7c-87gr-rq4x | Unspecified vulnerability in Interchange before 5.4.2 allows remote attackers to cause an unspecified denial of service (possibly server hang) via crafted HTTP requests. | []
|
|
GHSA-rxv9-6mj3-27gh | IBM Maximo Asset Management 7.1 through 7.1.1.12 and 7.5 before 7.5.0.5 allows remote authenticated users to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2013-3049. | []
|
|
CVE-2022-28796 | jbd2_journal_wait_updates in fs/jbd2/transaction.c in the Linux kernel before 5.17.1 has a use-after-free caused by a transaction_t race condition. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vsphere:*:*",
"cpe:2.3:a:netapp:solidfire\\,_enterprise_sds_\\&_hci_storage_node:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:solidfire_\\&_hci_management_node:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:hci_compute_node_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*"
]
|
|
GHSA-xg75-3277-gvvj | Directory Traversal in serve | Versions of `serve` before 7.1.3 are vulnerable to Directory Traversal. File paths are not sanitized leading to unauthorized access of system files.RecommendationUpgrade to version 7.1.3 or later | []
|
GHSA-7pq4-47cm-wq26 | Multiple SQL injection vulnerabilities in ilyav FAQ System 1.1 and earlier allows remote attackers to execute arbitrary SQL commands via the (1) FAQ_ID and (2) action parameters in (a) viewFAQ.php; and (3) CATEGORY_ID parameter in (b) index.php. | []
|
|
GHSA-66q9-qhmh-c66j | Keekoon KK002 devices 1.8.12 HD have a Cross Site Request Forgery Vulnerability affecting goform/formChnUserPwd and goform/formUserMng (and the entire set of other pages). | []
|
|
CVE-2007-6638 | March Networks DVR 3204 stores sensitive information under the web root with insufficient access control, which allows remote attackers to obtain usernames, passwords, device names, and IP addresses via a direct request for scripts/logfiles.tar.gz. | [
"cpe:2.3:h:march_networks:3204_dvr:*:*:*:*:*:*:*:*"
]
|
|
GHSA-j5v7-9xr5-m7gx | TYPO3 Cross-site Scripting vulnerability | Cross-site scripting (XSS) vulnerability in the typoLink function in TYPO3 6.2.x before 6.2.16 and 7.x before 7.6.1 allows remote authenticated editors to inject arbitrary web script or HTML via a link field. | []
|
GHSA-9c8g-fjxj-3vgq | WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2. | []
|
|
CVE-2017-18310 | ClientEnv exposes services 0-32 to HLOS in Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear in version MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SD 845, SDA660, SDM429, SDM439, SDM630, SDM632, SDM636, SDM660, Snapdragon_High_Med_2016 | [
"cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_412_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_412:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_427_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_427:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_435_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_435:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_616_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_616:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_415:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_617_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_617:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm429_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm429:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm632_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm632:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm636_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm636:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*"
]
|
|
GHSA-p36f-hqc8-f7jr | SAP BusinessObjects CMC allows an unauthenticated attacker to retrieve token information over the network which would otherwise be restricted. This can be achieved only when a legitimate user accesses the application and a local compromise occurs, like sniffing or social engineering. On successful exploitation, the attacker can completely compromise the application. | []
|
|
GHSA-83mm-r262-4333 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Themefic Ultimate Addons for Contact Form 7.This issue affects Ultimate Addons for Contact Form 7: from n/a through 3.1.23. | []
|
|
CVE-2023-1472 | The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.7.1. This is due to missing or incorrect nonce validation on its AJAX actions. This makes it possible for unauthenticated attackers to invoke those functions, via forged request granted they can trick a site administrator into performing an action such as clicking on a link. Actions include resetting the API key, accessing or deleting log files, and deleting cache among others. | [
"cpe:2.3:a:rapidload:rapidload_power-up_for_autoptimize:*:*:*:*:*:wordpress:*:*"
]
|
|
GHSA-93vv-c929-gw49 | Incorrect access control in the CxUtilSvc component of the Synaptics Sound Device drivers prior to version 2.29 allows a local attacker to increase access privileges to the Windows Registry via an unpublished API. | []
|
|
CVE-2024-51665 | WordPress Magical Addons For Elementor plugin <= 1.2.1 - Server Side Request Forgery (SSRF) vulnerability | Server-Side Request Forgery (SSRF) vulnerability in Noor alam Magical Addons For Elementor allows Server Side Request Forgery.This issue affects Magical Addons For Elementor: from n/a through 1.2.1. | [
"cpe:2.3:a:wpthemespace:magical_addons_for_elementor:*:*:*:*:*:wordpress:*:*"
]
|
CVE-2021-20371 | IBM Jazz Foundation and IBM Engineering products could allow a remote attacker to obtain sensitive information when an error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 195516. | [
"cpe:2.3:a:ibm:collaborative_lifecycle_management:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:collaborative_lifecycle_management:6.0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_lifecycle_management:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_lifecycle_management:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_lifecycle_management:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_engineering_insights:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_engineering_insights:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_engineering_insights:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_publishing:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_publishing:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_lifecycle_optimization_-_publishing:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_test_management:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:engineering_test_management:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:6.0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_quality_manager:6.0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:removable_media_manager:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:removable_media_manager:6.0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:removable_media_manager:7.0:*:*:*:*:*:*:*"
]
|
|
CVE-2021-1653 | Windows CSC Service Elevation of Privilege Vulnerability | Windows CSC Service Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008_r2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012_r2:*:*:*:*:*:*:x64:*"
]
|
GHSA-h9q5-269p-879r | Cross-site scripting (XSS) vulnerability in error.php in TaskFreak! 0.5.5 allows remote attackers to inject arbitrary web script or HTML via the tznMessage parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | []
|
|
CVE-2015-6596 | mediaserver in Android before 5.1.1 LMY48T allows attackers to gain privileges via a crafted application, aka internal bugs 20731946 and 20719651, a different vulnerability than CVE-2015-7717. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
]
|
|
CVE-2021-47110 | x86/kvm: Disable kvmclock on all CPUs on shutdown | In the Linux kernel, the following vulnerability has been resolved:
x86/kvm: Disable kvmclock on all CPUs on shutdown
Currenly, we disable kvmclock from machine_shutdown() hook and this
only happens for boot CPU. We need to disable it for all CPUs to
guard against memory corruption e.g. on restore from hibernate.
Note, writing '0' to kvmclock MSR doesn't clear memory location, it
just prevents hypervisor from updating the location so for the short
while after write and while CPU is still alive, the clock remains usable
and correct so we don't need to switch to some other clocksource. | []
|
GHSA-2334-74rr-746w | Unspecified vulnerability in the serveServletsByClassnameEnabled feature in IBM WebSphere Application Server (WAS) 6.0 through 6.0.2.25, 6.1 through 6.1.0.14, and 5.1.1.x before 5.1.1.18 has unknown impact and attack vectors. | []
|
|
CVE-2024-41251 | An Incorrect Access Control vulnerability was found in /smsa/admin_teacher_register_approval.php and /smsa/admin_teacher_register_approval_submit.php in Kashipara Responsive School Management System v3.2.0, which allows remote unauthenticated attackers to view and approve Teacher registration. | [
"cpe:2.3:a:kashipara:responsive_school_management_system:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:lopalopa:responsive_school_management_system:3.2.0:*:*:*:*:*:*:*"
]
|
|
GHSA-rvmr-97cf-9f3m | Failure to initialize
memory in SEV Firmware may allow a privileged attacker to access stale data
from other guests. | []
|
|
GHSA-h9jp-mhgm-h8hw | SQL injection vulnerability in diziler.asp in Yigit Aybuga Dizi Portali allows remote attackers to execute arbitrary SQL commands via the id parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | []
|
|
CVE-2023-21956 | Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Container). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebLogic Server, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data as well as unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). | [
"cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*"
]
|
|
CVE-2016-4066 | Cross-site request forgery (CSRF) vulnerability in Fortinet FortiWeb before 5.5.3 allows remote attackers to hijack the authentication of administrators for requests that change the password via unspecified vectors. | [
"cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*"
]
|
|
GHSA-gvqw-c58j-q64r | TIBCO ActiveMatrix Runtime Platform in Service Grid and Service Bus 2.x before 2.3.2 and BusinessWorks Service Engine before 5.8.2; TIBCO ActiveMatrix Platform in TIBCO Silver Fabric ActiveMatrix Service Grid Distribution 3.1.3, Service Grid and Service Bus 3.x before 3.1.5, BusinessWorks Service Engine 5.9.x before 5.9.3, and BPM before 1.3.0; TIBCO BusinessEvents Runtime in Enterprise and Inference Editions 3.x before 3.0.3, Standard Edition 4.x before 4.0.2, and Standard Edition and Express 5.0.0; and TIBCO BusinessWorks Engine in TIBCO Silver Fabric ActiveMatrix BusinessWorks Distribution 5.9.2 and ActiveMatrix BusinessWorks before 5.9.3 allow remote attackers to obtain sensitive information via a crafted URL. | []
|
|
GHSA-m6q3-mcjx-5646 | Tenda FH1201 v1.2.0.14 (408) was discovered to contain a stack overflow via the page parameter in the fromSafeClientFilter function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request. | []
|
|
CVE-2024-28913 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability | [
"cpe:2.3:a:microsoft:ole_db_driver_for_sql_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*",
"cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*"
]
|
GHSA-6f85-3hg7-g6mc | The RomethemeForm For Elementor plugin for WordPress is vulnerable to unauthorized access and modification of data due to a missing capability check on the export_entries, rtformnewform, and rtformupdate functions in all versions up to, and including, 1.1.5. This makes it possible for unauthenticated attackers to export arbitrary form submissions, create new forms, or update any post title or certain metadata. | []
|
|
GHSA-mjmf-39p4-3jpp | Buffer overflow in Adobe Illustrator CS3 13.0.3 and earlier and Illustrator CS4 14.0.0 allows attackers to execute arbitrary code via unspecified vectors. | []
|
|
GHSA-f86f-3g5x-82q5 | Buffer overflow in Ethereal 0.9.15 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a malformed GTP MSISDN string. | []
|
|
GHSA-pq6v-hjqm-frww | Memory safety bugs present in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12. | []
|
|
CVE-2004-0523 | Multiple buffer overflows in krb5_aname_to_localname for MIT Kerberos 5 (krb5) 1.3.3 and earlier allow remote attackers to execute arbitrary code as root. | [
"cpe:2.3:a:mit:kerberos:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos:1.2.2.beta1:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.2:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.2:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.3:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:propack:2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:seam:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:seam:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:seam:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tinysofa:tinysofa_enterprise_server:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tinysofa:tinysofa_enterprise_server:1.0_u1:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*"
]
|
|
GHSA-7pcg-5825-pfjh | Real Time Automation 460 Series products with versions prior to v8.9.8 are vulnerable to cross-site scripting, which could allow an attacker to run any JavaScript reference from the URL string. If this were to occur, the gateway's HTTP interface would redirect to the main page, which is index.htm. | []
|
|
GHSA-jm96-4x63-mg6m | Heap Buffer Overflow vulnerability in GPAC version 2.3-DEV-rev617-g671976fcc-master, allows attackers to execute arbitrary code and cause a denial of service (DoS) via str2ulong class in src/media_tools/avilib.c in gpac/MP4Box. | []
|
|
CVE-2024-40722 | CHANGING Information Technology TCBServiSign Windows Version - Stack-based Buffer Overflow | The specific API in TCBServiSign Windows Version from CHANGING Information Technology does does not properly validate the length of server-side input. When a user visits a spoofed website, unauthenticated remote attackers can cause a stack-based buffer overflow in the TCBServiSign, temporarily disrupting its service. | [
"cpe:2.3:a:changingtec:tcb_servisign:*:*:*:*:*:windows:*:*"
]
|
CVE-2023-20915 | In addOrReplacePhoneAccount of PhoneAccountRegistrar.java, there is a possible way to enable a phone account without user interaction due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-246930197 | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
]
|
|
GHSA-822j-g3v7-c3r6 | The Disk Images subsystem in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. | []
|
|
CVE-2003-0089 | Buffer overflow in the Software Distributor utilities for HP-UX B.11.00 and B.11.11 allows local users to execute arbitrary code via a long LANG environment variable to setuid programs such as (1) swinstall and (2) swmodify. | [
"cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*"
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.