id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
GHSA-6phf-73q6-gh87 | Insecure Deserialization in Apache Commons Beanutils | In Apache Commons Beanutils 1.9.2, a special BeanIntrospector class was added which allows suppressing the ability for an attacker to access the classloader via the class property available on all Java objects. We, however were not using this by default characteristic of the PropertyUtilsBean. | [] |
CVE-2025-0853 | PGS Core <= 5.8.0 - Unauthenticated SQL Injection | The PGS Core plugin for WordPress is vulnerable to SQL Injection via the 'event' parameter in the 'save_header_builder' function in all versions up to, and including, 5.8.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | [] |
GHSA-9v63-c998-mq62 | Vulnerabilities in the AirWave Management Platform web-based management interface exist which expose some URLs to a lack of proper access controls. These vulnerabilities could allow a remote attacker with limited privileges to gain access to sensitive information and/or change network configurations with privileges at a higher effective level in Aruba AirWave Management Platform version(s): 8.2.15.0 and below. | [] |
|
GHSA-p982-cmx8-62xh | An improper neutralization of input during web page generation vulnerability ('Cross-site Scripting') [CWE-79] in Fortinet FortiOS version 7.2.0 through 7.2.3, version 7.0.0 through 7.0.9, version 6.4.0 through 6.4.11 and before 6.2.12 and FortiProxy version 7.2.0 through 7.2.1 and before 7.0.7 allows an unauthenticated attacker to perform an XSS attack via crafted HTTP GET requests. | [] |
|
CVE-2021-39145 | XStream is vulnerable to an Arbitrary Code Execution attack | XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. | [
"cpe:2.3:a:xstream_project:xstream:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
"cpe:2.3:a:oracle:business_activity_monitoring:12.2.1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:commerce_guided_search:11.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_billing_and_revenue_management_elastic_charging_engine:11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_billing_and_revenue_management_elastic_charging_engine:12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:1.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:1.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_xstore_point_of_service:16.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_xstore_point_of_service:17.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_xstore_point_of_service:18.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_xstore_point_of_service:19.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_xstore_point_of_service:20.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:utilities_framework:4.2.0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:utilities_framework:4.2.0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:utilities_framework:4.3.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:utilities_framework:4.3.0.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:utilities_framework:4.4.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:utilities_framework:4.4.0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:utilities_framework:4.4.0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:utilities_testing_accelerator:6.0.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:webcenter_portal:12.2.1.4.0:*:*:*:*:*:*:*"
] |
CVE-2024-30569 | An information leak in currentsetting.htm of Netgear R6850 v1.1.0.88 allows attackers to obtain sensitive information without any authentication required. | [
"cpe:2.3:o:netgear:r6850_firmware:1.1.0.88:*:*:*:*:*:*:*"
] |
|
GHSA-5fmv-wj76-wxvc | Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Fluid Homepage & Navigation). Supported versions that are affected are 8.54 and 8.55. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N). | [] |
|
CVE-2024-35102 | Insecure Permissions vulnerability in VITEC AvediaServer (Model avsrv-m8105) 8.6.2-1 allows a remote attacker to escalate privileges via a crafted script. | [
"cpe:2.3:a:vitec:exterity_avediaserver:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-35561 | A stack overflow vulnerability exists in /goform/WifiMacFilterSet in Tenda W6 V1.0.0.9(4122) version, which can be exploited by attackers to cause a denial of service (DoS) via the index parameter. | [
"cpe:2.3:o:tenda:w6_firmware:1.0.0.9\\(4122\\):*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:w6:-:*:*:*:*:*:*:*"
] |
|
CVE-2019-9066 | PHP Scripts Mall PHP Appointment Booking Script 3.0.3 allows HTML injection in a user profile. | [
"cpe:2.3:a:php_appointment_booking_script_project:php_appointment_booking_script:3.0.3:*:*:*:*:*:*:*"
] |
|
GHSA-vp9h-hm4f-q9f6 | Multiple SQL injection vulnerabilities in NPDS 4.8 and 5.0 allow remote attackers to execute arbitrary SQL commands via the thold parameter to (1) comments.php or (2) pollcomments.php. | [] |
|
CVE-2022-24504 | Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability | Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] |
CVE-2009-1816 | SQL injection vulnerability in admin.php in My Game Script 2.0 allows remote attackers to execute arbitrary SQL commands via the user parameter (aka the username field). NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:mygamescript:my_game_script:2.0:*:*:*:*:*:*:*"
] |
|
CVE-2013-5426 | Session fixation vulnerability in IBM InfoSphere Master Data Management - Collaborative Edition 10.x before 10.1 IF5 and 11.0 before IF1 and InfoSphere Master Data Management Server for Product Information Management 9.x before 9.1 IF11 allows remote authenticated users to hijack web sessions via unspecified vectors. | [
"cpe:2.3:a:ibm:infosphere_master_data_management_collaboration_server:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_master_data_management_collaboration_server:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_master_data_management_collaboration_server:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_master_data_management_server_for_product_information_management:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_master_data_management_server_for_product_information_management:9.1:*:*:*:*:*:*:*"
] |
|
CVE-2024-47124 | Cleartext Transmission of Sensitive Information in goTenna Pro | The goTenna Pro App does not encrypt callsigns in messages. It is
recommended to not use sensitive information in callsigns when using
this and previous versions of the app and update your app to the current
app version which uses AES-256 encryption for callsigns in encrypted
operation. | [
"cpe:2.3:a:gotenna:gotenna_pro:*:*:*:*:*:iphone_os:*:*",
"cpe:2.3:a:gotenna:gotenna_pro:*:*:*:*:*:android:*:*"
] |
CVE-2024-30490 | WordPress ProfileGrid plugin <= 5.7.8 - SQL Injection vulnerability | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Metagauss ProfileGrid.This issue affects ProfileGrid : from n/a through 5.7.8.
| [
"cpe:2.3:a:metagauss:profilegrid:*:*:*:*:*:*:*:*"
] |
CVE-2018-20719 | In Tiki before 17.2, the user task component is vulnerable to a SQL Injection via the tiki-user_tasks.php show_history parameter. | [
"cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:*:*:*:*:*:*:*:*"
] |
|
GHSA-c75x-6682-hrm4 | Amazon Web Services (AWS) FreeRTOS through 1.3.1, FreeRTOS up to V10.0.1 (with FreeRTOS+TCP), and WITTENSTEIN WHIS Connect middleware TCP/IP component allow division by zero in prvCheckOptions. | [] |
|
GHSA-x74x-9vc6-fmq8 | Adobe Acrobat Reader versions 23.003.20244 (and earlier) and 20.005.30467 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] |
|
CVE-2022-50015 | ASoC: SOF: Intel: hda-ipc: Do not process IPC reply before firmware boot | In the Linux kernel, the following vulnerability has been resolved:
ASoC: SOF: Intel: hda-ipc: Do not process IPC reply before firmware boot
It is not yet clear, but it is possible to create a firmware so broken
that it will send a reply message before a FW_READY message (it is not
yet clear if FW_READY will arrive later).
Since the reply_data is allocated only after the FW_READY message, this
will lead to a NULL pointer dereference if not filtered out.
The issue was reported with IPC4 firmware but the same condition is present
for IPC3. | [] |
CVE-2023-37833 | Improper access control in Elenos ETG150 FM transmitter v3.12 allows attackers to make arbitrary configuration edits that are only accessed by privileged users. | [
"cpe:2.3:h:elenos:etg150_fm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:elenos:etg150_firmware:3.12:*:*:*:*:*:*:*",
"cpe:2.3:h:elenos:etg150:-:*:*:*:*:*:*:*"
] |
|
CVE-2025-0226 | Tsinghua Unigroup Electronic Archives System downLoad.html download information disclosure | A vulnerability, which was classified as problematic, has been found in Tsinghua Unigroup Electronic Archives System 3.2.210802(62532). Affected by this issue is the function download of the file /collect/PortV4/downLoad.html. The manipulation of the argument path leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | [] |
GHSA-jx87-g24w-29gr | Foxit PDF Reader AcroForm Signature Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of Signature objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22003. | [] |
|
GHSA-pm2f-322j-vg72 | heap-buffer-overflow in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of inducing denial of service. | [] |
|
CVE-2011-3794 | Pligg CMS 1.1.3 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by widgets/statistics/init.php and certain other files. | [
"cpe:2.3:a:pligg:pligg_cms:1.1.3:*:*:*:*:*:*:*"
] |
|
GHSA-5437-fx95-vwq6 | Cross-site Scripting (XSS) in Dolibarr ERP/CRM 3.3.1 allows remote attackers to inject arbitrary web script or HTML in functions.lib.php. | [] |
|
GHSA-xv7p-jw46-8r85 | Cross-site Scripting in JFinalcms | JFinalcms 5.0.0 is vulnerable to Cross Site Scripting (XSS) in the site management office. | [] |
GHSA-xv5g-cq95-4rcm | An attacker sending specially crafted data packets to the Mobile Device Server can cause memory corruption which could result to a Denial of Service (DoS). | [] |
|
CVE-2022-36938 | DexLoader function get_stringidx_fromdex() in Redex prior to commit 3b44c64 can load an out of bound address when loading the string index table, potentially allowing remote code execution during processing of a 3rd party Android APK file. | [
"cpe:2.3:a:facebook:redex:*:*:*:*:*:*:*:*"
] |
|
CVE-2002-0017 | Buffer overflow in SNMP daemon (snmpd) on SGI IRIX 6.5 through 6.5.15m allows remote attackers to execute arbitrary code via an SNMP request. | [
"cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.6:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.7:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.9:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.10:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.11f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.11m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.12f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.12m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.13f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.13m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.14f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.14m:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.15f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.15m:*:*:*:*:*:*:*"
] |
|
CVE-2017-11219 | Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable use after free vulnerability in the XFA rendering engine. Successful exploitation could lead to arbitrary code execution. | [
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] |
|
GHSA-2hwr-88h3-g5j5 | An issue was discovered in Zimbra Collaboration (ZCS) 9.0. XSS can occur on the Classic UI login page by injecting arbitrary JavaScript code in the username field. This occurs before the user logs into the system, which means that even if the attacker executes arbitrary JavaScript, they will not get any sensitive information. | [] |
|
CVE-2006-6156 | Cross-site scripting (XSS) vulnerability in auth/message.php in HIOX Star Rating System Script (HSRS) 1.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the query string (PHP_SELF). NOTE: The provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:hscripts:hiox_star_rating_system_script:*:*:*:*:*:*:*:*"
] |
|
CVE-2016-4392 | A remote cross site scripting vulnerability has been identified in HP Business Service Management software v9.1x, v9.20 - v9.25IP1. | [
"cpe:2.3:a:hp:business_service_management:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:business_service_management:9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:business_service_management:9.25:ip1:*:*:*:*:*:*"
] |
|
CVE-2011-2648 | Unspecified vulnerability in Kiwi before 3.74.2, as used in SUSE Studio 1.1 before 1.1.4, allows remote attackers to execute arbitrary code via a filter in a modified file. | [
"cpe:2.3:a:marcus_schafer:kiwi:*:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:suse_studio_onsite:1.1:*:*:*:*:*:*:*"
] |
|
CVE-2024-0336 | Improper Access Control in EMTA Grups PDKS | Improper Access Control vulnerability in EMTA Grup PDKS allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects PDKS: before 20240603.
NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:a:emta_grup:pdks:3.04:*:*:*:*:*:*:*"
] |
CVE-2018-16313 | Bludit 2.3.4 allows XSS via a user name. | [
"cpe:2.3:a:bludit:bludit:2.3.4:*:*:*:*:*:*:*"
] |
|
CVE-2024-34459 | An issue was discovered in xmllint (from libxml2) before 2.11.8 and 2.12.x before 2.12.7. Formatting error messages with xmllint --htmlout can result in a buffer over-read in xmlHTMLPrintFileContext in xmllint.c. | [
"cpe:2.3:a:xmlsoft:xmllint:*:*:*:*:*:*:*:*"
] |
|
CVE-2006-1934 | Multiple buffer overflows in Ethereal 0.10.x up to 0.10.14 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the (1) ALCAP dissector, (2) Network Instruments file code, or (3) NetXray/Windows Sniffer file code. | [
"cpe:2.3:a:ethereal_group:ethereal:0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.0a:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ethereal_group:ethereal:0.10.13:*:*:*:*:*:*:*"
] |
|
CVE-2019-1215 | An elevation of privilege vulnerability exists in the way that ws2ifsl.sys (Winsock) handles objects in memory, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1253, CVE-2019-1278, CVE-2019-1303. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] |
|
CVE-2022-45597 | ComponentSpace.Saml2 4.4.0 Missing SSL Certificate Validation. NOTE: the vendor does not consider this a vulnerability because the report is only about use of certificates at the application layer (not the transport layer) and "Certificates are exchanged in a controlled fashion between entities within a trust relationship. This is why self-signed certificates may be used and why validating certificates isn’t as important as doing so for the transport layer certificates." | [
"cpe:2.3:a:componentspace:saml:4.4.0:*:*:*:*:asp.net:*:*"
] |
|
CVE-2021-0660 | In ccu, there is a possible out of bounds read due to incorrect error handling. This could lead to information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05827145; Issue ID: ALPS05827145. | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*"
] |
|
GHSA-3pwm-mf62-vq4p | A vulnerability classified as problematic was found in Tsinghua Unigroup Electronic Archives System 3.2.210802(62532). Affected by this vulnerability is an unknown functionality of the file /setting/ClassFy/exampleDownload.html. The manipulation of the argument name leads to path traversal: '/../filedir'. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | [] |
|
GHSA-pm3v-cfmp-f7x4 | An issue was discovered in SeaCMS 6.64. XSS exists in admin_datarelate.php via the time or maxHit parameter in a dorandomset action. | [] |
|
CVE-2021-0229 | Junos OS: Receipt of specific packets could lead to Denial of Service in MQTT Server | An uncontrolled resource consumption vulnerability in Message Queue Telemetry Transport (MQTT) server of Juniper Networks Junos OS allows an attacker to cause MQTT server to crash and restart leading to a Denial of Service (DoS) by sending a stream of specific packets. A Juniper Extension Toolkit (JET) application designed with a listening port uses the Message Queue Telemetry Transport (MQTT) protocol to connect to a mosquitto broker that is running on Junos OS to subscribe for events. Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue affects Juniper Networks Junos OS: 16.1R1 and later versions prior to 17.3R3-S11; 17.4 versions prior to 17.4R2-S13, 17.4R3-S4; 18.1 versions prior to 18.1R3-S12; 18.2 versions prior to 18.2R2-S8, 18.2R3-S7; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R1-S8, 18.4R2-S7, 18.4R3-S7; 19.1 versions prior to 19.1R3-S5; 19.2 versions prior to 19.2R1-S6, 19.2R3-S2; 19.3 versions prior to 19.3R3-S2; 19.4 versions prior to 19.4R2-S4, 19.4R3-S2; 20.1 versions prior to 20.1R2-S1, 20.1R3; 20.2 versions prior to 20.2R2-S2, 20.2R3; 20.3 versions prior to 20.3R1-S1, 20.3R2. This issue does not affect Juniper Networks Junos OS versions prior to 16.1R1. | [
"cpe:2.3:o:juniper:junos:16.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r3-s10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r3-s11:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r3-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r4-s12:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r4-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r4-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r4-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r4-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r4-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r4-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r5-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r6-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r6-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r6-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r6-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r7-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r7-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r7-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r7-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r7-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.1:r7-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r2-s10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r2-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r2-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r2-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:16.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r1-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s11:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r2-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.1:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r1-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r1-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r2-s11:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r2-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.2:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3:-:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.3:r3-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s11:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s12:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s11:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1:-:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*"
] |
CVE-2020-36167 | An issue was discovered in the server in Veritas Backup Exec through 16.2, 20.6 before hotfix 298543, and 21.1 before hotfix 657517. On start-up, it loads the OpenSSL library from the Installation folder. This library in turn attempts to load the /usr/local/ssl/openssl.cnf configuration file, which may not exist. On Windows systems, this path could translate to <drive>:\usr\local\ssl\openssl.cnf. A low privileged user can create a :\usr\local\ssl\openssl.cnf configuration file to load a malicious OpenSSL engine, resulting in arbitrary code execution as SYSTEM when the service starts. This gives the attacker administrator access on the system, allowing the attacker (by default) to access all data, access all installed applications, etc. If the system is also an Active Directory domain controller, then this can affect the entire domain. | [
"cpe:2.3:a:veritas:backup_exec:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-39619 | ReDos in NPMJS Node Email Check v.1.0.4 allows an attacker to cause a denial of service via a crafted string to the scpSyntax component. | [
"cpe:2.3:a:teomantuncer:node_email_check:1.0.4:*:*:*:*:node.js:*:*"
] |
|
GHSA-cf26-j9p4-wm96 | Akuvox E11 uses a hard-coded cryptographic key, which could allow an attacker to decrypt sensitive information. | [] |
|
CVE-2007-2027 | Untrusted search path vulnerability in the add_filename_to_string function in intl/gettext/loadmsgcat.c for Elinks 0.11.1 allows local users to cause Elinks to use an untrusted gettext message catalog (.po file) in a "../po" directory, which can be leveraged to conduct format string attacks. | [
"cpe:2.3:a:elinks:elinks:0.11.1:*:*:*:*:*:*:*"
] |
|
CVE-2020-29612 | An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave. A malicious application may be able to execute arbitrary code with system privileges. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] |
|
GHSA-756j-8p5m-2p7m | libraries/common.inc.php in phpMyAdmin 4.0.x before 4.0.10.7, 4.1.x before 4.1.14.8, and 4.2.x before 4.2.13.1 allows remote attackers to cause a denial of service (resource consumption) via a long password. | [] |
|
GHSA-qjw3-35px-c96q | A memory corruption vulnerability was found in the kernel function kern_getfsstat in MidnightBSD before 1.2.7 and 1.3 through 2020-08-19, and FreeBSD through 11.4, that allows an attacker to trigger an invalid free and crash the system via a crafted size value in conjunction with an invalid mode. | [] |
|
CVE-2023-4937 | The BEAR for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.1.3.3. This is due to missing or incorrect nonce validation on the woobe_bulkoperations_apply_default_combination function. This makes it possible for unauthenticated attackers to manipulate products via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [
"cpe:2.3:a:pluginus:bear_-_woocommerce_bulk_editor_and_products_manager_professional:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2017-0924 | Gitlab Community Edition version 10.2.4 is vulnerable to lack of input validation in the labels component resulting in persistent cross site scripting. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] |
|
GHSA-5gj2-2h84-jmf8 | In onCheckedChanged of BluetoothPairingController.java, there is a possible way to retrieve contact information due to a permissions bypass. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-8.0 Android-8.1 Android-9. Android ID: A-72872376 | [] |
|
CVE-2017-12904 | Improper Neutralization of Special Elements used in an OS Command in bookmarking function of Newsbeuter versions 0.7 through 2.9 allows remote attackers to perform user-assisted code execution by crafting an RSS item that includes shell code in its title and/or URL. | [
"cpe:2.3:a:newsbeuter:newsbeuter:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:newsbeuter:newsbeuter:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:newsbeuter:newsbeuter:0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:newsbeuter:newsbeuter:0.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:newsbeuter:newsbeuter:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:newsbeuter:newsbeuter:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:newsbeuter:newsbeuter:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:newsbeuter:newsbeuter:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:newsbeuter:newsbeuter:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:newsbeuter:newsbeuter:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:newsbeuter:newsbeuter:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:newsbeuter:newsbeuter:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:newsbeuter:newsbeuter:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:newsbeuter:newsbeuter:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:newsbeuter:newsbeuter:2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:newsbeuter:newsbeuter:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:newsbeuter:newsbeuter:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:newsbeuter:newsbeuter:2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:newsbeuter:newsbeuter:2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:newsbeuter:newsbeuter:2.9:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] |
|
GHSA-9chw-9f2x-67h9 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of TP-LINK TL-WR841N routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 80 by default. When parsing the Host request header, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length static buffer. An attacker can leverage this vulnerability to execute code in the context of the admin user. Was ZDI-CAN-8457. | [] |
|
GHSA-8g3m-vppx-x269 | The isMobile plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘device’ parameter in all versions up to, and including, 1.1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
|
GHSA-9vx6-7xxf-x967 | OpenZeppelin Contracts base64 encoding may read from potentially dirty memory | ImpactThe `Base64.encode` function encodes a `bytes` input by iterating over it in chunks of 3 bytes. When this input is not a multiple of 3, the last iteration may read parts of the memory that are beyond the input buffer.Although the `encode` function pads the output for these cases, up to 4 bits of data are kept between the encoding and padding, corrupting the output if these bits were dirty (i.e. memory after the input is not 0). These conditions are more frequent in the following scenarios:A `bytes memory` struct is allocated just after the input and the first bytes of it are non-zero.The memory pointer is set to a non-empty memory location before allocating the input.Developers should evaluate whether the extra bits can be maliciously manipulated by an attacker.PatchesUpgrade to 5.0.2 or 4.9.6.ReferencesThis issue was reported by the Independent Security Researcher Riley Holterhus through Immunefi (@rileyholterhus on X) | [] |
CVE-2019-17430 | EyouCms through 2019-07-11 has XSS related to the login.php web_recordnum parameter. | [
"cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*"
] |
|
GHSA-ch75-4hc2-84c6 | Cross site scripting (XSS) vulnerability in DiscuzX 3.4 allows attackers to execute arbitrary code via the datetline, title, tpp, or username parameters via the audit search. | [] |
|
GHSA-39rw-jh89-3x4q | An Insecure Permissions issue exists in Gestionale Open 11.00.00. A low privilege account is able to rename the mysqld.exe file located in bin folder and replace with a malicious file that would connect back to an attacking computer giving system level privileges (nt authority\system) due to the service running as Local System. While a low privilege user is unable to restart the service through the application, a restart of the computer triggers the execution of the malicious file. The application also have unquoted service path issues. | [] |
|
GHSA-6c23-8rhp-2qv3 | This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave. Processing a maliciously crafted image may lead to arbitrary code execution. | [] |
|
CVE-2022-4816 | A denial-of-service vulnerability has been identified in Lenovo Safecenter that could allow a local user to crash the application. | [
"cpe:2.3:a:lenovo:safecenter:*:*:*:*:*:*:*:*"
] |
|
CVE-2025-48346 | WordPress Embed and Integrate Etsy Shop <= 1.0.4 - Broken Access Control Vulnerability | Missing Authorization vulnerability in Etsy360 Embed and Integrate Etsy Shop allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Embed and Integrate Etsy Shop: from n/a through 1.0.4. | [] |
GHSA-jf89-rfxp-h245 | The device-management command-line interface in Palo Alto Networks PAN-OS before 3.1.11 and 4.0.x before 4.0.9 allows remote authenticated users to execute arbitrary code via unspecified vectors, aka Ref ID 34896. | [] |
|
CVE-2005-0963 | An error in the Toshiba ACPI BIOS 1.6 causes the BIOS to only examine the first slot in the Master Boot Record (MBR) table for an active partition, which prevents the system from booting even though the MBR is not malformed. NOTE: it has been debated as to whether or not this issue poses a security vulnerability, since administrative privileges would be required, and other DoS attacks are possible with such privileges. | [
"cpe:2.3:a:toshiba:acpi_flash_bios:1.6:*:*:*:*:*:*:*"
] |
|
GHSA-6mmp-g6cf-6jf5 | A vulnerability was found in TRENDnet TI-G102i 1.0.7.S0_ /1.0.8.S0_ and classified as problematic. This issue affects the function plugins_call_handle_uri_raw of the file /usr/sbin/lighttpd of the component HTTP Request Handler. The manipulation leads to null pointer dereference. The attack can only be done within the local network. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [] |
|
GHSA-jj3c-mrcr-m6pr | The JetFormBuilder plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 3.3.4.1. This is due to improper restriction on user meta fields. This makes it possible for authenticated attackers, with administrator-level and above permissions, to register as super-admins on the sites configured as multi-sites. | [] |
|
GHSA-9pc9-mc38-6cmq | 64 bit Solaris 7 procfs allows local users to perform a denial of service. | [] |
|
CVE-2019-16882 | An issue was discovered in the string-interner crate before 0.7.1 for Rust. It allows attackers to read from memory locations associated with dangling pointers, because of a cloning flaw. | [
"cpe:2.3:a:string-interner_project:string-interner:*:*:*:*:*:*:*:*"
] |
|
GHSA-fmf7-vf6x-cv7g | Vulnerability of data verification errors in the kernel module.
Impact: Successful exploitation of this vulnerability may affect service confidentiality. | [] |
|
GHSA-hfjf-652v-fg9x | Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file. | [] |
|
GHSA-74xp-r998-p3xg | The management console on Symantec Web Gateway (SWG) appliances with software before 5.2.2 DB 5.0.0.1277 allows remote authenticated users to bypass intended access restrictions and execute arbitrary commands by leveraging a "redirect." | [] |
|
CVE-2013-6446 | The JobHistory Server in Cloudera CDH 4.x before 4.6.0 and 5.x before 5.0.0 Beta 2, when using MRv2/YARN with HTTP authentication, allows remote authenticated users to obtain sensitive job information by leveraging failure to enforce job ACLs. | [
"cpe:2.3:a:cloudera:cdh:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cloudera:cdh:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cloudera:cdh:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cloudera:cdh:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cloudera:cdh:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cloudera:cdh:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cloudera:cdh:4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cloudera:cdh:4.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cloudera:cdh:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cloudera:cdh:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cloudera:cdh:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cloudera:cdh:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cloudera:cdh:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cloudera:cdh:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cloudera:cdh:4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cloudera:cdh:4.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cloudera:cdh:5.0.0:beta:*:*:*:*:*:*"
] |
|
CVE-2023-21708 | Remote Procedure Call Runtime Remote Code Execution Vulnerability | Remote Procedure Call Runtime Remote Code Execution Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] |
CVE-2022-25165 | An issue was discovered in Amazon AWS VPN Client 2.0.0. A TOCTOU race condition exists during the validation of VPN configuration files. This allows parameters outside of the AWS VPN Client allow list to be injected into the configuration file prior to the AWS VPN Client service (running as SYSTEM) processing the file. Dangerous arguments can be injected by a low-level user such as log, which allows an arbitrary destination to be specified for writing log files. This leads to an arbitrary file write as SYSTEM with partial control over the files content. This can be abused to cause an elevation of privilege or denial of service. | [
"cpe:2.3:a:amazon:aws_client_vpn:2.0.0:*:*:*:*:*:*:*"
] |
|
GHSA-fq23-mhmq-5hc5 | Cross-Site Request Forgery (CSRF) vulnerability in Mihai Iova WordPress Knowledge base & Documentation Plugin – WP Knowledgebase plugin <= 1.3.4 versions. | [] |
|
CVE-2021-3623 | A flaw was found in libtpms. The flaw can be triggered by specially-crafted TPM 2 command packets containing illegal values and may lead to an out-of-bounds access when the volatile state of the TPM 2 is marshalled/written or unmarshalled/read. The highest threat from this vulnerability is to system availability. | [
"cpe:2.3:a:libtpms_project:libtpms:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*"
] |
|
CVE-2023-26568 | Unauthenticated SQL Injection In IDAttend’s IDWeb Application | Unauthenticated SQL injection in the GetStudentGroupStudents method in IDAttend’s IDWeb application 3.1.052 and earlier allows extraction or modification of all data by unauthenticated attackers. | [
"cpe:2.3:a:idattend:idweb:*:*:*:*:*:*:*:*"
] |
CVE-2017-6549 | Session hijack vulnerability in httpd on ASUS RT-N56U, RT-N66U, RT-AC66U, RT-N66R, RT-AC66R, RT-AC68U, RT-AC68R, RT-N66W, RT-AC66W, RT-AC87R, RT-AC87U, RT-AC51U, RT-AC68P, RT-N11P, RT-N12+, RT-N12E B1, RT-AC3200, RT-AC53U, RT-AC1750, RT-AC1900P, RT-N300, and RT-AC750 routers with firmware before 3.0.0.4.380.7378; RT-AC68W routers with firmware before 3.0.0.4.380.7266; and RT-N600, RT-N12+ B1, RT-N11P B1, RT-N12VP B1, RT-N12E C1, RT-N300 B1, and RT-N12+ Pro routers with firmware before 3.0.0.4.380.9488; and Asuswrt-Merlin firmware before 380.65_2 allows remote attackers to steal any active admin session by sending cgi_logout and asusrouter-Windows-IFTTT-1.0 in certain HTTP headers. | [
"cpe:2.3:o:asus:rt-ac53_firmware:3.0.0.4.380.6038:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rt-ac53:-:*:*:*:*:*:*:*"
] |
|
CVE-2018-15520 | Various Lexmark devices have a Buffer Overflow (issue 2 of 2). | [
"cpe:2.3:o:lexmark:cx82x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx82x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cx860_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx860:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xc6152_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc6152:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xc8155_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc8155:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xc8160_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc8160:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cx72x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx72x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xc41x0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc41x0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cx92x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx92x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xc92x5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc92x5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mx321_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx321:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mb2338_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mb2338:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mx42x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx42x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mx52x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx52x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mx622_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx622:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mb2442_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mb2442:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mb2546_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mb2546:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mb2650_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mb2650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xm124x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm124x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xm3250_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm3250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mx72x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx72x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mx82x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx82x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mb2770_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mb2770:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xm5370_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm5370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xm7355_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm7355:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xm7370_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm7370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cx421_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx421:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mc2325_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mc2325:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mc2425_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mc2425:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cx522_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx522:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cx62x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx62x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mc2535_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mc2535:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mc2640_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mc2640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xc2235_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc2235:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xc4240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc4240:-:*:*:*:*:*:*:*"
] |
|
CVE-2012-4077 | Cisco NX-OS allows local users to gain privileges and execute arbitrary commands via the sed e option, aka Bug IDs CSCtf25457 and CSCtf27651. | [
"cpe:2.3:o:cisco:nx-os:-:*:*:*:*:*:*:*"
] |
|
GHSA-x6m6-5hrf-fh6r | Denial of Service in markdown-it-toc-and-anchor | All versions of `markdown-it-toc-and-anchor` are vulnerable to Denial of Service. Parsing markdown containing `**text**+\n@[toc]` causes the application to enter and infinite loop.RecommendationNo fix is currently available. Consider using an alternative module until a fix is made available. | [] |
GHSA-5x6v-ccmr-rp83 | A vulnerability in Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an authenticated, remote attacker with administrator privileges to overwrite or read arbitrary files on the underlying operating system (OS) of an affected device. The vulnerability is due to improper input validation in NFVIS filesystem commands. An attacker could exploit this vulnerability by using crafted variables during the execution of an affected command. A successful exploit could allow the attacker to overwrite or read arbitrary files on the underlying OS. | [] |
|
GHSA-v2jx-72wh-2fm2 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in WPOPAL Opal Woo Custom Product Variation allows Path Traversal.This issue affects Opal Woo Custom Product Variation: from n/a through 1.1.3. | [] |
|
CVE-2007-4555 | Cross-site scripting (XSS) vulnerability in Ipswitch WS_FTP allows remote attackers to inject arbitrary web script or HTML via arguments to a valid command, which is not properly handled when it is displayed by the view log option in the administration interface. NOTE: this can be leveraged to create a new admin account. | [
"cpe:2.3:a:ipswitch:ws_ftp:*:*:*:*:*:*:*:*"
] |
|
GHSA-h2jx-f8c9-6v68 | Multiple use-after-free vulnerabilities exist in the VCD get_vartoken realloc functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the use-after-free when triggered via the GUI's interactive VCD parsing code. | [] |
|
CVE-2024-43793 | Halo's editor has a stored XSS vulnerability | Halo is an open source website building tool. A security vulnerability has been identified in versions prior to 2.19.0 of the Halo project. This vulnerability allows an attacker to execute malicious scripts in the user's browser through specific HTML and JavaScript code, potentially leading to a Cross-Site Scripting (XSS) attack. This vulnerability is fixed in 2.19.0. | [
"cpe:2.3:a:halo:halo:-:*:*:*:*:*:*:*",
"cpe:2.3:a:halo:halo:*:*:*:*:*:*:*:*"
] |
GHSA-7977-2v22-fwr7 | The MOLIE WordPress plugin through 0.5 does not validate and escape a post parameter before using in a SQL statement, leading to an SQL Injection | [] |
|
CVE-2022-27538 | A potential Time-of-Check to Time-of-Use (TOCTOU) vulnerability has been identified in the BIOS for certain HP PC products which may allow arbitrary code execution, denial of service, and information disclosure. HP is releasing BIOS updates to mitigate the potential vulnerability. | [
"cpe:2.3:o:hp:dragonfly_folio_g3_2-in-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:dragonfly_folio_g3_2-in-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_dragonfly_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_dragonfly:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_dragonfly_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_dragonfly_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_dragonfly_g2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_dragonfly_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_dragonfly_max_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_dragonfly_max:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_x2_1013_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_x2_1013_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_x2_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_x2_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_x2_g8_tablet_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_x2_g8_tablet:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_x360_1040_g9_2-in-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_x360_1040_g9_2-in-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_1040_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_1040_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_1050_g1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_1050_g1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_630_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_630_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_640_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_640_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_645_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_645_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_650_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_650_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_655_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_655_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_735_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_735_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_735_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_735_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_745_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_745_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_745_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_745_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_755_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_755_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_830_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_830_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_830_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_830_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_830_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_830_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_830_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_830_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_830_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_830_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_835_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_835_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_835_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_835_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_835_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_835_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_836_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_836_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_836_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_836_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840_aero_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840_aero_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840_g5_healthcare_edition_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840_g5_healthcare_edition:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840_g6_healthcare_edition_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840_g6_healthcare_edition:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840r_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840r_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_845_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_845_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_845_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_845_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_845_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_845_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_846_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_846_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_850_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_850_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_850_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_850_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_850_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_850_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_850_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_850_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_855_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_855_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_855_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_855_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_860_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_860_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_865_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_865_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1030_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1030_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1030_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1030_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1030_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1030_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1030_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1030_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1040_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1040_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1040_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1040_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1040_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1040_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1040_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1040_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_830_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_830_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_830_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_830_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_830_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_830_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_830_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_830_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_x360_435_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_x360_435_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_x360_fortis_g10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_x360_fortis_g10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_x360_fortis_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_x360_fortis_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_430_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_430_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_430_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_430_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_430_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_430_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_430_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_430_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_440_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_440_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_440_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_440_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_440_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_440_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_440_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_440_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_440_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_440_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_445_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_445_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_445_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_445_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_445_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_445_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_445_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_445_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_445r_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_445r_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_450_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_450_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_450_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_450_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_450_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_450_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_450_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_450_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_450_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_450_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_455_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_455_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_455_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_455_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_455_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_455_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_455_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_455_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_455_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_455_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_455r_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_455r_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_470_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_470_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_630_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_630_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_635_aero_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_635_aero_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_635_aero_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_635_aero_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_640_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_640_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_640_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_640_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_640_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_640_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_640_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_640_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_645_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_645_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_650_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_650_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_650_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_650_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_650_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_650_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_650_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_650_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_fortis_g10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_fortis_g10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_fortis_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_fortis_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_11_g3_education_edition_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_x360_11_g3_education_edition:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_11_g4_education_edition_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_x360_11_g4_education_edition:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_11_g5_education_edition_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_x360_11_g5_education_edition:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_11_g6_education_edition_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_x360_11_g6_education_edition:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_11_g7_education_edition_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_x360_11_g7_education_edition:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_435_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_x360_435_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_435_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_x360_435_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_440_g1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_x360_440_g1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_14u_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_14u_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_14u_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_14u_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_15_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_15_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_15_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_15_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_15u_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_15u_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_15u_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_15u_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_17_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_17_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_17_g6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_17_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_create_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_create_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_firefly_14_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_firefly_14_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_firefly_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_firefly_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_firefly_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_firefly_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_firefly_15_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_firefly_15_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_firefly_15_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_firefly_15_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_firefly_16_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_firefly_16_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_fury_15_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_fury_15_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_fury_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_fury_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_fury_16_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_fury_16_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_fury_17_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_fury_17_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_fury_17_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_fury_17_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_power_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_power_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_power_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_power_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_power_g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_power_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_studio_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_studio_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_studio_16_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_studio_16_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_studio_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_studio_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_studio_g7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_studio_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_studio_x360_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_studio_x360_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_13_g2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_13_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_14_g2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_14_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_14_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_14_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_14_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_14_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_15_g2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_15_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_15_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_15_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_a_14_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_a_14_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_a_14_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_a_14_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_a_14_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_a_14_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_g1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_g1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_x_13_g2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_x_13_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_mini_600_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_mini_600_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_mini_800_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_mini_800_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_sff_600_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_sff_600_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_sff_800_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_sff_800_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_slice_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_slice:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_slice_g2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_slice_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_tower_600_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_tower_600_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_tower_680_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_tower_680_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_tower_800_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_tower_800_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_tower_880_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_tower_880_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_705_g4_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_705_g4_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_705_g4_microtower_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_705_g4_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_705_g4_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_705_g4_small_form_factor_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_705_g5_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_705_g5_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_705_g5_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_705_g5_small_form_factor_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_35w_g3_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_35w_g3_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_35w_g4_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_35w_g4_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_65w_g3_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_65w_g3_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_65w_g4_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_65w_g4_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_95w_g4_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_95w_g4_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g3_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g3_small_form_factor_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g3_tower_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g3_tower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g4_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g4_small_form_factor_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g4_tower_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g4_tower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g5_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g5_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g5_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g5_small_form_factor_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g5_tower_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g5_tower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g6_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g6_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g6_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g6_small_form_factor_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g6_tower_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g6_tower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g8_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g8_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g8_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g8_small_form_factor_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g8_tower_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g8_tower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_805_g6_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_805_g6_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_805_g6_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_805_g6_small_form_factor_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_805_g8_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_805_g8_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_805_g8_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_805_g8_small_form_factor_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_880_g3_tower_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_880_g3_tower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_880_g4_tower_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_880_g4_tower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_880_g5_tower_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_880_g5_tower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_880_g6_tower_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_880_g6_tower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_880_g8_tower_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_880_g8_tower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_1000_g1_23.8-in_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_1000_g1_23.8-in_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_1000_g1_23.8-in_touch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_1000_g1_23.8-in_touch_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_1000_g1_27-in_4k_uhd_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_1000_g1_27-in_4k_uhd_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_1000_g1_34-in_curved_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_1000_g1_34-in_curved_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_1000_g2_23.8-in_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_1000_g2_23.8-in_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_1000_g2_23.8-in_touch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_1000_g2_23.8-in_touch_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_1000_g2_27-in_4k_uhd_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_1000_g2_27-in_4k_uhd_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_1000_g2_34-in_curved_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_1000_g2_34-in_curved_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g3_23.8_non-touch_healthcare_edition_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g3_23.8_non-touch_healthcare_edition_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g3_23.8-inch_non-touch_all-in-one_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g3_23.8-inch_non-touch_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g3_23.8-inch_non-touch_gpu_all-in-one_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g3_23.8-inch_non-touch_gpu_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g3_23.8-inch_touch_all-in-one_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g3_23.8-inch_touch_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g3_23.8-inch_touch_gpu_all-in-one_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g3_23.8-inch_touch_gpu_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g4_23.8-in_healthcare_edition_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g4_23.8-in_healthcare_edition_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_non-touch_all-in-one_pc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_non-touch_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_non-touch_gpu_all-in-one_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_non-touch_gpu_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_touch_all-in-one_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_touch_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_touch_gpu_all-in-one_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_touch_gpu_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g5_23.8-in_healthcare_edition_all-in-one_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g5_23.8-in_healthcare_edition_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g5_23.8-inch_all-in-one_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g5_23.8-inch_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g6_24_all-in-one_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g6_24_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g6_27_all-in-one_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g6_27_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g8_24_all-in-one_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g8_24_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g8_27_all-in-one_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g8_27_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_840_23.8_inch_g9_all-in-one_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_840_23.8_inch_g9_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_870_27_inch_g9_all-in-one_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_870_27_inch_g9_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_mini_400_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_mini_400_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_sff_400_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_sff_400_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_tower_400_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_tower_400_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_tower_480_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_tower_480_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g3_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g3_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g4_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g4_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g4_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g4_small_form_factor_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g5_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g5_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g5_microtower_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g5_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g5_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g5_small_form_factor_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g6_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g6_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g6_microtower_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g6_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g6_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g6_small_form_factor_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g7_microtower_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g7_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g7_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g7_small_form_factor_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_405_g4_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_405_g4_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_405_g6_desktop_mini_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_405_g6_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_405_g6_small_form_factor_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_405_g6_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_405_g8_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_405_g8_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_405_g8_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_405_g8_small_form_factor_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_480_g4_microtower_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_480_g4_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_480_g5_microtower_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_480_g5_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_480_g6_microtower_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_480_g6_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_480_g7_pci_microtower_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_480_g7_pci_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g3_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g3_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g3_microtower_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g3_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g3_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g3_small_form_factor_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g4_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g4_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g4_microtower_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g4_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g4_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g4_small_form_factor_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g5_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g5_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g5_microtower_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g5_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g5_microtower_pc\\(with_pci_slot\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g5_microtower_pc\\(with_pci_slot\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g5_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g5_small_form_factor_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g6_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g6_desktop_mini_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g6_microtower_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g6_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g6_pci_microtower_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g6_pci_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g6_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g6_small_form_factor_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_680_g3_microtower_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_680_g3_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_680_g4_microtower_pc\\(with_pci_slot\\)_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_680_g4_microtower_pc\\(with_pci_slot\\):-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_680_g6_pci_microtower_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_680_g6_pci_microtower_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g3_20-inch_non-touch_all-in-one_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g3_20-inch_non-touch_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g3_20-inch_touch_all-in-one_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g3_20-inch_touch_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g4_20-inch_non-touch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g4_20-inch_non-touch_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g4_23.8-inch_non-touch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g4_23.8-inch_non-touch_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g5_20-inch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g5_20-inch_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g5_23.8-inch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g5_23.8-inch_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g6_20_all-in-one_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g6_20_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g6_24_all-in-one_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g6_24_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_440_23.8_inch_g9_all-in-one_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_440_23.8_inch_g9_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_440_g4_23.8-inch_non-touch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_440_g4_23.8-inch_non-touch_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_440_g5_23.8-in_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_440_g5_23.8-in_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_440_g6_24_all-in-one_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_440_g6_24_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_480_g3_20-inch_non-touch_all-in_one_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_480_g3_20-inch_non-touch_all-in_one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_600_g3_21.5-inch_non-touch_all-in-one_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_600_g3_21.5-inch_non-touch_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_600_g4_21.5-inch_touch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_600_g4_21.5-inch_touch_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_600_g5_21.5-in_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_600_g5_21.5-in_all-in-one_business_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_600_g6_22_all-in-one_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_600_g6_22_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z1_g8_tower_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z1_g8_tower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_g3_22_all-in-one_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_g3_22_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_g3_24_all-in-one_pc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_g3_24_all-in-one_pc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_99_pro_23.8_inch_g9_all-in-one_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_99_pro_23.8_inch_g9_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:engage_flex_pro_retail_system_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:engage_flex_pro_retail_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:engage_flex_pro-c_retail_system_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:engage_flex_pro-c_retail_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:engage_go_10_mobile_system_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:engage_go_10_mobile_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:engage_go_mobile_system_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:engage_go_mobile_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:engage_one_all-in-one_system_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:engage_one_all-in-one_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:engage_one_pro_aio_system_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:engage_one_pro_aio_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:mp9_g4_retail_system_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:mp9_g4_retail_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z1_all-in-one_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z1_all-in-one_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z1_entry_tower_g5_workstation_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z1_entry_tower_g5_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z1_entry_tower_g6_workstation_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z1_entry_tower_g6_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_mini_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_mini_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_mini_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_mini_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_mini_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_mini_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_mini_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_mini_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_small_form_factor_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_small_form_factor_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_small_form_factor_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_small_form_factor_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_small_form_factor_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_small_form_factor_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_small_form_factor_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_small_form_factor_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_tower_g4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_tower_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_tower_g5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_tower_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_tower_g8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_tower_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_tower_g9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_tower_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z238_microtower_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z238_microtower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z240_small_form_factor_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z240_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z240_tower_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z240_tower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:mt22_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:mt22:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:mt31_mobile_thin_client_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:mt31_mobile_thin_client:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:mt32_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:mt32:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:mt44_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:mt44:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:mt45_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:mt45:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:mt46_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:mt46:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_mt440_g3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_mt440_g3:-:*:*:*:*:*:*:*"
] |
|
CVE-2022-45659 | Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the wpapsk_crypto parameter in the fromSetWirelessRepeat function. | [
"cpe:2.3:o:tendacn:ac6_firmware:15.03.05.19:*:*:*:*:*:*:*",
"cpe:2.3:h:tendacn:ac6:1.0:*:*:*:*:*:*:*"
] |
|
GHSA-w9xp-gh5g-rf6p | Privilege Escalation vulnerability in the File Lock component of McAfee Total Protection (MTP) prior to 16.0.32 allows a local user to gain elevated privileges by manipulating a symbolic link in the IOCTL interface. | [] |
|
GHSA-38f9-m297-6q9g | DoS via malicious record IDs in WatermelonDB | ImpactMedium severity 5.9 https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:HA maliciously crafted record ID can exploit a SQL Injection vulnerability in iOS adapter implementation and cause the app to delete all or selected records from the database, generally causing the app to become unusable.This may happen in apps that don't validate IDs (valid IDs are `/^[a-zA-Z0-9_-.]+$/`) and use Watermelon Sync or low-level `database.adapter.destroyDeletedRecords` method.The integrity risk is low due to the fact that maliciously deleted records won't synchronize, so logout-login will restore all data, although some local changes may be lost if the malicious deletion causes the sync process to fail to proceed to push stage.No way to breach confidentiality with this vulnerability is known. Full exploitation of SQL Injection is mitigated, because it's not possible to nest an insert/update query inside a delete query in SQLite, and it's not possible to pass a semicolon-separated second query. There's also no known practicable way to breach confidentiality by selectively deleting records, because those records will not be synchronized.It's theoretically possible that selective record deletion could cause an app to behave insecurely if lack of a record is used to make security decisions by the app.PatchesPatched versions include:0.15.10.16.20.16.1-fixthis is actually the same as 0.16.0, but with the patch applied - as 0.16.1 is causing issues for some users`924c7ae2a8d` commit id contains the patchWorkaroundsEnsure that your backend service sanitizes record IDs sent in the `pull sync` endpoint, such that only IDs matching `/^[a-zA-Z0-9_-.]+$/` are returned. This could also be done in JavaScript `pullChanges` function passed to `synchronize()`If you use `destroyDeletedRecords` directly, validate all IDs passed the same wayFor more informationIf you have any questions about this advisory, contact @radex. | [] |
GHSA-32jr-8q2g-wwf3 | Multiple directory traversal vulnerabilities in the View Log Files component in Axigen Free Mail Server allow remote attackers to read or delete arbitrary files via a .. (dot dot) in (1) the fileName parameter in a download action to source/loggin/page_log_dwn_file.hsp, or the fileName parameter in (2) an edit action or (3) a delete action to the default URI. | [] |
|
CVE-2018-20479 | An issue was discovered in S-CMS 1.0. It allows SQL Injection via the wap_index.php?type=newsinfo S_id parameter. | [
"cpe:2.3:a:s-cms:s-cms:1.0:*:*:*:*:*:*:*"
] |
|
CVE-2022-33640 | System Center Operations Manager: Open Management Infrastructure (OMI) Elevation of Privilege Vulnerability | System Center Operations Manager: Open Management Infrastructure (OMI) Elevation of Privilege Vulnerability | [
"cpe:2.3:a:microsoft:open_management_infrastructure:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:system_center_operations_manager:2016:-:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:system_center_operations_manager:2019:-:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:system_center_operations_manager:2022:-:*:*:*:*:*:*"
] |
GHSA-m4hx-q62w-4fvm | Buffer overflow in ReiserFS 3.5.28 in SuSE Linux allows local users to cause a denial of service and possibly execute arbitrary commands by via a long directory name. | [] |
|
CVE-2019-8747 | A memory corruption vulnerability was addressed with improved locking. This issue is fixed in watchOS 6.1. An application may be able to execute arbitrary code with kernel privileges. | [
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] |
|
GHSA-hjw2-8p34-88rj | User interface (UI) misrepresentation of critical information issue exists in multiple Home GateWay/Hikari Denwa routers provided by NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION. If this vulnerability is exploited, an attacker who identified WAN-side IPv6 address may access the product's Device Setting page via WAN-side. Note that, affects products are also provided by NIPPON TELEGRAPH AND TELEPHONE WEST CORPORATION, but the vulnerability only affects products subscribed and used in NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION areas. | [] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.