id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-9vr6-xwj8-46f6
|
Unspecified vulnerability in the RDBMS Security component in Oracle Database Server 11.2.0.4 and 12.1.0.2 allows local users to affect confidentiality via unknown vectors, a different vulnerability than CVE-2016-5498.
|
[] | null | null | 3.3 | null | null |
|
CVE-2024-31144
|
Xapi: Metadata injection attack against backup/restore functionality
|
For a brief summary of Xapi terminology, see:
https://xapi-project.github.io/xen-api/overview.html#object-model-overview
Xapi contains functionality to backup and restore metadata about Virtual
Machines and Storage Repositories (SRs).
The metadata itself is stored in a Virtual Disk Image (VDI) inside an
SR. This is used for two purposes; a general backup of metadata
(e.g. to recover from a host failure if the filer is still good), and
Portable SRs (e.g. using an external hard drive to move VMs to another
host).
Metadata is only restored as an explicit administrator action, but
occurs in cases where the host has no information about the SR, and must
locate the metadata VDI in order to retrieve the metadata.
The metadata VDI is located by searching (in UUID alphanumeric order)
each VDI, mounting it, and seeing if there is a suitable metadata file
present. The first matching VDI is deemed to be the metadata VDI, and
is restored from.
In the general case, the content of VDIs are controlled by the VM owner,
and should not be trusted by the host administrator.
A malicious guest can manipulate its disk to appear to be a metadata
backup.
A guest cannot choose the UUIDs of its VDIs, but a guest with one disk
has a 50% chance of sorting ahead of the legitimate metadata backup. A
guest with two disks has a 75% chance, etc.
|
[] | null | 3.8 | null | null | null |
RHSA-2017:0530
|
Red Hat Security Advisory: rabbitmq-server security and bug fix update
|
rabbitmq-server: DoS via lengths_age or lengths_incr parameter in the management plugin
|
[
"cpe:/a:redhat:openstack:7::el7"
] | null | null | 6.5 | null | null |
CVE-2022-50015
|
ASoC: SOF: Intel: hda-ipc: Do not process IPC reply before firmware boot
|
In the Linux kernel, the following vulnerability has been resolved:
ASoC: SOF: Intel: hda-ipc: Do not process IPC reply before firmware boot
It is not yet clear, but it is possible to create a firmware so broken
that it will send a reply message before a FW_READY message (it is not
yet clear if FW_READY will arrive later).
Since the reply_data is allocated only after the FW_READY message, this
will lead to a NULL pointer dereference if not filtered out.
The issue was reported with IPC4 firmware but the same condition is present
for IPC3.
|
[] | null | null | null | null | null |
GHSA-mjxw-wvmv-64gf
|
The Data access layer component of TIBCO Software Inc.'s TIBCO Spotfire Analytics Platform for AWS Marketplace and TIBCO Spotfire Server contains multiple vulnerabilities that theoretically allow an attacker access to data cached from a data source, or a portion of a data source, that the attacker should not have access to. The attacker would need privileges to save a Spotfire file to the library. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Analytics Platform for AWS Marketplace: version 10.6.0 and TIBCO Spotfire Server: versions 7.11.7 and below, versions 7.12.0, 7.13.0, 7.14.0, 10.0.0, 10.0.1, 10.1.0, 10.2.0, 10.2.1, 10.3.0, 10.3.1, 10.3.2, 10.3.3, and 10.3.4, versions 10.4.0, 10.5.0, and 10.6.0.
|
[] | null | null | null | null | null |
|
CVE-2022-3154
|
Multiple Plugins from Viszt Peter - Multiple CSRF
|
The Woo Billingo Plus WordPress plugin before 4.4.5.4, Integration for Billingo & Gravity Forms WordPress plugin before 1.0.4, Integration for Szamlazz.hu & Gravity Forms WordPress plugin before 1.2.7 are lacking CSRF checks in various AJAX actions, which could allow attackers to make logged in Shop Managers and above perform unwanted actions, such as deactivate the plugin's license
|
[
"cpe:2.3:a:woo_billingo_plus_project:woo_billingo_plus:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:integration_for_billingo_\\&_gravity_forms_project:integration_for_billingo_\\&_gravity_forms:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:integration_for_szamlazz.hu_\\&_gravity_forms_project:integration_for_szamlazz.hu_\\&_gravity_forms:*:*:*:*:*:wordpress:*:*"
] | null | 7.1 | null | null | null |
CVE-2015-1129
|
Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5 does not properly select X.509 client certificates, which makes it easier for remote attackers to track users via a crafted web site.
|
[
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:8.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:8.0.4:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2020-2936
|
Vulnerability in the Oracle Financial Services Balance Sheet Planning product of Oracle Financial Services Applications (component: User Interface). The supported version that is affected is 8.0.8. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Financial Services Balance Sheet Planning. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Financial Services Balance Sheet Planning accessible data as well as unauthorized read access to a subset of Oracle Financial Services Balance Sheet Planning accessible data. CVSS 3.0 Base Score 7.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N).
|
[
"cpe:2.3:a:oracle:financial_services_balance_sheet_planning:8.0.8:*:*:*:*:*:*:*"
] | null | null | 7.1 | null | null |
|
CVE-2020-12081
|
An information disclosure vulnerability has been identified in FlexNet Publisher lmadmin.exe 11.14.0.2. The web portal link can be used to access to system files or other important files on the system.
|
[
"cpe:2.3:a:flexera:flexnet_publisher:11.14.0.2:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
GHSA-533v-gm9h-955p
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Alexander Conroy Simpul Events by Esotech allows Stored XSS.This issue affects Simpul Events by Esotech: from n/a through 1.8.5.
|
[] | null | 6.5 | null | null | null |
|
CVE-2019-20567
|
An issue was discovered on Samsung mobile devices with N(7.x), O(8.x), and P(9.0) (Exynos chipsets) software. A up_parm heap overflow leads to code execution in the bootloader. The Samsung ID is SVE-2019-14993 (September 2019).
|
[
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 | null |
|
CVE-2024-39442
|
In sprd ssense service, there is a possible missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
|
[] | null | 6.2 | null | null | null |
|
CVE-2000-0145
|
The libguile.so library file used by gnucash in Debian GNU/Linux is installed with world-writable permissions.
|
[
"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2006-0551
|
SQL injection vulnerability in the Data Pump Metadata API in Oracle Database 10g and possibly earlier might allow remote attackers to execute arbitrary SQL commands via unknown vectors. NOTE: due to the lack of relevant details from the Oracle advisory, a separate CVE is being created since it cannot be conclusively proven that this issue has been addressed by Oracle. It is possible that this is the same issue as Oracle Vuln# DB06 from the January 2006 CPU, in which case this would be subsumed by CVE-2006-0259 or, if it is DB05, subsumed by CVE-2006-0260.
|
[
"cpe:2.3:a:oracle:database_server:10.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:10.1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:10.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:10.2.0.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2021-47373
|
irqchip/gic-v3-its: Fix potential VPE leak on error
|
In the Linux kernel, the following vulnerability has been resolved:
irqchip/gic-v3-its: Fix potential VPE leak on error
In its_vpe_irq_domain_alloc, when its_vpe_init() returns an error,
there is an off-by-one in the number of VPEs to be freed.
Fix it by simply passing the number of VPEs allocated, which is the
index of the loop iterating over the VPEs.
[maz: fixed commit message]
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
GHSA-239m-chp6-538f
|
An open redirect vulnerability exists in the Access Manager Identity Provider prior to 4.4 SP3.
|
[] | null | null | 6.1 | null | null |
|
CVE-2019-20774
|
An issue was discovered on LG mobile devices with Android OS 7.0, 7.1, 7.2, 8.0, 8.1, and 9.0 software. A system service allows local retrieval of the user's password. The LG ID is LVE-SMP-190009 (August 2019).
|
[
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 | null |
|
GHSA-p6wm-338f-gmjm
|
The Starbox WordPress plugin before 3.5.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
|
[] | null | 4.8 | null | null | null |
|
GHSA-q366-x2fq-6rxw
|
An elevation of privilege vulnerability exists when Windows improperly handles objects in memory and incorrectly maps kernel memory, aka "Microsoft DirectX Graphics Kernel Subsystem Elevation of Privilege Vulnerability." This affects Windows Server 2012 R2, Windows RT 8.1, Windows Server 2012, Windows Server 2016, Windows 8.1, Windows 10, Windows 10 Servers.
|
[] | null | null | 7.8 | null | null |
|
GHSA-g9jw-3v2m-h989
|
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
|
[] | null | null | 9.8 | null | null |
|
CVE-2023-36713
|
Windows Common Log File System Driver Information Disclosure Vulnerability
|
Windows Common Log File System Driver Information Disclosure Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp2:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp2:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
cisco-sa-sb-hardcoded-cred-MJCEXvX
|
Cisco Business 220 Series Smart Switches Static Key and Password Vulnerabilities
|
Multiple vulnerabilities in Cisco Business 220 Series Smart Switches firmware could allow an attacker with Administrator privileges to access sensitive login credentials or reconfigure the passwords on the user account.
For more information about these vulnerabilities, see the Details ["#details"] section of this advisory.
Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
|
[] | null | 5.5 | null | null | null |
GHSA-f3wc-386p-mwc3
|
In the Linux kernel, the following vulnerability has been resolved:jfs: fix out-of-bounds in dbNextAG() and diAlloc()In dbNextAG() , there is no check for the case where bmp->db_numag is
greater or same than MAXAG due to a polluted image, which causes an
out-of-bounds. Therefore, a bounds check should be added in dbMount().And in dbNextAG(), a check for the case where agpref is greater than
bmp->db_numag should be added, so an out-of-bounds exception should be
prevented.Additionally, a check for the case where agno is greater or same than
MAXAG should be added in diAlloc() to prevent out-of-bounds.
|
[] | null | 7.1 | null | null | null |
|
CVE-2006-3385
|
Cross-site scripting (XSS) vulnerability in divers.php in Vincent Leclercq News 5.2 allows remote attackers to inject arbitrary web script or HTML via the (1) id and (2) disabled parameters.
|
[
"cpe:2.3:a:vincent_leclercq:news:5.2:*:*:*:*:*:*:*"
] | null | null | null | 5.8 | null |
|
CVE-2022-4478
|
Font Awesome < 4.3.2 - Contributor+ Stored XSS
|
The Font Awesome WordPress plugin before 4.3.2 does not validate and escapes some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as a contributor to perform Stored Cross-Site Scripting attacks against logged-in admins.
|
[
"cpe:2.3:a:fontawesome:font_awesome:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null | null |
CVE-2024-57255
|
An integer overflow in sqfs_resolve_symlink in Das U-Boot before 2025.01-rc1 occurs via a crafted squashfs filesystem with an inode size of 0xffffffff, resulting in a malloc of zero and resultant memory overwrite.
|
[] | null | 7.1 | null | null | null |
|
GHSA-7pq2-85jv-r5mw
|
A stored cross-site scripting (XSS) vulnerability in the cms/content/edit component of YZNCMS v1.3.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the title parameter.
|
[] | null | 6.1 | null | null | null |
|
GHSA-93gj-m35w-q9v5
|
Improper Access Control in Samsung Voice Recorder prior to versions 21.4.15.01 in Android 12 and Android 13, 21.4.50.17 in Android 14 allows physical attackers to access Voice Recorder information on the lock screen.
|
[] | null | 6.8 | null | null | null |
|
CVE-2023-22038
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N).
|
[
"cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
] | null | 2.7 | null | null | null |
|
CVE-2021-32975
|
Cscape (All Versions prior to 9.90 SP5) lacks proper validation of user-supplied data when parsing project files. This could lead to an out-of-bounds read. An attacker could leverage this vulnerability to execute code in the context of the current process.
|
[
"cpe:2.3:a:hornerautomation:cscape:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hornerautomation:cscape:9.90:-:*:*:*:*:*:*",
"cpe:2.3:a:hornerautomation:cscape:9.90:sp1:*:*:*:*:*:*",
"cpe:2.3:a:hornerautomation:cscape:9.90:sp2:*:*:*:*:*:*",
"cpe:2.3:a:hornerautomation:cscape:9.90:sp3:*:*:*:*:*:*",
"cpe:2.3:a:hornerautomation:cscape:9.90:sp4:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 | null |
|
GHSA-h89w-c652-v4r6
|
A security feature bypass vulnerability exists when Windows Subsystem for Linux improperly handles case sensitivity, aka "Windows Subsystem for Linux Security Feature Bypass Vulnerability." This affects Windows 10, Windows 10 Servers.
|
[] | null | null | 5.3 | null | null |
|
GHSA-phrv-w9px-24x9
|
A command injection vulnerability in the Command Dispatcher Service of NASA Fprime v3.4.3 allows attackers to execute arbitrary commands.
|
[] | null | 9.8 | null | null | null |
|
CVE-2004-0875
|
Multiple cross-site scripting (XSS) vulnerabilities in Phpgroupware (aka webdistro) 0.9.16.002 and earlier allow remote attackers to insert arbitrary HTML or web script, as demonstrated with a request to the wiki module.
|
[
"cpe:2.3:a:phpgroupware:phpgroupware:0.9.12:*:*:*:*:*:*:*",
"cpe:2.3:a:phpgroupware:phpgroupware:0.9.13:*:*:*:*:*:*:*",
"cpe:2.3:a:phpgroupware:phpgroupware:0.9.14.003:*:*:*:*:*:*:*",
"cpe:2.3:a:phpgroupware:phpgroupware:0.9.14.005:*:*:*:*:*:*:*",
"cpe:2.3:a:phpgroupware:phpgroupware:0.9.14.006:*:*:*:*:*:*:*",
"cpe:2.3:a:phpgroupware:phpgroupware:0.9.14.007:*:*:*:*:*:*:*",
"cpe:2.3:a:phpgroupware:phpgroupware:0.9.16.000:*:*:*:*:*:*:*",
"cpe:2.3:a:phpgroupware:phpgroupware:0.9.16.002:*:*:*:*:*:*:*",
"cpe:2.3:a:phpgroupware:phpgroupware:0.9.16_rc1:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
RHSA-2021:0428
|
Red Hat Security Advisory: OpenShift Container Platform 4.5.33 bug fix and security update
|
openshift/builder: privilege escalation during container image builds via mounted secrets
|
[
"cpe:/a:redhat:openshift:4.5::el7",
"cpe:/a:redhat:openshift:4.5::el8"
] | null | 8.8 | null | null | null |
CVE-2019-7163
|
The web interface of Alcatel LINKZONE MW40-V-V1.0 MW40_LU_02.00_02 devices is vulnerable to an authentication bypass that allows an unauthenticated user to have access to the web interface without knowing the administrator's password.
|
[
"cpe:2.3:o:tcl:alcatel_linkzone_firmware:mw40-v-v1.0_mw40_lu_02.00_02:*:*:*:*:*:*:*",
"cpe:2.3:h:tcl:alcatel_linkzone:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 | null |
|
CVE-2016-4340
|
The impersonate feature in Gitlab 8.7.0, 8.6.0 through 8.6.7, 8.5.0 through 8.5.11, 8.4.0 through 8.4.9, 8.3.0 through 8.3.8, and 8.2.0 through 8.2.4 allows remote authenticated users to "log in" as any other user via unspecified vectors.
|
[
"cpe:2.3:a:gitlab:gitlab:8.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:gitlab:gitlab:8.7.0:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.5 | null |
|
CVE-2006-1546
|
Apache Software Foundation (ASF) Struts before 1.2.9 allows remote attackers to bypass validation via a request with a 'org.apache.struts.taglib.html.Constants.CANCEL' parameter, which causes the action to be canceled but would not be detected from applications that do not use the isCancelled check.
|
[
"cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-pmjr-jg67-xfgh
|
Unspecified vulnerability in HP Insight Software Installer for Windows before 6.1 allows local users to read or modify data via unknown vectors.
|
[] | null | null | null | null | null |
|
GHSA-p349-27r5-4p76
|
Sourcecodester Online ID Generator System 1.0 was discovered to contain an arbitrary file upload vulnerability via id_generator/classes/Users.php?f=save. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.
|
[] | null | 5.1 | null | null | null |
|
CVE-2016-10427
|
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile and Snapdragon Wear MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, SD 835, SD 845, SD 850, and SDX20, improper boundary check in RLC AM module leads to denial of service by reaching assertion.
|
[
"cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9615_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9635m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9635m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9645_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9645:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9655_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9655:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_412_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_412:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_616_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_616:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_415:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_617_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_617:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_808_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_808:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.8 | null |
|
CVE-2014-0948
|
Unspecified vulnerability in IBM Rational Software Architect Design Manager and Rational Rhapsody Design Manager 3.x and 4.x before 4.0.7 allows remote authenticated users to execute arbitrary code via a crafted ZIP archive.
|
[
"cpe:2.3:a:ibm:rhapsody_design_manager:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rhapsody_design_manager:3.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rhapsody_design_manager:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rhapsody_design_manager:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rhapsody_design_manager:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rhapsody_design_manager:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rhapsody_design_manager:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rhapsody_design_manager:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rhapsody_design_manager:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rhapsody_design_manager:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_design_manager:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_design_manager:3.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_design_manager:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_design_manager:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_design_manager:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_design_manager:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_design_manager:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_design_manager:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_design_manager:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_software_architect_design_manager:4.0.6:*:*:*:*:*:*:*"
] | null | null | null | 6 | null |
|
CVE-2024-9782
|
D-Link DIR-619L B1 formEasySetupWWConfig buffer overflow
|
A vulnerability was found in D-Link DIR-619L B1 2.06. It has been declared as critical. This vulnerability affects the function formEasySetupWWConfig of the file /goform/formEasySetupWWConfig. The manipulation of the argument curTime leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[
"cpe:2.3:h:d-link:dir-619l_b1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-619l_firmware:2.06:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-619l:b1:*:*:*:*:*:*:*"
] | 8.7 | 8.8 | 8.8 | 9 | null |
RHSA-2001:084
|
Red Hat Security Advisory: Kernel
|
security flaw
|
[
"cpe:/o:redhat:linux:7.1"
] | null | null | null | null | null |
GHSA-xmjh-q998-8xf2
|
Cross Site Scripting (XSS) vulnerability exists in SeaCMS 12.6 via the (1) v_company and (2) v_tvs parameters in /admin_video.php,
|
[] | null | null | null | null | null |
|
CVE-2021-1560
|
Cisco DNA Spaces Connector Command Injection Vulnerabilities
|
Multiple vulnerabilities in Cisco DNA Spaces Connector could allow an authenticated, remote attacker to perform a command injection attack on an affected device. These vulnerabilities are due to insufficient input sanitization when executing affected commands. A high-privileged attacker could exploit these vulnerabilities on a Cisco DNA Spaces Connector by injecting crafted input during command execution. A successful exploit could allow the attacker to execute arbitrary commands as root within the Connector docker container.
|
[
"cpe:2.3:a:cisco:dna_spaces\\:_connector:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
RHSA-2023:1199
|
Red Hat Security Advisory: openssl security and bug fix update
|
openssl: read buffer overflow in X.509 certificate verification openssl: timing attack in RSA Decryption implementation openssl: double free after calling PEM_read_bio_ex openssl: use-after-free following BIO_new_NDEF openssl: invalid pointer dereference in d2i_PKCS7 functions openssl: NULL dereference validating DSA public key openssl: X.400 address type confusion in X.509 GeneralName openssl: NULL dereference during PKCS7 data verification
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream",
"cpe:/o:redhat:rhel_eus:9.0::baseos"
] | null | 7.5 | null | null | null |
GHSA-w6mh-p599-cxh4
|
Dropbox Lepton v1.2.1-185-g2a08b77 was discovered to contain a heap-buffer-overflow in the function aligned_dealloc():src/lepton/bitops.cc:108.
|
[] | null | 7.8 | null | null | null |
|
GHSA-j8rm-cm55-qqj6
|
.NET Information Disclosure Vulnerability
|
Microsoft Security Advisory CVE-2023-35391: .NET Information Disclosure Vulnerability<a name="executive-summary"></a>Executive summaryMicrosoft is releasing this security advisory to provide information about a vulnerability in ASP.NET core 2.1, .NET 6.0 and, .NET 7.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.A vulnerability exists in ASP.NET Core 2.1, .NET 6.0 and, .NET 7.0 applications using SignalR when redis backplane use might result in information disclosure.AnnouncementAnnouncement for this issue can be found at https://github.com/dotnet/announcements/issues/267<a name="mitigation-factors"></a>Mitigation factorsMicrosoft has not identified any mitigating factors for this vulnerability.<a name="affected-software"></a>Affected softwareAny .NET 7.0 application running on .NET 7.0.9 or earlier.Any .NET 6.0 application running on .NET 6.0.20 or earlier.If your application uses the following package versions, ensure you update to the latest version of .NET.<a name=".NET 7"></a>.NET 7Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[Microsoft.AspNetCore.SignalR.StackExchangeRedis](https://www.nuget.org/packages/Microsoft.AspNetCore.SignalR.StackExchangeRedis) | >= 7.0.0, <= 7.0.9 | 7.0.10<a name=".NET 6"></a>.NET 6Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[Microsoft.AspNetCore.SignalR.StackExchangeRedis](https://www.nuget.org/packages/Microsoft.AspNetCore.SignalR.StackExchangeRedis) | >= 6.0.0, <= 6.0.20 | 6.0.21<a name="ASP.NET Core 2.1"></a>ASP.NET Core 2.1Package name | Affected version | Patched version
------------ | ---------------- | -------------------------
[Microsoft.AspNetCore.SignalR.Redis](https://www.nuget.org/packages/Microsoft.AspNetCore.SignalR.Redis) | < 1.0.40 | 1.0.40Advisory FAQ<a name="how-affected"></a>How do I know if I am affected?If you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-software), you're exposed to the vulnerability.<a name="how-fix"></a>How do I fix the issue?To fix the issue please install the latest version of .NET 6.0 or .NET 7.0. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs.If you are using one of the affected packages, please update to the patched version listed above.If you have .NET 6.0 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following;If you're using .NET 7.0, you should download and install Runtime 7.0.10 or SDK 7.0.110 (for Visual Studio 2022 v17.4) from https://dotnet.microsoft.com/download/dotnet-core/7.0.If you're using .NET 6.0, you should download and install Runtime 6.0.21 or SDK 6.0.316 (for Visual Studio 2022 v17.2) from https://dotnet.microsoft.com/download/dotnet-core/6.0..NET 6.0 and and .NET 7.0 updates are also available from Microsoft Update. To access this either type "Check for updates" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates.Once you have installed the updated runtime or SDK, restart your apps for the update to take effect.Additionally, if you've deployed [self-contained applications](https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd) targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed.Other InformationReporting Security IssuesIf you have found a potential security issue in .NET 6.0 or .NET 7.0, please email details to [email protected]. Reports may qualify for the Microsoft .NET Core & .NET 5 Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at <https://aka.ms/corebounty>.SupportYou can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime and https://github.com/dotnet/aspnet/. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue.DisclaimerThe information provided in this advisory is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.External Links[CVE-2023-35391]( https://www.cve.org/CVERecord?id=CVE-2023-35391)RevisionsV1.0 (August 08, 2023): Advisory published._Version 1.0__Last Updated 2023-08-08_
|
[] | null | 7.1 | null | null | null |
CVE-2016-0757
|
OpenStack Image Service (Glance) before 2015.1.3 (kilo) and 11.0.x before 11.0.2 (liberty), when show_multiple_locations is enabled, allow remote authenticated users to change image status and upload new image data by removing the last location of an image.
|
[
"cpe:2.3:a:openstack:image_registry_and_delivery_service_\\(glance\\):11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openstack:image_registry_and_delivery_service_\\(glance\\):11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openstack:image_registry_and_delivery_service_\\(glance\\):2015.1.2:*:*:*:*:*:*:*"
] | null | null | 4.3 | 4 | null |
|
CVE-2015-1344
|
The do_write_pids function in lxcfs.c in LXCFS before 0.12 does not properly check permissions, which allows local users to gain privileges by writing a pid to the tasks file.
|
[
"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
"cpe:2.3:a:canonical:lxcfs:*:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
GHSA-jfx8-97fx-6vfq
|
Untrusted pointer dereference in Windows Subsystem for Linux allows an unauthorized attacker to execute code locally.
|
[] | null | 8.4 | null | null | null |
|
CVE-2017-15241
|
IrfanView version 4.44 (32bit) with PDF plugin version 4.43 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .pdf file, related to "Data from Faulting Address controls Branch Selection starting at PDF!xmlParserInputRead+0x00000000000929f5."
|
[
"cpe:2.3:a:irfanview:irfanview:4.44:*:*:*:*:*:x86:*",
"cpe:2.3:a:irfanview:pdf:4.43:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 | null |
|
CVE-2023-37951
|
Jenkins mabl Plugin 0.0.46 and earlier does not set the appropriate context for credentials lookup, allowing attackers with Item/Configure permission to access and capture credentials they are not entitled to.
|
[
"cpe:2.3:a:jenkins:mabl:*:*:*:*:*:jenkins:*:*"
] | null | 6.5 | null | null | null |
|
RHSA-2021:4848
|
Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.5.2 security update and bugfix advisory
|
nodejs-immer: prototype pollution may lead to DoS or remote code execution mig-controller: incorrect namespaces handling may lead to not authorized usage of Migration Toolkit for Containers (MTC)
|
[
"cpe:/a:redhat:rhmt:1.5::el7",
"cpe:/a:redhat:rhmt:1.5::el8"
] | null | 6.3 | null | null | null |
GHSA-p43w-35fv-3qjj
|
Multiple unspecified vulnerabilities in Ethereal 0.10.x up to 0.10.14 allow remote attackers to cause a denial of service (large or infinite loops) viarafted packets to the (1) UMA and (2) BER dissectors.
|
[] | null | null | null | null | null |
|
CVE-2023-29791
|
kodbox <= 1.37 is vulnerable to Cross Site Scripting (XSS) via the debug information.
|
[
"cpe:2.3:a:kodcloud:kodbox:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
|
cisco-sa-sb-wap-multi-85G83CRB
|
Cisco Small Business 100, 300, and 500 Series Wireless Access Points Command Injection and Buffer Overflow Vulnerabilities
|
Multiple vulnerabilities in the web-based management interface of Cisco Small Business 100, 300, and 500 Series Wireless Access Points (APs) could allow an authenticated, remote attacker to perform command injection and buffer overflow attacks against an affected device. In order to exploit these vulnerabilities, the attacker must have valid administrative credentials for the device.
For more information about these vulnerabilities, see the Details ["#details"] section of this advisory.
There are no workarounds that address these vulnerabilities.
|
[] | null | 6.5 | null | null | null |
GHSA-p723-w3qm-qpvw
|
Inadequate encryption strength in subsystem for Intel(R) CSME versions before 13.0.40 and 13.30.10 may allow an unauthenticated user to potentially enable information disclosure via physical access.
|
[] | null | null | null | null | null |
|
CVE-2014-9597
|
The picture_pool_Delete function in misc/picture_pool.c in VideoLAN VLC media player 2.1.5 allows remote attackers to execute arbitrary code or cause a denial of service (DEP violation and application crash) via a crafted FLV file.
|
[
"cpe:2.3:a:videolan:vlc_media_player:2.1.5:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
RHSA-2019:3187
|
Red Hat Security Advisory: kernel security and bug fix update
|
hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB)
|
[
"cpe:/o:redhat:rhel_aus:7.4::server",
"cpe:/o:redhat:rhel_e4s:7.4::server",
"cpe:/o:redhat:rhel_tus:7.4::server"
] | null | null | 7 | null | null |
RHSA-2025:9308
|
Red Hat Security Advisory: gimp:2.8 security update
|
gimp: GIMP ICO File Parsing Integer Overflow gimp: Multiple heap buffer overflows in TGA parser gimp: Multiple use after free in XCF parser
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream"
] | null | 7.3 | null | null | null |
CVE-2023-2898
|
There is a null-pointer-dereference flaw found in f2fs_write_end_io in fs/f2fs/data.c in the Linux kernel. This flaw allows a local privileged user to cause a denial of service problem.
|
[
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*"
] | null | 4.7 | null | null | null |
|
GHSA-m553-8g9v-hr9v
|
Cross-site scripting (XSS) vulnerability in search.php in Sniggabo CMS 2.21 allows remote attackers to inject arbitrary web script or HTML via the q parameter.
|
[] | null | null | null | null | null |
|
CVE-2025-24319
|
BIG-IP Next Central Manager vulnerability
|
When BIG-IP Next Central Manager is running, undisclosed requests to the BIG-IP Next Central Manager API can cause the BIG-IP Next Central Manager Node's Kubernetes service to terminate.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
|
[] | 7.1 | 6.5 | null | null | null |
GHSA-pmqr-v7cp-5xfx
|
libxslt, as used in Google Chrome before 17.0.963.46, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
|
[] | null | null | null | null | null |
|
CVE-2015-2860
|
Directory traversal vulnerability in Avigilon Control Center (ACC) 4 before 4.12.0.54 and 5 before 5.4.2.22 allows remote attackers to read arbitrary files via a crafted help/ URL.
|
[
"cpe:2.3:a:avigilon:avigilon_control_center:*:*:*:*:*:*:*:*"
] | null | null | null | 7.8 | null |
|
GHSA-f72g-9wmh-q5r7
|
service.cgi in Cobalt RAQ 4 allows remote attackers to cause a denial of service, and possibly execute arbitrary code, via a long service argument.
|
[] | null | null | null | null | null |
|
CVE-2024-57542
|
Linksys E8450 v1.2.00.360516 was discovered to contain a command injection vulnerability via the field id_email_check_btn.
|
[] | null | 8.8 | null | null | null |
|
GHSA-cpq5-hc88-m4rw
|
An issue was discovered in PvPGN Stats 2.4.6. SQL Injection exists in ladder/stats.php via the POST user_search parameter.
|
[] | null | null | 9.8 | null | null |
|
CVE-2005-0701
|
Directory traversal vulnerability in Oracle Database Server 8i and 9i allows remote attackers to read or rename arbitrary files via "\\.\\.." (modified dot dot backslash) sequences to UTL_FILE functions such as (1) UTL_FILE.FOPEN or (2) UTL_FILE.frename.
|
[
"cpe:2.3:a:oracle:database_server:*:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-298h-vfc8-fcfc
|
IBM Common Cryptographic Architecture 7.0.0 through 7.5.51 could allow an authenticated user to cause a denial of service in the Hardware Security Module (HSM) using a specially crafted sequence of valid requests.
|
[] | null | 6.5 | null | null | null |
|
GHSA-g8fx-vvch-2699
|
The PayPal module in Ubercart does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
|
[] | null | null | null | null | null |
|
GHSA-2cj6-g7fv-hq3m
|
A local privilege escalation vulnerability has been identified in the SwitchVPN client 2.1012.03 for macOS. Due to over-permissive configuration settings and a SUID binary, an attacker is able to execute arbitrary binaries as root.
|
[] | null | null | 7.8 | null | null |
|
GHSA-hh23-hp8m-rwv7
|
A vulnerability, which was classified as problematic, has been found in go4rayyan Scumblr up to 2.0.1a. Affected by this issue is some unknown functionality of the component Task Handler. The manipulation leads to cross site scripting. The attack may be launched remotely. Upgrading to version 2.0.2 is able to address this issue. The patch is identified as 5c9120f2362ddb7cbe48f2c4620715adddc4ee35. It is recommended to upgrade the affected component. VDB-251570 is the identifier assigned to this vulnerability.
|
[] | null | 2.4 | null | null | null |
|
CVE-2022-28586
|
XSS in edit page of Hoosk 1.8.0 allows attacker to execute javascript code in user browser via edit page with XSS payload bypass filter some special chars.
|
[
"cpe:2.3:a:hoosk:hoosk:1.8.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
CVE-2025-48303
|
WordPress Post Type Converter plugin <= 0.6 - Cross Site Request Forgery (CSRF) vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in Kevin Langley Jr. Post Type Converter allows Cross-Site Request Forgery.This issue affects Post Type Converter: from n/a through 0.6.
|
[] | null | 4.3 | null | null | null |
GHSA-cr4f-qgfw-47cw
|
The Event Tickets and Registration plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.18.1 via the tc-order-id parameter due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to view order details of orders they did not place, which includes ticket prices, user emails and order date.
|
[] | null | 5.3 | null | null | null |
|
CVE-2025-23091
|
An Improper Certificate Validation on UniFi OS devices, with Identity Enterprise configured, could allow a malicious actor to execute a man-in-the-middle (MitM) attack during application update.
|
[] | null | null | 5.9 | null | null |
|
CVE-2021-36937
|
Windows Media MPEG-4 Video Decoder Remote Code Execution Vulnerability
|
Windows Media MPEG-4 Video Decoder Remote Code Execution Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2114:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2114:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2114:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2114:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1734:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1734:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1734:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1165:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1165:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1165:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1165:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1165:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1165:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1165:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.1165:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19022:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19022:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4583:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4583:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4583:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:6.1.7601.25685:sp1:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_7:6.1.7601.25685:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20094:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20094:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20094:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21192:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21192:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008_r2:6.1.7601.25685:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23435:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012_r2:6.3.9600.20094:*:*:*:*:*:x64:*"
] | null | 7.8 | null | null | null |
CVE-2013-3276
|
EMC RSA Archer GRC 5.x before 5.4 allows remote authenticated users to bypass intended access restrictions and complete a login by leveraging a deactivated account.
|
[
"cpe:2.3:a:emc:rsa_archer_egrc:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_archer_egrc:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_archer_egrc:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:emc:rsa_archer_egrc:5.3:*:*:*:*:*:*:*"
] | null | null | null | 6 | null |
|
CVE-2022-41303
|
A user may be tricked into opening a malicious FBX file which may exploit a use-after-free vulnerability in Autodesk FBX SDK 2020 version causing the application to reference a memory location controlled by an unauthorized third party, thereby running arbitrary code on the system.
|
[
"cpe:2.3:a:autodesk:fbx_software_development_kit:2020.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
CVE-2024-21531
|
All versions of the package git-shallow-clone are vulnerable to Command injection due to missing sanitization or mitigation flags in the process variable of the gitShallowClone function.
|
[
"cpe:2.3:a:git:git-shallow-clone:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
|
GHSA-2r64-2qmr-9w43
|
WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.
|
[] | null | null | null | null | null |
|
GHSA-r62r-q8j9-cw33
|
The external node classifier (ENC) API in Foreman before 1.1 allows remote attackers to obtain the hashed root password via an API request.
|
[] | null | null | null | null | null |
|
GHSA-rfmc-v2gq-q3j6
|
SQL injection vulnerability in login.asp of Brooky eStore 1.0.1 through 1.0.2b allows remote attackers to bypass authentication and execute arbitrary SQL code via the (1) user or (2) pass parameters.
|
[] | null | null | null | null | null |
|
CVE-2017-8182
|
MTK platform in Huawei smart phones with software of earlier than Nice-AL00C00B160 versions, earlier than Nice-AL10C00B140 versions has a out-of-bound read vulnerability. An attacker tricks a user into installing a malicious application on the smart phone, and send given parameter and cause to memory out-of-bound read.
|
[
"cpe:2.3:o:huawei:mtk_platform_smart_phone_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:mtk_platform_smart_phone:-:*:*:*:*:*:*:*"
] | null | null | 6.1 | 5.8 | null |
|
GHSA-rjqp-837c-gqg6
|
Question2Answer Q2A Ultimate SEO Version 1.3 is affected by cross-site scripting (XSS), which may lead to arbitrary remote code execution.
|
[] | null | null | null | null | null |
|
GHSA-r73v-c4r5-xmf5
|
Cross-site scripting (XSS) vulnerability in recommend.php in Chipmunk Directory script allows remote attackers to inject arbitrary web script or HTML via the entryID parameter.
|
[] | null | null | null | null | null |
|
GHSA-m4f6-29hg-8grv
|
Atlassian JIRA before 5.0.1; Confluence before 3.5.16, 4.0 before 4.0.7, and 4.1 before 4.1.10; FishEye and Crucible before 2.5.8, 2.6 before 2.6.8, and 2.7 before 2.7.12; Bamboo before 3.3.4 and 3.4.x before 3.4.5; and Crowd before 2.0.9, 2.1 before 2.1.2, 2.2 before 2.2.9, 2.3 before 2.3.7, and 2.4 before 2.4.1 do not properly restrict the capabilities of third-party XML parsers, which allows remote attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.
|
[] | null | 9.1 | null | null | null |
|
GHSA-27v5-q384-ff55
|
find_theni_home.php in E-theni allows remote attackers to obtain sensitive system information via a URL request which executes phpinfo.
|
[] | null | null | null | null | null |
|
GHSA-pj67-778w-r7w3
|
The MSI installer for Splashtop Streamer for Windows before 3.6.2.0 uses a temporary folder with weak permissions during installation. A local user can exploit this to escalate privileges to SYSTEM by replacing InstRegExp.reg.
|
[] | null | 7.8 | null | null | null |
|
CVE-2014-2099
|
The msrle_decode_frame function in libavcodec/msrle.c in FFmpeg before 2.1.4 does not properly calculate line sizes, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted Microsoft RLE video data.
|
[
"cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:2.1.2:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2022-31644
|
Potential vulnerabilities have been identified in the system BIOS of certain HP PC products, which might allow arbitrary code execution, escalation of privilege, denial of service, and information disclosure.
|
[
"cpe:2.3:o:hp:dragonfly_folio_g3_2-in-1_firmware:01.01.03:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:dragonfly_folio_g3_2-in-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_dragonfly_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_dragonfly:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_dragonfly_g3_firmware:01.03.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_dragonfly_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_dragonfly_g2_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_dragonfly_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_dragonfly_max_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_dragonfly_max:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_folio_2-in-1_firmware:not_impacted:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_folio_2-in-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_x2_1012_g1_firmware:1.57:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_x2_1012_g1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_x2_1012_g2_firmware:1.43:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_x2_1012_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_x2_1013_g3_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_x2_1013_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_x2_g4_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_x2_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_x2_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_x2_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_x360_1040_g9_2-in-1_firmware:01.03.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_x360_1040_g9_2-in-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_x360_830_g9_2-in-1_firmware:01.03.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_x360_830_g9_2-in-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_1030_g1_firmware:1.57:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_1030_g1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_1040_g9_firmware:01.03.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_1040_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_1040_g3_firmware:1.57:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_1040_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_1040_g4_firmware:1.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_1040_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_1050_g1_firmware:01.22.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_1050_g1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_630_g9_firmware:01.04.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_630_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_640_g9_firmware:01.04.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_640_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_645_g9_firmware:01.08.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_645_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_650_g9_firmware:01.04.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_650_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_655_g9_firmware:01.08.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_655_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_735_g5_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_735_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_735_g6_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_735_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_745_g5_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_745_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_745_g6_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_745_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_755_g5_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_755_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_830_g9_firmware:01.03.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_830_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_830_g5_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_830_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_830_g6_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_830_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_830_g7_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_830_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_830_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_830_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_835_g9_firmware:01.02.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_835_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_835_g7_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_835_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_835_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_835_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_836_g5_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_836_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_836_g6_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_836_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840_g9_firmware:01.03.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840_aero_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840_aero_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840_g5_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840_g6_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840_g7_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_840r_g4_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_840r_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_845_g9_firmware:01.02.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_845_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_845_g7_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_845_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_845_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_845_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_846_g5_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_846_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_850_g5_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_850_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_850_g6_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_850_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_850_g7_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_850_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_850_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_850_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_855_g7_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_855_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_855_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_855_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_860_g9_firmware:01.03.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_860_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_865_g9_firmware:01.02.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_865_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1030_g3_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1030_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1030_g4_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1030_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1030_g7_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1030_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1030_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1030_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1040_g5_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1040_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1040_g6_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1040_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1040_g7_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1040_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_1040_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_1040_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_830_g5_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_830_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_830_g6_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_830_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_830_g7_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_830_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitebook_x360_830_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitebook_x360_830_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_x360_fortis_g10_firmware:01.03.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_x360_fortis_g10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_x360_fortis_g9_firmware:01.03.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_x360_fortis_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_430_g5_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_430_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_430_g6_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_430_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_430_g7_firmware:01.14.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_430_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_430_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_430_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_440_g9_firmware:01.04.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_440_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_440_g5_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_440_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_440_g6_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_440_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_440_g7_firmware:01.14.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_440_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_440_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_440_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_445_g9_firmware:01.08.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_445_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_445_g6_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_445_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_445_g7_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_445_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_445_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_445_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_445r_g6_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_445r_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_450_g9_firmware:01.04.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_450_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_450_g5_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_450_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_450_g6_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_450_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_450_g7_firmware:01.14.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_450_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_450_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_450_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_455_g9_firmware:01.08.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_455_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_455_g5_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_455_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_455_g6_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_455_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_455_g7_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_455_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_455_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_455_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_455r_g6_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_455r_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_470_g5_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_470_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_630_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_630_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_635_aero_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_635_aero_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_640_g4_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_640_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_640_g5_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_640_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_640_g7_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_640_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_640_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_640_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_645_g4_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_645_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_650_g4_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_650_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_650_g5_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_650_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_650_g7_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_650_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_650_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_650_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_fortis_g10_firmware:01.03.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_fortis_g10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_fortis_g9_firmware:01.03.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_fortis_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_11_g3_ee_firmware:01.20.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_x360_11_g3_ee:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_11_g4_ee_firmware:01.16.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_x360_11_g4_ee:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_11_g5_ee_firmware:01.11.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_x360_11_g5_ee:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_11_g6_ee_firmware:01.12.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_x360_11_g6_ee:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_11_g7_ee_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_x360_11_g7_ee:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_435_g7_firmware:01.10.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_x360_435_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_435_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_x360_435_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:probook_x360_440_g1_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:probook_x360_440_g1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_14u_g5_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_14u_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_14u_g6_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_14u_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_15_g5_firmware:01.21.02:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_15_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_15_g6_firmware:01.21.02:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_15_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_15u_g5_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_15u_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_15u_g6_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_15u_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_17_g5_firmware:01.21.02:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_17_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_17_g6_firmware:01.21.02:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_17_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_create_g7_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_create_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_firefly_14_g7_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_firefly_14_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_firefly_14_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_firefly_14_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_firefly_14_g9_firmware:01.03.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_firefly_14_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_firefly_15_g7_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_firefly_15_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_firefly_15_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_firefly_15_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_firefly_16_g9_firmware:01.03.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_firefly_16_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_fury_15_g7_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_fury_15_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_fury_15_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_fury_15_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_fury_16_g9_firmware:01.03.02:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_fury_16_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_fury_17_g7_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_fury_17_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_fury_17_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_fury_17_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_power_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_power_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_power_g9_firmware:01.03.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_power_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_power_g7_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_power_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_studio_g8_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_studio_g8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_studio_g9_firmware:01.03.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_studio_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_studio_g5_firmware:01.21.02:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_studio_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_studio_g7_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_studio_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zbook_studio_x360_g5_firmware:01.21.02:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zbook_studio_x360_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_13_g2_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_13_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_14_g2_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_14_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_14_g3_firmware:01.14.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_14_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_14_g4_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_14_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_g5_firmware:01.04.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_15_g2_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_15_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_15_g3_firmware:01.14.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_15_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_a_14_g3_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_a_14_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_a_14_g4_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_a_14_g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_a_14_g5_firmware:01.08.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_a_14_g5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_g1_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_g1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_x_13_g2_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_x_13_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_mini_600_g9_firmware:02.05.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_mini_600_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_mini_800_g9_firmware:02.05.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_mini_800_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_sff_600_g9_firmware:02.05.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_sff_600_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_sff_800_g9_firmware:02.05.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_sff_800_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_slice_firmware:2.59:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_slice:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_slice_g2_firmware:2.59:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_slice_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_tower_600_g9_firmware:02.05.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_tower_600_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_tower_680_g9_firmware:02.05.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_tower_680_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_tower_800_g9_firmware:02.05.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_tower_800_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elite_tower_880_g9_firmware:02.05.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elite_tower_880_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_705_g3_firmware:2.41:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_705_g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_705_g4_desktop_mini_firmware:02.20.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_705_g4_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_705_g4_microtower_firmware:02.20.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_705_g4_microtower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_705_g4_small_form_factor_firmware:02.20.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_705_g4_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_705_g4_workstation_firmware:02.19.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_705_g4_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_705_g5_desktop_mini_firmware:02.15.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_705_g5_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_705_g5_small_form_factor_firmware:02.15.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_705_g5_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_35w_g2_desktop_mini_firmware:2.59:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_35w_g2_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_35w_g3_desktop_mini_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_35w_g3_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_35w_g4_desktop_mini_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_35w_g4_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_65w_g2_desktop_mini_firmware:2.59:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_65w_g2_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_65w_g3_desktop_mini_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_65w_g3_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_65w_g4_desktop_mini_firmware:02.20.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_65w_g4_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_95w_g4_desktop_mini_firmware:02.20.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_95w_g4_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g2_small_form_factor_firmware:2.59:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g2_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g3_small_form_factor_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g3_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g3_tower_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g3_tower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g4_small_form_factor_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g4_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g4_tower_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g4_tower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g4_workstation_firmware:02.20.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g4_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g5_desktop_mini_firmware:02.15.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g5_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g5_small_form_factor_firmware:02.15.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g5_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g5_tower_firmware:02.15.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g5_tower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g6_desktop_mini_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g6_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g6_small_form_factor_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g6_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g6_tower_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g6_tower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g8_desktop_mini_firmware:02.09.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g8_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g8_small_form_factor_firmware:02.09.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g8_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_800_g8_tower_firmware:02.09.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_800_g8_tower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_805_g6_desktop_mini_firmware:02.09.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_805_g6_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_805_g6_small_form_factor_firmware:02.09.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_805_g6_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_805_g8_desktop_mini_firmware:02.05.02:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_805_g8_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_805_g8_small_form_factor_firmware:02.05.02:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_805_g8_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_880_g3_tower_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_880_g3_tower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_880_g4_tower_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_880_g4_tower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_880_g5_tower_firmware:02.15.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_880_g5_tower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_880_g6_tower_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_880_g6_tower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:elitedesk_880_g8_tower_firmware:02.09.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:elitedesk_880_g8_tower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_1000_g1_23.8-in_all-in-one_business_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_1000_g1_23.8-in_all-in-one_business:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_1000_g1_23.8-in_touch_all-in-one_business_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_1000_g1_23.8-in_touch_all-in-one_business:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_1000_g1_27-in_4k_uhd_all-in-one_business_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_1000_g1_27-in_4k_uhd_all-in-one_business:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_1000_g1_34-in_curved_all-in-one_business_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_1000_g1_34-in_curved_all-in-one_business:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_1000_g2_23.8-in_all-in-one_business_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_1000_g2_23.8-in_all-in-one_business:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_1000_g2_23.8-in_touch_all-in-one_business_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_1000_g2_23.8-in_touch_all-in-one_business:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_1000_g2_27-in_4k_uhd_all-in-one_business_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_1000_g2_27-in_4k_uhd_all-in-one_business:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_1000_g2_34-in_curved_all-in-one_business_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_1000_g2_34-in_curved_all-in-one_business:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g2_23-inch_non-touch_all-in-one_firmware:2.59:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g2_23-inch_non-touch_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g2_23-inch_touch_all-in-one_firmware:2.59:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g2_23-inch_touch_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g3_23.8_non-touch_all-in-one_business_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g3_23.8_non-touch_all-in-one_business:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g3_23.8-inch_non-touch_all-in-one_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g3_23.8-inch_non-touch_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g3_23.8-inch_non-touch_gpu_all-in-one_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g3_23.8-inch_non-touch_gpu_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g3_23.8-inch_touch_all-in-one_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g3_23.8-inch_touch_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g3_23.8-inch_touch_gpu_all-in-one_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g3_23.8-inch_touch_gpu_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g4_23.8-in_all-in-one_business_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g4_23.8-in_all-in-one_business:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_non-touch_all-in-one_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_non-touch_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_non-touch_gpu_all-in-one_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_non-touch_gpu_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_touch_all-in-one_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_touch_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_touch_gpu_all-in-one_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_touch_gpu_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g5_23.8-in_all-in-one_firmware:02.15.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g5_23.8-in_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g5_23.8-inch_all-in-one_firmware:02.15.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g5_23.8-inch_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g6_24_all-in-one_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g6_24_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g6_27_all-in-one_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g6_27_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g8_24_all-in-one_firmware:02.09.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g8_24_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_800_g8_27_all-in-one_firmware:02.09.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_800_g8_27_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:eliteone_840_23.8_inch_g9_all-in-one_firmware:02.06.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:eliteone_840_23.8_inch_g9_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_mini_400_g9_firmware:02.05.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_mini_400_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_sff_400_g9_firmware:02.05.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_sff_400_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_tower_400_g9_firmware:02.05.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_tower_400_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:pro_tower_480_g9_firmware:02.05.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:pro_tower_480_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g3_desktop_mini_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g3_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g4_desktop_mini_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g4_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g4_microtower_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g4_microtower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g4_small_form_factor_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g4_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g5_desktop_mini_firmware:02.15.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g5_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g5_microtower_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g5_microtower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g5_small_form_factor_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g5_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g6_desktop_mini_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g6_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g6_microtower_firmware:02.15.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g6_microtower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g6_small_form_factor_firmware:02.15.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g6_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g7_microtower_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g7_microtower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_400_g7_small_form_factor_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_400_g7_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_405_g4_desktop_mini_firmware:02.20.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_405_g4_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_405_g4_small_form_factor_firmware:02.20.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_405_g4_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_405_g6_desktop_mini_firmware:02.09.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_405_g6_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_405_g6_small_form_factor_firmware:02.09.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_405_g6_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_405_g8_desktop_mini_firmware:02.05.02:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_405_g8_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_405_g8_small_form_factor_firmware:02.05.02:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_405_g8_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_480_g4_microtower_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_480_g4_microtower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_480_g5_microtower_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_480_g5_microtower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_480_g6_microtower_firmware:02.15.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_480_g6_microtower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_480_g7_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_480_g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g2_desktop_mini_firmware:2.59:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g2_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g2_microtower_firmware:2.59:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g2_microtower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g2_small_form_factor_firmware:2.59:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g2_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g3_desktop_mini_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g3_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g3_microtower_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g3_microtower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g3_small_form_factor_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g3_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g4_desktop_mini_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g4_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g4_microtower_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g4_microtower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g4_small_form_factor_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g4_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g5_desktop_mini_firmware:02.15.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g5_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g5_microtower_firmware:02.15.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g5_microtower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g5_small_form_factor_firmware:02.15.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g5_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g6_desktop_mini_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g6_desktop_mini:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g6_microtower_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g6_microtower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g6_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_600_g6_small_form_factor_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_600_g6_small_form_factor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_680_g2_microtower_firmware:2.59:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_680_g2_microtower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_680_g3_microtower_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_680_g3_microtower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_680_g4_microtower_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_680_g4_microtower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:prodesk_680_g6_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:prodesk_680_g6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g2_20-inch_non-touch_all-in-one_firmware:2.59:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g2_20-inch_non-touch_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g2_20-inch_touch_all-in-one_firmware:2.59:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g2_20-inch_touch_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g3_20-inch_non-touch_all-in-one_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g3_20-inch_non-touch_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g3_20-inch_touch_all-in-one_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g3_20-inch_touch_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g4_20-inch_non-touch_all-in-one_business_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g4_20-inch_non-touch_all-in-one_business:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g4_23.8-inch_non-touch_all-in-one_business_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g4_23.8-inch_non-touch_all-in-one_business:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g5_20-inch_all-in-one_business_firmware:02.15.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g5_20-inch_all-in-one_business:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g5_23.8-inch_all-in-one_business_firmware:02.15.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g5_23.8-inch_all-in-one_business:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g6_20_all-in-one_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g6_20_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_400_g6_24_all-in-one_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_400_g6_24_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_440_23.8_inch_g9_all-in-one_firmware:02.05.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_440_23.8_inch_g9_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_440_g4_23.8-inch_non-touch_all-in-one_business_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_440_g4_23.8-inch_non-touch_all-in-one_business:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_440_g5_23.8-in_all-in-one_business_firmware:02.15.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_440_g5_23.8-in_all-in-one_business:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_440_g6_24_all-in-one_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_440_g6_24_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_480_g3_20-inch_non-touch_all-in_one_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_480_g3_20-inch_non-touch_all-in_one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_600_g2_21.5-inch_non-touch_all-in-one_firmware:2.59:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_600_g2_21.5-inch_non-touch_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_600_g2_21.5-inch_touch_all-in-one_firmware:2.59:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_600_g2_21.5-inch_touch_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_600_g3_21.5-inch_non-touch_all-in-one_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_600_g3_21.5-inch_non-touch_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_600_g4_21.5-inch_touch_all-in-one_business_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_600_g4_21.5-inch_touch_all-in-one_business:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_600_g5_21.5-in_all-in-one_business_firmware:02.15.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_600_g5_21.5-in_all-in-one_business:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:proone_600_g6_22_all-in-one_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:proone_600_g6_22_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z1_g8_tower_firmware:02.09.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z1_g8_tower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z1_g9_tower_firmware:02.05.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z1_g9_tower:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_g3_22_all-in-one_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_g3_22_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:zhan_66_pro_g3_24_all-in-one_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:zhan_66_pro_g3_24_all-in-one:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:engage_flex_mini_retail_system_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:engage_flex_mini_retail_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:engage_flex_pro_retail_system_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:engage_flex_pro_retail_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:engage_flex_pro-c_retail_system_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:engage_flex_pro-c_retail_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:engage_go_10_mobile_system_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:engage_go_10_mobile_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:engage_go_mobile_system_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:engage_go_mobile_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:engage_one_aio_system_firmware:2.44:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:engage_one_aio_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:engage_one_pro_aio_system_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:engage_one_pro_aio_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:mp9_g2_retail_system_firmware:2.59:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:mp9_g2_retail_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:mp9_g4_retail_system_firmware:02.21.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:mp9_g4_retail_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:rp9_g1_retail_system_firmware:2.59:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:rp9_g1_retail_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z1_entry_tower_g5_workstation_firmware:02.15.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z1_entry_tower_g5_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z1_entry_tower_g6_workstation_firmware:02.12.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z1_entry_tower_g6_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_mini_g4_workstation_firmware:01.08.03:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_mini_g4_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_mini_g5_workstation_firmware:01.04.07:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_mini_g5_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_small_form_factor_g4_workstation_firmware:01.08.03:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_small_form_factor_g4_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_small_form_factor_g5_workstation_firmware:01.04.07:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_small_form_factor_g5_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_small_form_factor_g8_workstation_firmware:01.06.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_small_form_factor_g8_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_tower_g4_workstation_firmware:01.08.03:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_tower_g4_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_tower_g5_workstation_firmware:01.04.07:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_tower_g5_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:z2_tower_g8_workstation_firmware:01.06.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:z2_tower_g8_workstation:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:mt44_mobile_thin_client_firmware:01.21.01:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:mt44_mobile_thin_client:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:mt45_mobile_thin_client_firmware:01.21.10:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:mt45_mobile_thin_client:-:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:mt46_mobile_thin_client_firmware:01.10.00:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:mt46_mobile_thin_client:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
CVE-2012-4416
|
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Hotspot.
|
[
"cpe:2.3:a:oracle:jdk:*:update7:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:*:update7:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:*:update35:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update33:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update34:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:*:update35:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update33:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update34:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0.200:update20:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0.210:update21:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*"
] | null | null | null | 6.4 | null |
|
GHSA-wmv2-95fh-hx2w
|
Trend Micro OfficeScan 11.0 before SP1 CP 6325 (with Agent Module Build before 6152) and XG before CP 1352 has XSS via a crafted URI using a blocked website.
|
[] | null | null | 6.1 | null | null |
|
CVE-2012-1053
|
The change_user method in the SUIDManager (lib/puppet/util/suidmanager.rb) in Puppet 2.6.x before 2.6.14 and 2.7.x before 2.7.11, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x before 2.0.3 does not properly manage group privileges, which allows local users to gain privileges via vectors related to (1) the change_user not dropping supplementary groups in certain conditions, (2) changes to the eguid without associated changes to the egid, or (3) the addition of the real gid to supplementary groups.
|
[
"cpe:2.3:a:puppet:puppet:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.6.13:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.7.9:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet:2.7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:puppetlabs:puppet:2.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:puppetlabs:puppet:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:puppetlabs:puppet_enterprise_users:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:puppetlabs:puppet_enterprise_users:1.1:*:*:*:*:*:*:*"
] | null | null | null | 6.9 | null |
|
GHSA-hwrx-wc75-mgh7
|
Spree allows remote attackers to obtain sensitive information
|
Spree 0.11.x before 0.11.2 and 0.30.x before 0.30.0 exchanges data using JavaScript Object Notation (JSON) without a mechanism for validating requests, which allows remote attackers to obtain sensitive information via vectors involving (1) `admin/products.json`, (2) `admin/users.json`, or (3) `admin/overview/get_report_data`, related to a "JSON hijacking" issue.
|
[] | null | null | null | null | null |
GHSA-w5v3-f8xv-j94c
|
Autodesk 3D Studio Max (3DSMax) 6 through 9 and 2008 through 2010 allows remote attackers to execute arbitrary code via a .max file with a MAXScript statement that calls the DOSCommand method, related to "application callbacks."
|
[] | null | null | null | null | null |
|
CVE-2024-6578
|
Stored XSS in aimhubio/aim
|
A stored cross-site scripting (XSS) vulnerability exists in aimhubio/aim version 3.19.3. The vulnerability arises from the improper neutralization of input during web page generation, specifically in the logs-tab for runs. The terminal output logs are displayed using the `dangerouslySetInnerHTML` function in React, which is susceptible to XSS attacks. An attacker can exploit this vulnerability by injecting malicious scripts into the logs, which will be executed when a user views the logs-tab.
|
[
"cpe:2.3:a:aimhubio:aim:3.19.3:*:*:*:*:*:*:*",
"cpe:2.3:a:aimstack:aim:3.19.3:*:*:*:*:*:*:*"
] | null | null | 7.2 | null | null |
GHSA-xw33-f5cf-9cw7
|
Microsoft Host Integration Server (HIS) 2000, 2004, and 2006 does not limit RPC access to administrative functions, which allows remote attackers to bypass authentication and execute arbitrary programs via a crafted SNA RPC message using opcode 1 or 6 to call the CreateProcess function, aka "HIS Command Execution Vulnerability."
|
[] | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.