id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-5xh3-j434-h57h
A CWE-89 "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')" in maxprofile/menu/model.lua (editUserMenu endpoint) in Q-Free MaxTime less than or equal to version 2.11.0 allows an authenticated remote attacker to execute arbitrary SQL commands via crafted HTTP requests.
[]
null
5.5
null
null
CVE-2006-4646
Cross-site scripting (XSS) vulnerability in the Drupal 4.7 Pathauto module before pathauto_node.inc 1.17.2.1 and the Drupal 4.6 Pathauto module before pathauto_node.inc 1.14.2.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:drupal:drupal_pathauto_module:4.6:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal_pathauto_module:4.7:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2015-4069
The EdgeServiceImpl web service in Arcserve UDP before 5.0 Update 4 allows remote attackers to obtain sensitive credentials via a crafted SOAP request to the (1) getBackupPolicy or (2) getBackupPolicies method.
[ "cpe:2.3:a:arcserve:arcserve_unified_data_protection:*:3:*:*:*:*:*:*" ]
null
null
null
7.8
GHSA-j66j-6mgv-px39
In waimai Super Cms 20150505, there is stored XSS via the /admin.php/Foodcat/editsave fcname parameter.
[]
null
null
4.8
null
GHSA-ch69-82p3-hfw4
A security researcher stored XSS via a Help Server setting. This affects customers using Internet Explorer, because they do not support 'rel=noopener'.
[]
null
null
null
null
GHSA-vwm9-4mjh-m96x
The ipTIME NAS product allows an arbitrary file upload vulnerability in the Manage Bulletins/Upload feature, which can be leveraged to gain remote code execution. This issue affects: pTIME NAS 1.4.36.
[]
null
null
null
null
CVE-2023-5955
Contact Form Email < 1.3.44 - Editor+ Stored Cross-Site Scripting
The Contact Form Email WordPress plugin before 1.3.44 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
[ "cpe:2.3:a:codepeople:contact_form_email:*:*:*:*:*:wordpress:*:*" ]
null
6.1
null
null
GHSA-44g4-9qvp-9723
In the Linux kernel, the following vulnerability has been resolved:net/ncsi: Disable the ncsi work before freeing the associated structureThe work function can run after the ncsi device is freed, resulting in use-after-free bugs or kernel panic.
[]
null
5.5
null
null
CVE-2024-5844
Heap buffer overflow in Tab Strip in Google Chrome prior to 126.0.6478.54 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium)
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-5vc9-m9gx-8qqw
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in whiletrue Most And Least Read Posts Widget allows Stored XSS. This issue affects Most And Least Read Posts Widget: from n/a through 2.5.20.
[]
null
6.5
null
null
GHSA-p234-pw68-f22f
Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3161.
[]
null
null
null
null
CVE-2025-29230
Linksys E5600 v1.1.0.26 was discovered to contain a command injection vulnerability in the runtime.emailReg function. The vulnerability can be triggered via the `pt["email"]` parameter.
[]
null
8.6
null
null
GHSA-xrf8-cmrg-7436
Cross-site scripting (XSS) vulnerability in Grav
A cross-site scripting (XSS) vulnerability in Grav versions 1.7.44 and before, allows remote authenticated attackers to execute arbitrary web scripts or HTML via the onmouseover attribute of an ISINDEX element.
[]
null
5.4
null
null
CVE-2013-5609
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*", "cpe:2.3:a:suse:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:sp3:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:-:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:vmware:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" ]
null
9.8
null
10
CVE-2019-10779
All versions of stroom:stroom-app before 5.5.12 and all versions of the 6.0.0 branch before 6.0.25 are affected by Cross-site Scripting. An attacker website is able to load the Stroom UI into a hidden iframe. Using that iframe, the attacker site can issue commands to the Stroom UI via an XSS vulnerability to take full control of the Stroom UI on behalf of the logged-in user.
[ "cpe:2.3:a:gchq:stroom:*:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
GHSA-6r7x-h2cv-64j8
Missing Authorization vulnerability in CodeRevolution Aiomatic.This issue affects Aiomatic: from n/a through 1.9.3.
[]
null
4.3
null
null
CVE-2018-6331
Buck parser-cache command loads/saves state using Java serialized object. If the state information is maliciously crafted, deserializing it could lead to code execution. This issue affects Buck versions prior to v2018.06.25.01.
[ "cpe:2.3:a:facebook:buck:*:*:*:*:*:*:*:*" ]
null
9.8
9.8
7.5
GHSA-7q57-vxpq-2xjc
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
[]
null
null
8.8
null
CVE-2024-4849
WordPress Automatic <= 3.94.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via autoplay Parameter
The WordPress Automatic Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘autoplay’ parameter in all versions up to, and including, 3.94.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
RHSA-2020:5500
Red Hat Security Advisory: mariadb:10.3 security, bug fix, and enhancement update
mysql: InnoDB unspecified vulnerability (CPU Oct 2019) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019) mysql: C API unspecified vulnerability (CPU Jan 2020) mysql: C API unspecified vulnerability (CPU Apr 2020) mysql: InnoDB unspecified vulnerability (CPU Apr 2020) mysql: Server: DML unspecified vulnerability (CPU Apr 2020) mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2020) mysql: InnoDB unspecified vulnerability (CPU Apr 2020) mariadb-connector-c: Improper validation of content in a OK packet received from server mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) mysql: InnoDB unspecified vulnerability (CPU Oct 2020) mysql: Server: FTS unspecified vulnerability (CPU Oct 2020) mysql: Server: Locking unspecified vulnerability (CPU Oct 2020) mariadb: Insufficient SST method name check leading to code injection in mysql-wsrep mysql: InnoDB unspecified vulnerability (CPU Jan 2021) mysql: Server: Parser unspecified vulnerability (CPU Apr 2021) mysql: InnoDB unspecified vulnerability (CPU Apr 2021)
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
4.9
4.9
null
GHSA-pmp3-x433-rm9r
The web interface for Micronet Wireless Broadband Router SP916BM running firmware before 1.9 08/04/2004 resets the password to the default password when the router is shut off, which could allow remote attackers to gain access.
[]
null
null
null
null
CVE-2021-40050
There is an out-of-bounds read vulnerability in the IFAA module. Successful exploitation of this vulnerability may cause stack overflow.
[ "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*" ]
null
9.8
null
10
GHSA-c4v9-f6pv-f763
A vulnerability in the Tool Command Language (Tcl) interpreter of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, local attacker with privileged EXEC credentials to cause a denial of service (DoS) condition on an affected system. The vulnerability is due to insufficient input validation of data passed to the Tcl interpreter. An attacker could exploit this vulnerability by executing crafted Tcl arguments on an affected device. An exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.
[]
null
6
null
null
GHSA-8cm5-jfj2-26q7
Fides Webserver Logs Hosted Database Password Partial Exposure Vulnerability
The Fides webserver requires a connection to a hosted PostgreSQL database for persistent storage of application data. If the password used by the webserver for this database connection includes special characters such as `@` and `$`, webserver startup fails and the part of the password following the special character is exposed in webserver error logs.This is caused by improper escaping of the SQLAlchemy password string, see [here](https://docs.sqlalchemy.org/en/14/core/engines.html#escaping-special-characters-such-as-signs-in-passwords) and [here](https://github.com/sqlalchemy/sqlalchemy/discussions/6615) for more info.ImpactPartial exposure of hosted database password in webserver logsPatchesThe vulnerability has been patched in Fides version `2.37.0`. Users are advised to upgrade to this version or later to secure their systems against this threat.WorkaroundsThere are no workarounds.Proof of ConceptCreate a hosted PostgreSQL database for Fides with a password including `@` or `$` e.g. `p@ssword`Run Fides and observe failure, sample log attached
[]
null
2.3
null
null
GHSA-hrg4-r4x5-qp6w
Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Security). Supported versions that are affected are 8.56 and 8.57. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. While the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of PeopleSoft Enterprise PeopleTools. CVSS 3.0 Base Score 8.6 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H).
[]
null
null
null
null
CVE-2024-42268
net/mlx5: Fix missing lock on sync reset reload
In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Fix missing lock on sync reset reload On sync reset reload work, when remote host updates devlink on reload actions performed on that host, it misses taking devlink lock before calling devlink_remote_reload_actions_performed() which results in triggering lock assert like the following: WARNING: CPU: 4 PID: 1164 at net/devlink/core.c:261 devl_assert_locked+0x3e/0x50 … CPU: 4 PID: 1164 Comm: kworker/u96:6 Tainted: G S W 6.10.0-rc2+ #116 Hardware name: Supermicro SYS-2028TP-DECTR/X10DRT-PT, BIOS 2.0 12/18/2015 Workqueue: mlx5_fw_reset_events mlx5_sync_reset_reload_work [mlx5_core] RIP: 0010:devl_assert_locked+0x3e/0x50 … Call Trace: <TASK> ? __warn+0xa4/0x210 ? devl_assert_locked+0x3e/0x50 ? report_bug+0x160/0x280 ? handle_bug+0x3f/0x80 ? exc_invalid_op+0x17/0x40 ? asm_exc_invalid_op+0x1a/0x20 ? devl_assert_locked+0x3e/0x50 devlink_notify+0x88/0x2b0 ? mlx5_attach_device+0x20c/0x230 [mlx5_core] ? __pfx_devlink_notify+0x10/0x10 ? process_one_work+0x4b6/0xbb0 process_one_work+0x4b6/0xbb0 […]
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2015-0201
The Java SockJS client in Pivotal Spring Framework 4.1.x before 4.1.5 generates predictable session ids, which allows remote attackers to send messages to other sessions via unspecified vectors.
[ "cpe:2.3:a:pivotal_software:spring_framework:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:spring_framework:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:spring_framework:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:spring_framework:4.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:spring_framework:4.1.4:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-3gq5-r59m-mmv2
Kirby XSS Vulnerability
Kirby v2.5.12 allows XSS by using the "site files" Add option to upload an SVG file.
[]
null
null
4.8
null
RHSA-2020:0576
Red Hat Security Advisory: thunderbird security update
Mozilla: Message ID calculation was based on uninitialized data Mozilla: Out-of-bounds read when processing certain email messages Mozilla: Setting a master password post-Thunderbird 52 does not delete unencrypted previously stored passwords Mozilla: Crash processing S/MIME messages with multiple signatures Mozilla: Incorrect parsing of template tag could result in JavaScript injection Mozilla: Memory safety bugs fixed in Firefox 73 and Firefox ESR 68.5
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
6.1
null
CVE-2023-27873
IBM Aspera Faspex information disclosure
IBM Aspera Faspex 4.4.2 could allow a remote authenticated attacker to obtain sensitive credential information using specially crafted XML input. IBM X-Force ID: 249654.
[ "cpe:2.3:a:ibm:aspera_faspex:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:aspera_faspex:4.4.2:patch_level_1:*:*:*:*:*:*", "cpe:2.3:a:ibm:aspera_faspex:4.4.2:patch_level_2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" ]
null
6.5
null
null
RHSA-2025:1885
Red Hat Security Advisory: Red Hat build of Quarkus 3.15.3.SP1 Security Update
io.quarkus:quarkus-rest: Quarkus REST Endpoint Request Parameter Leakage Due to Shared Instance io.quarkus:quarkus-resteasy: Memory Leak in Quarkus RESTEasy Classic When Client Requests Timeout io.netty:netty-handler: SslHandler doesn't correctly validate packets which can lead to native crash when using native SSLEngine
[ "cpe:/a:redhat:quarkus:3.15::el8" ]
null
7.5
null
null
CVE-2023-32446
Dell Wyse ThinOS versions prior to 2303 (9.4.1141) contain a sensitive information disclosure vulnerability. An unauthenticated malicious user with local access to the device could exploit this vulnerability to read sensitive information written to the log files.
[ "cpe:2.3:o:dell:wyse_thinos:9.4.1141:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3420:-:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3440:-:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5440:-:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3000_thin_client:-:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5400:-:*:*:*:*:*:*:*", "cpe:2.3:h:dell:wyse_3040_thin_client:-:*:*:*:*:*:*:*", "cpe:2.3:h:dell:wyse_5070_thin_client:-:*:*:*:*:*:*:*", "cpe:2.3:h:dell:wyse_5470_all-in-one_thin_client:-:*:*:*:*:*:*:*", "cpe:2.3:h:dell:wyse_5470_mobile_thin_client:-:*:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2020-27948
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in watchOS 7.2, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, iOS 14.3 and iPadOS 14.3, tvOS 14.3. Processing a maliciously crafted audio file may lead to arbitrary code execution.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
GHSA-mf3c-7cwx-2vv8
Cross-site scripting (XSS) vulnerability in index.php in EasyPageCMS allows remote attackers to inject arbitrary web script or HTML via the cat parameter.
[]
null
null
null
null
GHSA-x9w6-j9p6-2qp6
A floating point exception (divide-by-zero) vulnerability was discovered in mupdf 1.23.4 in functon pnm_binary_read_image() of load-pnm.c.
[]
null
7.5
null
null
CVE-2023-28962
Junos OS: Unauthenticated access vulnerability in J-Web
An Improper Authentication vulnerability in upload-file.php, used by the J-Web component of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to upload arbitrary files to temporary folders on the device. This issue affects Juniper Networks Junos OS: All versions prior to 19.4R3-S11; 20.1 version 20.1R1 and later versions; 20.2 versions prior to 20.2R3-S7; 20.3 version 20.3R1 and later versions; 20.4 versions prior to 20.4R3-S6; 21.1 version 21.1R1 and later versions; 21.2 versions prior to 21.2R3-S4; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3-S3; 22.1 versions prior to 22.1R3-S1; 22.2 versions prior to 22.2R2-S1, 22.2R3; 22.3 versions prior to 22.3R1-S2, 22.3R2.
[ "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r1-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r2-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r2-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r2-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r2-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r2-s7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r3-s10:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r3-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r3-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r3-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r3-s7:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r3-s8:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:19.4:r3-s9:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r1-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r3-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.1:r3-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r3-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r3-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.2:r3-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r3-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r3-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.3:r3-s6:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r3-s4:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.1:r3-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*" ]
null
5.3
null
null
CVE-2021-43334
BuddyBoss Platform through 1.8.0 allows XSS via the Group Name or Group Description field.
[ "cpe:2.3:a:buddyboss:buddyboss:*:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
CVE-2008-1427
SQL injection vulnerability in the Joobi Acajoom (com_acajoom) 1.1.5 and 1.2.5 component for Joomla! allows remote attackers to execute arbitrary SQL commands via the mailingid parameter in a mailing view action to index.php.
[ "cpe:2.3:a:joobi:acajoom:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:joobi:acajoom:1.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:com_acajoom:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:com_acajoom:1.2.5:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-cc2m-fh63-9238
epan/dissectors/packet-pktap.c in the Ethernet dissector in Wireshark 2.x before 2.0.4 mishandles the packet-header data type, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
[]
null
null
5.9
null
GHSA-7w6v-23gr-722w
Buffer underflow in atmfd.dll in the Windows Adobe Type Manager Library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via a crafted OpenType font, aka "OpenType Font Driver Vulnerability."
[]
null
8.8
null
null
GHSA-8mh3-6g9j-4mxq
Cross-site scripting (XSS) vulnerability in Coppermine Photo Gallery (CPG) before 1.4.27 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[]
null
null
null
null
CVE-2009-3524
Unspecified vulnerability in ashWsFtr.dll in avast! Home and Professional for Windows before 4.8.1356 has unknown impact and local attack vectors.
[ "cpe:2.3:a:avast:avast_antivirus_home:*:*:windows:*:*:*:*:*", "cpe:2.3:a:avast:avast_antivirus_home:4.7.827:*:windows:*:*:*:*:*", "cpe:2.3:a:avast:avast_antivirus_home:4.7.844:*:windows:*:*:*:*:*", "cpe:2.3:a:avast:avast_antivirus_home:4.7.869:*:windows:*:*:*:*:*", "cpe:2.3:a:avast:avast_antivirus_home:4.7.1043:*:windows:*:*:*:*:*", "cpe:2.3:a:avast:avast_antivirus_home:4.7.1098:*:windows:*:*:*:*:*", "cpe:2.3:a:avast:avast_antivirus_home:4.8.1169:*:windows:*:*:*:*:*", "cpe:2.3:a:avast:avast_antivirus_home:4.8.1195:*:windows:*:*:*:*:*", "cpe:2.3:a:avast:avast_antivirus_home:4.8.1201:*:windows:*:*:*:*:*", "cpe:2.3:a:avast:avast_antivirus_home:4.8.1227:*:windows:*:*:*:*:*", "cpe:2.3:a:avast:avast_antivirus_home:4.8.1229:*:windows:*:*:*:*:*", "cpe:2.3:a:avast:avast_antivirus_home:4.8.1282:*:windows:*:*:*:*:*", "cpe:2.3:a:avast:avast_antivirus_home:4.8.1290:*:windows:*:*:*:*:*", "cpe:2.3:a:avast:avast_antivirus_home:4.8.1296:*:windows:*:*:*:*:*", "cpe:2.3:a:avast:avast_antivirus_home:4.8.1335:*:windows:*:*:*:*:*", "cpe:2.3:a:avast:avast_antivirus_professional:*:*:windows:*:*:*:*:*", "cpe:2.3:a:avast:avast_antivirus_professional:4.7.827:*:windows:*:*:*:*:*", "cpe:2.3:a:avast:avast_antivirus_professional:4.7.844:*:windows:*:*:*:*:*", "cpe:2.3:a:avast:avast_antivirus_professional:4.7.1043:*:windows:*:*:*:*:*", "cpe:2.3:a:avast:avast_antivirus_professional:4.7.1098:*:windows:*:*:*:*:*", "cpe:2.3:a:avast:avast_antivirus_professional:4.8.1169:*:windows:*:*:*:*:*", "cpe:2.3:a:avast:avast_antivirus_professional:4.8.1195:*:windows:*:*:*:*:*", "cpe:2.3:a:avast:avast_antivirus_professional:4.8.1201:*:windows:*:*:*:*:*", "cpe:2.3:a:avast:avast_antivirus_professional:4.8.1227:*:windows:*:*:*:*:*", "cpe:2.3:a:avast:avast_antivirus_professional:4.8.1229:*:windows:*:*:*:*:*", "cpe:2.3:a:avast:avast_antivirus_professional:4.8.1282:*:windows:*:*:*:*:*", "cpe:2.3:a:avast:avast_antivirus_professional:4.8.1290:*:windows:*:*:*:*:*", "cpe:2.3:a:avast:avast_antivirus_professional:4.8.1296:*:windows:*:*:*:*:*", "cpe:2.3:a:avast:avast_antivirus_professional:4.8.1335:*:windows:*:*:*:*:*" ]
null
null
null
7.2
CVE-2019-16650
On Supermicro X10 and X11 products, a client's access privileges may be transferred to a different client that later has the same socket file descriptor number. In opportunistic circumstances, an attacker can simply connect to the virtual media service, and then connect virtual USB devices to the server managed by the BMC.
[ "cpe:2.3:o:supermicro:x11dai-n_firmware:1.71.5:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11dai-n:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11dac_firmware:1.71.5:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11dac:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11dph-tq_firmware:1.71.5:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11dph-tq:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11dph-i_firmware:1.71.5:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11dph-i:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11dph-t_firmware:1.71.5:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11dph-t:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11dps-re_firmware:1.71.5:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11dps-re:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11dsf-e_firmware:1.71.5:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11dsf-e:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11dsn-ts_firmware:1.71.5:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11dsn-ts:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11dsn-tsq_firmware:1.71.5:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11dsn-tsq:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11dsc\\+_firmware:1.74:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11dsc\\+:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11ddw-nt_firmware:1.71.5:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11ddw-nt:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11ddw-l_firmware:1.71.5:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11ddw-l:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11dgq_firmware:1.71.5:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11dgq:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11dpff-sn_firmware:1.71.5:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11dpff-sn:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11dpfr-sn_firmware:1.71.5:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11dpfr-sn:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11dpfr-s_firmware:1.71.5:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11dpfr-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11dpt-ps_firmware:1.71.5:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11dpt-ps:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11dpt-b_firmware:1.71.5:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11dpt-b:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11dpt-bh_firmware:1.71.5:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11dpt-bh:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11dpt-l_firmware:3.74:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11dpt-l:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11dpu_firmware:1.71.5:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11dpu:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11dpu-v_firmware:1.71.5:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11dpu-v:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11dpu-x_firmware:1.71.5:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11dpu-x:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11dpu-xll_firmware:1.71.5:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11dpu-xll:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11dpu-z\\+_firmware:1.71.5:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11dpu-z\\+:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11dpu-ze\\+_firmware:1.71.5:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11dpu-ze\\+:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11dpg-sn_firmware:1.71.5:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11dpg-sn:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11dpg-qt_firmware:1.71.5:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11dpg-qt:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11dpg-ot-cpu_firmware:1.71.5:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11dpg-ot-cpu:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11dpi-nt_firmware:1.71.5:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11dpi-nt:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11dpi-n_firmware:1.71.5:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11dpi-n:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11dpl-i_firmware:1.71.5:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11dpl-i:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11dpx-t_firmware:1.71.5:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11dpx-t:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11dgo-t_firmware:1.71.5:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11dgo-t:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11sca_firmware:1.71.5:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11sca:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11sca-f_firmware:1.71.5:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11sca-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11sch-f_firmware:1.23.2:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11sch-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11sch-ln4f_firmware:1.23.2:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11sch-ln4f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11sca-w_firmware:1.71.5:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11sca-w:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11scl-f_firmware:1.23.2:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11scl-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11scl-ln4f_firmware:1.23.2:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11scl-ln4f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11scl-if_firmware:1.23.2:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11scl-if:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11scm-f_firmware:1.23.2:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11scm-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11scm-ln8f_firmware:1.23.2:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11scm-ln8f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11scw-f_firmware:3.75.00:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11scw-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11spa-t_firmware:1.71.5:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11spa-t:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11spa-tf_firmware:1.71.5:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11spa-tf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11spi-tf_firmware:1.71.6:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11spi-tf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11spl-f_firmware:1.71.6:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11spl-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11spm-f_firmware:1.71.6:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11spm-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11spm-tf_firmware:1.71.6:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11spm-tf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11spm-tpf_firmware:1.71.6:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11spm-tpf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11sph-nctf_firmware:1.71.6:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11sph-nctf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11sph-nctpf_firmware:1.71.6:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11sph-nctpf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11spw-tf_firmware:1.71.6:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11spw-tf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11spw-ctf_firmware:1.71.6:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11spw-ctf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11spg-tf_firmware:1.71.6:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11spg-tf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11sri-if_firmware:3.75.00:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11sri-if:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11srl-f_firmware:3.74.2:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11srl-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11srm-f_firmware:1.31.1:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11srm-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11srm-vf_firmware:1.31.1:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11srm-vf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11ssl-f_firmware:1.56:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11ssl-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11ssm-f_firmware:1.56:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11ssm-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11ssl_firmware:1.56:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11ssl:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11ssm_firmware:1.56:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11ssm:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11ssh-f_firmware:1.56:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11ssh-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11ssh-ln4f_firmware:1.56:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11ssh-ln4f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11ssw-4tf_firmware:1.56:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11ssw-4tf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11ssw-tf_firmware:1.56:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11ssw-tf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11ssw-f_firmware:1.71.5:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11ssw-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11ssi-ln4f_firmware:1.71.5:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11ssi-ln4f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11ssw-f_firmware:3.85.00:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11ssh-tf_firmware:1.56:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11ssh-tf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11ssh-ctf_firmware:1.56:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11ssh-ctf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11ssl-cf_firmware:1.56:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11ssl-cf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11ssl-nf_firmware:1.56:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11ssl-nf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11ssh-gf-1585_firmware:1.56:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11ssh-gf-1585:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11ssh-gf-1585l_firmware:1.56:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11ssh-gf-1585l:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11ssh-gtf-1585_firmware:1.56:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11ssh-gtf-1585:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11ssh-gtf-1585l_firmware:1.56:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11ssh-gtf-1585l:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:b11dpt_firmware:3.68:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:b11dpt:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:b11dpe_firmware:3.68:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:b11dpe:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:b11spe-cpu-tf_firmware:3.68:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:b11spe-cpu-tf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:b11spe-cpu-25g_firmware:3.68:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:b11spe-cpu-25g:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:b11qpi_firmware:3.68:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:b11qpi:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11ssd-f_firmware:3.68:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11ssd-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11sse-f_firmware:3.68:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11sse-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:b2ss1-cpu_firmware:3.68:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:b2ss1-cpu:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:b2ss1-cf_firmware:3.68:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:b2ss1-cf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:b2ss1-f_firmware:3.68:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:b2ss1-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:b2ss2-f_firmware:3.68:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:b2ss2-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:b2ss1-mtf_firmware:3.68:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:b2ss1-mtf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:b2ss1-h-mtf_firmware:3.68:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:b2ss1-h-mtf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:b2ss2-mtf_firmware:3.68:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:b2ss2-mtf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:b2ss2-h-mtf_firmware:3.68:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:b2ss2-h-mtf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11scd-f_firmware:3.68:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11scd-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11sdd-8c-f_firmware:3.68:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11sdd-8c-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11sdd-18c-f_firmware:3.68:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11sdd-18c-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11qph\\+_firmware:1.71.5:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11qph\\+:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11opi-cpu_firmware:1.71.5:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11opi-cpu:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11sds-8c_firmware:3.74.2:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11sds-8c:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11sds-12c_firmware:3.74.2:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11sds-12c:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x11sds-16c_firmware:3.74.2:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x11sds-16c:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10ddw-i_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10ddw-i:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10ddw-in_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10ddw-in:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drs_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drs:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drd-i_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drd-i:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drd-it_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drd-it:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drd-int_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drd-int:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drd-intp_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drd-intp:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drd-itp_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drd-itp:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drd-l_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drd-l:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drd-lt_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drd-lt:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drd-ltp_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drd-ltp:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drx_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drx:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drh-c_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drh-c:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drh-ct_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drh-ct:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drh-cln4_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drh-cln4:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drh-i_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drh-i:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drh-it_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drh-it:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drh-iln4_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drh-iln4:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10dri_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10dri:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10dri-t_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10dri-t:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drc-ln4\\+_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drc-ln4\\+:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drc-t4\\+_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drc-t4\\+:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10dri-ln4\\+_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10dri-ln4\\+:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10dri-t4\\+_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10dri-t4\\+:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drl-ln4_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drl-ln4:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drl-i_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drl-i:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drl-it_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drl-it:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drl-c_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drl-c:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drl-ct_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drl-ct:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drt-l_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drt-l:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drt-libq_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drt-libq:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drt-libf_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drt-libf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drt-b\\+_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drt-b\\+:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drt-h_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drt-h:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drt-hibf_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drt-hibf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drt-ps_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drt-ps:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drt-p_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drt-p:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drt-pt_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drt-pt:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drt-pibq_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drt-pibq:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drt-pibf_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drt-pibf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drfr-n_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drfr-n:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drfr-nt_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drfr-nt:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drfr_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drfr:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drfr-t_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drfr-t:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drff-cg_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drff-cg:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drff-ctg_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drff-ctg:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drff-ig_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drff-ig:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drff-itg_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drff-itg:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drff_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drff:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drff-c_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drff-c:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drw-n_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drw-n:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drw-nt_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drw-nt:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drw-e_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drw-e:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drw-et_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drw-et:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drw-i_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drw-i:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drw-it_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drw-it:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10dsn-ts_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10dsn-ts:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drg-ot\\+-cpu_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drg-ot\\+-cpu:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drg-o\\+-cpu_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drg-o\\+-cpu:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10dgo-t_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10dgo-t:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10dgq_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10dgq:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drg-q_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drg-q:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drg-h_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drg-h:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10drg-ht_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10drg-ht:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10dru-i\\+_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10dru-i\\+:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10dru-x_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10dru-x:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10dru-xll_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10dru-xll:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10dsc\\+_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10dsc\\+:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10sra-f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10sra-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10sra_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10sra:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10srd-f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10srd-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10srm-f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10srm-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10srm-tf_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10srm-tf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10srl-f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10srl-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10sri-f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10sri-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10srh-cf_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10srh-cf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10srh-cln4f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10srh-cln4f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10srg-f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10srg-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10srw-f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10srw-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10sae_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10sae:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10sat_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10sat:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10slx-f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10slx-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10sld-f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10sld-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10sld-hf_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10sld-hf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10sle-f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10sle-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10sle-hf_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10sle-hf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10sle-df_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10sle-df:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10sl7-f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10sl7-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10sla-f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10sla-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10slh-f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10slh-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10sll\\+-f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10sll\\+-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10sll-f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10sll-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10sll-sf_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10sll-sf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10sll-s_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10sll-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10slm-f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10slm-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10slm\\+-f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10slm\\+-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10slm\\+-ln4f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10slm\\+-ln4f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10sde-df_firmware:3.68:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10sde-df:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10sdd-16c-f_firmware:3.68:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10sdd-16c-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10sdd-f_firmware:3.68:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10sdd-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:b1sd1-16c-tf_firmware:3.68:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:b1sd1-16c-tf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:b1sd1-tf_firmware:3.68:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:b1sd1-tf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:b1sd2-16c-tf_firmware:3.68:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:b1sd2-16c-tf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:b1sd2-tf_firmware:3.68:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:b1sd2-tf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:b10drc_firmware:3.68:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:b10drc:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:b10drc-n_firmware:3.68:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:b10drc-n:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:b10dri_firmware:3.68:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:b10dri:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:b10dri-n_firmware:3.68:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:b10dri-n:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:b10drg-ibf_firmware:3.68:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:b10drg-ibf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:b10drg-ibf2_firmware:3.68:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:b10drg-ibf2:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:b10drg-tp_firmware:3.68:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:b10drg-tp:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:b10drt_firmware:3.68:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:b10drt:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:b10drt-ibf_firmware:3.68:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:b10drt-ibf:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:b10drt-ibf2_firmware:3.68:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:b10drt-ibf2:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:b10drt-tp_firmware:3.68:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:b10drt-tp:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10qrh\\+_firmware:3.80:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10qrh\\+:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10qbl-4_firmware:3.80:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10qbl-4:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10qbl-4ct_firmware:3.80:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10qbl-4ct:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10qbl_firmware:3.80:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10qbl:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10qbl-ct_firmware:3.80:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10qbl-ct:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10qbi_firmware:3.81:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10qbi:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10obi-cpu_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10obi-cpu:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10dbt-t_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10dbt-t:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10sdv-7tp8f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10sdv-7tp8f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10sdv-7tp4f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10sdv-7tp4f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10sdv-2c-7tp4f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10sdv-2c-7tp4f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10sdv-4c-7tp4f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10sdv-4c-7tp4f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10sdv-2c-tp4f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10sdv-2c-tp4f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10sdv-4c\\+-tp4f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10sdv-4c\\+-tp4f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10sdv-2c-tp8f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10sdv-2c-tp8f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10sdv-tp8f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10sdv-tp8f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10sdv-f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10sdv-f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10sdv-tln4f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10sdv-tln4f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10sdv-8c-tln4f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10sdv-8c-tln4f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10sdv-6c-tln4f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10sdv-6c-tln4f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10sdv-2c-tln2f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10sdv-2c-tln2f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10sdv-4c-tln2f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10sdv-4c-tln2f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10sdv-4c-tln4f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10sdv-4c-tln4f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10sdv-4c\\+-tln4f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10sdv-4c\\+-tln4f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10sdv-6c\\+-tln4f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10sdv-6c\\+-tln4f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10sdv-8c-tln4f\\+_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10sdv-8c-tln4f\\+:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10sdv-8c\\+-ln2f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10sdv-8c\\+-ln2f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10sdv-12c-tln4f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10sdv-12c-tln4f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10sdv-12c-tln4f\\+_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10sdv-12c-tln4f\\+:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10sdv-12c\\+-tln4f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10sdv-12c\\+-tln4f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10sdv-16c\\+-tln4f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10sdv-16c\\+-tln4f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10sdv-16c-tln4f\\+_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10sdv-16c-tln4f\\+:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:x10sdv-16c-tln4f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:x10sdv-16c-tln4f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:a1srm-ln7f-2358_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:a1srm-ln7f-2358:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:a1srm-ln7f-2758_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:a1srm-ln7f-2758:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:a1srm-ln5f-2358_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:a1srm-ln5f-2358:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:a1sa2-2750f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:a1sa2-2750f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:a1sam-2750f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:a1sam-2750f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:a1sam-2550f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:a1sam-2550f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:a1srm-2758f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:a1srm-2758f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:a1srm-2558f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:a1srm-2558f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:a1sai-2750f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:a1sai-2750f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:a1sai-2550f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:a1sai-2550f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:a1sri-2758f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:a1sri-2758f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:a1sri-2558f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:a1sri-2558f:-:*:*:*:*:*:*:*", "cpe:2.3:o:supermicro:a1sri-2358f_firmware:3.83:*:*:*:*:*:*:*", "cpe:2.3:h:supermicro:a1sri-2358f:-:*:*:*:*:*:*:*" ]
null
10
null
7.5
CVE-2024-2024
Folders Pro <= 3.0.2 - Authenticated(Author+) Arbitrary File Upload via handle_folders_file_upload
The Folders Pro plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'handle_folders_file_upload' function in all versions up to, and including, 3.0.2. This makes it possible for authenticated attackers, with author access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
[]
null
8.8
null
null
CVE-2023-40611
Apache Airflow Dag Runs Broken Access Control Vulnerability
Apache Airflow, versions before 2.7.1, is affected by a vulnerability that allows authenticated and DAG-view authorized Users to modify some DAG run detail values when submitting notes. This could have them alter details such as configuration parameters, start date, etc. Users should upgrade to version 2.7.1 or later which has removed the vulnerability.
[ "cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*" ]
null
4.3
null
null
CVE-2019-6640
On BIG-IP 14.1.0-14.1.0.5, 14.0.0-14.0.0.4, 13.0.0-13.1.1.4, 12.1.0-12.1.4, 11.6.1-11.6.3.4, and 11.5.1-11.5.8, SNMP exposes sensitive configuration objects over insecure transmission channels. This issue is exposed when a passphrase is inserted into various profile types and accessed using SNMPv2.
[ "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*" ]
null
5.3
null
5
CVE-2025-24801
GLPI allows authenticated remote code execution
GLPI is a free asset and IT management software package. An authenticated user can upload and force the execution of *.php files located on the GLPI server. This vulnerability is fixed in 10.0.18.
[]
null
8.6
null
null
CVE-2021-0337
In moveInMediaStore of FileSystemProvider.java, there is a possible file exposure due to stale metadata. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-157474195
[ "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*" ]
null
7.8
null
7.2
GHSA-j49j-9f8j-jjfx
Improper setting of device configuration in system firmware for Intel(R) NUC kits may allow a privileged user to potentially enable escalation of privilege via physical access.
[]
null
null
6.2
null
CVE-2004-0682
comersus_gatewayPayPal.asp in Comersus Cart 5.09, and possibly other versions before 5.098, allows remote attackers to change the prices of items by directly modifying them in the URL.
[ "cpe:2.3:a:comersus_open_technologies:comersus_cart:5.0.9:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-7g23-63v6-c2vh
Joomla! before 1.5.4 allows attackers to access administration functionality, which has unknown impact and attack vectors related to a missing "LDAP security fix."
[]
null
null
null
null
GHSA-v2vx-4w8c-2w28
SQL injection vulnerability in CategoryManager/upload_image_category.asp in DMXReady Secure Document Library 1.1 and earlier allows remote attackers to execute arbitrary SQL commands via the cid parameter.
[]
null
null
null
null
GHSA-988m-8h76-4f64
The js-jobs plugin before 1.0.7 for WordPress has CSRF.
[]
null
null
8.8
null
CVE-2018-1316
The ODE process deployment web service was sensible to deployment messages with forged names. Using a path for the name was allowing directory traversal, resulting in the potential writing of files under unwanted locations, the overwriting of existing files or their deletion. This issue was addressed in Apache ODE 1.3.3 which was released in 2009, however the incorrect name CVE-2008-2370 was used on the advisory by mistake.
[ "cpe:2.3:a:apache:ode:*:*:*:*:*:*:*:*", "cpe:2.3:a:apache:ode:1.0:incubating:*:*:*:*:*:*", "cpe:2.3:a:apache:ode:1.0:rc1-incubating:*:*:*:*:*:*", "cpe:2.3:a:apache:ode:1.0:rc2-incubating:*:*:*:*:*:*", "cpe:2.3:a:apache:ode:1.0:rc3-incubating:*:*:*:*:*:*", "cpe:2.3:a:apache:ode:1.0:rc4-incubating:*:*:*:*:*:*", "cpe:2.3:a:apache:ode:1.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:apache:ode:1.1:rc2:*:*:*:*:*:*", "cpe:2.3:a:apache:ode:1.1:rc3:*:*:*:*:*:*", "cpe:2.3:a:apache:ode:1.1:rc4:*:*:*:*:*:*", "cpe:2.3:a:apache:ode:1.1:rc5:*:*:*:*:*:*", "cpe:2.3:a:apache:ode:1.1.1:rc1:*:*:*:*:*:*" ]
null
null
7.5
6.4
ICSA-22-090-06
General Electric Renewable Energy MDS Radios
This previously disclosed vulnerability in the GoAhead Webserver may allow remote code execution in iNET/iNET II, TD220X, and TD220MAX series radios.CVE-2017-17562 has been assigned to this vulnerability. A CVSS v3 base score of 10.0 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). iNET/iNET II series radios allow unauthenticated local and network access to the device configuration shell.CVE-2022-24119 has been assigned to this vulnerability. A CVSS v3 base score of 10.0 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). This vulnerability identifies a weakness in the wireless security software and chipset implementations in iNET/iNET II series radios.CVE-2022-24116 has been assigned to this vulnerability. A CVSS v3 base score of 8.0 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). A feature can allow the use of an authentication code to cause iNET/iNET II, SD, TD220X, and TD220MAX series radios to reset back to the factory default configuration and reboot.CVE-2022-24118 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H). iNET and iNET II series radios store credentials in plaintext on the system flash memory.CVE-2022-24120 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). There is no cryptographic signature to verify authenticity of firmware.CVE-2022-24117 has been assigned to this vulnerability. A CVSS v3 base score of 8.4 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H).
[]
null
null
8.4
null
CVE-2023-26519
WordPress Publish to Schedule Plugin <= 4.5.4 is vulnerable to Cross Site Scripting (XSS)
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Alex Benfica Publish to Schedule plugin <= 4.5.4 versions.
[ "cpe:2.3:a:publish_to_schedule_project:publish_to_schedule:*:*:*:*:*:wordpress:*:*" ]
null
5.9
null
null
CVE-2021-30683
A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur 11.4, Security Update 2021-003 Catalina, Security Update 2021-004 Mojave. A malicious application could execute arbitrary code leading to compromise of user information.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-003:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
GHSA-9w7f-mwxm-3g85
An issue was discovered in GitLab CE/EE affecting all versions starting from 16.4 prior to 17.1.7, starting from 17.2 prior to 17.2.5, starting from 17.3 prior to 17.3.2 which could cause Denial of Service via sending a large `glm_source` parameter.
[]
null
7.5
null
null
CVE-2008-6294
admin/Index.php in Acc Statistics 1.1 allows remote attackers to bypass authentication and gain administrative access by setting the username_cookie cookie to "admin."
[ "cpe:2.3:a:accscripts:acc_statistics:1.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2008-6543
Multiple PHP remote file inclusion vulnerabilities in ComScripts TEAM Quick Classifieds 1.0 via the DOCUMENT_ROOT parameter to (1) index.php3, (2) locate.php3, (3) search_results.php3, (4) classifieds/index.php3, and (5) classifieds/view.php3; (6) index.php3, (7) manager.php3, (8) pass.php3, (9) remember.php3 (10) sign-up.php3, (11) update.php3, (12) userSet.php3, and (13) verify.php3 in controlcenter/; (14) alterCats.php3, (15) alterFeatured.php3, (16) alterHomepage.php3, (17) alterNews.php3, (18) alterTheme.php3, (19) color_help.php3, (20) createdb.php3, (21) createFeatured.php3, (22) createHomepage.php3, (23) createL.php3, (24) createM.php3, (25) createNews.php3, (26) createP.php3, (27) createS.php3, (28) createT.php3, (29) index.php3, (30) mailadmin.php3, and (31) setUp.php3 in controlpannel/; (32) include/sendit.php3 and (33) include/sendit2.php3; and possibly (34) include/adminHead.inc, (35) include/usersHead.inc, and (36) style/default.scheme.inc.
[ "cpe:2.3:a:comscripts:quick_classifieds:1.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-rwfg-mjhh-rj23
A cross-site scripting vulnerability in Trellix Central Management (CM) prior to 9.1.3.97129 allows a remote authenticated attacker to craft CM dashboard internal requests causing arbitrary content to be injected into the response when accessing the CM dashboard.
[]
null
4.6
null
null
GHSA-vj52-633x-8xpp
A security vulnerability exists in a management port in the version of ZTE's ZXMP M721V3.10P01B10_M2NCP. An attacker could exploit this vulnerability to build a link to the device and send specific packets to cause a denial of service.
[]
null
null
null
null
GHSA-3g2g-rcm6-rrq2
Cleartext Transmission of Sensitive Information in Jenkins JIRA Pipeline Steps Plugin
Jenkins JIRA Pipeline Steps Plugin 2.0.165.v8846cf59f3db and earlier transmits the private key in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure.
[]
null
5.5
null
null
CVE-2022-3616
OctoRPKI crash when maximum iterations number is reached
Attackers can create long chains of CAs that would lead to OctoRPKI exceeding its max iterations parameter. In consequence it would cause the program to crash, preventing it from finishing the validation and leading to a denial of service. Credits to Donika Mirdita and Haya Shulman - Fraunhofer SIT, ATHENE, who discovered and reported this vulnerability.
[ "cpe:2.3:a:cloudflare:octorpki:*:*:*:*:*:*:*:*" ]
null
5.4
null
null
GHSA-r9mw-f2c2-56rh
SQL injection vulnerability in the member function in classes/member.php in WSN Guest 1.24 allows remote attackers to execute arbitrary SQL commands via the wsnuser cookie to index.php.
[]
null
null
null
null
GHSA-m84f-q6r9-jhvp
An issue was discovered in certain Apple products. macOS before 10.13 is affected. The issue involves the "DesktopServices" component. It allows local users to bypass intended access restrictions on home folder files.
[]
null
null
5.5
null
GHSA-544g-2gcv-p698
The kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to bypass the ASLR protection mechanism via a crafted function call, aka "Microsoft Windows Kernel Memory Disclosure Vulnerability," a different vulnerability than CVE-2015-1677, CVE-2015-1678, CVE-2015-1679, and CVE-2015-1680.
[]
null
null
null
null
CVE-2020-26914
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D6200 before 1.1.00.38, D7000 before 1.0.1.78, JR6150 before 1.0.1.24, R6020 before 1.0.0.42, R6050 before 1.0.1.24, R6080 before 1.0.0.42, R6120 before 1.0.0.66, R6220 before 1.1.0.100, R6260 before 1.1.0.64, R6700v2 before 1.2.0.62, R6800 before 1.2.0.62, R6900v2 before 1.2.0.62, R7450 before 1.2.0.62, and WNR2020 before 1.1.0.62.
[ "cpe:2.3:o:netgear:d6200_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d6200:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:d7000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d7000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:jr6150_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:jr6150:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6020_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6020:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6050_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6050:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6080_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6080:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6120_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6120:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6220_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6220:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6260_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6260:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6700v2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6700v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6800_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6800:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6900v2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6900v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7450_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7450:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wnr2020_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wnr2020:-:*:*:*:*:*:*:*" ]
null
6.7
null
null
CVE-2017-0889
Paperclip ruby gem version 3.1.4 and later suffers from a Server-SIde Request Forgery (SSRF) vulnerability in the Paperclip::UriAdapter class. Attackers may be able to access information about internal network resources.
[ "cpe:2.3:a:thoughtbot:paperclip:*:*:*:*:*:ruby:*:*" ]
null
null
9.8
7.5
RHSA-2015:0789
Red Hat Security Advisory: openstack-packstack and openstack-puppet-modules security and bug fix update
openstack-puppet-modules: pacemaker configured with default password
[ "cpe:/a:redhat:openstack:6::el7" ]
null
null
null
null
CVE-2018-0032
Junos OS: RPD crash when receiving a crafted BGP UPDATE
The receipt of a crafted BGP UPDATE can lead to a routing process daemon (RPD) crash and restart. Repeated receipt of the same crafted BGP UPDATE can result in an extended denial of service condition for the device. This issue only affects the specific versions of Junos OS listed within this advisory. Earlier releases are unaffected by this vulnerability. This crafted BGP UPDATE does not propagate to other BGP peers. Affected releases are Juniper Networks Junos OS: 16.1X65 versions prior to 16.1X65-D47; 17.2X75 versions prior to 17.2X75-D91, 17.2X75-D110; 17.3 versions prior to 17.3R1-S4, 17.3R2; 17.4 versions prior to 17.4R1-S3, 17.4R2.
[ "cpe:2.3:o:juniper:junos:16.1x65:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.1x65:d30:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.1x65:d35:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:16.1x65:d40:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.2x75:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.3:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:17.4:r1:*:*:*:*:*:*" ]
null
null
7.5
null
GHSA-w77j-2gh3-6mvp
Use after free in Extensions in Google Chrome prior to 100.0.4896.60 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via specific user interaction and profile destruction.
[]
null
7.5
null
null
GHSA-m793-xp46-r76w
Under certain circumstances, a user opt-in setting that Focus should require authentication before use could have been be bypassed (distinct from CVE-2025-0245). This vulnerability affects Firefox < 136.
[]
null
9.1
null
null
CVE-2020-2011
PAN-OS: Panorama registration denial of service
An improper input validation vulnerability in the configuration daemon of Palo Alto Networks PAN-OS Panorama allows for a remote unauthenticated user to send a specifically crafted registration request to the device that causes the configuration service to crash. Repeated attempts to send this request result in denial of service to all PAN-OS Panorama services by restarting the device and putting it into maintenance mode. This issue affects: All versions of PAN-OS 7.1, PAN-OS 8.0; PAN-OS 8.1 versions earlier than 8.1.14; PAN-OS 9.0 versions earlier than 9.0.7; PAN-OS 9.1 versions earlier than 9.1.0.
[ "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-2r7g-mf5h-9gcw
Microsoft Windows XP SP2 and SP3, and Server 2003 SP1 and SP2, does not properly validate the option length field in Pragmatic General Multicast (PGM) packets, which allows remote attackers to cause a denial of service (infinite loop and system hang) via a crafted PGM packet, aka the "PGM Invalid Length Vulnerability."
[]
null
null
null
null
GHSA-527v-75q9-6w5g
Multiple cross-site scripting (XSS) vulnerabilities in Unica Affinium Campaign 7.2.1.0.55 allow remote attackers to inject arbitrary web script or HTML via a Javascript event in the (1) url, (2) PageName, and (3) title parameters in a CustomBookMarkLink action to Campaign/Campaign; (4) a Javascript event in the displayIcon parameter to Campaign/updateOfferTemplateSubmit.do (aka the templates web page); (5) crafted input to Campaign/CampaignListener (aka the listener server), which is not properly handled when displaying the status log; and (6) id parameter to Campaign/campaignDetails.do, (7) id parameter to Campaign/offerDetails.do, (8) function parameter to Campaign/Campaign, (9) sessionID parameter to Campaign/runAllFlowchart.do, (10) id parameter in an edit action to Campaign/updateOfferTemplatePage.do, (11) Frame parameter in a LoadFrame action to Campaign/Campaign, (12) affiniumUserName parameter to manager/jsp/test.jsp, (13) affiniumUserName parameter to Campaign/main.do, and possibly other vectors.
[]
null
null
null
null
GHSA-g328-m8jq-63j6
VMware vCenter Server 5.5 before u3 and 6.0 before u1 does not verify X.509 certificates from TLS LDAP servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
null
null
CVE-2023-46979
TOTOLINK X6000R V9.4.0cu.852_B20230719 was discovered to contain a command injection vulnerability via the enable parameter in the setLedCfg function.
[ "cpe:2.3:o:totolink:x6000r_firmware:9.4.0cu.852_b20230719:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:x6000r:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2019-1214
An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory, aka 'Windows Common Log File System Driver Elevation of Privilege Vulnerability'.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
7.8
null
7.2
GHSA-cg7p-mpr5-rxjh
tinyproxy HTTP proxy 1.5.0, 1.4.3, and earlier allows remote attackers to execute arbitrary code via memory that is freed twice (double-free).
[]
null
null
null
null
GHSA-3v4m-w579-rrr3
The Orange Form WordPress plugin through 1.0.1 does not have any authorisation and CSRF checks in all of its AJAX calls, for example the or_delete_filed one which is available to both unauthenticated and authenticated users could allow attackers to delete arbitrary posts.The AJAX calls performing actions on posts also do not ensure that the post belong to them (or that they are allowed to perform such action on it)
[]
null
null
null
null
CVE-2018-4290
A denial of service issue was addressed with improved memory handling. This issue affected versions prior to iOS 11.4.1, watchOS 4.3.2.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
null
null
5.9
4.3
GHSA-96jv-vj39-x4j6
Argo CD improper access control bug can allow malicious user to escalate privileges to admin level
ImpactImpacts for versions starting with v1.0.0All unpatched versions of Argo CD starting with v1.0.0 are vulnerable to an improper access control bug, allowing a malicious user to potentially escalate their privileges to admin-level.To perform the following exploits, an authorized Argo CD user must have push access to an Application's source git or Helm repository or `sync` and `override` access to an Application. Once a user has that access, different exploitation levels are possible depending on their other RBAC privileges:If that user has `update` access to the Application, they can modify any resource on the Application's destination cluster. If the destination cluster is or can be made to be the same as the cluster hosting Argo CD, the user can escalate their Argo CD permissions to admin-level.If the user has `delete` access to the Application, they can delete any resource on the Application's destination cluster. (This exploit is possible starting with v0.8.0.)If the user has `get` access to the Application, they can view any resource on the Application's destination cluster (except for the contents of Secrets) and list [actions](https://argo-cd.readthedocs.io/en/stable/operator-manual/resource_actions/) available for that resource.If the user has `get` access to the Application, they can view the logs of any Pods on the Application's destination cluster.If the user has `action/{some action or *}` access on the Application, they can run an action for any resource (which supports the allowed action(s)) on the Application's destination cluster. (Some actions are available in Argo CD by default, and others may be configured by an Argo CD admin.)See the [Argo CD RBAC documentation](https://argo-cd.readthedocs.io/en/stable/operator-manual/rbac/#rbac-resources-and-actions) for an explanation of the privileges available in Argo CD.Events exploitA related exploit is possible for a user with `get` access to an Application **even if they do not have access to the Application's source git or Helm repository or `sync` and `override` access to the Application**. The user can access any Event in the Application's destination cluster if they know the involved object's name, UID, and namespace.Impacts for versions starting with v0.8.0The same bug exists starting with v0.8.0, but only the following exploits were possible before v1.0.0:The `delete exploit` (#⁠2 above).The logs exploit (#⁠4 above).The Events exploit described above.Impacts for versions starting with v0.5.0The same bug exists starting with v0.5.0 (when RBAC was implemented), but only the Events exploit described above was possible before v0.8.0.Patches A patch for this vulnerability has been released in the following Argo CD versions:v2.3.2v2.2.8v2.1.14**Versions 2.0.x and earlier users**: See the changelog for links to upgrade instructions for your version. It is imperative to upgrade quickly, but some limited mitigations are described in the next section.**argo-helm chart users**: Argo CD users deploying v2.3.x with argo-helm can upgrade the chart to version 4.2.2. Argo CD 2.2 and 2.1 users can set the global.image.tag value to the latest in your current release series (v2.2.8, or v2.1.14). Since charts for the 2.2 and 2.1 series are no longer maintained, you will need to either leave the value override in place or upgrade to the 4.x chart series (and therefore to Argo CD 2.3).WorkaroundsThe only certain way to avoid the vulnerability is to upgrade.MitigationsTo avoid privilege escalation:Limit who has push access to Application source repositories or sync + override access to Applications.Limit which repositories are available in projects where users have update access to Applications.To avoid unauthorized resource inspection/tampering:Limit who has delete, get, or action access to Applications.These mitigations can help limit potential damage, but they are not a substitute for upgrading. It is necessary to upgrade immediately.
[]
null
8.8
null
null
GHSA-mfxp-rc9g-82p5
D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the config.smtp_email_subject parameter at /goform/formSetEmail.
[]
null
9.8
null
null
GHSA-g93r-3jrg-24gc
A stored cross-site scripting (XSS) vulnerability in Serosoft Solutions Pvt Ltd Academia Student Information System (SIS) EagleR v1.0.118 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Print Name parameter at /rest/staffResource/update.
[]
null
5.4
null
null
GHSA-c7mp-wpm2-4qqg
Windows Point-to-Point Tunneling Protocol Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-41090.
[]
null
5.9
null
null
CVE-2017-0185
A denial of service vulnerability exists when Microsoft Hyper-V Network Switch running on a Windows 10, Windows 8.1, Windows Server 2012, Windows Server 2012 R2, or Windows Server 2016 host server fails to properly validate input from a privileged user on a guest operating system, aka "Hyper-V Denial of Service Vulnerability." This CVE ID is unique from CVE-2017-0178, CVE-2017-0179, CVE-2017-0182, CVE-2017-0183, CVE-2017-0184, and CVE-2017-0186.
[ "cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*" ]
null
null
5.8
6.3
CVE-2024-13334
Car Demon <= 1.8.1 - Reflected Cross-Site Scripting
The Car Demon plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'search_condition' parameter in all versions up to, and including, 1.8.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[]
null
6.1
null
null
CVE-2020-36842
Migration, Backup, Staging – WPvivid <= 0.9.35 - Authenticated (Subscriber+) Arbitrary File Upload
The Migration, Backup, Staging – WPvivid plugin for WordPress is vulnerable to arbitrary file uploads due to a missing capability check on the wpvivid_upload_import_files and wpvivid_upload_files AJAX actions that allows low-level authenticated attackers to upload zip files that can be subsequently extracted. This affects versions up to, and including 0.9.35.
[ "cpe:2.3:a:wpvivid:migration\\,_backup\\,_staging:*:*:*:*:*:wordpress:*:*" ]
null
8.8
null
null
CVE-2010-2119
Microsoft Internet Explorer 6.0.2900.2180 allows remote attackers to cause a denial of service (resource consumption) via JavaScript code containing an infinite loop that creates IFRAME elements for invalid nntp:// URIs.
[ "cpe:2.3:a:microsoft:internet_explorer:6.0.2900.2180:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2022-23285
Remote Desktop Client Remote Code Execution Vulnerability
Remote Desktop Client Remote Code Execution Vulnerability
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server:2022:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-6p5q-h963-pwwf
Apache AGE: Python and Golang drivers allow data manipulation and exposure due to SQL injection
There are issues with the AGE drivers for Golang and Python that enable SQL injections to occur. This impacts AGE for PostgreSQL 11 & AGE for PostgreSQL 12, all versions up-to-and-including 1.1.0, when using those drivers. The fix is to update to the latest Golang and Python drivers in addition to the latest version of AGE that is used for PostgreSQL 11 or PostgreSQL 12. The update of AGE will add a new function to enable parameterization of the cypher() function, which, in conjunction with the driver updates, will resolve this issue. Background (for those who want more information): After thoroughly researching this issue, we found that due to the nature of the cypher() function, it was not easy to parameterize the values passed into it. This enabled SQL injections, if the developer of the driver wasn't careful. The developer of the Golang and Pyton drivers didn't fully utilize parameterization, likely because of this, thus enabling SQL injections. The obvious fix to this issue is to use parameterization in the drivers for all PG SQL queries. However, parameterizing all PG queries is complicated by the fact that the cypher() function call itself cannot be parameterized directly, as it isn't a real function. At least, not the parameters that would take the graph name and cypher query. The reason the cypher() function cannot have those values parameterized is because the function is a placeholder and never actually runs. The cypher() function node, created by PG in the query tree, is transformed and replaced with a query tree for the actual cypher query during the analyze phase. The problem is that parameters - that would be passed in and that the cypher() function transform needs to be resolved - are only resolved in the execution phase, which is much later. Since the transform of the cypher() function needs to know the graph name and cypher query prior to execution, they can't be passed as parameters. The fix that we are testing right now, and are proposing to use, is to create a function that will be called prior to the execution of the cypher() function transform. This new function will allow values to be passed as parameters for the graph name and cypher query. As this command will be executed prior to the cypher() function transform, its values will be resolved. These values can then be cached for the immediately following cypher() function transform to use. As added features, the cached values will store the calling session's pid, for validation. And, the cypher() function transform will clear this cached information after function invocation, regardless of whether it was used. This method will allow the parameterizing of the cypher() function indirectly and provide a way to lock out SQL injection attacks.
[]
null
8.1
null
null
GHSA-7jcv-rmg2-jm39
An unauthenticated attacker can infer the existence of usernames in the system by querying an API.
[]
6.9
5.3
null
null
CVE-2018-11008
An Incorrect Access Control issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53.
[ "cpe:2.3:a:k7computing:antivrius:*:*:*:*:premium:*:*:*", "cpe:2.3:a:k7computing:enterprise_security:*:*:*:*:*:*:*:*", "cpe:2.3:a:k7computing:total_security:*:*:*:*:*:*:*:*", "cpe:2.3:a:k7computing:ultimate_security:*:*:*:*:*:*:*:*" ]
null
5.5
null
4.3
CVE-2016-6360
A vulnerability in Advanced Malware Protection (AMP) for Cisco Email Security Appliances (ESA) and Web Security Appliances (WSA) could allow an unauthenticated, remote attacker to cause a partial denial of service (DoS) condition due to the AMP process unexpectedly restarting. Affected Products: Cisco AsyncOS Software for Email Security Appliances (ESA) versions 9.5 and later up to the first fixed release, Cisco AsyncOS Software for Web Security Appliances (WSA) all versions prior to the first fixed release. More Information: CSCux56406, CSCux59928. Known Affected Releases: 9.6.0-051 9.7.0-125 8.8.0-085 9.5.0-444 WSA10.0.0-000. Known Fixed Releases: 9.7.1-066 WSA10.0.0-233.
[ "cpe:2.3:a:cisco:email_security_appliance:9.5.0-000:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:email_security_appliance:9.5.0-201:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:email_security_appliance:9.6.0-000:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:email_security_appliance:9.6.0-042:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:email_security_appliance:9.6.0-051:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:email_security_appliance:9.7.0-125:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:web_security_appliance:8.8.0-085:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:web_security_appliance:9.0.0-193:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:web_security_appliance:9.0_base:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:web_security_appliance:9.1.0-000:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:web_security_appliance:9.1.0-070:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:web_security_appliance:9.1_base:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:web_security_appliance:9.5.0-235:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:web_security_appliance:9.5.0-284:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:web_security_appliance:9.5.0-444:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:web_security_appliance:9.5_base:*:*:*:*:*:*:*" ]
null
null
7.5
5
CVE-2020-1866
There is an out-of-bounds read vulnerability in several products. The software reads data past the end of the intended buffer when parsing certain crafted DHCP messages. Successful exploit could cause certain service abnormal. Affected product versions include:NIP6800 versions V500R001C30,V500R001C60SPC500,V500R005C00;S12700 versions V200R008C00;S2700 versions V200R008C00;S5700 versions V200R008C00;S6700 versions V200R008C00;S7700 versions V200R008C00;S9700 versions V200R008C00;Secospace USG6600 versions V500R001C30SPC200,V500R001C30SPC600,V500R001C60SPC500,V500R005C00;USG9500 versions V500R001C30SPC300,V500R001C30SPC600,V500R001C60SPC500,V500R005C00.
[ "cpe:2.3:o:huawei:nip6800_firmware:v500r001c30:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6800_firmware:v500r001c60spc500:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6800_firmware:v500r005c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:nip6800:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s12700_firmware:v200r008c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:s12700:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s2700_firmware:v200r008c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:s2700:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s7700_firmware:v200r008c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:s7700:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s9700_firmware:v200r008c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:s9700:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc200:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30spc600:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c60spc500:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r005c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc300:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9500_firmware:v500r001c30spc600:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9500_firmware:v500r001c60spc500:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:usg9500_firmware:v500r005c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:usg9500:-:*:*:*:*:*:*:*" ]
null
6.5
null
3.3
GHSA-pw59-9rv7-8jcx
OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6e41a8.
[]
null
6.5
null
null
GHSA-42r6-p4px-qvv6
tgstation-server cached user logins in legacy server
Please note this advisory is for a historical preexisting issue in the legacy server from 2018. It has long since been triaged. It is being moved here for visibility. The text below is copied from the original issue #690You can login to the server with any username/password combination if someone else is logged inAn explanation of the bug: Back in 3.2.1.0, in order to accommodate running the Control Panel using Mono some hooks were added to the WCF communication layer. Detailed in this commit: https://github.com/tgstation/tgstation-server/commit/2894ea03d708c7f16bab47ba5020c2ad4c3d5554#diff-0ba090ea7073a3a304dfdbdfc512f733The bug was in this line: https://github.com/tgstation/tgstation-server/commit/2894ea03d708c7f16bab47ba5020c2ad4c3d5554#diff-0ba090ea7073a3a304dfdbdfc512f733R48 authPolicy is passed in by the framework but the documentation for what the parameter is is virtually non-existent: https://docs.microsoft.com/en-us/dotnet/api/system.servicemodel.serviceauthenticationmanager.authenticate?view=netframework-4.7.2#System_ServiceModel_ServiceAuthenticationManager_Authenticate_System_Collections_ObjectModel_ReadOnlyCollection_System_IdentityModel_Policy_IAuthorizationPolicy__System_Uri_System_ServiceModel_Channels_Message__Turns out it is a cache of what the previously returned policy was, as Floyd thankfully found out for us. The security patch fixes the issue by creating a new empty list as the return value when password authentication fails as opposed to using the authPolicy parameter.If you're wondering why this line: https://github.com/tgstation/tgstation-server/commit/2894ea03d708c7f16bab47ba5020c2ad4c3d5554#diff-0ba090ea7073a3a304dfdbdfc512f733R42 didn't prevent the issue. It only invalidated the actual Windows login session, but in the eyes of the server the user was still valid since we just passed that closed handle as a return result. Had access to static files been attempted with a bad login, the request would end up erroring due to trying to impersonate using a closed user token handle.This has been fixed in 1812a9c6793c8516c138a105ccfb2108164f0eff and versions 3.2.5.0+
[]
null
8.3
null
null
CVE-2021-29770
IBM i2 Analyst's Notebook Premium (IBM i2 Analyze 4.3.0, 4.3.1, and 4.3.2) could allow an authenticated user to perform unauthorized actions due to hazardous input validation. IBM X-Force ID: 202771.
[ "cpe:2.3:a:ibm:i2_analyze:4.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:i2_analyze:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:i2_analyze:4.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
4.1
null
GHSA-77gp-3h4r-6428
Out of bounds read and write in Tensorflow
ImpactThere is a typo in TensorFlow's [`SpecializeType`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/full_type_util.cc#L81-L102) which results in heap OOB read/write:Due to a typo, `arg` is initialized to the `i`th mutable argument in a loop where the loop index is `j`. Hence it is possible to assign to `arg` from outside the vector of arguments. Since this is a mutable proto value, it allows both read and write to outside of bounds data.PatchesWe have patched the issue in GitHub commit [0657c83d08845cc434175934c642299de2c0f042](https://github.com/tensorflow/tensorflow/commit/0657c83d08845cc434175934c642299de2c0f042).The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, and TensorFlow 2.6.3, as these are also affected and still in supported range.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
[]
8.7
8.8
null
null