id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
GHSA-gffm-ghfv-g8hc | Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [] |
|
CVE-2025-23170 | The Versa Director SD-WAN orchestration platform includes functionality to initiate SSH sessions to remote CPEs and the Director shell via Shell-In-A-Box. The underlying Python script, shell-connect.py, is vulnerable to command injection through the user argument. This allows an attacker to execute arbitrary commands on the system.
Exploitation Status:
Versa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers.
Workarounds or Mitigation:
There are no workarounds to disable the GUI option. Versa recommends that Director be upgraded to one of the remediated software versions. | [] |
|
CVE-2022-1351 | Stored XSS in Tooltip in pimcore/pimcore | Stored XSS in Tooltip in GitHub repository pimcore/pimcore prior to 10.4. | [
"cpe:2.3:a:pimcore:pimcore:*:*:*:*:*:*:*:*"
] |
GHSA-c2qf-pq2q-694f | WriteEPTImage in coders/ept.c in ImageMagick 7.0.7-25 Q16 allows remote attackers to cause a denial of service (MagickCore/memory.c double free and application crash) or possibly have unspecified other impact via a crafted file. | [] |
|
GHSA-4rgw-hq9r-qp9v | The CMS CORBA listener in SAP BusinessObjects BI Edge 4.0 allows remote attackers to cause a denial of service (server shutdown) via crafted OSCAFactory::Session ORB message. | [] |
|
GHSA-qh4q-fwf8-qqrw | Zope Denial of Service (DoS) vulnerability in ZServer | ZServer in Zope 2.10.x before 2.10.12 and 2.11.x before 2.11.7 allows remote attackers to cause a denial of service (crash of worker threads) via vectors that trigger uncaught exceptions. | [] |
CVE-2020-7684 | Directory Traversal | This affects all versions of package rollup-plugin-serve. There is no path sanitization in readFile operation. | [
"cpe:2.3:a:rollup-plugin-serve_project:rollup-plugin-serve:*:*:*:*:*:node.js:*:*"
] |
CVE-2024-49607 | WordPress WP Dropbox Dropins plugin <= 1.0 - Arbitrary File Upload vulnerability | Unrestricted Upload of File with Dangerous Type vulnerability in Redwan Hilali WP Dropbox Dropins allows Upload a Web Shell to a Web Server.This issue affects WP Dropbox Dropins: from n/a through 1.0. | [
"cpe:2.3:a:redwan_hilali:wp_dropbox_dropins:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redwanhilali:wp_dropbox_dropins:*:*:*:*:*:wordpress:*:*"
] |
CVE-2017-8942 | The YottaMark ShopWell - Healthy Diet & Grocery Food Scanner app 5.3.7 through 5.4.2 for iOS does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:yottamark_inc.:shopwell_-_healthy_diet_\\&_grocery_food_scanner:5.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:yottamark_inc.:shopwell_-_healthy_diet_\\&_grocery_food_scanner:5.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:yottamark_inc.:shopwell_-_healthy_diet_\\&_grocery_food_scanner:5.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:yottamark_inc.:shopwell_-_healthy_diet_\\&_grocery_food_scanner:5.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:yottamark_inc.:shopwell_-_healthy_diet_\\&_grocery_food_scanner:5.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:yottamark_inc.:shopwell_-_healthy_diet_\\&_grocery_food_scanner:5.4.2:*:*:*:*:*:*:*"
] |
|
CVE-2020-7116 | The ClearPass Policy Manager WebUI administrative interface has an authenticated command remote execution. When the attacker is already authenticated to the administrative interface, they could then exploit the system, leading to remote command execution in the underlying operating system. Resolution: Fixed in 6.7.13-HF, 6.8.5-HF, 6.8.6, 6.9.1 and higher. | [
"cpe:2.3:a:arubanetworks:clearpass_policy_manager:*:*:*:*:*:*:*:*"
] |
|
GHSA-48fh-jfr3-g6j5 | IBM QRadar SIEM 7.3.0 through 7.3.3 discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 166355. | [] |
|
GHSA-8r7j-2xcc-hmf7 | munin-cgi-graph for Munin 2.0 rc4 does not delete temporary files, which allows remote attackers to cause a denial of service (disk consumption) via many requests to an image with unique parameters. | [] |
|
GHSA-gvjh-r2g7-mjgx | In multiple functions of CompanionDeviceManagerService.java, there is a possible launch NotificationAccessConfirmationActivity of another user profile due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | [] |
|
GHSA-vc45-rcx6-vhcm | An issue was discovered in Adobe Digital Editions 4.5.6 and earlier versions. An exploitable memory corruption vulnerability exists, which could lead to disclosure of memory addresses. | [] |
|
CVE-2024-20760 | Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79) | Adobe Experience Manager versions 6.5.19 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*"
] |
CVE-2023-6094 | OnCell G3150A-LTE Series: Web Server Transmits Cleartext Credentials | A vulnerability has been identified in OnCell G3150A-LTE Series firmware versions v1.3 and prior. The vulnerability results from lack of protection for sensitive information during transmission. An attacker eavesdropping on the traffic between the web browser and server may obtain sensitive information. This type of attack could be executed to gather sensitive information or to facilitate a subsequent attack against the target.
| [
"cpe:2.3:o:moxa:oncell_g3150a-lte_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:oncell_g3150a-lte:-:*:*:*:*:*:*:*"
] |
GHSA-c38m-9668-6j2w | Magento Improper input validation vulnerability | Magento versions 2.4.2 (and earlier), 2.4.1-p1 (and earlier) and 2.3.6-p1 (and earlier) are affected by an Improper input validation vulnerability in the New customer WebAPI.Successful exploitation could allow an attacker to send unsolicited spam e-mails. | [] |
CVE-2021-28971 | In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:aff_a250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:aff_a250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:aff_500f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:aff_500f:-:*:*:*:*:*:*:*"
] |
|
CVE-2024-46049 | Tenda O6 V3.0 firmware V1.0.0.7(2054) contains a stack overflow vulnerability in the formexeCommand function. | [
"cpe:2.3:o:tenda:o6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:tenda:o6_firmware:1.0.0.7\\(2054\\):*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:o6:-:*:*:*:*:*:*:*"
] |
|
CVE-2020-5929 | In versions 13.0.0-13.0.0 HF2, 12.1.0-12.1.2 HF1, and 11.6.1-11.6.2, BIG-IP platforms with Cavium Nitrox SSL hardware acceleration cards, a Virtual Server configured with a Client SSL profile, and using Anonymous (ADH) or Ephemeral (DHE) Diffie-Hellman key exchange and Single DH use option not enabled in the options list may be vulnerable to crafted SSL/TLS Handshakes that may result with a PMS (Pre-Master Secret) that starts in a 0 byte and may lead to a recovery of plaintext messages as BIG-IP TLS/SSL ADH/DHE sends different error messages acting as an oracle. Similar error messages when PMS starts with 0 byte coupled with very precise timing measurement observation may also expose this vulnerability. | [
"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:11.6.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:12.1.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:12.1.2:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.0:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:13.0.0:hotfix2:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.6.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.1.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.1.2:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.0.0:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:13.0.0:hotfix2:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:11.6.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:12.1.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:12.1.2:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:13.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:13.0.0:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:13.0.0:hotfix2:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:11.6.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:12.1.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:12.1.2:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:13.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:13.0.0:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:13.0.0:hotfix2:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.6.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.1.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.1.2:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:13.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:13.0.0:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:13.0.0:hotfix2:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:11.6.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:12.1.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:12.1.2:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:13.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:13.0.0:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:13.0.0:hotfix2:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:11.6.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:12.1.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:12.1.2:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:13.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:13.0.0:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:13.0.0:hotfix2:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:11.6.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:12.1.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:12.1.2:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:13.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:13.0.0:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:13.0.0:hotfix2:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:11.6.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:12.1.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:12.1.2:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:13.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:13.0.0:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:13.0.0:hotfix2:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:11.6.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:12.1.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:12.1.2:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:13.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:13.0.0:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:13.0.0:hotfix2:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:11.6.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:12.1.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:12.1.2:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:13.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:13.0.0:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:13.0.0:hotfix2:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:11.6.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:12.1.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:12.1.2:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:13.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:13.0.0:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:13.0.0:hotfix2:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.6.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.1.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.1.2:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:13.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:13.0.0:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:13.0.0:hotfix2:*:*:*:*:*:*",
"cpe:2.3:a:f5:ssl_orchestrator:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:ssl_orchestrator:11.6.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:ssl_orchestrator:12.1.2:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:ssl_orchestrator:12.1.2:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:ssl_orchestrator:13.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:f5:ssl_orchestrator:13.0.0:hotfix1:*:*:*:*:*:*",
"cpe:2.3:a:f5:ssl_orchestrator:13.0.0:hotfix2:*:*:*:*:*:*"
] |
|
GHSA-x3v7-899j-3p69 | Microsoft Internet Explorer 6 through 8 does not properly restrict script access to content from a different (1) domain or (2) zone, which allows remote attackers to obtain sensitive information via a crafted web site, aka "Cross-Domain Information Disclosure Vulnerability." | [] |
|
GHSA-g749-g2h4-gjcm | Missing Authorization vulnerability in Woo product importer Sharkdropship dropshipping for Aliexpress, eBay, Amazon, etsy.This issue affects Sharkdropship dropshipping for Aliexpress, eBay, Amazon, etsy: from n/a through 2.1.1. | [] |
|
CVE-2019-1694 | Cisco Adaptive Security Appliance Software and Cisco Firepower Threat Defense Software TCP Timer Handling Denial of Service Vulnerability | A vulnerability in the TCP processing engine of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to the improper handling of TCP traffic. An attacker could exploit this vulnerability by sending a specific sequence of packets at a high rate through an affected device. A successful exploit could allow the attacker to temporarily disrupt traffic through the device while it reboots. | [
"cpe:2.3:a:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5505:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5510:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5512-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5515-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5520:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5525-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5540:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5545-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5550:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5555-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5580:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5585-x:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*"
] |
CVE-2023-5511 | Cross-Site Request Forgery (CSRF) in snipe/snipe-it | Cross-Site Request Forgery (CSRF) in GitHub repository snipe/snipe-it prior to v.6.2.3. | [
"cpe:2.3:a:snipeitapp:snipe-it:*:*:*:*:*:*:*:*"
] |
GHSA-qvg6-9fpw-3vw9 | LibTIFF version 4.0.7 is vulnerable to a heap-based buffer over-read in tif_lzw.c resulting in DoS or code execution via a crafted bmp image to tools/bmp2tiff. | [] |
|
CVE-2013-3496 | Infotecs ViPNet Client 3.2.10 (15632) and earlier, ViPNet Coordinator 3.2.10 (15632) and earlier, ViPNet Personal Firewall 3.1 and earlier, and ViPNet SafeDisk 4.1 (0.5643) and earlier use weak permissions (Everyone: Full Control) for a folder under %PROGRAMFILES%\Infotecs, which allows local users to gain privileges via a Trojan horse (1) executable file or (2) DLL file. | [
"cpe:2.3:a:infotecs:vipnet_client:*:*:*:*:*:*:*:*",
"cpe:2.3:a:infotecs:vipnet_coordinator:*:*:*:*:*:*:*:*",
"cpe:2.3:a:infotecs:vipnet_personal_firewall:*:*:*:*:*:*:*:*",
"cpe:2.3:a:infotecs:vipnet_safedisk:*:*:*:*:*:*:*:*"
] |
|
GHSA-vcfg-vcq2-8xc9 | NVIDIA DGX A100 contains a vulnerability in SBIOS in the SmmCore, where a user with high privileges can chain another vulnerability to this vulnerability, causing an integer overflow, possibly leading to code execution, escalation of privileges, denial of service, compromised integrity, and information disclosure. The scope of impact can extend to other components. | [] |
|
GHSA-vp8h-vvmf-j596 | The FluentSMTP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via an email subject in versions up to, and including, 2.2.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
|
GHSA-jcpj-35gg-r7f5 | Multiple PHP remote file inclusion vulnerabilities in Segue CMS 1.5.9 and earlier, when magic_quotes_gpc is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the theme parameter to (1) themesettings.php or (2) index.php, a different vector than CVE-2006-5497. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [] |
|
CVE-2017-14548 | STDU Viewer 1.6.375 allows attackers to execute arbitrary code or cause a denial of service via a crafted .djvu file, related to a "User Mode Write AV starting at STDUDjVuFile!DllUnregisterServer+0x000000000000854d." | [
"cpe:2.3:a:stdutility:stdu_viewer:1.6.375:*:*:*:*:*:*:*"
] |
|
CVE-2008-0462 | Cross-site scripting (XSS) vulnerability in the Archive 5.x before 5.x-1.8 module for Drupal allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:drupal:archive_module:*:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*"
] |
|
GHSA-93m5-952c-4mxx | Multiple Cross-site scripting (XSS) vulnerabilities in Webmin before 1.850 allow remote attackers to inject arbitrary web script or HTML via the sec parameter to view_man.cgi, the referers parameter to change_referers.cgi, or the name parameter to save_user.cgi. NOTE: these issues were not fixed in 1.840. | [] |
|
CVE-2020-27904 | A logic issue existed resulting in memory corruption. This was addressed with improved state management. This issue is fixed in macOS Big Sur 11.0.1. An application may be able to execute arbitrary code with kernel privileges. | [
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] |
|
GHSA-x98f-r46f-9w75 | An issue discovered in Acer Wireless Keyboard SK-9662 allows attacker in physical proximity to both decrypt wireless keystrokes and inject arbitrary keystrokes via use of weak encryption. | [] |
|
GHSA-f34v-4q4f-pf5q | A NULL pointer dereference flaw was found in the ub_ctx_set_fwd function in Unbound. This issue could allow an attacker who can invoke specific sequences of API calls to cause a segmentation fault. When certain API functions such as ub_ctx_set_fwd and ub_ctx_resolvconf are called in a particular order, the program attempts to read from a NULL pointer, leading to a crash. This issue can result in a denial of service by causing the application to terminate unexpectedly. | [] |
|
CVE-2022-4496 | miniOrange WordPress SAML SSO multiple versions - Open Redirect in SSO login | The SAML SSO Standard WordPress plugin version 16.0.0 before 16.0.8, SAML SSO Premium WordPress plugin version 12.0.0 before 12.1.0 and SAML SSO Premium Multisite WordPress plugin version 20.0.0 before 20.0.7 does not validate that the redirect parameter to its SSO login endpoint points to an internal site URL, making it vulnerable to an Open Redirect issue when the user is already logged in. | [
"cpe:2.3:a:miniorange:saml_sp_single_sign_on:*:*:*:*:premium:wordpress:*:*",
"cpe:2.3:a:miniorange:saml_sp_single_sign_on:*:*:*:*:standard:wordpress:*:*",
"cpe:2.3:a:miniorange:saml_sp_single_sign_on:*:*:*:*:multisite:wordpress:*:*"
] |
CVE-2021-3977 | Cross-site Scripting (XSS) - Stored in invoiceninja/invoiceninja | invoiceninja is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | [
"cpe:2.3:a:invoiceninja:invoice_ninja:*:*:*:*:*:*:*:*"
] |
GHSA-xc3f-2gf2-6fw9 | SQL Injection in Trend Micro Control Manager 6.0 causes Remote Code Execution when executing opcode 0x3b21 due to lack of proper user input validation in mdHandlerLicenseManager.dll. Formerly ZDI-CAN-4561. | [] |
|
GHSA-f2mp-4h2c-6v7m | Cross-site request forgery (CSRF) vulnerability in xmlrpc.cgi in Bugzilla 4.0.2 through 4.0.4 and 4.1.1 through 4.2rc2, when mod_perl is used, allows remote attackers to hijack the authentication of arbitrary users for requests that modify the product's installation via the XML-RPC API. | [] |
|
GHSA-9h73-cr42-c392 | Missing Authorization vulnerability in KaizenCoders Short URL allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Short URL: from n/a through 1.6.8. | [] |
|
CVE-2022-31630 | OOB read due to insufficient input validation in imageloadfont() | In PHP versions prior to 7.4.33, 8.0.25 and 8.1.12, when using imageloadfont() function in gd extension, it is possible to supply a specially crafted font file, such as if the loaded font is used with imagechar() function, the read outside allocated buffer will be used. This can lead to crashes or disclosure of confidential information. | [
"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"
] |
GHSA-j648-847p-926p | Buffer overflow in socks5 server on Linux allows attackers to execute arbitrary commands via a long connection request. | [] |
|
GHSA-pw74-hq2f-c2j4 | Unrestricted Upload of File with Dangerous Type vulnerability in Realtyna Realtyna Organic IDX plugin allows Code Injection.This issue affects Realtyna Organic IDX plugin: from n/a through 4.14.13. | [] |
|
CVE-2018-5475 | A Stack-based Buffer Overflow issue was discovered in GE D60 Line Distance Relay devices running firmware Version 7.11 and prior. Multiple stack-based buffer overflow vulnerabilities have been identified, which may allow remote code execution. | [
"cpe:2.3:o:ge:d60_line_distance_relay_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ge:d60_line_distance_relay:-:*:*:*:*:*:*:*"
] |
|
CVE-2017-18065 | In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, improper input validation for vent->vdev_id in wma_action_frame_filter_mac_event_handler(), which is received from firmware, leads to arbitrary code execution. | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] |
|
CVE-2017-5729 | Frame replay vulnerability in Wi-Fi subsystem in Intel Dual-Band and Tri-Band Wireless-AC Products allows remote attacker to replay frames via channel-based man-in-the-middle. | [
"cpe:2.3:o:intel:dual_band_wireless-ac_3160:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:dual_band_wireless-ac_3160:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:dual_band_wireless-ac_7260:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:dual_band_wireless-ac_7260:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:dual_band_wireless-n_7260:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:dual_band_wireless-n_7260:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:wireless-n_7260:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:wireless-n_7260:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:dual_band_wireless-ac_7265:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:dual_band_wireless-ac_7265:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:dual_band_wireless-n_7265:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:dual_band_wireless-n_7265:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:wireless-n_7265:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:wireless-n_7265:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:tri-band_wireless-ac_17265:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:tri-band_wireless-ac_17265:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:tri-band_wireless-ac_18260:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:tri-band_wireless-ac_18260:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:tri-band_wireless-ac_18265:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:tri-band_wireless-ac_18265:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*"
] |
|
GHSA-c5wr-523p-2hqc | A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to overwrite arbitrary files in the underlying file system of an affected system. This vulnerability is due to insufficient validation of the user-supplied input parameters of a specific CLI command. An attacker could exploit this vulnerability by issuing that command with specific parameters. A successful exploit could allow the attacker to overwrite the content in any arbitrary files that reside on the underlying host file system. | [] |
|
GHSA-93hh-g6j8-gcm4 | SitePanel 2.6.1 and earlier (SitePanel2) allows remote attackers to upload and execute arbitrary files such as PHP scripts via an attachment to a trouble ticket. | [] |
|
GHSA-5695-324m-jq3v | An Improper Authentication vulnerability in the kernel of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause an impact on confidentiality or integrity. A vulnerability in the processing of TCP-AO will allow a BGP or LDP peer not configured with authentication to establish a session even if the peer is locally configured to use authentication. This could lead to untrusted or unauthorized sessions being established. This issue affects Juniper Networks Junos OS: 21.2 versions prior to 21.2R3-S1; 21.3 versions prior to 21.3R2-S2, 21.3R3; 21.4 versions prior to 21.4R2-S1, 21.4R3; 22.1 versions prior to 22.1R1-S1, 22.1R2. This issue does not affect Juniper Networks Junos OS Evolved. | [] |
|
GHSA-vxxj-6jx6-2x5h | Lhaz 1.33 allows remote attackers to execute arbitrary code via unknown vectors, as actively exploited in August 2007 by the Exploit-LHAZ.a gzip file, a different issue than CVE-2006-4116. | [] |
|
GHSA-jv97-q22f-fpw5 | Missing authentication for critical function in Wi-Fi AP UNIT allows a remote unauthenticated attacker to obtain sensitive information of the affected products. Affected products and versions are as follows: AC-PD-WAPU v1.05_B04 and earlier, AC-PD-WAPUM v1.05_B04 and earlier, AC-PD-WAPU-P v1.05_B04P and earlier, AC-PD-WAPUM-P v1.05_B04P and earlier, AC-WAPU-300 v1.00_B07 and earlier, AC-WAPUM-300 v1.00_B07 and earlier, AC-WAPU-300-P v1.00_B07 and earlier, and AC-WAPUM-300-P v1.00_B07 and earlier | [] |
|
GHSA-gqrc-7g2r-3f7c | An out-of-bounds write vulnerability on windows operating systems causes the Ivanti AntiVirus Product to crash. Update to Ivanti AV Product version 7.9.1.285 or above. | [] |
|
CVE-2025-30660 | Junos OS: MX Series: Decapsulation of specific GRE packets leads to PFE reset | An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on MX Series allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).When processing a high rate of specific GRE traffic destined to the device, the respective PFE will hang causing traffic forwarding to stop.
When this issue occurs the following logs can be observed:
<fpc #> MQSS(0): LI-3: Received a parcel with more than 512B accompanying data
CHASSISD_FPC_ASIC_ERROR: ASIC Error detected <...>
This issue affects Junos OS:
* all versions before 21.2R3-S9,
* 21.4 versions before 21.4R3-S8,
* 22.2 versions before 22.2R3-S4,
* 22.4 versions before 22.4R3-S5,
* 23.2 versions before 23.2R2-S2,
* 23.4 versions before 23.4R2. | [] |
CVE-2018-21213 | Certain NETGEAR devices are affected by a buffer overflow by an unauthenticated attacker. This affects D3600 before 1.0.0.67, D6000 before 1.0.0.67, D7800 before 1.0.1.30, R6100 before 1.0.1.20, R7500 before 1.0.0.118, R7500v2 before 1.0.3.24, R7800 before 1.0.2.40, R9000 before 1.0.2.52, WNDR3700v4 before 1.0.2.96, WNDR4300 before 1.0.2.98, WNDR4300v2 before 1.0.0.50, and WNDR4500v3 before 1.0.0.50. | [
"cpe:2.3:o:netgear:r7800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r9000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r9000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndr3700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr3700:v4:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndr4300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr4300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr4300:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndr4500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr4500:v3:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d7800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d7800:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7500:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d6000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d6000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d3600_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d3600:-:*:*:*:*:*:*:*"
] |
|
CVE-2023-37502 | An unrestricted file upload vulnerability affects HCL Compass | HCL Compass is vulnerable to lack of file upload security. An attacker could upload files containing active code that can be executed by the server or by a user's web browser.
| [
"cpe:2.3:a:hcl_software:hcl_compass:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hcltech:hcl_compass:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hcltech:hcl_compass:2.1.0:*:*:*:*:*:*:*"
] |
GHSA-ph8x-8q5q-f3mh | The Symantec Management Console prior to ITMS 8.1 RU1, ITMS 8.0_POST_HF6, and ITMS 7.6_POST_HF7 has an issue whereby XML input containing a reference to an external entity is processed by a weakly configured XML parser. This attack may lead to the disclosure of confidential data, denial of service, server side request forgery, port scanning from the perspective of the machine where the parser is located, and other system impacts. | [] |
|
CVE-2012-0003 | Unspecified vulnerability in winmm.dll in Windows Multimedia Library in Windows Media Player (WMP) in Microsoft Windows XP SP2 and SP3, Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows remote attackers to execute arbitrary code via a crafted MIDI file, aka "MIDI Remote Code Execution Vulnerability." | [
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:professional_x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:2005:sp3:media_center:*:*:*:*:*"
] |
|
CVE-1999-1243 | SGI Desktop Permissions Tool in IRIX 6.0.1 and earlier allows local users to modify permissions for arbitrary files and gain privileges. | [
"cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.0:*:*:*:*:*:*:*"
] |
|
CVE-2023-45686 | Arbitrary file write via WebDAV path traversal in Titan MFT and Titan SFTP servers | Insufficient path validation when writing a file via WebDAV in South River Technologies' Titan MFT and Titan SFTP servers on Linux allows an authenticated attacker to write a file to any location on the filesystem via path traversal | [
"cpe:2.3:a:southrivertech:titan_mfp_server:*:*:*:*:*:linux:*:*"
] |
GHSA-cx7j-6x8v-hjf9 | Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin before 2.10.1.0 allow remote attackers to inject arbitrary web script or HTML via (1) the fieldkey parameter to browse_foreigners.php or (2) certain input to the PMA_sanitize function. | [] |
|
GHSA-wmrf-r2v7-34hw | Proxifier for Mac before 2.19.2, when first run, allows local users to gain privileges by replacing the KLoader binary with a Trojan horse program. | [] |
|
CVE-2016-0529 | Unspecified vulnerability in the Oracle Customer Interaction History component in Oracle E-Business Suite 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, and 12.2.5 allows remote attackers to affect confidentiality and integrity via vectors related to User GUI, a different vulnerability than CVE-2016-0527, CVE-2016-0528, and CVE-2016-0530. | [
"cpe:2.3:a:oracle:customer_interaction_history:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:customer_interaction_history:12.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:customer_interaction_history:12.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:customer_interaction_history:12.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:customer_interaction_history:12.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:customer_interaction_history:12.2.5:*:*:*:*:*:*:*"
] |
|
GHSA-x6xg-mjxq-9qw2 | In the Linux kernel, the following vulnerability has been resolved:wifi: plfxlc: Remove erroneous assert in plfxlc_mac_releaseplfxlc_mac_release() asserts that mac->lock is held. This assertion is
incorrect, because even if it was possible, it would not be the valid
behaviour. The function is used when probe fails or after the device is
disconnected. In both cases mac->lock can not be held as the driver is
not working with the device at the moment. All functions that use mac->lock
unlock it just after it was held. There is also no need to hold mac->lock
for plfxlc_mac_release() itself, as mac data is not affected, except for
mac->flags, which is modified atomically.This bug leads to the following warning:WARNING: CPU: 0 PID: 127 at drivers/net/wireless/purelifi/plfxlc/mac.c:106 plfxlc_mac_release+0x7d/0xa0
Modules linked in:
CPU: 0 PID: 127 Comm: kworker/0:2 Not tainted 6.1.124-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Workqueue: usb_hub_wq hub_event
RIP: 0010:plfxlc_mac_release+0x7d/0xa0 drivers/net/wireless/purelifi/plfxlc/mac.c:106
Call Trace:
<TASK>
probe+0x941/0xbd0 drivers/net/wireless/purelifi/plfxlc/usb.c:694
usb_probe_interface+0x5c0/0xaf0 drivers/usb/core/driver.c:396
really_probe+0x2ab/0xcb0 drivers/base/dd.c:639
__driver_probe_device+0x1a2/0x3d0 drivers/base/dd.c:785
driver_probe_device+0x50/0x420 drivers/base/dd.c:815
__device_attach_driver+0x2cf/0x510 drivers/base/dd.c:943
bus_for_each_drv+0x183/0x200 drivers/base/bus.c:429
__device_attach+0x359/0x570 drivers/base/dd.c:1015
bus_probe_device+0xba/0x1e0 drivers/base/bus.c:489
device_add+0xb48/0xfd0 drivers/base/core.c:3696
usb_set_configuration+0x19dd/0x2020 drivers/usb/core/message.c:2165
usb_generic_driver_probe+0x84/0x140 drivers/usb/core/generic.c:238
usb_probe_device+0x130/0x260 drivers/usb/core/driver.c:293
really_probe+0x2ab/0xcb0 drivers/base/dd.c:639
__driver_probe_device+0x1a2/0x3d0 drivers/base/dd.c:785
driver_probe_device+0x50/0x420 drivers/base/dd.c:815
__device_attach_driver+0x2cf/0x510 drivers/base/dd.c:943
bus_for_each_drv+0x183/0x200 drivers/base/bus.c:429
__device_attach+0x359/0x570 drivers/base/dd.c:1015
bus_probe_device+0xba/0x1e0 drivers/base/bus.c:489
device_add+0xb48/0xfd0 drivers/base/core.c:3696
usb_new_device+0xbdd/0x18f0 drivers/usb/core/hub.c:2620
hub_port_connect drivers/usb/core/hub.c:5477 [inline]
hub_port_connect_change drivers/usb/core/hub.c:5617 [inline]
port_event drivers/usb/core/hub.c:5773 [inline]
hub_event+0x2efe/0x5730 drivers/usb/core/hub.c:5855
process_one_work+0x8a9/0x11d0 kernel/workqueue.c:2292
worker_thread+0xa47/0x1200 kernel/workqueue.c:2439
kthread+0x28d/0x320 kernel/kthread.c:376
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295
</TASK>Found by Linux Verification Center (linuxtesting.org) with Syzkaller. | [] |
|
GHSA-j2fc-j5qr-63jr | Directory Traversal vulnerability in Punkbuster pbsv.d64 2.351, allows remote attackers to execute arbitrary code. | [] |
|
CVE-2006-0378 | Cross-site scripting (XSS) vulnerability in Netrix X-Site Manager allows remote attackers to inject arbitrary web script or HTML via the product_id parameter, as originally demonstrated for a custom mp3players_details.php program. NOTE: the name of the affected program might be installation-dependent, but it has been identified as "product_details.php" by some sources. | [
"cpe:2.3:a:netrix:x-site_manager:*:*:*:*:*:*:*:*"
] |
|
CVE-2017-20171 | PrivateSky apersistence mysqlUtils.js sql injection | A vulnerability classified as critical has been found in PrivateSky apersistence. This affects an unknown part of the file db/sql/mysqlUtils.js. The manipulation leads to sql injection. The identifier of the patch is 954425f61634b556fe644837a592a5b8fcfca068. It is recommended to apply a patch to fix this issue. The identifier VDB-218457 was assigned to this vulnerability. | [
"cpe:2.3:a:apersistence_project:apersistence:*:*:*:*:*:*:*:*"
] |
CVE-2018-10927 | A flaw was found in RPC request using gfs3_lookup_req in glusterfs server. An authenticated attacker could use this flaw to leak information and execute remote denial of service by crashing gluster brick process. | [
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gluster:glusterfs:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
] |
|
CVE-2015-1425 | JAKWEB Gecko CMS has Multiple Input Validation Vulnerabilities | [
"cpe:2.3:a:jakweb:gecko_cms:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:jakweb:gecko_cms:2.3:*:*:*:*:*:*:*"
] |
|
GHSA-78c6-5xpm-9h9h | In ImageMagick 7.0.5-6 Q16, the ReadJNGImage function in coders/png.c allows attackers to cause a denial of service (memory leak) via a crafted file. | [] |
|
CVE-2024-26094 | Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79) | Adobe Experience Manager versions 6.5.19 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [
"cpe:2.3:a:adobe:experience_manager:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager_cloud_service:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*"
] |
GHSA-m67h-9h78-qpxg | Adobe Photoshop versions 21.2.6 (and earlier) and 22.3 (and earlier) are affected by a Buffer Overflow vulnerability when parsing a specially crafted JSX file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] |
|
CVE-2018-0591 | The KINEPASS App for Android Ver 3.1.1 and earlier, and for iOS Ver 3.1.2 and earlier do not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:t-joy:kinepass:*:*:*:*:*:android:*:*",
"cpe:2.3:a:t-joy:kinepass:*:*:*:*:*:iphone_os:*:*"
] |
|
CVE-2019-4258 | IBM Sterling B2B Integrator 6.0.0.0 and 6.0.0.1 Standard Edition is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 159946. | [
"cpe:2.3:a:ibm:sterling_b2b_integrator:6.0.0.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:sterling_b2b_integrator:6.0.0.1:*:*:*:standard:*:*:*"
] |
|
GHSA-xxqv-2w2h-3m7c | Cross-site scripting (XSS) vulnerability in ProjectSend (formerly cFTP) r561 allows remote attackers to inject arbitrary web script or HTML via the Description field in a file upload. NOTE: this issue was originally incorrectly mapped to CVE-2014-1155; see CVE-2014-1155 for more information. | [] |
|
CVE-2023-1294 | SourceCodester File Tracker Manager System POST Parameter login.php sql injection | A vulnerability was found in SourceCodester File Tracker Manager System 1.0. It has been classified as critical. Affected is an unknown function of the file /file_manager/login.php of the component POST Parameter Handler. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222648. | [
"cpe:2.3:a:file_tracker_manager_system_project:file_tracker_management_system:1.0:*:*:*:*:*:*:*"
] |
GHSA-m8fc-35q9-4pcq | In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile and Snapdragon Wear MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9645, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 600, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, and SD 820, UE crash is seen due to IPCMem exhaustion, when UDP data is pumped to UE's ULP (UserPlane Location protocol) UDP port 7275. | [] |
|
GHSA-4hf6-x32w-573x | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.7.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [] |
|
GHSA-6jvp-5xf7-xfxc | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | [] |
|
CVE-2022-29258 | Cross-site Scripting in Filter Stream Converter Application in XWiki Platform | XWiki Platform Filter UI provides a generic user interface to convert from a XWiki Filter input stream to an output stream with settings for each stream. Starting with versions 6.0-milestone-2 and 5.4.4 and prior to versions 12.10.11, 14.0-rc-1, 13.4.7, and 13.10.3, XWiki Platform Filter UI contains a possible cross-site scripting vector in the `Filter.FilterStreamDescriptorForm` wiki page related to pretty much all the form fields printed in the home page of the application. The issue is patched in versions 12.10.11, 14.0-rc-1, 13.4.7, and 13.10.3. The easiest workaround is to edit the wiki page `Filter.FilterStreamDescriptorForm` (with wiki editor) according to the instructions in the GitHub Security Advisory. | [
"cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*"
] |
GHSA-wpp9-hvmx-xrcv | An exploitable out of bounds write vulnerability exists in the parsing of ELF Section Headers of Hopper Disassembler 3.11.20. A specially crafted ELF file can cause attacker controlled pointer arithmetic resulting in a partially controlled out of bounds write. An attacker can craft an ELF file with specific section headers to trigger this vulnerability. | [] |
|
CVE-2021-44040 | HTTP request line fuzzing attacks | Improper Input Validation vulnerability in request line parsing of Apache Traffic Server allows an attacker to send invalid requests. This issue affects Apache Traffic Server 8.0.0 to 8.1.3 and 9.0.0 to 9.1.1. | [
"cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] |
CVE-2024-5696 | By manipulating the text in an `<input>` tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-21878 | Command Injection through Unsafe File Name Evaluation in internal script in Enphase IQ Gateway v4.x to and including 8.x | Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Enphase IQ Gateway (formerly known as Envoy) allows OS Command Injection. This vulnerability is present in an internal script.This issue affects Envoy: from 4.x up to and including 8.x and is currently unpatched. | [
"cpe:2.3:h:enphase:envoy:*:*:*:*:*:*:*:*",
"cpe:2.3:o:enphase:iq_gateway_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:enphase:iq_gateway:-:*:*:*:*:*:*:*"
] |
GHSA-x2qc-cg56-c5w3 | Unspecified vulnerability in the Enterprise Manager Ops Center component in Oracle Enterprise Manager Grid Control 11.1.3 and 12.1.4 allows remote attackers to affect integrity via unknown vectors related to User Interface Framework. | [] |
|
CVE-2025-26468 | CyberData 011209 SIP Emergency Intercom Missing Authentication for Critical Function | CyberData
011209
Intercom exposes features that could allow an unauthenticated to gain
access and cause a denial-of-service condition or system disruption. | [] |
CVE-2014-9911 | Stack-based buffer overflow in the ures_getByKeyWithFallback function in common/uresbund.cpp in International Components for Unicode (ICU) before 54.1 for C/C++ allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted uloc_getDisplayName call. | [
"cpe:2.3:a:icu-project:international_components_for_unicode:*:*:*:*:*:c\\/c\\+\\+:*:*"
] |
|
GHSA-rfvx-8c45-w4c7 | In the Linux kernel, the following vulnerability has been resolved:riscv/kprobe: fix kernel panic when invoking sys_read traced by kprobeThe execution of sys_read end up hitting a BUG_ON() in __find_get_block
after installing kprobe at sys_read, the BUG message like the following:[ 65.708663] ------------[ cut here ]------------
[ 65.709987] kernel BUG at fs/buffer.c:1251!
[ 65.711283] Kernel BUG [#1]
[ 65.712032] Modules linked in:
[ 65.712925] CPU: 0 PID: 51 Comm: sh Not tainted 5.12.0-rc4 #1
[ 65.714407] Hardware name: riscv-virtio,qemu (DT)
[ 65.715696] epc : __find_get_block+0x218/0x2c8
[ 65.716835] ra : __getblk_gfp+0x1c/0x4a
[ 65.717831] epc : ffffffe00019f11e ra : ffffffe00019f56a sp : ffffffe002437930
[ 65.719553] gp : ffffffe000f06030 tp : ffffffe0015abc00 t0 : ffffffe00191e038
[ 65.721290] t1 : ffffffe00191e038 t2 : 000000000000000a s0 : ffffffe002437960
[ 65.723051] s1 : ffffffe00160ad00 a0 : ffffffe00160ad00 a1 : 000000000000012a
[ 65.724772] a2 : 0000000000000400 a3 : 0000000000000008 a4 : 0000000000000040
[ 65.726545] a5 : 0000000000000000 a6 : ffffffe00191e000 a7 : 0000000000000000
[ 65.728308] s2 : 000000000000012a s3 : 0000000000000400 s4 : 0000000000000008
[ 65.730049] s5 : 000000000000006c s6 : ffffffe00240f800 s7 : ffffffe000f080a8
[ 65.731802] s8 : 0000000000000001 s9 : 000000000000012a s10: 0000000000000008
[ 65.733516] s11: 0000000000000008 t3 : 00000000000003ff t4 : 000000000000000f
[ 65.734434] t5 : 00000000000003ff t6 : 0000000000040000
[ 65.734613] status: 0000000000000100 badaddr: 0000000000000000 cause: 0000000000000003
[ 65.734901] Call Trace:
[ 65.735076] [<ffffffe00019f11e>] __find_get_block+0x218/0x2c8
[ 65.735417] [<ffffffe00020017a>] __ext4_get_inode_loc+0xb2/0x2f6
[ 65.735618] [<ffffffe000201b6c>] ext4_get_inode_loc+0x3a/0x8a
[ 65.735802] [<ffffffe000203380>] ext4_reserve_inode_write+0x2e/0x8c
[ 65.735999] [<ffffffe00020357a>] __ext4_mark_inode_dirty+0x4c/0x18e
[ 65.736208] [<ffffffe000206bb0>] ext4_dirty_inode+0x46/0x66
[ 65.736387] [<ffffffe000192914>] __mark_inode_dirty+0x12c/0x3da
[ 65.736576] [<ffffffe000180dd2>] touch_atime+0x146/0x150
[ 65.736748] [<ffffffe00010d762>] filemap_read+0x234/0x246
[ 65.736920] [<ffffffe00010d834>] generic_file_read_iter+0xc0/0x114
[ 65.737114] [<ffffffe0001f5d7a>] ext4_file_read_iter+0x42/0xea
[ 65.737310] [<ffffffe000163f2c>] new_sync_read+0xe2/0x15a
[ 65.737483] [<ffffffe000165814>] vfs_read+0xca/0xf2
[ 65.737641] [<ffffffe000165bae>] ksys_read+0x5e/0xc8
[ 65.737816] [<ffffffe000165c26>] sys_read+0xe/0x16
[ 65.737973] [<ffffffe000003972>] ret_from_syscall+0x0/0x2
[ 65.738858] ---[ end trace fe93f985456c935d ]---A simple reproducer looks like:
echo 'p:myprobe sys_read fd=%a0 buf=%a1 count=%a2' > /sys/kernel/debug/tracing/kprobe_events
echo 1 > /sys/kernel/debug/tracing/events/kprobes/myprobe/enable
cat /sys/kernel/debug/tracing/traceHere's what happens to hit that BUG_ON():After installing kprobe at entry of sys_read, the first instruction
is replaced by 'ebreak' instruction on riscv64 platform.Once kernel reach the 'ebreak' instruction at the entry of sys_read,
it trap into the riscv breakpoint handler, where it do something to
setup for coming single-step of origin instruction, including backup
the 'sstatus' in pt_regs, followed by disable interrupt during single
stepping via clear 'SIE' bit of 'sstatus' in pt_regs.Then kernel restore to the instruction slot contains two instructions,
one is original instruction at entry of sys_read, the other is 'ebreak'.
Here it trigger a 'Instruction page fault' exception (value at 'scause'
is '0xc'), if PF is not filled into PageTabe for that slot yet.Again kernel trap into page fault exception handler, where it choose
different policy according to the state of running kprobe. Because
afte 2) the state is KPROBE_HIT_SS, so kernel reset the current kp
---truncated--- | [] |
|
CVE-2019-11171 | Heap corruption in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure, escalation of privilege and/or denial of service via network access. | [
"cpe:2.3:o:intel:baseboard_management_controller_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:bbs2600bpb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:bbs2600bpbr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:bbs2600bpq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:bbs2600bpqr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:bbs2600bps:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:bbs2600bpsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:bbs2600stb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:bbs2600stbr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:bbs2600stq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:bbs2600stqr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpb24r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpb24rx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpblc24r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpblcr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpbr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpbrx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpq24r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpqr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bps24r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hns2600bpsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hpchns2600bpbr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hpchns2600bpqr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hpchns2600bpsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hpcr1208wfqysr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hpcr1208wftysr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hpcr1304wf0ysr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hpcr1304wftysr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hpcr2208wf0zsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hpcr2208wfqzsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hpcr2208wftzsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hpcr2208wftzsrx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hpcr2224wftzsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hpcr2308wftzsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hpcr2312wf0npr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:hpcr2312wftzsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r1208wfqysr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r1208wftysr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r1304wf0ysr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r1304wftysr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2208wf0zsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2208wfqzsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2208wftzsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2208wftzsrx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2224wftzsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2308wftzsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2312wf0npr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:r2312wftzsr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600stbr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600stqr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600wf0:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600wf0r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600wfqr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s2600wftr:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s9232wk1hlc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s9232wk2hac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s9232wk2hlc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s9248wk1hlc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s9248wk2hac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s9248wk2hlc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:s9256wk1hlc:-:*:*:*:*:*:*:*"
] |
|
GHSA-hx46-gcq8-4c72 | A Cross Site Scripting (XSS) vulnerability exists in Exrick XMall Admin Panel as of 11/7/2021 via the GET parameter in product-add.jsp. | [] |
|
CVE-2020-11663 | CA API Developer Portal 4.3.1 and earlier handles 404 requests in an insecure manner, which allows attackers to perform open redirect attacks. | [
"cpe:2.3:a:broadcom:ca_api_developer_portal:*:*:*:*:*:*:*:*"
] |
|
GHSA-9qwh-mr4w-j7m3 | Acidcat 2.1.13 and earlier stores the database under the web root with insufficient access control, which allows remote attackers to obtain sensitive information via a request to databases/acidcat.mdb. | [] |
|
CVE-2015-4715 | The fetch function in OAuth/Curl.php in Dropbox-PHP, as used in ownCloud Server before 6.0.8, 7.x before 7.0.6, and 8.x before 8.0.4 when an external Dropbox storage has been mounted, allows remote administrators of Dropbox.com to read arbitrary files via an @ (at sign) character in unspecified POST values. | [
"cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*"
] |
|
GHSA-687h-86vc-5x59 | ChainerRL Visualizer 0.1.1 vulnerable to Path Traversal via unsafe use of send_file function | The chainer/chainerrl-visualizer repository through 0.1.1 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely. | [] |
GHSA-v26h-pr28-4w63 | Insufficiently Protected Credentials vulnerability in Baxter Welch Allyn Configuration Tool may allow Remote Services with Stolen Credentials.This issue affects Welch Allyn Configuration Tool: versions 1.9.4.1 and prior. | [] |
|
CVE-2020-3230 | Cisco IOS and IOS XE Software Internet Key Exchange Version 2 Denial of Service Vulnerability | A vulnerability in the Internet Key Exchange Version 2 (IKEv2) implementation in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to prevent IKEv2 from establishing new security associations. The vulnerability is due to incorrect handling of crafted IKEv2 SA-Init packets. An attacker could exploit this vulnerability by sending crafted IKEv2 SA-Init packets to the affected device. An exploit could allow the attacker to cause the affected device to reach the maximum incoming negotiation limits and prevent further IKEv2 security associations from being formed. | [
"cpe:2.3:o:cisco:ios:12.2\\(6\\)i1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ej:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ej1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ek:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ek1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ex:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ex1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ex2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ex3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ex4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ex5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ex6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ex7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ex8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ey:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ey1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ey2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ey3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ez:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)se1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)se2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)se3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)se4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)se5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)se6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)se7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)se8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)se9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)se10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)se10a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)se11:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)se12:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2a\\)ex5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2a\\)se9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)s1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)s2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)sg1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)sg2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)sy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)sy1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)sy2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)sy3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)sy4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)sy5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)sy6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)t1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)t2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)t3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)t4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)t5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)xb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)xb1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)xb2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(1\\)xb3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)gc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)gc1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)gc2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)s1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)s2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sg1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sg2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sg3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sg4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sg5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sg6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sg7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sg8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy4a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy11:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy12:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy13:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)sy14:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)t0a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)t1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)t2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)t2a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)t3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)t4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(2\\)t5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)mra:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)mra1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)mra2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)mra3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)mra4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)s0a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)s1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)s2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)s3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)s4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)s5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)s5a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)s6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)s7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)svs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)t1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)t2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)t3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(3\\)t4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(4\\)gc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(4\\)gc1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(4\\)gc2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(4\\)m:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(4\\)m0a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(4\\)m0b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(4\\)m1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(4\\)m2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(4\\)m3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(4\\)m3a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(4\\)m4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(4\\)m5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(4\\)m6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(4\\)m7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(4\\)m8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(4\\)m9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(4\\)m10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(4\\)m12a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(4\\)xb4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(4\\)xb5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(4\\)xb5a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(4\\)xb6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(4\\)xb7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(4\\)xb8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1\\(4\\)xb8a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)e1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)e2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)e3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)ey:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)gc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)gc1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)gc2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)s1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)s2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)sy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)sy0a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)sy1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)sy1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)sy2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)sy3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)sy4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)sy5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)sy6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)sy7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)sy8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)e1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)e2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)e3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)e4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)e5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)e5a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)e5b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)e6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)e7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)e7b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)e8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)e9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)e9a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)e10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)ea:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)ea2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)ea3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)eb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)eb1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)eb2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)gc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)s1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)s2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)sc1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)sc3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)sc4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)sy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)sy1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)sy2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)sy3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2a\\)e1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2a\\)e2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2b\\)e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(3\\)e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(3\\)e1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(3\\)e2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(3\\)e3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(3\\)e4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(3\\)e5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(3\\)ea:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(3\\)gc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(3\\)gc1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(3a\\)e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(3m\\)e2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(3m\\)e7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(3m\\)e8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)e1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)e2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)e3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)e4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)e5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)e5a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)e6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)e7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)e8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)ea:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)ea1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)ea4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)ea5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)ea6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)ea7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)ea8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)ec1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)ec2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)gc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)gc1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)gc2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)gc3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)jaz1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)m:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)m1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)m2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)m3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)m4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)m5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)m6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)m6a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)m6b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)m7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)m8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)m9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)m10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)m11:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)s1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)s2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)s3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)s3a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)s4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)s4a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)s5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)s6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)s7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4\\)s8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4m\\)e1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4m\\)e2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4m\\)e3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4n\\)e2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4o\\)e2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4o\\)e3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4p\\)e1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4q\\)e1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(4s\\)e1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(5\\)e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(5\\)e1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(5\\)e2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(5\\)e2b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(5\\)e2c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(5\\)ea:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(5a\\)e1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(5b\\)e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(6\\)e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(6\\)e0a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(6\\)e0c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(6\\)e1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(6\\)e1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(6\\)e1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(6\\)e2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(6\\)e2a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(6\\)eb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(7\\)e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(7\\)e0a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(0\\)sy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(1\\)s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(1\\)s1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(1\\)s2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(1\\)sy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(1\\)sy1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(1\\)sy2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(1\\)t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(1\\)t1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(1\\)t2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(1\\)t3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(1\\)t4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(2\\)s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(2\\)s1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(2\\)s2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(2\\)t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(2\\)t1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(2\\)t2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(2\\)t3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(2\\)t4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jaa1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)m:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)m1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)m2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)m3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)m4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)m5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)m6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)m7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)m8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)m8a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)m9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)m10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)s1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)s2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)s2a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)s3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)s4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)s5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)s6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)s6a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)s7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)s8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)s8a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)s9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)s10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)xb12:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)cg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)cg1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)s1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)s2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)s3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)s4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)sy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)sy1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)sy2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)sy3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)sy4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)t1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)t2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)t3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)t4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(2\\)cg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(2\\)s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(2\\)s1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(2\\)s2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(2\\)s3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(2\\)s4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(2\\)sn:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(2\\)sn1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(2\\)t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(2\\)t1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(2\\)t2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(2\\)t3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(2\\)t4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)m:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)m1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)m2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)m3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)m4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)m5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)m6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)m6a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)m7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)m7a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)m8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)m9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)m10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)s0d:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)s0e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)s0f:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)s1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)s2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)s3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)s4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)s5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)s6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)s6a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)s7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)s8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)s9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)s10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)sn1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)sn1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(1\\)s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(1\\)s1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(1\\)s2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(1\\)s3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(1\\)s4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(1\\)sn:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(1\\)sn1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(1\\)sy:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(1\\)sy1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(1\\)sy2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(1\\)sy3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(1\\)t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(1\\)t1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(1\\)t2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(1\\)t3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(1\\)t4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(2\\)s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(2\\)s1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(2\\)s2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(2\\)s3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(2\\)s4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(2\\)sn:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(2\\)t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(2\\)t1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(2\\)t2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(2\\)t3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(2\\)t4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(2\\)xb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)m:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)m0a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)m1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)m2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)m2a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)m3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)m4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)m4a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)m4b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)m4c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)m5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)m6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)m6a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)m7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)m8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)m9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)s0a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)s1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)s1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)s2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)s3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)s4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)s5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)s6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)s6a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)s6b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)s7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)s8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)s9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)sn:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.5\\(3\\)sn0a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(1\\)s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(1\\)s1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(1\\)s2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(1\\)s3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(1\\)s4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(1\\)sn:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(1\\)sn1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(1\\)sn2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(1\\)sn3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(1\\)t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(1\\)t0a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(1\\)t1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(1\\)t2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(1\\)t3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(2\\)s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(2\\)s1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(2\\)s2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(2\\)s3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(2\\)s4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(2\\)sn:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(2\\)sp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(2\\)sp1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(2\\)sp2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(2\\)sp3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(2\\)sp4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(2\\)sp5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(2\\)sp6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(2\\)t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(2\\)t0a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(2\\)t1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(2\\)t2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(2\\)t3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(3\\)m:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(3\\)m0a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(3\\)m1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(3\\)m1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(3\\)m1b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(3\\)m2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(3\\)m2a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(3\\)m3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(3\\)m3a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(3\\)m4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(3\\)m5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(3\\)m6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(3\\)m6a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(3\\)m6b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(3\\)sn:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(4\\)sn:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(5\\)sn:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(6\\)sn:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(7\\)sn:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(7\\)sn1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.6\\(7\\)sn2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.7\\(3\\)m:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.7\\(3\\)m0a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.7\\(3\\)m1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.7\\(3\\)m2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.7\\(3\\)m3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.7\\(3\\)m4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.7\\(3\\)m4a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.7\\(3\\)m4b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.8\\(3\\)m:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.8\\(3\\)m0a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.8\\(3\\)m0b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.8\\(3\\)m1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.8\\(3\\)m1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.8\\(3\\)m2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.8\\(3\\)m2a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3.0sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3.0xo:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3.1sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3.1xo:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3.2sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.3.2xo:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.0sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.1sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.2sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.3sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.4sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.5sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.6sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.7sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.4.8sg:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.5.0e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.5.1e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.5.2e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.5.3e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6.0ae:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6.0be:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6.0e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6.1e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6.2ae:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6.3e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6.4e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6.5ae:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6.5be:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6.5e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6.6e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6.7ae:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6.7be:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6.7e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6.8e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6.9ae:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6.9e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.6.10e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.0bs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.0e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.1e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.2e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.2ts:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.3e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.4as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.4e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.5e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.5s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.6s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.7s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.7.8s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8.0e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8.1e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8.2e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8.3e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8.4e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8.5ae:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8.5e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8.6e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8.7e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.8.8e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.9.0as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.9.0e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.9.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.9.1e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.9.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.9.2be:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.9.2e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.9.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.0ce:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.0e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.1ae:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.1e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.1se:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.2as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.2e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.2ts:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.5s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.6s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.7s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.8as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.8s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.9s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.10.10s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.11.0e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.11.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.11.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.11.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.11.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.11.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.12.0as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.12.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.12.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.12.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.12.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.12.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.0as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.2as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.5as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.5s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.6as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.6bs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.6s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.7as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.7s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.8s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.9s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13.10s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.14.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.14.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.14.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.14.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.14.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.15.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.15.1cs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.15.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.15.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.15.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.15.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.0as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.0bs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.0cs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.1as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.2as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.2bs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.3as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.4as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.4bs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.4cs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.4ds:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.4es:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.4gs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.5as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.5bs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.5s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.6bs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.6s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.7as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.7bs:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.7s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.8s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.16.9s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.17.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.17.1as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.17.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.17.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.17.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.17.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.0as:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.0sp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.1asp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.1bsp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.1csp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.1gsp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.1hsp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.1isp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.1sp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.2asp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.2sp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.3asp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.3bsp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.3sp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.4sp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.5sp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.18.6sp:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.5b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.3.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.5.1b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.4a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.5a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.5b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.6.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.7.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.7.1b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.1b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.1c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.1d:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.1e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.8.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.1b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.1c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.1d:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.2a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.3a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.3h:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.9.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1d:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1f:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:*"
] |
GHSA-7p64-r5h9-r835 | Multiple cross-site scripting (XSS) vulnerabilities in Atlas Systems Aeon 3.5 and 3.6 allow remote attackers to inject arbitrary web script or HTML via the (1) Action or (2) Form parameter to aeon.dll. | [] |
|
CVE-2023-34402 | Mercedes-Benz head-unit NTG6 contains functions to import or export profile settings over USB. Inside file is encapsulate another file, which service will drop during processing. Due to missed checks, attacker can achieve Arbitrary File Write with service speech rights. | [] |
|
GHSA-5g3c-xpc6-569g | Windows Kernel Elevation of Privilege Vulnerability | [] |
|
CVE-2019-20172 | Kernel/VM/MemoryManager.cpp in SerenityOS before 2019-12-30 does not reject syscalls with pointers into the kernel-only virtual address space, which allows local users to gain privileges by overwriting a return address that was found on the kernel stack. | [
"cpe:2.3:o:serenityos:serenityos:*:*:*:*:*:*:*:*"
] |
|
CVE-2025-2958 | TRENDnet TEW-818DRU HTTP Request httpd denial of service | A vulnerability was found in TRENDnet TEW-818DRU 1.0.14.6. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /usr/sbin/httpd of the component HTTP Request Handler. The manipulation leads to denial of service. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.