id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
GHSA-9vr6-xwj8-46f6
Unspecified vulnerability in the RDBMS Security component in Oracle Database Server 11.2.0.4 and 12.1.0.2 allows local users to affect confidentiality via unknown vectors, a different vulnerability than CVE-2016-5498.
[]
null
null
3.3
null
null
CVE-2024-31144
Xapi: Metadata injection attack against backup/restore functionality
For a brief summary of Xapi terminology, see: https://xapi-project.github.io/xen-api/overview.html#object-model-overview Xapi contains functionality to backup and restore metadata about Virtual Machines and Storage Repositories (SRs). The metadata itself is stored in a Virtual Disk Image (VDI) inside an SR. This is used for two purposes; a general backup of metadata (e.g. to recover from a host failure if the filer is still good), and Portable SRs (e.g. using an external hard drive to move VMs to another host). Metadata is only restored as an explicit administrator action, but occurs in cases where the host has no information about the SR, and must locate the metadata VDI in order to retrieve the metadata. The metadata VDI is located by searching (in UUID alphanumeric order) each VDI, mounting it, and seeing if there is a suitable metadata file present. The first matching VDI is deemed to be the metadata VDI, and is restored from. In the general case, the content of VDIs are controlled by the VM owner, and should not be trusted by the host administrator. A malicious guest can manipulate its disk to appear to be a metadata backup. A guest cannot choose the UUIDs of its VDIs, but a guest with one disk has a 50% chance of sorting ahead of the legitimate metadata backup. A guest with two disks has a 75% chance, etc.
[]
null
3.8
null
null
null
RHSA-2017:0530
Red Hat Security Advisory: rabbitmq-server security and bug fix update
rabbitmq-server: DoS via lengths_age or lengths_incr parameter in the management plugin
[ "cpe:/a:redhat:openstack:7::el7" ]
null
null
6.5
null
null
CVE-2022-50015
ASoC: SOF: Intel: hda-ipc: Do not process IPC reply before firmware boot
In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: Intel: hda-ipc: Do not process IPC reply before firmware boot It is not yet clear, but it is possible to create a firmware so broken that it will send a reply message before a FW_READY message (it is not yet clear if FW_READY will arrive later). Since the reply_data is allocated only after the FW_READY message, this will lead to a NULL pointer dereference if not filtered out. The issue was reported with IPC4 firmware but the same condition is present for IPC3.
[]
null
null
null
null
null
GHSA-mjxw-wvmv-64gf
The Data access layer component of TIBCO Software Inc.'s TIBCO Spotfire Analytics Platform for AWS Marketplace and TIBCO Spotfire Server contains multiple vulnerabilities that theoretically allow an attacker access to data cached from a data source, or a portion of a data source, that the attacker should not have access to. The attacker would need privileges to save a Spotfire file to the library. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Analytics Platform for AWS Marketplace: version 10.6.0 and TIBCO Spotfire Server: versions 7.11.7 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.0.1, 10.1.0, 10.2.0, 10.2.1, 10.3.0, 10.3.1, 10.3.2, 10.3.3, and 10.3.4, versions 10.4.0, 10.5.0, and 10.6.0.
[]
null
null
null
null
null
CVE-2022-3154
Multiple Plugins from Viszt Peter - Multiple CSRF
The Woo Billingo Plus WordPress plugin before 4.4.5.4, Integration for Billingo & Gravity Forms WordPress plugin before 1.0.4, Integration for Szamlazz.hu & Gravity Forms WordPress plugin before 1.2.7 are lacking CSRF checks in various AJAX actions, which could allow attackers to make logged in Shop Managers and above perform unwanted actions, such as deactivate the plugin's license
[ "cpe:2.3:a:woo_billingo_plus_project:woo_billingo_plus:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:integration_for_billingo_\\&_gravity_forms_project:integration_for_billingo_\\&_gravity_forms:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:integration_for_szamlazz.hu_\\&_gravity_forms_project:integration_for_szamlazz.hu_\\&_gravity_forms:*:*:*:*:*:wordpress:*:*" ]
null
7.1
null
null
null
CVE-2015-1129
Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5 does not properly select X.509 client certificates, which makes it easier for remote attackers to track users via a crafted web site.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:7.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:7.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:7.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:7.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:7.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:7.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:7.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:8.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:8.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:8.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:8.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:8.0.4:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2020-2936
Vulnerability in the Oracle Financial Services Balance Sheet Planning product of Oracle Financial Services Applications (component: User Interface). The supported version that is affected is 8.0.8. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Financial Services Balance Sheet Planning. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Financial Services Balance Sheet Planning accessible data as well as unauthorized read access to a subset of Oracle Financial Services Balance Sheet Planning accessible data. CVSS 3.0 Base Score 7.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N).
[ "cpe:2.3:a:oracle:financial_services_balance_sheet_planning:8.0.8:*:*:*:*:*:*:*" ]
null
null
7.1
null
null
CVE-2020-12081
An information disclosure vulnerability has been identified in FlexNet Publisher lmadmin.exe 11.14.0.2. The web portal link can be used to access to system files or other important files on the system.
[ "cpe:2.3:a:flexera:flexnet_publisher:11.14.0.2:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
GHSA-533v-gm9h-955p
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Alexander Conroy Simpul Events by Esotech allows Stored XSS.This issue affects Simpul Events by Esotech: from n/a through 1.8.5.
[]
null
6.5
null
null
null
CVE-2019-20567
An issue was discovered on Samsung mobile devices with N(7.x), O(8.x), and P(9.0) (Exynos chipsets) software. A up_parm heap overflow leads to code execution in the bootloader. The Samsung ID is SVE-2019-14993 (September 2019).
[ "cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*" ]
null
9.8
null
10
null
CVE-2024-39442
In sprd ssense service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
[]
null
6.2
null
null
null
CVE-2000-0145
The libguile.so library file used by gnucash in Debian GNU/Linux is installed with world-writable permissions.
[ "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2006-0551
SQL injection vulnerability in the Data Pump Metadata API in Oracle Database 10g and possibly earlier might allow remote attackers to execute arbitrary SQL commands via unknown vectors. NOTE: due to the lack of relevant details from the Oracle advisory, a separate CVE is being created since it cannot be conclusively proven that this issue has been addressed by Oracle. It is possible that this is the same issue as Oracle Vuln# DB06 from the January 2006 CPU, in which case this would be subsumed by CVE-2006-0259 or, if it is DB05, subsumed by CVE-2006-0260.
[ "cpe:2.3:a:oracle:database_server:10.1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:10.1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:10.1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:10.2.0.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2021-47373
irqchip/gic-v3-its: Fix potential VPE leak on error
In the Linux kernel, the following vulnerability has been resolved: irqchip/gic-v3-its: Fix potential VPE leak on error In its_vpe_irq_domain_alloc, when its_vpe_init() returns an error, there is an off-by-one in the number of VPEs to be freed. Fix it by simply passing the number of VPEs allocated, which is the index of the loop iterating over the VPEs. [maz: fixed commit message]
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*" ]
null
5.5
null
null
null
GHSA-239m-chp6-538f
An open redirect vulnerability exists in the Access Manager Identity Provider prior to 4.4 SP3.
[]
null
null
6.1
null
null
CVE-2019-20774
An issue was discovered on LG mobile devices with Android OS 7.0, 7.1, 7.2, 8.0, 8.1, and 9.0 software. A system service allows local retrieval of the user's password. The LG ID is LVE-SMP-190009 (August 2019).
[ "cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*" ]
null
5.5
null
2.1
null
GHSA-p6wm-338f-gmjm
The Starbox WordPress plugin before 3.5.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
[]
null
4.8
null
null
null
GHSA-q366-x2fq-6rxw
An elevation of privilege vulnerability exists when Windows improperly handles objects in memory and incorrectly maps kernel memory, aka "Microsoft DirectX Graphics Kernel Subsystem Elevation of Privilege Vulnerability." This affects Windows Server 2012 R2, Windows RT 8.1, Windows Server 2012, Windows Server 2016, Windows 8.1, Windows 10, Windows 10 Servers.
[]
null
null
7.8
null
null
GHSA-g9jw-3v2m-h989
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
[]
null
null
9.8
null
null
CVE-2023-36713
Windows Common Log File System Driver Information Disclosure Vulnerability
Windows Common Log File System Driver Information Disclosure Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp2:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp2:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
cisco-sa-sb-hardcoded-cred-MJCEXvX
Cisco Business 220 Series Smart Switches Static Key and Password Vulnerabilities
Multiple vulnerabilities in Cisco Business 220 Series Smart Switches firmware could allow an attacker with Administrator privileges to access sensitive login credentials or reconfigure the passwords on the user account. For more information about these vulnerabilities, see the Details ["#details"] section of this advisory. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
[]
null
5.5
null
null
null
GHSA-f3wc-386p-mwc3
In the Linux kernel, the following vulnerability has been resolved:jfs: fix out-of-bounds in dbNextAG() and diAlloc()In dbNextAG() , there is no check for the case where bmp->db_numag is greater or same than MAXAG due to a polluted image, which causes an out-of-bounds. Therefore, a bounds check should be added in dbMount().And in dbNextAG(), a check for the case where agpref is greater than bmp->db_numag should be added, so an out-of-bounds exception should be prevented.Additionally, a check for the case where agno is greater or same than MAXAG should be added in diAlloc() to prevent out-of-bounds.
[]
null
7.1
null
null
null
CVE-2006-3385
Cross-site scripting (XSS) vulnerability in divers.php in Vincent Leclercq News 5.2 allows remote attackers to inject arbitrary web script or HTML via the (1) id and (2) disabled parameters.
[ "cpe:2.3:a:vincent_leclercq:news:5.2:*:*:*:*:*:*:*" ]
null
null
null
5.8
null
CVE-2022-4478
Font Awesome < 4.3.2 - Contributor+ Stored XSS
The Font Awesome WordPress plugin before 4.3.2 does not validate and escapes some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as a contributor to perform Stored Cross-Site Scripting attacks against logged-in admins.
[ "cpe:2.3:a:fontawesome:font_awesome:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
null
CVE-2024-57255
An integer overflow in sqfs_resolve_symlink in Das U-Boot before 2025.01-rc1 occurs via a crafted squashfs filesystem with an inode size of 0xffffffff, resulting in a malloc of zero and resultant memory overwrite.
[]
null
7.1
null
null
null
GHSA-7pq2-85jv-r5mw
A stored cross-site scripting (XSS) vulnerability in the cms/content/edit component of YZNCMS v1.3.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the title parameter.
[]
null
6.1
null
null
null
GHSA-93gj-m35w-q9v5
Improper Access Control in Samsung Voice Recorder prior to versions 21.4.15.01 in Android 12 and Android 13, 21.4.50.17 in Android 14 allows physical attackers to access Voice Recorder information on the lock screen.
[]
null
6.8
null
null
null
CVE-2023-22038
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N).
[ "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*" ]
null
2.7
null
null
null
CVE-2021-32975
Cscape (All Versions prior to 9.90 SP5) lacks proper validation of user-supplied data when parsing project files. This could lead to an out-of-bounds read. An attacker could leverage this vulnerability to execute code in the context of the current process.
[ "cpe:2.3:a:hornerautomation:cscape:*:*:*:*:*:*:*:*", "cpe:2.3:a:hornerautomation:cscape:9.90:-:*:*:*:*:*:*", "cpe:2.3:a:hornerautomation:cscape:9.90:sp1:*:*:*:*:*:*", "cpe:2.3:a:hornerautomation:cscape:9.90:sp2:*:*:*:*:*:*", "cpe:2.3:a:hornerautomation:cscape:9.90:sp3:*:*:*:*:*:*", "cpe:2.3:a:hornerautomation:cscape:9.90:sp4:*:*:*:*:*:*" ]
null
7.8
null
6.8
null
GHSA-h89w-c652-v4r6
A security feature bypass vulnerability exists when Windows Subsystem for Linux improperly handles case sensitivity, aka "Windows Subsystem for Linux Security Feature Bypass Vulnerability." This affects Windows 10, Windows 10 Servers.
[]
null
null
5.3
null
null
GHSA-phrv-w9px-24x9
A command injection vulnerability in the Command Dispatcher Service of NASA Fprime v3.4.3 allows attackers to execute arbitrary commands.
[]
null
9.8
null
null
null
CVE-2004-0875
Multiple cross-site scripting (XSS) vulnerabilities in Phpgroupware (aka webdistro) 0.9.16.002 and earlier allow remote attackers to insert arbitrary HTML or web script, as demonstrated with a request to the wiki module.
[ "cpe:2.3:a:phpgroupware:phpgroupware:0.9.12:*:*:*:*:*:*:*", "cpe:2.3:a:phpgroupware:phpgroupware:0.9.13:*:*:*:*:*:*:*", "cpe:2.3:a:phpgroupware:phpgroupware:0.9.14.003:*:*:*:*:*:*:*", "cpe:2.3:a:phpgroupware:phpgroupware:0.9.14.005:*:*:*:*:*:*:*", "cpe:2.3:a:phpgroupware:phpgroupware:0.9.14.006:*:*:*:*:*:*:*", "cpe:2.3:a:phpgroupware:phpgroupware:0.9.14.007:*:*:*:*:*:*:*", "cpe:2.3:a:phpgroupware:phpgroupware:0.9.16.000:*:*:*:*:*:*:*", "cpe:2.3:a:phpgroupware:phpgroupware:0.9.16.002:*:*:*:*:*:*:*", "cpe:2.3:a:phpgroupware:phpgroupware:0.9.16_rc1:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
RHSA-2021:0428
Red Hat Security Advisory: OpenShift Container Platform 4.5.33 bug fix and security update
openshift/builder: privilege escalation during container image builds via mounted secrets
[ "cpe:/a:redhat:openshift:4.5::el7", "cpe:/a:redhat:openshift:4.5::el8" ]
null
8.8
null
null
null
CVE-2019-7163
The web interface of Alcatel LINKZONE MW40-V-V1.0 MW40_LU_02.00_02 devices is vulnerable to an authentication bypass that allows an unauthenticated user to have access to the web interface without knowing the administrator's password.
[ "cpe:2.3:o:tcl:alcatel_linkzone_firmware:mw40-v-v1.0_mw40_lu_02.00_02:*:*:*:*:*:*:*", "cpe:2.3:h:tcl:alcatel_linkzone:-:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
null
CVE-2016-4340
The impersonate feature in Gitlab 8.7.0, 8.6.0 through 8.6.7, 8.5.0 through 8.5.11, 8.4.0 through 8.4.9, 8.3.0 through 8.3.8, and 8.2.0 through 8.2.4 allows remote authenticated users to "log in" as any other user via unspecified vectors.
[ "cpe:2.3:a:gitlab:gitlab:8.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.5.9:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.5.10:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.5.11:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.6.7:*:*:*:*:*:*:*", "cpe:2.3:a:gitlab:gitlab:8.7.0:*:*:*:*:*:*:*" ]
null
null
8.8
6.5
null
CVE-2006-1546
Apache Software Foundation (ASF) Struts before 1.2.9 allows remote attackers to bypass validation via a request with a 'org.apache.struts.taglib.html.Constants.CANCEL' parameter, which causes the action to be canceled but would not be detected from applications that do not use the isCancelled check.
[ "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-pmjr-jg67-xfgh
Unspecified vulnerability in HP Insight Software Installer for Windows before 6.1 allows local users to read or modify data via unknown vectors.
[]
null
null
null
null
null
GHSA-p349-27r5-4p76
Sourcecodester Online ID Generator System 1.0 was discovered to contain an arbitrary file upload vulnerability via id_generator/classes/Users.php?f=save. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.
[]
null
5.1
null
null
null
CVE-2016-10427
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile and Snapdragon Wear MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, SD 835, SD 845, SD 850, and SDX20, improper boundary check in RLC AM module leads to denial of service by reaching assertion.
[ "cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9615_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9615:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9625_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9625:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9635m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9635m:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9645_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9645:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:mdm9655_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:mdm9655:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_400:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_410_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_410:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_412_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_412:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_615:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_616_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_616:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_415:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_617_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_617:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_800_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_800:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_808_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_808:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_810_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_810:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*" ]
null
null
7.5
7.8
null
CVE-2014-0948
Unspecified vulnerability in IBM Rational Software Architect Design Manager and Rational Rhapsody Design Manager 3.x and 4.x before 4.0.7 allows remote authenticated users to execute arbitrary code via a crafted ZIP archive.
[ "cpe:2.3:a:ibm:rhapsody_design_manager:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rhapsody_design_manager:3.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rhapsody_design_manager:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rhapsody_design_manager:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rhapsody_design_manager:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rhapsody_design_manager:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rhapsody_design_manager:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rhapsody_design_manager:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rhapsody_design_manager:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rhapsody_design_manager:4.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_software_architect_design_manager:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_software_architect_design_manager:3.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_software_architect_design_manager:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_software_architect_design_manager:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_software_architect_design_manager:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_software_architect_design_manager:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_software_architect_design_manager:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_software_architect_design_manager:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_software_architect_design_manager:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_software_architect_design_manager:4.0.6:*:*:*:*:*:*:*" ]
null
null
null
6
null
CVE-2024-9782
D-Link DIR-619L B1 formEasySetupWWConfig buffer overflow
A vulnerability was found in D-Link DIR-619L B1 2.06. It has been declared as critical. This vulnerability affects the function formEasySetupWWConfig of the file /goform/formEasySetupWWConfig. The manipulation of the argument curTime leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:h:d-link:dir-619l_b1:*:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-619l_firmware:2.06:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-619l:b1:*:*:*:*:*:*:*" ]
8.7
8.8
8.8
9
null
RHSA-2001:084
Red Hat Security Advisory: Kernel
security flaw
[ "cpe:/o:redhat:linux:7.1" ]
null
null
null
null
null
GHSA-xmjh-q998-8xf2
Cross Site Scripting (XSS) vulnerability exists in SeaCMS 12.6 via the (1) v_company and (2) v_tvs parameters in /admin_video.php,
[]
null
null
null
null
null
CVE-2021-1560
Cisco DNA Spaces Connector Command Injection Vulnerabilities
Multiple vulnerabilities in Cisco DNA Spaces Connector could allow an authenticated, remote attacker to perform a command injection attack on an affected device. These vulnerabilities are due to insufficient input sanitization when executing affected commands. A high-privileged attacker could exploit these vulnerabilities on a Cisco DNA Spaces Connector by injecting crafted input during command execution. A successful exploit could allow the attacker to execute arbitrary commands as root within the Connector docker container.
[ "cpe:2.3:a:cisco:dna_spaces\\:_connector:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
RHSA-2023:1199
Red Hat Security Advisory: openssl security and bug fix update
openssl: read buffer overflow in X.509 certificate verification openssl: timing attack in RSA Decryption implementation openssl: double free after calling PEM_read_bio_ex openssl: use-after-free following BIO_new_NDEF openssl: invalid pointer dereference in d2i_PKCS7 functions openssl: NULL dereference validating DSA public key openssl: X.400 address type confusion in X.509 GeneralName openssl: NULL dereference during PKCS7 data verification
[ "cpe:/a:redhat:rhel_eus:9.0::appstream", "cpe:/o:redhat:rhel_eus:9.0::baseos" ]
null
7.5
null
null
null
GHSA-w6mh-p599-cxh4
Dropbox Lepton v1.2.1-185-g2a08b77 was discovered to contain a heap-buffer-overflow in the function aligned_dealloc():src/lepton/bitops.cc:108.
[]
null
7.8
null
null
null
GHSA-j8rm-cm55-qqj6
.NET Information Disclosure Vulnerability
Microsoft Security Advisory CVE-2023-35391: .NET Information Disclosure Vulnerability<a name="executive-summary"></a>Executive summaryMicrosoft is releasing this security advisory to provide information about a vulnerability in ASP.NET core 2.1, .NET 6.0 and, .NET 7.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.A vulnerability exists in ASP.NET Core 2.1, .NET 6.0 and, .NET 7.0 applications using SignalR when redis backplane use might result in information disclosure.AnnouncementAnnouncement for this issue can be found at https://github.com/dotnet/announcements/issues/267<a name="mitigation-factors"></a>Mitigation factorsMicrosoft has not identified any mitigating factors for this vulnerability.<a name="affected-software"></a>Affected softwareAny .NET 7.0 application running on .NET 7.0.9 or earlier.Any .NET 6.0 application running on .NET 6.0.20 or earlier.If your application uses the following package versions, ensure you update to the latest version of .NET.<a name=".NET 7"></a>.NET 7Package name | Affected version | Patched version ------------ | ---------------- | ------------------------- [Microsoft.AspNetCore.SignalR.StackExchangeRedis](https://www.nuget.org/packages/Microsoft.AspNetCore.SignalR.StackExchangeRedis) | >= 7.0.0, <= 7.0.9 | 7.0.10<a name=".NET 6"></a>.NET 6Package name | Affected version | Patched version ------------ | ---------------- | ------------------------- [Microsoft.AspNetCore.SignalR.StackExchangeRedis](https://www.nuget.org/packages/Microsoft.AspNetCore.SignalR.StackExchangeRedis) | >= 6.0.0, <= 6.0.20 | 6.0.21<a name="ASP.NET Core 2.1"></a>ASP.NET Core 2.1Package name | Affected version | Patched version ------------ | ---------------- | ------------------------- [Microsoft.AspNetCore.SignalR.Redis](https://www.nuget.org/packages/Microsoft.AspNetCore.SignalR.Redis) | < 1.0.40 | 1.0.40Advisory FAQ<a name="how-affected"></a>How do I know if I am affected?If you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-software), you're exposed to the vulnerability.<a name="how-fix"></a>How do I fix the issue?To fix the issue please install the latest version of .NET 6.0 or .NET 7.0. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs.If you are using one of the affected packages, please update to the patched version listed above.If you have .NET 6.0 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following;If you're using .NET 7.0, you should download and install Runtime 7.0.10 or SDK 7.0.110 (for Visual Studio 2022 v17.4) from https://dotnet.microsoft.com/download/dotnet-core/7.0.If you're using .NET 6.0, you should download and install Runtime 6.0.21 or SDK 6.0.316 (for Visual Studio 2022 v17.2) from https://dotnet.microsoft.com/download/dotnet-core/6.0..NET 6.0 and and .NET 7.0 updates are also available from Microsoft Update. To access this either type "Check for updates" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates.Once you have installed the updated runtime or SDK, restart your apps for the update to take effect.Additionally, if you've deployed [self-contained applications](https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd) targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed.Other InformationReporting Security IssuesIf you have found a potential security issue in .NET 6.0 or .NET 7.0, please email details to [email protected]. Reports may qualify for the Microsoft .NET Core & .NET 5 Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at <https://aka.ms/corebounty>.SupportYou can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime and https://github.com/dotnet/aspnet/. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue.DisclaimerThe information provided in this advisory is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.External Links[CVE-2023-35391]( https://www.cve.org/CVERecord?id=CVE-2023-35391)RevisionsV1.0 (August 08, 2023): Advisory published._Version 1.0__Last Updated 2023-08-08_
[]
null
7.1
null
null
null
CVE-2016-0757
OpenStack Image Service (Glance) before 2015.1.3 (kilo) and 11.0.x before 11.0.2 (liberty), when show_multiple_locations is enabled, allow remote authenticated users to change image status and upload new image data by removing the last location of an image.
[ "cpe:2.3:a:openstack:image_registry_and_delivery_service_\\(glance\\):11.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:openstack:image_registry_and_delivery_service_\\(glance\\):11.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:openstack:image_registry_and_delivery_service_\\(glance\\):2015.1.2:*:*:*:*:*:*:*" ]
null
null
4.3
4
null
CVE-2015-1344
The do_write_pids function in lxcfs.c in LXCFS before 0.12 does not properly check permissions, which allows local users to gain privileges by writing a pid to the tasks file.
[ "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "cpe:2.3:a:canonical:lxcfs:*:*:*:*:*:*:*:*" ]
null
null
null
7.2
null
GHSA-jfx8-97fx-6vfq
Untrusted pointer dereference in Windows Subsystem for Linux allows an unauthorized attacker to execute code locally.
[]
null
8.4
null
null
null
CVE-2017-15241
IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .pdf file, related to "Data from Faulting Address controls Branch Selection starting at PDF!xmlParserInputRead+0x00000000000929f5."
[ "cpe:2.3:a:irfanview:irfanview:4.44:*:*:*:*:*:x86:*", "cpe:2.3:a:irfanview:pdf:4.43:*:*:*:*:*:*:*" ]
null
null
7.8
6.8
null
CVE-2023-37951
Jenkins mabl Plugin 0.0.46 and earlier does not set the appropriate context for credentials lookup, allowing attackers with Item/Configure permission to access and capture credentials they are not entitled to.
[ "cpe:2.3:a:jenkins:mabl:*:*:*:*:*:jenkins:*:*" ]
null
6.5
null
null
null
RHSA-2021:4848
Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.5.2 security update and bugfix advisory
nodejs-immer: prototype pollution may lead to DoS or remote code execution mig-controller: incorrect namespaces handling may lead to not authorized usage of Migration Toolkit for Containers (MTC)
[ "cpe:/a:redhat:rhmt:1.5::el7", "cpe:/a:redhat:rhmt:1.5::el8" ]
null
6.3
null
null
null
GHSA-p43w-35fv-3qjj
Multiple unspecified vulnerabilities in Ethereal 0.10.x up to 0.10.14 allow remote attackers to cause a denial of service (large or infinite loops) viarafted packets to the (1) UMA and (2) BER dissectors.
[]
null
null
null
null
null
CVE-2023-29791
kodbox <= 1.37 is vulnerable to Cross Site Scripting (XSS) via the debug information.
[ "cpe:2.3:a:kodcloud:kodbox:*:*:*:*:*:*:*:*" ]
null
6.1
null
null
null
cisco-sa-sb-wap-multi-85G83CRB
Cisco Small Business 100, 300, and 500 Series Wireless Access Points Command Injection and Buffer Overflow Vulnerabilities
Multiple vulnerabilities in the web-based management interface of Cisco Small Business 100, 300, and 500 Series Wireless Access Points (APs) could allow an authenticated, remote attacker to perform command injection and buffer overflow attacks against an affected device. In order to exploit these vulnerabilities, the attacker must have valid administrative credentials for the device. For more information about these vulnerabilities, see the Details ["#details"] section of this advisory. There are no workarounds that address these vulnerabilities.
[]
null
6.5
null
null
null
GHSA-p723-w3qm-qpvw
Inadequate encryption strength in subsystem for Intel(R) CSME versions before 13.0.40 and 13.30.10 may allow an unauthenticated user to potentially enable information disclosure via physical access.
[]
null
null
null
null
null
CVE-2014-9597
The picture_pool_Delete function in misc/picture_pool.c in VideoLAN VLC media player 2.1.5 allows remote attackers to execute arbitrary code or cause a denial of service (DEP violation and application crash) via a crafted FLV file.
[ "cpe:2.3:a:videolan:vlc_media_player:2.1.5:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
RHSA-2019:3187
Red Hat Security Advisory: kernel security and bug fix update
hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB)
[ "cpe:/o:redhat:rhel_aus:7.4::server", "cpe:/o:redhat:rhel_e4s:7.4::server", "cpe:/o:redhat:rhel_tus:7.4::server" ]
null
null
7
null
null
RHSA-2025:9308
Red Hat Security Advisory: gimp:2.8 security update
gimp: GIMP ICO File Parsing Integer Overflow gimp: Multiple heap buffer overflows in TGA parser gimp: Multiple use after free in XCF parser
[ "cpe:/a:redhat:rhel_aus:8.4::appstream" ]
null
7.3
null
null
null
CVE-2023-2898
There is a null-pointer-dereference flaw found in f2fs_write_end_io in fs/f2fs/data.c in the Linux kernel. This flaw allows a local privileged user to cause a denial of service problem.
[ "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*" ]
null
4.7
null
null
null
GHSA-m553-8g9v-hr9v
Cross-site scripting (XSS) vulnerability in search.php in Sniggabo CMS 2.21 allows remote attackers to inject arbitrary web script or HTML via the q parameter.
[]
null
null
null
null
null
CVE-2025-24319
BIG-IP Next Central Manager vulnerability
When BIG-IP Next Central Manager is running, undisclosed requests to the BIG-IP Next Central Manager API can cause the BIG-IP Next Central Manager Node's Kubernetes service to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
[]
7.1
6.5
null
null
null
GHSA-pmqr-v7cp-5xfx
libxslt, as used in Google Chrome before 17.0.963.46, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
[]
null
null
null
null
null
CVE-2015-2860
Directory traversal vulnerability in Avigilon Control Center (ACC) 4 before 4.12.0.54 and 5 before 5.4.2.22 allows remote attackers to read arbitrary files via a crafted help/ URL.
[ "cpe:2.3:a:avigilon:avigilon_control_center:*:*:*:*:*:*:*:*" ]
null
null
null
7.8
null
GHSA-f72g-9wmh-q5r7
service.cgi in Cobalt RAQ 4 allows remote attackers to cause a denial of service, and possibly execute arbitrary code, via a long service argument.
[]
null
null
null
null
null
CVE-2024-57542
Linksys E8450 v1.2.00.360516 was discovered to contain a command injection vulnerability via the field id_email_check_btn.
[]
null
8.8
null
null
null
GHSA-cpq5-hc88-m4rw
An issue was discovered in PvPGN Stats 2.4.6. SQL Injection exists in ladder/stats.php via the POST user_search parameter.
[]
null
null
9.8
null
null
CVE-2005-0701
Directory traversal vulnerability in Oracle Database Server 8i and 9i allows remote attackers to read or rename arbitrary files via "\\.\\.." (modified dot dot backslash) sequences to UTL_FILE functions such as (1) UTL_FILE.FOPEN or (2) UTL_FILE.frename.
[ "cpe:2.3:a:oracle:database_server:*:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-298h-vfc8-fcfc
IBM Common Cryptographic Architecture 7.0.0 through 7.5.51 could allow an authenticated user to cause a denial of service in the Hardware Security Module (HSM) using a specially crafted sequence of valid requests.
[]
null
6.5
null
null
null
GHSA-g8fx-vvch-2699
The PayPal module in Ubercart does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
[]
null
null
null
null
null
GHSA-2cj6-g7fv-hq3m
A local privilege escalation vulnerability has been identified in the SwitchVPN client 2.1012.03 for macOS. Due to over-permissive configuration settings and a SUID binary, an attacker is able to execute arbitrary binaries as root.
[]
null
null
7.8
null
null
GHSA-hh23-hp8m-rwv7
A vulnerability, which was classified as problematic, has been found in go4rayyan Scumblr up to 2.0.1a. Affected by this issue is some unknown functionality of the component Task Handler. The manipulation leads to cross site scripting. The attack may be launched remotely. Upgrading to version 2.0.2 is able to address this issue. The patch is identified as 5c9120f2362ddb7cbe48f2c4620715adddc4ee35. It is recommended to upgrade the affected component. VDB-251570 is the identifier assigned to this vulnerability.
[]
null
2.4
null
null
null
CVE-2022-28586
XSS in edit page of Hoosk 1.8.0 allows attacker to execute javascript code in user browser via edit page with XSS payload bypass filter some special chars.
[ "cpe:2.3:a:hoosk:hoosk:1.8.0:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
null
CVE-2025-48303
WordPress Post Type Converter plugin <= 0.6 - Cross Site Request Forgery (CSRF) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Kevin Langley Jr. Post Type Converter allows Cross-Site Request Forgery.This issue affects Post Type Converter: from n/a through 0.6.
[]
null
4.3
null
null
null
GHSA-cr4f-qgfw-47cw
The Event Tickets and Registration plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.18.1 via the tc-order-id parameter due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to view order details of orders they did not place, which includes ticket prices, user emails and order date.
[]
null
5.3
null
null
null
CVE-2025-23091
An Improper Certificate Validation on UniFi OS devices, with Identity Enterprise configured, could allow a malicious actor to execute a man-in-the-middle (MitM) attack during application update.
[]
null
null
5.9
null
null
CVE-2021-36937
Windows Media MPEG-4 Video Decoder Remote Code Execution Vulnerability
Windows Media MPEG-4 Video Decoder Remote Code Execution Vulnerability
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2114:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2114:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2114:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2114:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1734:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1734:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1734:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1165:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1165:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1165:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1165:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1165:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1165:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1165:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.1165:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19022:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19022:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4583:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4583:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4583:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:6.1.7601.25685:sp1:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_7:6.1.7601.25685:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20094:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20094:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20094:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21192:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21192:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2008_r2:6.1.7601.25685:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23435:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012_r2:6.3.9600.20094:*:*:*:*:*:x64:*" ]
null
7.8
null
null
null
CVE-2013-3276
EMC RSA Archer GRC 5.x before 5.4 allows remote authenticated users to bypass intended access restrictions and complete a login by leveraging a deactivated account.
[ "cpe:2.3:a:emc:rsa_archer_egrc:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:emc:rsa_archer_egrc:5.1:*:*:*:*:*:*:*", "cpe:2.3:a:emc:rsa_archer_egrc:5.2:*:*:*:*:*:*:*", "cpe:2.3:a:emc:rsa_archer_egrc:5.3:*:*:*:*:*:*:*" ]
null
null
null
6
null
CVE-2022-41303
A user may be tricked into opening a malicious FBX file which may exploit a use-after-free vulnerability in Autodesk FBX SDK 2020 version causing the application to reference a memory location controlled by an unauthorized third party, thereby running arbitrary code on the system.
[ "cpe:2.3:a:autodesk:fbx_software_development_kit:2020.0:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
CVE-2024-21531
All versions of the package git-shallow-clone are vulnerable to Command injection due to missing sanitization or mitigation flags in the process variable of the gitShallowClone function.
[ "cpe:2.3:a:git:git-shallow-clone:*:*:*:*:*:*:*:*" ]
null
5.3
null
null
null
GHSA-2r64-2qmr-9w43
WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.
[]
null
null
null
null
null
GHSA-r62r-q8j9-cw33
The external node classifier (ENC) API in Foreman before 1.1 allows remote attackers to obtain the hashed root password via an API request.
[]
null
null
null
null
null
GHSA-rfmc-v2gq-q3j6
SQL injection vulnerability in login.asp of Brooky eStore 1.0.1 through 1.0.2b allows remote attackers to bypass authentication and execute arbitrary SQL code via the (1) user or (2) pass parameters.
[]
null
null
null
null
null
CVE-2017-8182
MTK platform in Huawei smart phones with software of earlier than Nice-AL00C00B160 versions, earlier than Nice-AL10C00B140 versions has a out-of-bound read vulnerability. An attacker tricks a user into installing a malicious application on the smart phone, and send given parameter and cause to memory out-of-bound read.
[ "cpe:2.3:o:huawei:mtk_platform_smart_phone_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:mtk_platform_smart_phone:-:*:*:*:*:*:*:*" ]
null
null
6.1
5.8
null
GHSA-rjqp-837c-gqg6
Question2Answer Q2A Ultimate SEO Version 1.3 is affected by cross-site scripting (XSS), which may lead to arbitrary remote code execution.
[]
null
null
null
null
null
GHSA-r73v-c4r5-xmf5
Cross-site scripting (XSS) vulnerability in recommend.php in Chipmunk Directory script allows remote attackers to inject arbitrary web script or HTML via the entryID parameter.
[]
null
null
null
null
null
GHSA-m4f6-29hg-8grv
Atlassian JIRA before 5.0.1; Confluence before 3.5.16, 4.0 before 4.0.7, and 4.1 before 4.1.10; FishEye and Crucible before 2.5.8, 2.6 before 2.6.8, and 2.7 before 2.7.12; Bamboo before 3.3.4 and 3.4.x before 3.4.5; and Crowd before 2.0.9, 2.1 before 2.1.2, 2.2 before 2.2.9, 2.3 before 2.3.7, and 2.4 before 2.4.1 do not properly restrict the capabilities of third-party XML parsers, which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.
[]
null
9.1
null
null
null
GHSA-27v5-q384-ff55
find_theni_home.php in E-theni allows remote attackers to obtain sensitive system information via a URL request which executes phpinfo.
[]
null
null
null
null
null
GHSA-pj67-778w-r7w3
The MSI installer for Splashtop Streamer for Windows before 3.6.2.0 uses a temporary folder with weak permissions during installation. A local user can exploit this to escalate privileges to SYSTEM by replacing InstRegExp.reg.
[]
null
7.8
null
null
null
CVE-2014-2099
The msrle_decode_frame function in libavcodec/msrle.c in FFmpeg before 2.1.4 does not properly calculate line sizes, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted Microsoft RLE video data.
[ "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:2.1.2:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
CVE-2022-31644
Potential vulnerabilities have been identified in the system BIOS of certain HP PC products, which might allow arbitrary code execution, escalation of privilege, denial of service, and information disclosure.
[ "cpe:2.3:o:hp:dragonfly_folio_g3_2-in-1_firmware:01.01.03:*:*:*:*:*:*:*", "cpe:2.3:h:hp:dragonfly_folio_g3_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_dragonfly_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_dragonfly:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_dragonfly_g3_firmware:01.03.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_dragonfly_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_dragonfly_g2_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_dragonfly_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_dragonfly_max_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_dragonfly_max:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_folio_2-in-1_firmware:not_impacted:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_folio_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_x2_1012_g1_firmware:1.57:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_x2_1012_g1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_x2_1012_g2_firmware:1.43:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_x2_1012_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_x2_1013_g3_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_x2_1013_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_x2_g4_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_x2_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_x2_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_x2_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_x360_1040_g9_2-in-1_firmware:01.03.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_x360_1040_g9_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_x360_830_g9_2-in-1_firmware:01.03.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_x360_830_g9_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_1030_g1_firmware:1.57:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_1030_g1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_1040_g9_firmware:01.03.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_1040_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_1040_g3_firmware:1.57:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_1040_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_1040_g4_firmware:1.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_1040_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_1050_g1_firmware:01.22.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_1050_g1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_630_g9_firmware:01.04.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_630_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_640_g9_firmware:01.04.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_640_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_645_g9_firmware:01.08.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_645_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_650_g9_firmware:01.04.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_650_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_655_g9_firmware:01.08.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_655_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_735_g5_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_735_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_735_g6_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_735_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_745_g5_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_745_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_745_g6_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_745_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_755_g5_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_755_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_830_g9_firmware:01.03.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_830_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_830_g5_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_830_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_830_g6_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_830_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_830_g7_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_830_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_830_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_830_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_835_g9_firmware:01.02.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_835_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_835_g7_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_835_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_835_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_835_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_836_g5_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_836_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_836_g6_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_836_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_840_g9_firmware:01.03.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_840_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_840_aero_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_840_aero_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_840_g5_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_840_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_840_g6_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_840_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_840_g7_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_840_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_840_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_840_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_840r_g4_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_840r_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_845_g9_firmware:01.02.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_845_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_845_g7_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_845_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_845_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_845_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_846_g5_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_846_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_850_g5_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_850_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_850_g6_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_850_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_850_g7_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_850_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_850_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_850_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_855_g7_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_855_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_855_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_855_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_860_g9_firmware:01.03.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_860_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_865_g9_firmware:01.02.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_865_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_1030_g3_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_1030_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_1030_g4_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_1030_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_1030_g7_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_1030_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_1030_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_1030_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_1040_g5_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_1040_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_1040_g6_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_1040_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_1040_g7_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_1040_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_1040_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_1040_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_830_g5_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_830_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_830_g6_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_830_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_830_g7_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_830_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitebook_x360_830_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitebook_x360_830_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:pro_x360_fortis_g10_firmware:01.03.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:pro_x360_fortis_g10:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:pro_x360_fortis_g9_firmware:01.03.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:pro_x360_fortis_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_430_g5_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_430_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_430_g6_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_430_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_430_g7_firmware:01.14.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_430_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_430_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_430_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_440_g9_firmware:01.04.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_440_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_440_g5_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_440_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_440_g6_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_440_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_440_g7_firmware:01.14.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_440_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_440_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_440_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_445_g9_firmware:01.08.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_445_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_445_g6_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_445_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_445_g7_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_445_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_445_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_445_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_445r_g6_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_445r_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_450_g9_firmware:01.04.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_450_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_450_g5_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_450_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_450_g6_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_450_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_450_g7_firmware:01.14.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_450_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_450_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_450_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_455_g9_firmware:01.08.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_455_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_455_g5_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_455_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_455_g6_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_455_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_455_g7_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_455_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_455_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_455_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_455r_g6_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_455r_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_470_g5_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_470_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_630_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_630_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_635_aero_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_635_aero_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_640_g4_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_640_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_640_g5_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_640_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_640_g7_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_640_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_640_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_640_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_645_g4_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_645_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_650_g4_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_650_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_650_g5_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_650_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_650_g7_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_650_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_650_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_650_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_fortis_g10_firmware:01.03.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_fortis_g10:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_fortis_g9_firmware:01.03.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_fortis_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_x360_11_g3_ee_firmware:01.20.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_x360_11_g3_ee:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_x360_11_g4_ee_firmware:01.16.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_x360_11_g4_ee:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_x360_11_g5_ee_firmware:01.11.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_x360_11_g5_ee:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_x360_11_g6_ee_firmware:01.12.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_x360_11_g6_ee:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_x360_11_g7_ee_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_x360_11_g7_ee:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_x360_435_g7_firmware:01.10.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_x360_435_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_x360_435_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_x360_435_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:probook_x360_440_g1_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:probook_x360_440_g1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_14u_g5_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_14u_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_14u_g6_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_14u_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_15_g5_firmware:01.21.02:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_15_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_15_g6_firmware:01.21.02:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_15_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_15u_g5_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_15u_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_15u_g6_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_15u_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_17_g5_firmware:01.21.02:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_17_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_17_g6_firmware:01.21.02:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_17_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_create_g7_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_create_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_firefly_14_g7_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_firefly_14_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_firefly_14_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_firefly_14_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_firefly_14_g9_firmware:01.03.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_firefly_14_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_firefly_15_g7_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_firefly_15_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_firefly_15_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_firefly_15_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_firefly_16_g9_firmware:01.03.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_firefly_16_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_fury_15_g7_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_fury_15_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_fury_15_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_fury_15_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_fury_16_g9_firmware:01.03.02:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_fury_16_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_fury_17_g7_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_fury_17_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_fury_17_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_fury_17_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_power_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_power_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_power_g9_firmware:01.03.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_power_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_power_g7_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_power_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_studio_g8_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_studio_g8:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_studio_g9_firmware:01.03.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_studio_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_studio_g5_firmware:01.21.02:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_studio_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_studio_g7_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_studio_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zbook_studio_x360_g5_firmware:01.21.02:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zbook_studio_x360_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_13_g2_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_13_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_14_g2_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_14_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_14_g3_firmware:01.14.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_14_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_14_g4_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_14_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_g5_firmware:01.04.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_15_g2_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_15_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_15_g3_firmware:01.14.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_15_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_a_14_g3_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_a_14_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_a_14_g4_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_a_14_g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_a_14_g5_firmware:01.08.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_a_14_g5:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_g1_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_g1:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_x_13_g2_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_x_13_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_mini_600_g9_firmware:02.05.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_mini_600_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_mini_800_g9_firmware:02.05.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_mini_800_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_sff_600_g9_firmware:02.05.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_sff_600_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_sff_800_g9_firmware:02.05.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_sff_800_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_slice_firmware:2.59:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_slice:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_slice_g2_firmware:2.59:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_slice_g2:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_tower_600_g9_firmware:02.05.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_tower_600_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_tower_680_g9_firmware:02.05.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_tower_680_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_tower_800_g9_firmware:02.05.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_tower_800_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elite_tower_880_g9_firmware:02.05.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elite_tower_880_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_705_g3_firmware:2.41:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_705_g3:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_705_g4_desktop_mini_firmware:02.20.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_705_g4_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_705_g4_microtower_firmware:02.20.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_705_g4_microtower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_705_g4_small_form_factor_firmware:02.20.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_705_g4_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_705_g4_workstation_firmware:02.19.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_705_g4_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_705_g5_desktop_mini_firmware:02.15.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_705_g5_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_705_g5_small_form_factor_firmware:02.15.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_705_g5_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_35w_g2_desktop_mini_firmware:2.59:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_35w_g2_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_35w_g3_desktop_mini_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_35w_g3_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_35w_g4_desktop_mini_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_35w_g4_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_65w_g2_desktop_mini_firmware:2.59:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_65w_g2_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_65w_g3_desktop_mini_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_65w_g3_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_65w_g4_desktop_mini_firmware:02.20.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_65w_g4_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_95w_g4_desktop_mini_firmware:02.20.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_95w_g4_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g2_small_form_factor_firmware:2.59:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g2_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g3_small_form_factor_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g3_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g3_tower_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g3_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g4_small_form_factor_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g4_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g4_tower_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g4_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g4_workstation_firmware:02.20.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g4_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g5_desktop_mini_firmware:02.15.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g5_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g5_small_form_factor_firmware:02.15.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g5_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g5_tower_firmware:02.15.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g5_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g6_desktop_mini_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g6_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g6_small_form_factor_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g6_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g6_tower_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g6_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g8_desktop_mini_firmware:02.09.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g8_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g8_small_form_factor_firmware:02.09.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g8_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_800_g8_tower_firmware:02.09.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_800_g8_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_805_g6_desktop_mini_firmware:02.09.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_805_g6_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_805_g6_small_form_factor_firmware:02.09.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_805_g6_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_805_g8_desktop_mini_firmware:02.05.02:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_805_g8_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_805_g8_small_form_factor_firmware:02.05.02:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_805_g8_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_880_g3_tower_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_880_g3_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_880_g4_tower_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_880_g4_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_880_g5_tower_firmware:02.15.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_880_g5_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_880_g6_tower_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_880_g6_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:elitedesk_880_g8_tower_firmware:02.09.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:elitedesk_880_g8_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_1000_g1_23.8-in_all-in-one_business_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_1000_g1_23.8-in_all-in-one_business:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_1000_g1_23.8-in_touch_all-in-one_business_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_1000_g1_23.8-in_touch_all-in-one_business:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_1000_g1_27-in_4k_uhd_all-in-one_business_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_1000_g1_27-in_4k_uhd_all-in-one_business:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_1000_g1_34-in_curved_all-in-one_business_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_1000_g1_34-in_curved_all-in-one_business:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_1000_g2_23.8-in_all-in-one_business_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_1000_g2_23.8-in_all-in-one_business:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_1000_g2_23.8-in_touch_all-in-one_business_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_1000_g2_23.8-in_touch_all-in-one_business:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_1000_g2_27-in_4k_uhd_all-in-one_business_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_1000_g2_27-in_4k_uhd_all-in-one_business:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_1000_g2_34-in_curved_all-in-one_business_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_1000_g2_34-in_curved_all-in-one_business:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g2_23-inch_non-touch_all-in-one_firmware:2.59:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g2_23-inch_non-touch_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g2_23-inch_touch_all-in-one_firmware:2.59:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g2_23-inch_touch_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g3_23.8_non-touch_all-in-one_business_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g3_23.8_non-touch_all-in-one_business:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g3_23.8-inch_non-touch_all-in-one_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g3_23.8-inch_non-touch_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g3_23.8-inch_non-touch_gpu_all-in-one_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g3_23.8-inch_non-touch_gpu_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g3_23.8-inch_touch_all-in-one_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g3_23.8-inch_touch_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g3_23.8-inch_touch_gpu_all-in-one_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g3_23.8-inch_touch_gpu_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g4_23.8-in_all-in-one_business_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g4_23.8-in_all-in-one_business:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_non-touch_all-in-one_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_non-touch_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_non-touch_gpu_all-in-one_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_non-touch_gpu_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_touch_all-in-one_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_touch_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_touch_gpu_all-in-one_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_touch_gpu_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g5_23.8-in_all-in-one_firmware:02.15.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g5_23.8-in_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g5_23.8-inch_all-in-one_firmware:02.15.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g5_23.8-inch_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g6_24_all-in-one_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g6_24_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g6_27_all-in-one_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g6_27_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g8_24_all-in-one_firmware:02.09.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g8_24_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_800_g8_27_all-in-one_firmware:02.09.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_800_g8_27_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:eliteone_840_23.8_inch_g9_all-in-one_firmware:02.06.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:eliteone_840_23.8_inch_g9_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:pro_mini_400_g9_firmware:02.05.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:pro_mini_400_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:pro_sff_400_g9_firmware:02.05.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:pro_sff_400_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:pro_tower_400_g9_firmware:02.05.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:pro_tower_400_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:pro_tower_480_g9_firmware:02.05.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:pro_tower_480_g9:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g3_desktop_mini_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g3_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g4_desktop_mini_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g4_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g4_microtower_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g4_microtower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g4_small_form_factor_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g4_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g5_desktop_mini_firmware:02.15.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g5_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g5_microtower_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g5_microtower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g5_small_form_factor_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g5_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g6_desktop_mini_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g6_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g6_microtower_firmware:02.15.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g6_microtower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g6_small_form_factor_firmware:02.15.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g6_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g7_microtower_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g7_microtower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_400_g7_small_form_factor_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_400_g7_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_405_g4_desktop_mini_firmware:02.20.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_405_g4_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_405_g4_small_form_factor_firmware:02.20.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_405_g4_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_405_g6_desktop_mini_firmware:02.09.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_405_g6_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_405_g6_small_form_factor_firmware:02.09.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_405_g6_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_405_g8_desktop_mini_firmware:02.05.02:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_405_g8_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_405_g8_small_form_factor_firmware:02.05.02:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_405_g8_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_480_g4_microtower_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_480_g4_microtower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_480_g5_microtower_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_480_g5_microtower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_480_g6_microtower_firmware:02.15.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_480_g6_microtower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_480_g7_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_480_g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g2_desktop_mini_firmware:2.59:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g2_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g2_microtower_firmware:2.59:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g2_microtower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g2_small_form_factor_firmware:2.59:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g2_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g3_desktop_mini_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g3_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g3_microtower_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g3_microtower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g3_small_form_factor_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g3_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g4_desktop_mini_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g4_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g4_microtower_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g4_microtower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g4_small_form_factor_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g4_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g5_desktop_mini_firmware:02.15.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g5_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g5_microtower_firmware:02.15.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g5_microtower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g5_small_form_factor_firmware:02.15.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g5_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g6_desktop_mini_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g6_desktop_mini:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g6_microtower_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g6_microtower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g6_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_600_g6_small_form_factor_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_600_g6_small_form_factor:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_680_g2_microtower_firmware:2.59:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_680_g2_microtower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_680_g3_microtower_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_680_g3_microtower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_680_g4_microtower_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_680_g4_microtower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:prodesk_680_g6_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:prodesk_680_g6:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_400_g2_20-inch_non-touch_all-in-one_firmware:2.59:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_400_g2_20-inch_non-touch_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_400_g2_20-inch_touch_all-in-one_firmware:2.59:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_400_g2_20-inch_touch_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_400_g3_20-inch_non-touch_all-in-one_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_400_g3_20-inch_non-touch_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_400_g3_20-inch_touch_all-in-one_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_400_g3_20-inch_touch_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_400_g4_20-inch_non-touch_all-in-one_business_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_400_g4_20-inch_non-touch_all-in-one_business:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_400_g4_23.8-inch_non-touch_all-in-one_business_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_400_g4_23.8-inch_non-touch_all-in-one_business:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_400_g5_20-inch_all-in-one_business_firmware:02.15.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_400_g5_20-inch_all-in-one_business:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_400_g5_23.8-inch_all-in-one_business_firmware:02.15.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_400_g5_23.8-inch_all-in-one_business:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_400_g6_20_all-in-one_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_400_g6_20_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_400_g6_24_all-in-one_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_400_g6_24_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_440_23.8_inch_g9_all-in-one_firmware:02.05.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_440_23.8_inch_g9_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_440_g4_23.8-inch_non-touch_all-in-one_business_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_440_g4_23.8-inch_non-touch_all-in-one_business:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_440_g5_23.8-in_all-in-one_business_firmware:02.15.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_440_g5_23.8-in_all-in-one_business:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_440_g6_24_all-in-one_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_440_g6_24_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_480_g3_20-inch_non-touch_all-in_one_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_480_g3_20-inch_non-touch_all-in_one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_600_g2_21.5-inch_non-touch_all-in-one_firmware:2.59:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_600_g2_21.5-inch_non-touch_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_600_g2_21.5-inch_touch_all-in-one_firmware:2.59:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_600_g2_21.5-inch_touch_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_600_g3_21.5-inch_non-touch_all-in-one_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_600_g3_21.5-inch_non-touch_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_600_g4_21.5-inch_touch_all-in-one_business_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_600_g4_21.5-inch_touch_all-in-one_business:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_600_g5_21.5-in_all-in-one_business_firmware:02.15.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_600_g5_21.5-in_all-in-one_business:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:proone_600_g6_22_all-in-one_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:proone_600_g6_22_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z1_g8_tower_firmware:02.09.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z1_g8_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z1_g9_tower_firmware:02.05.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z1_g9_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_g3_22_all-in-one_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_g3_22_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:zhan_66_pro_g3_24_all-in-one_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:zhan_66_pro_g3_24_all-in-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:engage_flex_mini_retail_system_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:engage_flex_mini_retail_system:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:engage_flex_pro_retail_system_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:engage_flex_pro_retail_system:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:engage_flex_pro-c_retail_system_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:engage_flex_pro-c_retail_system:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:engage_go_10_mobile_system_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:engage_go_10_mobile_system:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:engage_go_mobile_system_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:engage_go_mobile_system:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:engage_one_aio_system_firmware:2.44:*:*:*:*:*:*:*", "cpe:2.3:h:hp:engage_one_aio_system:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:engage_one_pro_aio_system_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:engage_one_pro_aio_system:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:mp9_g2_retail_system_firmware:2.59:*:*:*:*:*:*:*", "cpe:2.3:h:hp:mp9_g2_retail_system:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:mp9_g4_retail_system_firmware:02.21.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:mp9_g4_retail_system:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:rp9_g1_retail_system_firmware:2.59:*:*:*:*:*:*:*", "cpe:2.3:h:hp:rp9_g1_retail_system:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z1_entry_tower_g5_workstation_firmware:02.15.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z1_entry_tower_g5_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z1_entry_tower_g6_workstation_firmware:02.12.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z1_entry_tower_g6_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z2_mini_g4_workstation_firmware:01.08.03:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z2_mini_g4_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z2_mini_g5_workstation_firmware:01.04.07:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z2_mini_g5_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z2_small_form_factor_g4_workstation_firmware:01.08.03:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z2_small_form_factor_g4_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z2_small_form_factor_g5_workstation_firmware:01.04.07:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z2_small_form_factor_g5_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z2_small_form_factor_g8_workstation_firmware:01.06.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z2_small_form_factor_g8_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z2_tower_g4_workstation_firmware:01.08.03:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z2_tower_g4_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z2_tower_g5_workstation_firmware:01.04.07:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z2_tower_g5_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:z2_tower_g8_workstation_firmware:01.06.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:z2_tower_g8_workstation:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:mt44_mobile_thin_client_firmware:01.21.01:*:*:*:*:*:*:*", "cpe:2.3:h:hp:mt44_mobile_thin_client:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:mt45_mobile_thin_client_firmware:01.21.10:*:*:*:*:*:*:*", "cpe:2.3:h:hp:mt45_mobile_thin_client:-:*:*:*:*:*:*:*", "cpe:2.3:o:hp:mt46_mobile_thin_client_firmware:01.10.00:*:*:*:*:*:*:*", "cpe:2.3:h:hp:mt46_mobile_thin_client:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
CVE-2012-4416
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Hotspot.
[ "cpe:2.3:a:oracle:jdk:*:update7:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:*:update7:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:*:update35:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update33:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update34:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:*:update35:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update33:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update34:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0.200:update20:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:1.6.0.210:update21:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*" ]
null
null
null
6.4
null
GHSA-wmv2-95fh-hx2w
Trend Micro OfficeScan 11.0 before SP1 CP 6325 (with Agent Module Build before 6152) and XG before CP 1352 has XSS via a crafted URI using a blocked website.
[]
null
null
6.1
null
null
CVE-2012-1053
The change_user method in the SUIDManager (lib/puppet/util/suidmanager.rb) in Puppet 2.6.x before 2.6.14 and 2.7.x before 2.7.11, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x before 2.0.3 does not properly manage group privileges, which allows local users to gain privileges via vectors related to (1) the change_user not dropping supplementary groups in certain conditions, (2) changes to the eguid without associated changes to the egid, or (3) the addition of the real gid to supplementary groups.
[ "cpe:2.3:a:puppet:puppet:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.6.7:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.6.8:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.6.9:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.6.10:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.6.11:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.6.12:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.6.13:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.7.6:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.7.7:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.7.8:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.7.9:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet:2.7.10:*:*:*:*:*:*:*", "cpe:2.3:a:puppetlabs:puppet:2.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:puppetlabs:puppet:2.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:1.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:puppetlabs:puppet_enterprise_users:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:puppetlabs:puppet_enterprise_users:1.1:*:*:*:*:*:*:*" ]
null
null
null
6.9
null
GHSA-hwrx-wc75-mgh7
Spree allows remote attackers to obtain sensitive information
Spree 0.11.x before 0.11.2 and 0.30.x before 0.30.0 exchanges data using JavaScript Object Notation (JSON) without a mechanism for validating requests, which allows remote attackers to obtain sensitive information via vectors involving (1) `admin/products.json`, (2) `admin/users.json`, or (3) `admin/overview/get_report_data`, related to a "JSON hijacking" issue.
[]
null
null
null
null
null
GHSA-w5v3-f8xv-j94c
Autodesk 3D Studio Max (3DSMax) 6 through 9 and 2008 through 2010 allows remote attackers to execute arbitrary code via a .max file with a MAXScript statement that calls the DOSCommand method, related to "application callbacks."
[]
null
null
null
null
null
CVE-2024-6578
Stored XSS in aimhubio/aim
A stored cross-site scripting (XSS) vulnerability exists in aimhubio/aim version 3.19.3. The vulnerability arises from the improper neutralization of input during web page generation, specifically in the logs-tab for runs. The terminal output logs are displayed using the `dangerouslySetInnerHTML` function in React, which is susceptible to XSS attacks. An attacker can exploit this vulnerability by injecting malicious scripts into the logs, which will be executed when a user views the logs-tab.
[ "cpe:2.3:a:aimhubio:aim:3.19.3:*:*:*:*:*:*:*", "cpe:2.3:a:aimstack:aim:3.19.3:*:*:*:*:*:*:*" ]
null
null
7.2
null
null
GHSA-xw33-f5cf-9cw7
Microsoft Host Integration Server (HIS) 2000, 2004, and 2006 does not limit RPC access to administrative functions, which allows remote attackers to bypass authentication and execute arbitrary programs via a crafted SNA RPC message using opcode 1 or 6 to call the CreateProcess function, aka "HIS Command Execution Vulnerability."
[]
null
null
null
null
null