Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2013-5904

Summary
Assigner-oracle
Assigner Org ID-43595867-4340-4103-b7a2-9a5208d29a85
Published At-15 Jan, 2014 | 01:33
Updated At-06 Aug, 2024 | 17:29
Rejected At-
Credits

Unspecified vulnerability in Oracle Java SE 7u45 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:oracle
Assigner Org ID:43595867-4340-4103-b7a2-9a5208d29a85
Published At:15 Jan, 2014 | 01:33
Updated At:06 Aug, 2024 | 17:29
Rejected At:
▼CVE Numbering Authority (CNA)

Unspecified vulnerability in Oracle Java SE 7u45 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://secunia.com/advisories/56535
third-party-advisory
x_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2014-0030.html
vendor-advisory
x_refsource_REDHAT
http://secunia.com/advisories/56485
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=139402697611681&w=2
vendor-advisory
x_refsource_HP
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777
x_refsource_CONFIRM
http://www.securityfocus.com/bid/64890
vdb-entry
x_refsource_BID
http://marc.info/?l=bugtraq&m=139402697611681&w=2
vendor-advisory
x_refsource_HP
http://www.securitytracker.com/id/1029608
vdb-entry
x_refsource_SECTRACK
http://osvdb.org/101993
vdb-entry
x_refsource_OSVDB
http://www.securityfocus.com/bid/64758
vdb-entry
x_refsource_BID
http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilities/90336
vdb-entry
x_refsource_XF
Hyperlink: http://secunia.com/advisories/56535
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://rhn.redhat.com/errata/RHSA-2014-0030.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://secunia.com/advisories/56485
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=139402697611681&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securityfocus.com/bid/64890
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://marc.info/?l=bugtraq&m=139402697611681&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.securitytracker.com/id/1029608
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://osvdb.org/101993
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://www.securityfocus.com/bid/64758
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
Resource:
x_refsource_CONFIRM
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/90336
Resource:
vdb-entry
x_refsource_XF
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://secunia.com/advisories/56535
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://rhn.redhat.com/errata/RHSA-2014-0030.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://secunia.com/advisories/56485
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=139402697611681&w=2
vendor-advisory
x_refsource_HP
x_transferred
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777
x_refsource_CONFIRM
x_transferred
http://www.securityfocus.com/bid/64890
vdb-entry
x_refsource_BID
x_transferred
http://marc.info/?l=bugtraq&m=139402697611681&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www.securitytracker.com/id/1029608
vdb-entry
x_refsource_SECTRACK
x_transferred
http://osvdb.org/101993
vdb-entry
x_refsource_OSVDB
x_transferred
http://www.securityfocus.com/bid/64758
vdb-entry
x_refsource_BID
x_transferred
http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
x_refsource_CONFIRM
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/90336
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://secunia.com/advisories/56535
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://rhn.redhat.com/errata/RHSA-2014-0030.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://secunia.com/advisories/56485
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=139402697611681&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securityfocus.com/bid/64890
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=139402697611681&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.securitytracker.com/id/1029608
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://osvdb.org/101993
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://www.securityfocus.com/bid/64758
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/90336
Resource:
vdb-entry
x_refsource_XF
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert_us@oracle.com
Published At:15 Jan, 2014 | 16:08
Updated At:11 Apr, 2025 | 00:51

Unspecified vulnerability in Oracle Java SE 7u45 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.06.8MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
Type: Primary
Version: 2.0
Base score: 6.8
Base severity: MEDIUM
Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CPE Matches

Oracle Corporation
oracle
>>jre>>1.7.0
cpe:2.3:a:oracle:jre:1.7.0:update45:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_desktop_supplementary>>5.0
cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:5.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_desktop_supplementary>>6.0
cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_hpc_node_supplementary>>6.0
cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_server_supplementary>>5.0
cpe:2.3:o:redhat:enterprise_linux_server_supplementary:5.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_server_supplementary>>6.0
cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_server_supplementary_aus>>6.5
cpe:2.3:o:redhat:enterprise_linux_server_supplementary_aus:6.5:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_server_supplementary_eus>>6.5.z
cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.5.z:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>enterprise_linux_workstation_supplementary>>6.0
cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
HP Inc.
hp
>>jdk>>Versions up to 7.0.08(inclusive)
cpe:2.3:a:hp:jdk:*:*:*:*:*:*:*:*
HP Inc.
hp
>>jre>>Versions up to 7.0.08(inclusive)
cpe:2.3:a:hp:jre:*:*:*:*:*:*:*:*
HP Inc.
hp
>>hp-ux>>b.11.23
cpe:2.3:o:hp:hp-ux:b.11.23:*:*:*:*:*:*:*
HP Inc.
hp
>>hp-ux>>b.11.31
cpe:2.3:o:hp:hp-ux:b.11.31:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-noinfoPrimarynvd@nist.gov
CWE ID: NVD-CWE-noinfo
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Per: http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html "Applies to client deployment of Java only. This vulnerability can be exploited only through sandboxed Java Web Start applications and sandboxed Java applets."
Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://marc.info/?l=bugtraq&m=139402697611681&w=2secalert_us@oracle.com
Third Party Advisory
http://marc.info/?l=bugtraq&m=139402697611681&w=2secalert_us@oracle.com
Third Party Advisory
http://osvdb.org/101993secalert_us@oracle.com
Broken Link
http://rhn.redhat.com/errata/RHSA-2014-0030.htmlsecalert_us@oracle.com
Third Party Advisory
http://secunia.com/advisories/56485secalert_us@oracle.com
Permissions Required
http://secunia.com/advisories/56535secalert_us@oracle.com
Permissions Required
http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.htmlsecalert_us@oracle.com
Vendor Advisory
http://www.securityfocus.com/bid/64758secalert_us@oracle.com
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/64890secalert_us@oracle.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1029608secalert_us@oracle.com
Third Party Advisory
VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/90336secalert_us@oracle.com
N/A
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777secalert_us@oracle.com
Third Party Advisory
http://marc.info/?l=bugtraq&m=139402697611681&w=2af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://marc.info/?l=bugtraq&m=139402697611681&w=2af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://osvdb.org/101993af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://rhn.redhat.com/errata/RHSA-2014-0030.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/56485af854a3a-2127-422b-91ae-364da2661108
Permissions Required
http://secunia.com/advisories/56535af854a3a-2127-422b-91ae-364da2661108
Permissions Required
http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.htmlaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.securityfocus.com/bid/64758af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/64890af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1029608af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/90336af854a3a-2127-422b-91ae-364da2661108
N/A
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=139402697611681&w=2
Source: secalert_us@oracle.com
Resource:
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=139402697611681&w=2
Source: secalert_us@oracle.com
Resource:
Third Party Advisory
Hyperlink: http://osvdb.org/101993
Source: secalert_us@oracle.com
Resource:
Broken Link
Hyperlink: http://rhn.redhat.com/errata/RHSA-2014-0030.html
Source: secalert_us@oracle.com
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/56485
Source: secalert_us@oracle.com
Resource:
Permissions Required
Hyperlink: http://secunia.com/advisories/56535
Source: secalert_us@oracle.com
Resource:
Permissions Required
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
Source: secalert_us@oracle.com
Resource:
Vendor Advisory
Hyperlink: http://www.securityfocus.com/bid/64758
Source: secalert_us@oracle.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securityfocus.com/bid/64890
Source: secalert_us@oracle.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id/1029608
Source: secalert_us@oracle.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/90336
Source: secalert_us@oracle.com
Resource: N/A
Hyperlink: https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777
Source: secalert_us@oracle.com
Resource:
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=139402697611681&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://marc.info/?l=bugtraq&m=139402697611681&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://osvdb.org/101993
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://rhn.redhat.com/errata/RHSA-2014-0030.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://secunia.com/advisories/56485
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Permissions Required
Hyperlink: http://secunia.com/advisories/56535
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Permissions Required
Hyperlink: http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://www.securityfocus.com/bid/64758
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securityfocus.com/bid/64890
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id/1029608
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/90336
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

762Records found

CVE-2020-36183
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-2.42% / 84.52%
||
7 Day CHG~0.00%
Published-06 Jan, 2021 | 22:30
Updated-04 Aug, 2024 | 17:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool.

Action-Not Available
Vendor-n/aDebian GNU/LinuxOracle CorporationFasterXML, LLC.NetApp, Inc.
Product-primavera_unifiercloud_backupjd_edwards_enterpriseone_orchestratorprimavera_gatewaycommunications_network_charging_and_controlcommunications_session_route_managerretail_service_backbonecommunications_session_report_managercommunications_instant_messaging_serverautovue_for_agile_product_lifecycle_managementagile_plmcommunications_policy_managementcommunications_cloud_native_core_policyretail_merchandising_systemcommunications_convergent_charging_controllercommerce_platformblockchain_platformcommunications_cloud_native_core_unified_data_repositoryjackson-databindcommunications_evolved_communications_application_servercommunications_unified_inventory_managementservice_level_managerdocumakerapplication_testing_suitecommunications_services_gatekeeperbanking_virtual_account_managementretail_customer_management_and_segmentation_foundationinsurance_rules_palettecommunications_billing_and_revenue_managementcommunications_offline_mediation_controllerdebian_linuxbanking_supply_chain_financecommunications_diameter_signaling_routecommunications_pricing_design_centerbanking_credit_facilities_process_managementretail_xstore_point_of_serviceinsurance_policy_administrationbanking_corporate_lending_process_managementgoldengate_application_adaptersbanking_extensibility_workbenchcommunications_element_managerjd_edwards_enterpriseone_toolsbanking_treasury_managementwebcenter_portaldata_integratorn/a
CWE ID-CWE-502
Deserialization of Untrusted Data
CVE-2018-12364
Matching Score-8
Assigner-Mozilla Corporation
ShareView Details
Matching Score-8
Assigner-Mozilla Corporation
CVSS Score-8.8||HIGH
EPSS-0.26% / 49.35%
||
7 Day CHG~0.00%
Published-18 Oct, 2018 | 13:00
Updated-21 Oct, 2024 | 13:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NPAPI plugins, such as Adobe Flash, can send non-simple cross-origin requests, bypassing CORS by making a same-origin POST that does a 307 redirect to the target site. This allows for a malicious site to engage in cross-site request forgery (CSRF) attacks. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.

Action-Not Available
Vendor-Canonical Ltd.Red Hat, Inc.Mozilla CorporationDebian GNU/Linux
Product-enterprise_linux_serverubuntu_linuxdebian_linuxthunderbirdenterprise_linux_server_eusfirefoxfirefox_esrenterprise_linux_server_ausenterprise_linux_workstationenterprise_linux_server_tusenterprise_linux_desktopThunderbirdFirefox ESRFirefox
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2015-4849
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-6.8||MEDIUM
EPSS-1.42% / 79.79%
||
7 Day CHG~0.00%
Published-21 Oct, 2015 | 23:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in the Oracle Payments component in Oracle E-Business Suite 11.5.10.2, 12.0.6, 12.1.3, 12.2.3, and 12.2.4 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Punch-in. NOTE: the previous information is from the October 2015 CPU. Oracle has not commented on third-party claims that this issue is an XML External Entity (XXE) vulnerability, which allows remote attackers to cause a denial of service or conduct SMB Relay attacks via a crafted DTD in an XML request to OA_HTML/IspPunchInServlet.

Action-Not Available
Vendor-n/aOracle Corporation
Product-e-business_suiten/a
CVE-2018-12389
Matching Score-8
Assigner-Mozilla Corporation
ShareView Details
Matching Score-8
Assigner-Mozilla Corporation
CVSS Score-8.8||HIGH
EPSS-1.14% / 77.59%
||
7 Day CHG~0.00%
Published-28 Feb, 2019 | 18:00
Updated-05 Aug, 2024 | 08:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mozilla developers and community members reported memory safety bugs present in Firefox ESR 60.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox ESR < 60.3 and Thunderbird < 60.3.

Action-Not Available
Vendor-Canonical Ltd.Red Hat, Inc.Mozilla CorporationDebian GNU/Linux
Product-enterprise_linux_serverubuntu_linuxdebian_linuxthunderbirdenterprise_linux_server_eusfirefox_esrenterprise_linux_server_ausenterprise_linux_workstationenterprise_linux_server_tusenterprise_linux_desktopThunderbirdFirefox ESR
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2018-12363
Matching Score-8
Assigner-Mozilla Corporation
ShareView Details
Matching Score-8
Assigner-Mozilla Corporation
CVSS Score-8.8||HIGH
EPSS-0.63% / 69.33%
||
7 Day CHG~0.00%
Published-18 Oct, 2018 | 13:00
Updated-21 Oct, 2024 | 13:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A use-after-free vulnerability can occur when script uses mutation events to move DOM nodes between documents, resulting in the old document that held the node being freed but the node still having a pointer referencing it. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 60, Thunderbird < 52.9, Firefox ESR < 60.1, Firefox ESR < 52.9, and Firefox < 61.

Action-Not Available
Vendor-Canonical Ltd.Red Hat, Inc.Mozilla CorporationDebian GNU/Linux
Product-enterprise_linux_serverubuntu_linuxdebian_linuxthunderbirdenterprise_linux_server_eusfirefoxfirefox_esrenterprise_linux_server_ausenterprise_linux_workstationenterprise_linux_server_tusenterprise_linux_desktopThunderbirdFirefox ESRFirefox
CWE ID-CWE-416
Use After Free
CVE-2018-1088
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-8.1||HIGH
EPSS-5.68% / 90.05%
||
7 Day CHG~0.00%
Published-18 Apr, 2018 | 16:00
Updated-05 Aug, 2024 | 03:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A privilege escalation flaw was found in gluster 3.x snapshot scheduler. Any gluster client allowed to mount gluster volumes could also mount shared gluster storage volume and escalate privileges by scheduling malicious cronjob via symlink.

Action-Not Available
Vendor-Debian GNU/LinuxRed Hat, Inc.openSUSE
Product-enterprise_linux_serverdebian_linuxvirtualizationvirtualization_hostgluster_storageleapglusterfs
CWE ID-CWE-266
Incorrect Privilege Assignment
CVE-2020-28419
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-8.8||HIGH
EPSS-0.78% / 72.68%
||
7 Day CHG~0.00%
Published-09 Nov, 2021 | 18:01
Updated-04 Aug, 2024 | 16:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

During installation with certain driver software or application packages an arbitrary code execution could occur.

Action-Not Available
Vendor-n/aHP Inc.
Product-deskjet_plus_ink_advantage_6400_5sd79aink_tank_310_z4b05acolor_laserjet_managed_mfp_e77422_5cm77aofficejet_pro_9010_firmwarecolor_laserjet_managed_mfp_e67550_firmwareenvy_photo_7100_k7g99adeskjet_ink_advantage_3830_f5r98bofficejet_8022_3uc62dlaserjet_pro_400_n404dw_firmwareofficejet_pro_8210_j3p65adeskjet_plus_4100_7fs76asmart_tank_plus_550_wireless_y0f72alaserjet_pro_m201_firmwaredeskjet_plus_4100_7mr23alaserjet_pro_mfp_m148_g3q77alaserjet_pro_mfp_m134_g3q59adeskjet_3790_firmwaredeskjet_plus_4100_7fs87adeskjet_3790_1sh08adeskjet_3700_j9v95bsmart_tank_plus_650_wireless_y0f71alaserjet_managed_mfp_e62555_j8j74alaserjet_pro_200_color_m251_cf147alaserjet_managed_flow_mfp_m830_firmwaredeskjet_ink_advantage_ultra_5730_f5s61acolor_laserjet_pro_mfp_m274n_m6d61asmart_tank_610_wireless_1tj10asmart_tank_plus_650_wireless_firmwareenvy_6000_5se16alaserjet_managed_flow_mfp_m630_p7z47acolor_laserjet_enterprise_flow_mfp_m577_b5l54adeskjet_ink_advantage_2600_y5z04bofficejet_pro_9020_1mr72acolor_laserjet_enterprise_m552_b5l23adeskjet_plus_ink_advantage_6000_5se23cdeskjet_ink_advantage_5000_m2u88bink_tank_wireless_410_z4b53alaserjet_managed_flow_mfp_m630_l3u62acolor_laserjet_enterprise_flow_mfp_m577_b5l47apagewide_managed_color_mfp_p77940_5zp00alaserjet_enterprise_m506_f2a70asmart_tank_plus_550_wireless_3yw71alaserjet_managed_mfp_m630_firmwaresmart_tank_510_wireless_1tj12alaserjet_pro_m203_g3q48aofficejet_8022_1kr70blaserjet_pro_m206_4pa39aink_tank_310_7zv78alaserjet_managed_mfp_e62555_j8j67alaserjet_managed_flow_mfp_e62565_j8j80asmart_tank_510_wireless_6hf11asmart_tank_510_wireless_4sb23adeskjet_3755_t8w92adeskjet_3755_j9v90alaserjet_pro_mfp_m132_g3q62acolor_laserjet_pro_m252n_b4a22alaserjet_ultra_mfp_m230_4pa44adeskjet_ink_advantage_3700_4sc29aofficejet_6960_j7k39asmart_tank_510_wireless_1tj09asmart_tank_plus_550_wireless_3yw70acolor_laserjet_managed_mfp_e67550_l3u67aofficejet_pro_9020_1mr71adeskjet_3755_t8x05bpagewide_managed_color_mfp_e58650dn_firmwareenvy_photo_7100_z3m47bpagewide_managed_color_mfp_p77960_5zp00aenvy_5000_m2u92bofficejet_6950_t3p03apagewide_managed_color_mfp_p77940_y3z68adeskjet_ink_advantage_3700_t8w37aofficejet_pro_9020_1mr70aofficejet_8010_1kr70bsmart_tank_plus_650_wireless_3yw72alaserjet_pro_mfp_m426_f6w14aenvy_photo_7800_k7s10ddeskjet_ink_advantage_2700_4ws04blaserjet_managed_m506_firmwareofficejet_8022_4kj70bcolor_laserjet_managed_flow_mfp_e67550_firmwarelaserjet_p1560_ce651acolor_laserjet_managed_mfp_e62655_3gy16acolor_laserjet_managed_mfp_e67560_l3u70aenvy_5000_z4a69alaserjet_pro_mfp_m126_cz186adeskjet_ink_advantage_2700_4ws04alaserjet_enterprise_flow_mfp_m830_firmwarepagewide_managed_color_mfp_p77950_5zp01aenvy_pro_6400_6wd16apagewide_enterprise_color_flow_mfp_780f_j7z09acolor_laserjet_pro_mfp_m277dw_firmwarecolor_laserjet_pro_mfp_m476_cf386aofficejet_enterprise_color_mfp_x585_firmwaredeskjet_ink_advantage_5000_m2u86apagewide_managed_color_mfp_p77950_y3z66aofficejet_8022_3uc65alaserjet_pro_mfp_m134_g3q62adeskjet_plus_4100_3xv15acolor_laserjet_pro_m154_t6b52aofficejet_8022_1kr69alaserjet_pro_mfp_m227_g3q74alaserjet_p1100_ce651acolor_laserjet_pro_m155_firmwareenvy_6000_7cz37apagewide_managed_color_mfp_p77960_y3z68alaserjet_enterprise_flow_mfp_m630_p7z48aenvy_photo_7100_k7g96alaserjet_enterprise_600_m603_ce994alaserjet_pro_mfp_m134_g3q58alaserjet_pro_m15_firmwarecolor_laserjet_enterprise_flow_mfp_m680_cz249acolor_laserjet_pro_mfp_m177_cz165alaserjet_managed_flow_mfp_e62575_j8j74aofficejet_pro_9010_3uk97dlaserjet_managed_mfp_e62565_j8j74alaserjet_enterprise_m506_f2a71aneverstop_laser_1020_4ye48aofficejet_pro_8020_4kj71dneverstop_laser_1200a_5nl12aenvy_pro_6400_5se48adeskjet_2600_5sf02aneverstop_laser_1020_5hg80adeskjet_3755_t8x10blaserjet_pro_400_m401_firmwarelaserjet_enterprise_500_color_m551_cf083asmart_tank_plus_650_wireless_3yw74acolor_laserjet_enterprise_mfp_m577_b5l48adeskjet_2600_v1n08alaserjet_managed_flow_mfp_e62575_j8j67alaserjet_pro_mfp_m125_cz175adeskjet_ink_advantage_3700_1dt62aofficejet_pro_9020_1mr71blaserjet_pro_mfp_m226_c6n23apagewide_managed_color_mfp_p77950_y3z61acolor_laserjet_enterprise_m856_firmwaredeskjet_2700_7fr60ddeskjet_ink_advantage_3830_f5r96claserjet_enterprise_600_m602_ce991acolor_laserjet_pro_mfp_m277dw_b3q10alaserjet_pro_m202_firmwarelaserjet_managed_flow_mfp_e62575_j8j66acolor_laserjet_cm4540_mfp_cc420adeskjet_2600_4uj28bdeskjet_ink_advantage_3700_t8w48cneverstop_laser_1000_4ry22aenvy_photo_7800_firmwarelaserjet_pro_mfp_m427_f6w14alaserjet_enterprise_m806_firmwareneverstop_laser_1020_4ry23aenvy_photo_7100_z3m48blaserjet_pro_mfp_m149_4pa42acolor_laserjet_managed_flow_mfp_m880zm_a2w76adeskjet_3755_j9v91a_laserjet_managed_mfp_e62665_3gy15alaserjet_pro_mfp_m227_4pa44alaserjet_pro_m16_firmwarelaserjet_pro_m226_c6n23alaserjet_pro_mfp_m134_g3q67alaserjet_enterprise_mfp_m725_firmwarelaserjet_enterprise_m607_firmwarelaserjet_enterprise_600_m601_firmwarelaserjet_pro_m402_f6j41a_laserjet_managed_mfp_e62665_3gy16alaserjet_pro_400_mfp_m425_cf288alaserjet_pro_m201_cf455acolor_laserjet_managed_mfp_e77428_5cm78aink_tank_wireless_410_4dx94alaserjet_pro_400_m401_cf399aofficejet_pro_9010_1kr55blaserjet_pro_m402_g3v21acolor_laserjet_enterprise_mfp_m680_firmwarepagewide_managed_color_mfp_p77960_2gp25alaserjet_p1560_firmwareofficejet_pro_9020_1mr70bcolor_laserjet_pro_mfp_m377_m5h23acolor_laserjet_enterprise_m552_firmwareofficejet_pro_9020_1mr73dlaserjet_enterprise_mfp_m528_1pv49aofficejet_pro_9020_1mr69alaserjet_pro_m402_f6j44alaserjet_pro_mfp_m126_cz184aenvy_pro_6400_5se45bdeskjet_3790_t8x40alaserjet_pro_300_color_mfp_m375_firmwarelaserjet_pro_m521_mfp_firmwarelaserjet_pro_cp1525_ce875adeskjet_3630_k4t97alaserjet_managed_flow_mfp_m630_b3g86acolor_laserjet_pro_m452dn_cf389adeskjet_ink_advantage_3700_t8w42cdeskjet_3700_j9v96blaserjet_pro_m403_f6j41adeskjet_2600_y5h62adeskjet_2600_5sf04acolor_laserjet_managed_m651_h0dc9acolor_laserjet_pro_mfp_m182_7kw55aenvy_5000_z4a74acolor_laserjet_managed_flow_mfp_e67560_l3u66adeskjet_2700_3xv18bdeskjet_3630_k4t99cenvy_5000_m2u85acolor_laserjet_enterprise_m855_a2w79asmart_tank_plus_650_wireless_3yw48apagewide_managed_color_mfp_p77950_2gp22adeskjet_3700_firmwaredeskjet_ink_advantage_2700_7hz98bcolor_laserjet_enterprise_flow_mfp_m880z_a2w76alaserjet_pro_m15_w2g52aofficejet_3830_k7v36alaserjet_managed_flow_mfp_m525_l3u59alaserjet_pro_m402_c5f95acolor_laserjet_pro_mfp_m277n_firmwarelaserjet_managed_mfp_e72425_firmwaresmart_tank_610_wireless_3yw72acolor_laserjet_pro_mfp_m477_cf379acolor_laserjet_pro_mfp_m180_t6b71aofficejet_8010_4kj69bofficejet_pro_9020_1mr78blaserjet_enterprise_color_flow_mfp_m575_cd644acolor_laserjet_cm4540_mfp_firmwarelaserjet_pro_mfp_m225_cf485alaserjet_pro_mfp_m31_cf485adeskjet_3755_t8w94adeskjet_3700_t8w94alaserjet_pro_m203_firmwaresmart_tank_610_wireless_3yw74aink_tank_wireless_410_z6z95asmart_tank_510_wireless_3yw71adeskjet_2600_v1n01alaserjet_pro_400_color_mfp_m451_ce955adeskjet_2600_v1n05bpagewide_enterprise_color_flow_mfp_780f_j7z10acolor_laserjet_managed_e75245_firmwaredeskjet_ink_advantage_2600_y5z03bsmart_tank_plus_550_wireless_3yw51alaserjet_enterprise_600_m602_ce993adeskjet_2700_7fr57dlaserjet_pro_200_color_m276_cf144alaserjet_pro_m521_mfp_a8p79alaserjet_pro_mfp_m227_g3q77acolor_laserjet_managed_mfp_e67650_3gy32adeskjet_ink_advantage_2700_7fr26blaserjet_managed_flow_mfp_m630_firmwareofficejet_6960_t0f38alaserjet_managed_mfp_m630_j7x28acolor_laserjet_pro_m252dw_b4a21acolor_laserjet_enterprise_flow_mfp_m880z_d7p70alaserjet_enterprise_mfp_m725_cf067alaserjet_pro_400_m401_cf274adeskjet_3700_t8x19blaserjet_pro_mfp_m426_firmwarepagewide_managed_color_mfp_p77960_5zn98acolor_laserjet_enterprise_m651_cz255alaserjet_pro_m402_f6j43alaserjet_pro_mfp_m226_cf484alaserjet_managed_mfp_m630_l3u61alaserjet_ultra_mfp_m230_g3q78alaserjet_managed_mfp_e72425_5cm72alaserjet_pro_mfp_m226_c6n22alaserjet_enterprise_flow_mfp_m527z_f2a78alaserjet_enterprise_m4555_mfp_ce504alaserjet_pro_mfp_m130_g3q58acolor_laserjet_managed_m553_bl27acolor_laserjet_managed_mfp_e77422_5rc91acolor_laserjet_enterprise_m855_a2w77alaserjet_pro_mfp_m134_g3q65alaserjet_managed_m605_l3u54apagewide_enterprise_color_flow_mfp_780f_firmwareofficejet_managed_color_mfp_x585deskjet_2600_y5h65adeskjet_3700_t8x23bdeskjet_ink_advantage_5000_m2u86cdeskjet_3700_t8x10blaserjet_pro_mfp_m125_cz183alaserjet_pro_m203_g3q46acolor_laserjet_enterprise_m855_t3u66alaserjet_pro_mfp_m130_g3q59acolor_laserjet_managed_mfp_e77422color_laserjet_pro_m452dw_cf389adeskjet_ink_advantage_3700_4sc30acolor_laserjet_pro_mfp_m176_firmwareofficejet_3830_f5r95cenvy_photo_7100_firmwarelaserjet_pro_mfp_m149_g3q75acolor_laserjet_enterprise_m855_d7p72acolor_laserjet_managed_flow_mfp_m880zm_d7p70alaserjet_enterprise_mfp_m527_f2a76aneverstop_laser_1000_4ye47adeskjet_2600_y5h60alaserjet_pro_mfp_m127_firmwaredeskjet_3630_f5s49blaserjet_managed_mfp_m527_f2a80acolor_laserjet_enterprise_flow_mfp_m680_cz248alaserjet_pro_mfp_m130_g3q64apagewide_managed_color_e55650_l3u44alaserjet_managed_m605_e6b69alaserjet_pro_m521_mfp_a8p80aenvy_5000_m2u94bcolor_laserjet_pro_mfp_m180_t6b70apagewide_managed_color_mfp_p77940_2gp23acolor_laserjet_managed_flow_mfp_e67560_l3u67aofficejet_8010_1kr58acolor_laserjet_managed_mfp_m775_firmwaresmart_tank_plus_550_wireless_7xv38adeskjet_3630_k4u00bink_tank_310_z6z11alaserjet_enterprise_flow_mfp_m830_l3u65aofficejet_enterprise_color_x555_l1h45acolor_laserjet_enterprise_m855_firmwarelaserjet_pro_m1536_mfp_firmwaredeskjet_2600_y5h80adeskjet_3700_t8w96adeskjet_3630_f5s50blaserjet_enterprise_600_m603_ce996aenvy_pro_6400_5se45alaserjet_managed_flow_mfp_e62575_firmwarelaserjet_pro_mfp_m126_cz174acolor_laserjet_enterprise_flow_mfp_m577_b5l48asmart_tank_plus_550_wireless_1tj09aenvy_photo_7100_z3m52alaserjet_p1100_ce653alaserjet_enterprise_500_color_m551_cf082acolor_laserjet_cm4540_mfp_cc419acolor_laserjet_pro_m452dw_firmwareenvy_photo_7800_y0g50blaserjet_enterprise_flow_mfp_m527z_f2a77alaserjet_pro_mfp_m29_firmwareofficejet_pro_9010_3uk91blaserjet_p1560_ce657alaserjet_pro_mfp_m132_firmwareink_tank_310_4yh05acolor_laserjet_cm4540_mfp_cc421acolor_laserjet_managed_mfp_e77422_5cm78asmart_tank_plus_650_wireless_6hf11alaserjet_pro_mfp_m127_cz182alaserjet_pro_500_color_mfp_m570_firmwaredeskjet_3700_t8x05benvy_6000_8qq99acolor_laserjet_enterprise_m855_d7p73alaserjet_pro_300_color_mfp_m351_ce957adeskjet_3755_t8w52aenvy_photo_7800_y0g49benvy_5000_m2u85bsmart_tank_610_wireless_7xv38alaserjet_managed_mfp_e62565_firmwaredeskjet_plus_ink_advantage_6400_5sd80blaserjet_ultra_mfp_m230_4pa41aenvy_pro_6400_6wd14aink_tank_wireless_410_z7a01alaserjet_enterprise_600_m601laserjet_managed_mfp_e72425_5cm70acolor_laserjet_pro_mfp_m283_7kw72aofficejet_pro_9010_3uk86blaserjet_managed_flow_mfp_m630_p7z48adeskjet_3700_t8w57acolor_laserjet_managed_flow_mfp_m880zm_firmwarelaserjet_pro_mfp_m134_g3q63acolor_laserjet_enterprise_m651_cz257alaserjet_pro_mfp_m126_cz183alaserjet_pro_m17_w2g50acolor_laserjet_managed_m553_b5l39aenvy_pro_6400_firmwarecolor_laserjet_pro_mfp_m183_firmwaresmart_tank_plus_650_wireless_3yw70alaserjet_pro_mfp_m427_f6w17alaserjet_enterprise_m806_cz244alaserjet_pro_mfp_m127_cz184aofficejet_pro_8020_4kj66bdeskjet_ink_advantage_ultra_5730_f5s60acolor_laserjet_pro_mfp_m181_firmwarecolor_laserjet_managed_flow_mfp_e67560_l3u69acolor_laserjet_managed_mfp_e77428_5rc91alaserjet_pro_mfp_m227_4pa41alaserjet_enterprise_m608_k0q18alaserjet_enterprise_m4555_mfp_firmwarecolor_laserjet_managed_e85055_t3u52alaserjet_enterprise_color_flow_mfp_m575_firmwarelaserjet_pro_mfp_m149_g3q79adeskjet_3755_t8w83alaserjet_enterprise_color_flow_mfp_m575_cd646asmart_tank_510_wireless_1tj11alaserjet_enterprise_700_m712_firmwarelaserjet_ultra_mfp_m230_firmwaredeskjet_3700_t8x00bdeskjet_plus_4100_7fs74alaserjet_pro_mfp_m148_4pa42alaserjet_managed_flow_mfp_e62555_j8j79alaserjet_p1600_ce653apagewide_managed_color_mfp_p77960_y3z64aenvy_5000_m2u91bofficejet_pro_8020_3uc61bdeskjet_2600_y5h64alaserjet_pro_m16_w2g53aofficejet_6960_t0f30alaserjet_pro_m226_cf484aofficejet_3830_k7v44bcolor_laserjet_managed_e85055_t3u51adeskjet_plus_4100_3xv14claserjet_enterprise_m606_e6b72adeskjet_2600_y5h61adeskjet_3700_t8x07bdeskjet_3700_j9v92alaserjet_managed_flow_mfp_m830_l3u65alaserjet_pro_mfp_m225_c6n23adeskjet_3700_t8w83asmart_tank_plus_650_wireless_3yw75alaserjet_enterprise_m607_k0q15alaserjet_pro_mfp_m125_cz174adeskjet_3790_t8x44aofficejet_pro_8210_d9l63alaserjet_enterprise_700_color_mfp_m775_firmwarecolor_laserjet_managed_mfp_e77428_5cm77adeskjet_2700_3xv19ddeskjet_plus_4100_7fs74dcolor_laserjet_pro_mfp_m282_firmwaredeskjet_plus_4100_7mr24adeskjet_3755_j9v86aofficejet_8010_1kr69alaserjet_managed_mfp_e62555_j8j79alaserjet_managed_flow_mfp_e62565_j8j66alaserjet_enterprise_m607_k0q14aofficejet_3830_k7v37alaserjet_pro_mfp_m31laserjet_pro_m403_firmwareenvy_photo_7800_y0g42dlaserjet_pro_m403_c5f93acolor_laserjet_pro_m252n_firmwaresmart_tank_510_wireless_y0f72adeskjet_3790_t8x40blaserjet_pro_400_n404dw_cf278aneverstop_laser_1000_4ry23alaserjet_pro_mfp_m128_cz185acolor_laserjet_enterprise_flow_mfp_m880z_a2w75acolor_laserjet_pro_mfp_m281_t6b83asmart_tank_510_wireless_7xv38alaserjet_managed_flow_mfp_e62555_j8j67acolor_laserjet_enterprise_flow_mfp_m880z_d7p71apagewide_enterprise_color_mfp_586_g1w39alaserjet_enterprise_600_m603_ce995apagewide_managed_color_mfp_p77940_5zn99alaserjet_managed_m506_f2a71asmart_tank_plus_550_wireless_3yw48acolor_laserjet_enterprise_m651_h0dc9alaserjet_pro_mfp_m125_cz185adeskjet_ink_advantage_3830_firmwaredeskjet_plus_ink_advantage_6400_firmwarelaserjet_p1560_ce655asmart_tank_355_firmwaredeskjet_3790_t8x39claserjet_pro_400_n404dw_cf274aofficejet_6960_j7k38acolor_laserjet_pro_mfp_m477_cf377acolor_laserjet_pro_mfp_m182_firmwarecolor_laserjet_managed_flow_mfp_e62675_firmwaredeskjet_2600_firmwarelaserjet_enterprise_mfp_m527_f2a81alaserjet_p1600_firmwareofficejet_pro_9010_1kr53dlaserjet_managed_flow_mfp_m525_firmwaresmart_tank_plus_550_wireless_3yw72alaserjet_enterprise_500_mfp_m525f_cf116alaserjet_pro_m17_y5s43a_laserjet_managed_mfp_e62665_3gy17alaserjet_enterprise_m506_f2a68adeskjet_2700_7fr57aofficejet_pro_9020_1mr76aenvy_photo_7800_k7s00adeskjet_3700_t8x01bdeskjet_3630_k4t96alaserjet_enterprise_m608_m0p32acolor_laserjet_pro_m452dn_cf394adeskjet_3630_f5s43ccolor_laserjet_managed_m553_b5l25alaserjet_pro_m118_g3q47apagewide_managed_color_mfp_p77950_5zn98alaserjet_pro_400_color_mfp_m475_ce864adeskjet_plus_4100_7fs87dcolor_laserjet_enterprise_flow_mfp_m880z_firmwareofficejet_managed_color_mfp_x585_firmwarecolor_laserjet_enterprise_mfp_m680_ca251alaserjet_enterprise_mfp_m725_cf066alaserjet_pro_mfp_m130_g3q63acolor_laserjet_managed_flow_mfp_e67550_l3u67acolor_laserjet_pro_m156_firmwarelaserjet_pro_m225_c6n22apagewide_enterprise_color_556_g1w46alaserjet_100_color_mfp_m175nw_ce865alaserjet_pro_m402_c5j91alaserjet_pro_m403_g3v21acolor_laserjet_managed_flow_mfp_m880zm_l3u52adeskjet_ink_advantage_2600_v1n02bdeskjet_ink_advantage_3700_j9v89bpagewide_managed_color_p75250_firmwaresmart_tank_plus_550_wireless_3yw73alaserjet_pro_mfp_m125_cz181alaserjet_pro_mfp_m427_c5f97aenvy_6000_5se17aofficejet_6960_t0f28aofficejet_3830_f5r99alaserjet_managed_mfp_e52545_firmwarelaserjet_enterprise_m605_e6b69aofficejet_6950_p4c81acolor_laserjet_pro_mfp_m183_7kw55alaserjet_enterprise_flow_mfp_m630_p7z47adeskjet_3630_k4u01bdeskjet_plus_4100_7fs75ddeskjet_2600_y5h66alaserjet_pro_mfp_m132_g3q64alaserjet_pro_mfp_m134_g3q60adeskjet_ink_advantage_3700_7fm65bofficejet_pro_9020_1mr73aofficejet_pro_7720_wide_format_y0s18aofficejet_pro_8020_3uc64alaserjet_managed_mfp_m630_b3g84alaserjet_pro_mfp_m126_cz172alaserjet_enterprise_m407_firmwarecolor_laserjet_managed_mfp_e67550_l3u70aenvy_5000_m2u91asmart_tank_610_wireless_firmwarelaserjet_pro_m435_mfp_a3e42alaserjet_managed_mfp_e72425_5cm71apagewide_managed_color_mfp_p77950_5zp00aink_tank_310_firmwarepagewide_managed_color_mfp_p77960_y3z63alaserjet_enterprise_700_m712_cf236adeskjet_2700_7fr53alaserjet_pro_mfp_m225_firmwarelaserjet_pro_m118_g3q50adeskjet_3755_j9v93bcolor_laserjet_enterprise_m750_firmwarelaserjet_ultra_mfp_m230_g3q79acolor_laserjet_pro_m452dn_cf388adeskjet_ink_advantage_3700_t8w50claserjet_pro_400_n404dw_cf285alaserjet_pro_mfp_m132_g3q58aofficejet_pro_8020_1kr57adeskjet_plus_4100_7fs88dsmart_tank_610_wireless_6hf11adeskjet_3700_t8x06benvy_pro_6400_8qq88acolor_laserjet_pro_mfp_m181_t6b71aink_tank_wireless_410_z6z99adeskjet_3700_t8x04blaserjet_pro_500_color_mfp_m570_cz272acolor_laserjet_pro_mfp_m281_t6b81acolor_laserjet_pro_mfp_m476_cf385alaserjet_pro_mfp_m427_c5f99alaserjet_pro_mfp_m128_cz186acolor_laserjet_enterprise_flow_mfp_m880z_l3u51alaserjet_pro_400_n404dw_cf399acolor_laserjet_managed_mfp_e62675_3gy16asmart_tank_610_wireless_3yw73alaserjet_pro_m402_firmwaredeskjet_3700_t8w51alaserjet_pro_mfp_m426_c5f98alaserjet_enterprise_m806_cz245aofficejet_8022_3uc58ddeskjet_plus_4100_8qb70acolor_laserjet_enterprise_mfp_m577_b5l46acolor_laserjet_managed_mfp_e77422_5cm79alaserjet_pro_mfp_m227_firmwarelaserjet_pro_m16_w2g51acolor_laserjet_managed_flow_mfp_e67550_l3u66apagewide_enterprise_color_mpf_780_j7z09alaserjet_managed_mfp_m725_l3u63acolor_laserjet_pro_mfp_m181_t6b70alaserjet_pro_mfp_m149_firmwarelaserjet_managed_mfp_e62565_j8j67alaserjet_pro_200_color_m251_firmwaredeskjet_3755_j9v95bofficejet_3830_f5s02bdeskjet_3700_t8w52alaserjet_pro_cp1525_firmwaredeskjet_2700_5ar83bsmart_tank_plus_550_wireless_3yw75alaserjet_pro_mfp_m426_c5f97aofficejet_pro_8020_1kr65bdeskjet_2700_7fr52acolor_laserjet_enterprise_m553_b5l25adeskjet_2600_v1n05aenvy_5000_z4a73asmart_tank_510_wireless_3yw51alaserjet_pro_mfp_m126_firmwarecolor_laserjet_pro_mfp_m277n_b3q17adeskjet_3700_j9v90alaserjet_enterprise_m609_k0q21aofficejet_8010_1kr71bcolor_laserjet_pro_m452dw_cf394acolor_laserjet_managed_mfp_e77428deskjet_2600_v1n07alaserjet_enterprise_m606_e6b73alaserjet_enterprise_m608_k0q19asmart_tank_plus_550_wireless_1tj10acolor_laserjet_enterprise_m455_firmwarelaserjet_p1100_ce658asmart_tank_plus_650_wireless_y0f72asmart_tank_610_wireless_y0f72acolor_laserjet_managed_mfp_e62675_3gy14aofficejet_enterprise_color_x555_c2s11asmart_tank_plus_550_wireless_1tj12adeskjet_ink_advantage_2700_7fr29blaserjet_enterprise_600_m601_ce990alaserjet_pro_m403_c5f96adeskjet_ink_advantage_2600_y5z02bofficejet_6950_p4c78alaserjet_pro_m226_cf485adeskjet_3755_j9v96blaserjet_managed_flow_mfp_e62565_j8j73aofficejet_8010_4kj67blaserjet_pro_mfp_m427_firmwareenvy_photo_7100_z3m42dlaserjet_pro_mfp_m125_cz182asmart_tank_510_wireless_y0f73alaserjet_pro_mfp_m132_g3q59alaserjet_pro_mfp_m134_g3q68a_laserjet_managed_mfp_e62665_firmwarelaserjet_managed_flow_mfp_e62565_j8j67adeskjet_plus_ink_advantage_6000_5se522claserjet_enterprise_flow_mfp_m830_cf367alaserjet_pro_m203_g3q47acolor_laserjet_enterprise_m750_d3l08acolor_laserjet_pro_mfp_m280_t6b83adeskjet_3700_j9v86blaserjet_enterprise_flow_mfp_m527z_f2a76acolor_laserjet_pro_m252dw_b4a22alaserjet_pro_mfp_m227_g3q75asmart_tank_510_wireless_3yw73aneverstop_laser_1200a_4ye52alaserjet_pro_m226_firmwarelaserjet_pro_mfp_m128_cz174asmart_tank_plus_650_wireless_1tj12adeskjet_ink_advantage_2600_v1n02acolor_laserjet_enterprise_flow_mfp_m880z_l3u52aofficejet_3830_k7v38adeskjet_plus_ink_advantage_6400_5sd78cpagewide_managed_color_mfp_e58650dn_l3u42apagewide_enterprise_color_flow_mfp_785_j7z11aofficejet_8010_3uc65alaserjet_enterprise_500_color_m551_firmwareofficejet_pro_8210_t0g70asmart_tank_wireless_450_firmwareofficejet_pro_9020_1mr77aneverstop_laser_1020_4ye47apagewide_managed_color_mfp_p77950_2gp25acolor_laserjet_managed_mfp_e77428_5cm76alaserjet_enterprise_m604_e6b67alaserjet_enterprise_m604_firmwareenvy_6000_8qq97apagewide_managed_color_mfp_p77940_y3z62adeskjet_plus_ink_advantage_6000_5se522asmart_tank_610_wireless_3yw75alaserjet_pro_mfp_m130_g3q65aofficejet_enterprise_color_mfp_x585_b5l04aneverstop_laser_1020_4ry22asmart_tank_510_wireless_3yw74aofficejet_6960_j7k37acolor_laserjet_enterprise_m455_3pz95adeskjet_3755_t8x07blaserjet_managed_m605_firmwarelaserjet_enterprise_700_color_mfp_m775_l3u49aofficejet_pro_9010_3uk83blaserjet_enterprise_600_m602_firmwarelaserjet_enterprise_m406_3pz15aenvy_photo_7800_y0g43dofficejet_pro_8020_4kj64dcolor_laserjet_managed_mfp_e62655_3gy18acolor_laserjet_pro_mfp_m280_t6b81alaserjet_enterprise_mfp_m630_b3g84alaserjet_pro_mfp_m128_cz184acolor_laserjet_managed_mfp_e67650_firmwarelaserjet_pro_mfp_m127_cz185adeskjet_3755_t8x12bcolor_laserjet_enterprise_mfp_m577_b5l47apagewide_managed_color_mfp_p77940_5zp01acolor_laserjet_managed_m651_cz255aofficejet_8022_firmwarecolor_laserjet_managed_e85055_firmwarecolor_laserjet_enterprise_m750_d3l09alaserjet_managed_mfp_m725_cf069adeskjet_ink_advantage_2600_7fq79bpagewide_managed_color_flow_mfp_e58650z_firmwaredeskjet_ink_advantage_ultra_5730_firmwaredeskjet_ink_advantage_3700_t8w41blaserjet_enterprise_flow_mfp_m525_cf118aofficejet_6960_j7k35adeskjet_3755_t8w58aneverstop_laser_1020_5hg74alaserjet_pro_m403_f6j43alaserjet_pro_m201_cf456alaserjet_pro_m118_g3q48aenvy_6000_5se20acolor_laserjet_pro_mfp_m282_7kw74alaserjet_enterprise_m605_l3u53aofficejet_6960_t0f31adeskjet_2700_8rk11acolor_laserjet_managed_mfp_m775_l3u49adeskjet_ink_advantage_3700_t8w46ccolor_laserjet_managed_mfp_e67560_l3u69alaserjet_pro_m17_w2g52aenvy_pro_6400_5se47aenvy_5000_m2u94apagewide_managed_color_mfp_p77940_2gp22adeskjet_3630_k4t99bdeskjet_plus_4100_7fs77bsmart_tank_510_wireless_y0f74asmart_tank_plus_550_wireless_1tj11asmart_tank_plus_550_wireless_3yw74aofficejet_pro_9010_y8m28dlaserjet_pro_m402_c5f94alaserjet_pro_cm1415_mfp_ce862aofficejet_pro_8020_4kj72dcolor_laserjet_enterprise_mfp_m680_cz250alaserjet_managed_mfp_e72425_5rc89adeskjet_3700_t8w56asmart_tank_510_wireless_3yw75aink_tank_310_z4b04adeskjet_2600_v1n03acolor_laserjet_managed_mfp_m680_firmwarecolor_laserjet_enterprise_m855_t3u52alaserjet_pro_m17_w2g51aenvy_photo_7800_y0g52bofficejet_pro_9010_1kr55alaserjet_pro_m203_g3q50alaserjet_pro_mfp_m130_g3q57aenvy_5000_z4a60adeskjet_2700_7fr54bdeskjet_3755_firmwarecolor_laserjet_managed_m651_firmwarelaserjet_pro_200_color_m276_cf145acolor_laserjet_pro_mfp_m176_cf547alaserjet_pro_mfp_m426_c5f99aenvy_photo_7100_z3m37alaserjet_managed_m506_f2a66alaserjet_pro_mfp_m128_cz175alaserjet_pro_mfp_m426_f6w19aenvy_pro_6400_5se46bofficejet_pro_8210_j3p67alaserjet_pro_mfp_m132_g3q67apagewide_enterprise_color_mpf_780_j7z10adeskjet_3630_f5s43adeskjet_3790_t8x39aofficejet_8010_4kj70bdeskjet_3700_j9v94bdeskjet_2600_v1n04adeskjet_plus_4100_3xv15dsmart_tank_610_wireless_3yw48acolor_laserjet_enterprise_m855_a2w78adeskjet_3755_t8w56acolor_laserjet_managed_mfp_m775_l3u50alaserjet_managed_m506_f2a68aofficejet_pro_9010_1kr48alaserjet_managed_flow_mfp_m525_l3u60adeskjet_ink_advantage_3700_3yz75alaserjet_pro_mfp_m148_firmwareofficejet_pro_9020_3ul00dcolor_laserjet_managed_mfp_e67550_l3u66aneverstop_laser_1000_5hg80apagewide_enterprise_color_flow_mfp_785_firmwareofficejet_pro_9020_3uk99dlaserjet_enterprise_m605_l3u54alaserjet_pro_m206_g3q46adeskjet_plus_ink_advantage_6000_5se26bcolor_laserjet_managed_mfp_e67650_3gy31alaserjet_pro_mfp_m149_g3q74aofficejet_enterprise_color_x555_c2s12alaserjet_managed_mfp_m630_b3g85acolor_laserjet_pro_mfp_m280_t6b80acolor_laserjet_enterprise_m651_cz256apagewide_managed_color_mfp_p77960_2gp22adeskjet_ink_advantage_2600_y5z00alaserjet_pro_mfp_m227_g3q78alaserjet_pro_mfp_m132_g3q61aofficejet_pro_8020_1kr66bofficejet_pro_7730_wide_format_l3t99aofficejet_pro_9020_1mr69claserjet_pro_mfp_m125_cz173apagewide_managed_color_mfp_p77960_y3z66adeskjet_2700_7fr50bdeskjet_2700_7fr48dofficejet_pro_9020_1mr80ddeskjet_2700_5ar84adeskjet_3630_v3f22acolor_laserjet_managed_flow_mfp_e67550_l3u69acolor_laserjet_pro_mfp_m283_7kw73aofficejet_pro_9010_3uk83alaserjet_enterprise_m609_k0q22acolor_laserjet_pro_mfp_m282_7kw75alaserjet_pro_m402_c5f93aofficejet_8010_3uc58dlaserjet_managed_flow_mfp_e62565_j8j79alaserjet_enterprise_700_m712_cf235alaserjet_enterprise_m506_f2a66alaserjet_pro_mfp_m427_f6w15asmart_tank_plus_650_wireless_y0f74adeskjet_3755_j9v86blaserjet_pro_mfp_m29_cf485alaserjet_managed_flow_mfp_e62555_j8j74asmart_tank_plus_550_wireless_y0f73adeskjet_2600_y5h69alaserjet_pro_m15_w2g50acolor_laserjet_pro_m154_t6b51alaserjet_pro_mfp_m127_cz174alaserjet_enterprise_flow_mfp_m630_b3g86alaserjet_pro_mfp_m130_g3q66acolor_laserjet_pro_m452nw_cf394alaserjet_pro_mfp_m128_cz173adeskjet_ink_advantage_3700_3yz74alaserjet_pro_m403_f6j42acolor_laserjet_pro_m155_7kw48alaserjet_pro_mfp_m226_cf485acolor_laserjet_enterprise_flow_mfp_m680_ca251alaserjet_managed_500_mfp_m525_firmwarecolor_laserjet_managed_mfp_m680_l3u47alaserjet_pro_mfp_m130_g3q68alaserjet_pro_mfp_m149_g3q77alaserjet_pro_mfp_m130_firmwaresmart_tank_610_wireless_y0f74aofficejet_pro_9010_1kr49alaserjet_pro_mfp_m148_g3q74aenvy_photo_7800_k7r96acolor_laserjet_managed_mfp_e62675_3gy15asmart_tank_plus_550_wireless_y0f71adeskjet_3630_v3f21alaserjet_managed_m506_f2a69asmart_tank_610_wireless_3yw70alaserjet_pro_mfp_m225_c6n22alaserjet_pro_400_m401_cf285aofficejet_pro_8210_d9l64alaserjet_managed_mfp_e52545_3gy19adeskjet_ink_advantage_2700_4ws03bdeskjet_3700_j9v86acolor_laserjet_managed_mfp_e77428_5cm79adeskjet_ink_advantage_3700_t8w35alaserjet_pro_mfp_m125_firmwarelaserjet_pro_400_mfp_m425_cf286acolor_laserjet_managed_flow_mfp_m680_l3u48apagewide_managed_color_mfp_p77960_y3z62alaserjet_enterprise_mfp_m725_l3u64alaserjet_pro_m226_cf486aofficejet_3830_firmwarecolor_laserjet_enterprise_m553_b5l26adeskjet_2600_v1n05cenvy_6000_firmwaredeskjet_ink_advantage_5000_m2u89bofficejet_pro_9010_3uk96dlaserjet_pro_m17_firmwarelaserjet_pro_400_color_m451_firmwarepagewide_managed_color_mfp_p77950_y3z64alaserjet_pro_mfp_m132_g3q63acolor_laserjet_pro_mfp_m476_cf387alaserjet_enterprise_700_color_mfp_m775_cc522aofficejet_pro_9010_3uk90dcolor_laserjet_pro_mfp_m377_firmwarecolor_laserjet_managed_flow_mfp_e67560_l3u70apagewide_enterprise_color_flow_mfp_586z_firmwarelaserjet_pro_200_color_m276_firmwarecolor_laserjet_pro_mfp_m477_cf378adeskjet_3755_t8w59acolor_laserjet_pro_mfp_m277n_b3q10acolor_laserjet_managed_e75245_t3u64acolor_laserjet_pro_mfp_m181_t6b74alaserjet_pro_mfp_m149_g3q76aneverstop_laser_1000_5hg74alaserjet_pro_m118_firmwareofficejet_pro_8020_5lj17acolor_laserjet_enterprise_m553_firmwareneverstop_laser_1200a_4ye53acolor_laserjet_pro_m452dw_cf388adeskjet_ink_advantage_5000_m2u87bpagewide_managed_color_e55650_firmwarecolor_laserjet_pro_mfp_m283_7kw75acolor_laserjet_pro_m452dn_firmwaredeskjet_ink_advantage_5000_m2u87aofficejet_8010_4kj68blaserjet_managed_m605_e6b70aneverstop_laser_1000_firmwarelaserjet_managed_flow_mfp_m527z_f2a79aofficejet_pro_9020_1mr72blaserjet_pro_cp1525_ce874acolor_laserjet_managed_flow_mfp_m680_firmwarelaserjet_enterprise_m4555_mfp_ce502alaserjet_pro_mfp_m134_g3q66alaserjet_pro_m403_c5f92alaserjet_managed_flow_mfp_e62555_j8j73acolor_laserjet_pro_mfp_m283_firmwarelaserjet_pro_mfp_m148_4pa41aofficejet_6950_p4c82adeskjet_2600_y5h67adeskjet_ink_advantage_5000_firmwarelaserjet_ultra_mfp_m230_4pa42alaserjet_pro_mfp_m127_cz173asmart_tank_610_wireless_1tj11apagewide_managed_color_mfp_p77940_y3z63adeskjet_2600_v1n03bdeskjet_plus_4100_firmwarelaserjet_pro_m15_y5s43aenvy_5000_m2u92adeskjet_3630_k4t93apagewide_enterprise_color_mpf_780dn_firmwarelaserjet_p1600_ce655adeskjet_2600_y5h68dofficejet_pro_9010_1kr46claserjet_pro_mfp_m149_g3q78adeskjet_2700_7fr55blaserjet_pro_m15_w2g51acolor_laserjet_pro_mfp_m280_t6b82apagewide_color_755_firmwarelaserjet_enterprise_m605_firmwaredeskjet_3790_t8x39bpagewide_managed_color_mfp_p77950_firmwarecolor_laserjet_pro_m155_7kw49adeskjet_3630_f5s48acolor_laserjet_enterprise_m553_bl27alaserjet_pro_m403_c5j91alaserjet_pro_mfp_m132_g3q68alaserjet_p1600_ce651apagewide_managed_color_mfp_p77950_y3z62acolor_laserjet_managed_mfp_m775_cc523aofficejet_pro_9020_1mr75alaserjet_pro_mfp_m134_firmwarecolor_laserjet_managed_mfp_e67560_firmwarelaserjet_pro_mfp_m126_cz173apagewide_managed_color_mfp_p77960_y3z65alaserjet_pro_m402_c5f92alaserjet_managed_mfp_m725_cf068asmart_tank_plus_650_wireless_3yw51alaserjet_pro_mfp_m149_4pa44adeskjet_3630_f5s57aofficejet_pro_9010_3uk85dlaserjet_ultra_mfp_m230_g3q76alaserjet_pro_mfp_m128_cz181aofficejet_pro_9010_1kr55dlaserjet_pro_m206_g3q48alaserjet_pro_mfp_m132_g3q66alaserjet_p1600_ce657adeskjet_2600_y5h67dlaserjet_pro_m501_j8h61acolor_laserjet_pro_mfp_m182_7kw56adeskjet_2600_y5h69denvy_5000_z4a70alaserjet_enterprise_m407_3pz16apagewide_managed_color_e75160_firmwarepagewide_enterprise_color_flow_mfp_586z_g1w40alaserjet_pro_mfp_m128_cz183alaserjet_enterprise_managed_e42540_cz245acolor_laserjet_pro_mfp_m176_cz165alaserjet_ultra_mfp_m230_g3q74adeskjet_ink_advantage_3700_firmwarelaserjet_pro_mfp_m227_g3q76aofficejet_pro_9020_1mr74alaserjet_pro_m206_g3q50alaserjet_pro_mfp_m134_g3q61alaserjet_p1560_ce653alaserjet_enterprise_mfp_m630_b3g85alaserjet_pro_300_color_mfp_m351_ce955aneverstop_laser_1200a_4ry26alaserjet_enterprise_600_m601_ce989alaserjet_pro_mfp_m127_cz183alaserjet_pro_mfp_m148_g3q75acolor_laserjet_pro_mfp_m477_firmwareofficejet_8010_3uc62dpagewide_enterprise_color_556_g1w47acolor_laserjet_enterprise_mfp_m577_b5l54alaserjet_enterprise_mfp_m725_cf069alaserjet_pro_m403_c5f94aofficejet_pro_8020_5lj18acolor_laserjet_pro_mfp_m277dw_b3q17apagewide_color_755_4pz47alaserjet_100_color_mfp_m175nw_ce866alaserjet_pro_m15_w2g53adeskjet_ink_advantage_3700_t8w36aofficejet_8022_1kr71bsmart_tank_wireless_450_z6z96acolor_laserjet_enterprise_m750_d3l10acolor_laserjet_enterprise_mfp_m680_cz249alaserjet_enterprise_500_mfp_m525f_cf118alaserjet_pro_400_color_mfp_m475_firmwaresmart_tank_510_wireless_3yw70aenvy_photo_7100_z3m46bsmart_tank_355_z4b07aenvy_5000_z4a71acolor_laserjet_managed_m651_l8z07alaserjet_pro_mfp_m148_4pa44apagewide_enterprise_color_flow_mfp_785_j7z12alaserjet_pro_400_color_mfp_m475_ce863adeskjet_3630_k4t95acolor_laserjet_pro_mfp_m476_firmwarelaserjet_pro_mfp_m426_f6w15asmart_tank_plus_550_wireless_6hf11apagewide_managed_color_e75160_j7z06asmart_tank_plus_550_wireless_y0f74aink_tank_wireless_410_4dx95adeskjet_ink_advantage_2700_7fr20alaserjet_p1100_ce655alaserjet_enterprise_500_color_mfp_m575_cd644acolor_laserjet_managed_mfp_e62655_3gy15acolor_laserjet_enterprise_m651_l8z07acolor_laserjet_pro_mfp_m280_firmwaredeskjet_ink_advantage_2700_firmwarecolor_laserjet_managed_flow_mfp_m880zm_d7p71adeskjet_ink_advantage_3700_j9v87cdeskjet_ink_advantage_3700_1dt61aofficejet_pro_8020_3uc59b_laserjet_managed_mfp_e62665_3gy14aofficejet_8022_1kr58apagewide_managed_color_mfp_p77950_y3z68acolor_laserjet_managed_mfp_m775_cc524apagewide_managed_color_flow_mfp_e58650z_l3u42adeskjet_ink_advantage_3700_j9v87alaserjet_pro_mfp_m426_f6w18asmart_tank_510_wireless_3yw72alaserjet_managed_mfp_e62565_j8j79alaserjet_managed_flow_mfp_e52545c_firmwarepagewide_managed_color_mfp_p77960_5zn99adeskjet_ink_advantage_2600_firmwareenvy_pro_6400_5se46alaserjet_pro_400_m401_cf270aenvy_6000_5se18acolor_laserjet_pro_m255_7kw65alaserjet_pro_mfp_m126_cz182apagewide_managed_color_mfp_p77950_y3z65alaserjet_pro_mfp_m427_f6w13aneverstop_laser_1020_firmwareenvy_5000_z4a54asmart_tank_plus_550_wireless_4sb23acolor_laserjet_managed_m553_firmwarelaserjet_pro_mfp_m125_cz184aofficejet_pro_9010_1kr45alaserjet_managed_flow_mfp_e62555_firmwareofficejet_pro_8020_1kr62aink_tank_wireless_410_firmwarelaserjet_enterprise_600_m603laserjet_managed_mfp_e62555_firmwareenvy_6000_5se16blaserjet_enterprise_flow_mfp_m630_firmwareofficejet_pro_8210_j3p66apagewide_enterprise_color_556_g1w47vdeskjet_2700_5ar83acolor_laserjet_pro_mfp_m182_7kw54acolor_laserjet_pro_m156_7kw49acolor_laserjet_pro_m156_7kw48acolor_laserjet_managed_e45028_3qa35aofficejet_8010_firmwarelaserjet_enterprise_m609_firmwarelaserjet_pro_m202_c6n21aofficejet_pro_8210_firmwarelaserjet_managed_flow_mfp_m830_cf367alaserjet_pro_mfp_m127_cz175apagewide_enterprise_color_556_firmwarelaserjet_pro_m403_f6j44apagewide_enterprise_color_flow_mfp_586z_g1w39apagewide_managed_color_mfp_p77940_firmwarelaserjet_pro_mfp_m126_cz175acolor_laserjet_pro_mfp_m281_t6b80aink_tank_wireless_410_4yf79apagewide_managed_color_p75250_y3z49alaserjet_managed_flow_mfp_e62565_firmwarepagewide_managed_color_mfp_p77960_y3z61adeskjet_2600_y5h58alaserjet_100_color_mfp_m175nw_firmwarelaserjet_managed_500_mfp_m525_l3u60apagewide_managed_color_mfp_e58650dn_l3u43alaserjet_enterprise_m608_k0q17alaserjet_enterprise_m4555_mfp_ce738alaserjet_enterprise_m506_f2a67aofficejet_pro_9010_1kr49bofficejet_3830_k7v40adeskjet_3630_k4t94acolor_laserjet_pro_m154_firmwarelaserjet_managed_mfp_m527_firmwarelaserjet_enterprise_flow_mfp_m527z_f2a81alaserjet_enterprise_500_mfp_m525f_cf117alaserjet_ultra_mfp_m230_g3q77alaserjet_managed_mfp_m527_f2a79acolor_laserjet_pro_m252n_b4a21acolor_laserjet_managed_mfp_e67560_l3u66alaserjet_managed_mfp_m725_cf067acolor_laserjet_pro_m452nw_cf389adeskjet_2700_3xv17alaserjet_pro_m225_cf486aneverstop_laser_1000_4ye51alaserjet_enterprise_mfp_m528_1pv65alaserjet_pro_m16_w2g52apagewide_managed_color_mfp_p77950_y3z63asmart_tank_wireless_450_z6z98adeskjet_plus_ink_advantage_6000_5se23blaserjet_pro_m402_c5f96aofficejet_pro_7720_wide_format_g5j56acolor_laserjet_pro_mfp_m283_7kw74alaserjet_pro_mfp_m227_g3q79aofficejet_pro_9020_1mr79acolor_laserjet_pro_m452nw_firmwaresmart_tank_plus_650_wireless_1tj10aofficejet_pro_9010_3uk93dlaserjet_enterprise_m604_e6b68acolor_laserjet_pro_mfp_m281_t6b82alaserjet_pro_mfp_m227_4pa42alaserjet_pro_m206_g3q47acolor_laserjet_managed_flow_mfp_e67550_l3u70adeskjet_2600_5sf03alaserjet_pro_mfp_m125_cz172alaserjet_pro_mfp_m127_cz186alaserjet_pro_mfp_m134_g3q57aenvy_6000_5se19bink_tank_wireless_410_z4b54asmart_tank_610_wireless_1tj09alaserjet_managed_flow_mfp_e52545c_3gy20adeskjet_ink_advantage_3700_t8w49claserjet_managed_flow_mfp_e62555_j8j80aenvy_photo_7800_k7s09dofficejet_pro_8020_4kj73dofficejet_6960_t0f36alaserjet_pro_m226_c6n22adeskjet_2700_7fr56dlaserjet_pro_mfp_m125_cz186alaserjet_pro_cm1415_mfp_ce861acolor_laserjet_managed_mfp_e62675_3gy18alaserjet_pro_400_m401_cf278alaserjet_pro_mfp_m226_cf486alaserjet_pro_mfp_m426_f6w17adeskjet_3700_t8x27bdeskjet_ink_advantage_3830_f5r96aink_tank_310_z6z13alaserjet_enterprise_m4555_mfp_ce503apagewide_managed_color_mfp_p77950_2gp23alaserjet_pro_mfp_m128_cz182asmart_tank_610_wireless_y0f71apagewide_managed_color_mfp_p77940_y3z64alaserjet_enterprise_700_color_mfp_m775_cf304acolor_laserjet_managed_mfp_e77422_5cm76adeskjet_3755_j9v94blaserjet_managed_flow_mfp_m527z_firmwarelaserjet_managed_mfp_e62555_j8j66alaserjet_managed_m605_l3u53alaserjet_pro_mfp_m426_f6w16acolor_laserjet_pro_mfp_m277n_b3q11asmart_tank_510_wireless_1tj10apagewide_managed_color_mfp_p77940_2gp26aneverstop_laser_1200a_firmwarelaserjet_enterprise_m609_k0q20adeskjet_3755_t8w95adeskjet_ink_advantage_2700_7fr21alaserjet_pro_m202_c6n20adeskjet_ink_advantage_3700_t8w38aneverstop_laser_1020_4ye51alaserjet_enterprise_managed_e42540_firmwaredeskjet_ink_advantage_3830_f5r97acolor_laserjet_pro_mfp_m180_firmwareofficejet_6950_p4c85aenvy_pro_6400_5se50alaserjet_enterprise_700_color_mfp_m775_cc524adeskjet_3700_j9v97blaserjet_managed_mfp_e62555_j8j73adeskjet_2600_v1n03cofficejet_6960_j7k33adeskjet_ink_advantage_3700_7fm66blaserjet_enterprise_flow_mfp_m525_firmwarelaserjet_pro_mfp_m427_f6w19adeskjet_3790_t8x42adeskjet_ink_advantage_2600_7fq81bpagewide_managed_color_mfp_p77940_y3z65acolor_laserjet_pro_mfp_m277dw_b3q11alaserjet_pro_300_color_mfp_m375_ce903aofficejet_6950_p4c84alaserjet_enterprise_flow_mfp_m630_l3u62aenvy_6000_5se17blaserjet_enterprise_flow_mfp_m527z_firmwarecolor_laserjet_managed_mfp_e77422_5cm75alaserjet_enterprise_mfp_m630_firmwaredeskjet_2700_7fr53bcolor_laserjet_managed_mfp_m680_l3u48aenvy_pro_6400_5se48blaserjet_managed_flow_mfp_e62575_j8j73aenvy_5000_z4a61blaserjet_pro_400_n404dw_cf270apagewide_enterprise_color_mfp_586_g1w41aofficejet_pro_8020_firmwarelaserjet_pro_m1536_mfp_ce538alaserjet_enterprise_m506_f2a69alaserjet_pro_400_color_mfp_m451_ce957alaserjet_ultra_mfp_m230_g3q75adeskjet_3755_t8x06bdeskjet_3700_t8w93aofficejet_pro_9020_1mr67aenvy_photo_7100_k7g93asmart_tank_plus_650_wireless_1tj11adeskjet_3700_t8w54adeskjet_2600_v1n01benvy_5000_firmwaresmart_tank_plus_550_wireless_firmwaredeskjet_ink_advantage_3830_f5r96bdeskjet_2700_3xv18cneverstop_laser_1200a_4qd21adeskjet_plus_4100_7fs88aofficejet_pro_9010_1kr42alaserjet_enterprise_mfp_m528_firmwarecolor_laserjet_managed_mfp_e67550_l3u69aink_tank_310_4qa85alaserjet_pro_mfp_m225_cf486asmart_tank_plus_650_wireless_4sb23acolor_laserjet_pro_m252dw_firmwarelaserjet_pro_mfp_m132_g3q65alaserjet_managed_m605_e6b71alaserjet_pro_mfp_m132_g3q60aofficejet_3830_f5s03bcolor_laserjet_enterprise_flow_mfp_m680_cz250adeskjet_3700_j9v91adeskjet_ink_advantage_2700_7fr27bofficejet_pro_9010_1kr46acolor_laserjet_managed_m553_b5l24alaserjet_pro_m435_mfp_firmwareofficejet_enterprise_color_x555_firmwarelaserjet_enterprise_700_color_mfp_m775_cc523alaserjet_managed_500_mfp_m525_l3u59alaserjet_managed_mfp_e72425_5cm68alaserjet_pro_m225_cf484acolor_laserjet_enterprise_mfp_m480deskjet_ink_advantage_3700_j9v88aofficejet_pro_9010_1kr50bcolor_laserjet_managed_mfp_e62655_firmwarecolor_laserjet_managed_mfp_m775_cf304adeskjet_3755_t8x04bcolor_laserjet_pro_m255_firmwarepagewide_managed_color_mfp_p77940_y3z66adeskjet_ink_advantage_2700_7hz99bpagewide_enterprise_color_flow_mfp_586z_g1w41aenvy_pro_6400_8qq86apagewide_enterprise_color_556_g1w46venvy_photo_7100_3xd89aofficejet_pro_9010_3uk84alaserjet_managed_m506_f2a70aenvy_photo_7800_k7s01alaserjet_enterprise_flow_mfp_m525_cf116aink_tank_wireless_410_z4b55alaserjet_pro_mfp_m226_firmwarelaserjet_pro_m17_w2g53adeskjet_3630_f5s56bofficejet_pro_8020_1kr61adeskjet_3755_t8w57acolor_laserjet_pro_mfp_m281_firmwarelaserjet_pro_mfp_m126_cz181alaserjet_enterprise_600_m602_ce992adeskjet_ink_advantage_2600_7fq80bdeskjet_ink_advantage_2700_7fr28bcolor_laserjet_managed_mfp_e62655_3gy14acolor_laserjet_managed_e45028_firmwareofficejet_pro_9020_3ul05blaserjet_managed_mfp_m725_cf066adeskjet_3700_j9v93bpagewide_managed_color_flow_mfp_e58650z_l3u43aofficejet_enterprise_color_mfp_x585_l3u40acolor_laserjet_pro_mfp_m282_7kw73acolor_laserjet_managed_flow_mfp_e67560_firmwareofficejet_pro_9020_1mr78alaserjet_enterprise_500_color_mfp_m575_cd645a_laserjet_managed_mfp_e62665_3gy18alaserjet_enterprise_mfp_m725_cf068alaserjet_p1600_ce658aofficejet_3830_f5r95benvy_photo_7800_k7s08alaserjet_pro_mfp_m225_cf484alaserjet_enterprise_500_color_mfp_m575_firmwarelaserjet_enterprise_managed_e42540_cz244adeskjet_3630_firmwaredeskjet_3630_f5s47alaserjet_enterprise_m406_firmwaredeskjet_2600_y5h63alaserjet_enterprise_m608_firmwaredeskjet_3755_t8x27blaserjet_pro_m225_firmwarepagewide_managed_color_mfp_p77960_2gp26aenvy_6000_8qq98alaserjet_managed_mfp_e72425_5cm69acolor_laserjet_pro_m452nw_cf388alaserjet_managed_mfp_e62555_j8j80adeskjet_3700_t8w95aneverstop_laser_1000_4ye48alaserjet_pro_m403_c5f95alaserjet_pro_m118_g3q46adeskjet_3630_f5s43bdeskjet_2600_v1n06bdeskjet_3630_k4u03bofficejet_pro_9020_3uk98dcolor_laserjet_managed_e85055_t3u66aofficejet_pro_8020_3uc63dlaserjet_pro_300_color_mfp_m351_ce958adeskjet_2700_3xv19alaserjet_pro_m206_firmwarelaserjet_enterprise_mfp_m528_1pv66alaserjet_managed_flow_mfp_e52545c_3gy19alaserjet_managed_flow_mfp_e62575_j8j79alaserjet_enterprise_color_flow_mfp_m575_cd645aofficejet_pro_8020_3uc60bdeskjet_ink_advantage_3700_j9v87blaserjet_pro_mfp_m134_g3q64adeskjet_3790_t8x39ddeskjet_plus_4100_7fs83dcolor_laserjet_pro_mfp_m183_7kw56aink_tank_wireless_410_z6z97adeskjet_3700_t8w59alaserjet_pro_m118_4pa39alaserjet_enterprise_700_color_mfp_m775_l3u50adeskjet_ink_advantage_3700_t8w40blaserjet_enterprise_500_color_mfp_m575_cd646aofficejet_3830_k7v45bpagewide_managed_color_mfp_p77960_2gp23adeskjet_3755_t8w54alaserjet_pro_m501_j8h60acolor_laserjet_enterprise_mfp_m680_cz248acolor_laserjet_managed_mfp_m775_cc522alaserjet_pro_mfp_m427_f6w16adeskjet_plus_ink_advantage_6000_5se522bofficejet_6960_t0g26aofficejet_pro_8020_5lj20dlaserjet_pro_mfp_m426_f6w13adeskjet_2700_7fr61alaserjet_pro_mfp_m130_g3q62alaserjet_enterprise_mfp_m527_firmwaredeskjet_3755_t8w96alaserjet_pro_mfp_m126_cz185aofficejet_pro_9010_1kr51bofficejet_8010_3uc57bdeskjet_plus_4100_3xv14bsmart_tank_plus_650_wireless_3yw73acolor_laserjet_managed_m651_cz257alaserjet_p1560_ce658adeskjet_plus_ink_advantage_6000_firmwaresmart_tank_610_wireless_3yw71aofficejet_6960_t0f32adeskjet_3755_t8x23bdeskjet_plus_ink_advantage_6400_5sd78bcolor_laserjet_managed_flow_mfp_m680_l3u47alaserjet_managed_mfp_e62565_j8j73adeskjet_2600_v1n07bpagewide_managed_color_mfp_p77950_2gp26asmart_tank_610_wireless_4sb23alaserjet_enterprise_m605_e6b70aofficejet_pro_9020_firmwarelaserjet_pro_m203_4pa39acolor_laserjet_enterprise_flow_mfp_m577_b5l46alaserjet_managed_mfp_e52545_3gy20adeskjet_3755_t8x00bdeskjet_3700_t8w58acolor_laserjet_managed_e75245_t3u44alaserjet_pro_m16_w2g50alaserjet_enterprise_mfp_m725_l3u63adeskjet_2700_firmwarecolor_laserjet_pro_mfp_m180_t6b74acolor_laserjet_managed_mfp_e77428_5cm75adeskjet_2600_y5h72dpagewide_managed_color_mfp_p77940_y3z61adeskjet_2700_5ar85alaserjet_pro_300_color_mfp_printer_m351_firmwarelaserjet_pro_400_mfp_m425_firmwareofficejet_6950_p4c86adeskjet_3755_t8x19blaserjet_managed_mfp_e62565_j8j80aofficejet_8022_4kj67bofficejet_3830_f5s01bdeskjet_2600_y5h68adeskjet_2700_7fr58alaserjet_enterprise_mfp_m527_f2a77asmart_tank_610_wireless_y0f73alaserjet_pro_mfp_m427_c5f98adeskjet_3700_t8w92apagewide_managed_color_mfp_p77940_5zn98acolor_laserjet_managed_flow_mfp_m880zm_a2w75aofficejet_6960_firmwarelaserjet_pro_mfp_m130_g3q61acolor_laserjet_enterprise_flow_mfp_m680_firmwarelaserjet_enterprise_mfp_m527_f2a78adeskjet_ink_advantage_5000_m2u86bofficejet_8022_4kj69bsmart_tank_610_wireless_1tj12apagewide_enterprise_color_mfp_586_firmwarepagewide_managed_color_mfp_p77950_5zn99acolor_laserjet_managed_mfp_e62655_3gy17apagewide_managed_color_mfp_p77960_5zp01acolor_laserjet_managed_mfp_e67560_l3u67asmart_tank_610_wireless_3yw51asmart_tank_wireless_450_z4b56adeskjet_3755_t8w93alaserjet_pro_mfp_m128_cz172adeskjet_ink_advantage_3700_t8w39blaserjet_pro_400_color_mfp_m451_ce958adeskjet_3630_k4u02bofficejet_pro_8020_5lj19aofficejet_pro_7730_wide_format_firmwarepagewide_managed_color_mfp_p77940_2gp25adeskjet_3700_t8x12bpagewide_enterprise_color_mfp_586_g1w40aofficejet_pro_9010_1kr54acolor_laserjet_managed_m651_cz256acolor_laserjet_enterprise_mfp_m480_3qa55alaserjet_pro_m501_firmwarecolor_laserjet_managed_mfp_e77428_5rc92acolor_laserjet_enterprise_m651_firmwaredeskjet_plus_ink_advantage_6400_5sd79benvy_pro_6400_5se47bcolor_laserjet_managed_m553_b5l38adeskjet_ink_advantage_3700_7fm64bofficejet_pro_9020_1mr68acolor_laserjet_pro_m255_7kw64alaserjet_pro_mfp_m127_cz181alaserjet_managed_mfp_m725_firmwarecolor_laserjet_enterprise_m855_t3u51aofficejet_8022_3uc57blaserjet_enterprise_500_color_m551_cf081aofficejet_pro_7720_wide_format_firmwarelaserjet_pro_mfp_m130_g3q60aofficejet_6960_t0g25alaserjet_pro_mfp_m132_g3q57alaserjet_pro_cm1415_mfp_firmwaredeskjet_3755_j9v92alaserjet_pro_m402_f6j42alaserjet_managed_flow_mfp_e62565_j8j74alaserjet_managed_flow_mfp_m527z_f2a80aofficejet_3830_f5r95adeskjet_plus_ink_advantage_6400_5sd79ccolor_laserjet_enterprise_mfp_m577_firmwaresmart_tank_plus_650_wireless_1tj09alaserjet_managed_mfp_e72425_5rc90alaserjet_pro_mfp_m149_4pa41adeskjet_ink_advantage_3700_t8w47claserjet_pro_mfp_m127_cz172alaserjet_pro_m225_cf485acolor_laserjet_enterprise_m553_b5l38adeskjet_plus_4100_3xv13alaserjet_pro_m16_y5s43alaserjet_pro_mfp_m148_g3q76adeskjet_2600_v1n01claserjet_managed_flow_mfp_e62555_j8j66aofficejet_6950_firmwareenvy_pro_6400_8qq87alaserjet_pro_m225_c6n23alaserjet_managed_mfp_e62565_j8j66adeskjet_plus_4100_7fs86adeskjet_3790_t8x40dcolor_laserjet_managed_mfp_e62675_3gy17acolor_laserjet_pro_mfp_m274n_firmwaresmart_tank_plus_650_wireless_y0f73aofficejet_pro_7730_wide_format_y0s19alaserjet_enterprise_mfp_m528_1pv64adeskjet_2700_7fr59dcolor_laserjet_pro_m255_7kw63alaserjet_enterprise_500_mfp_m525f_firmwarecolor_laserjet_managed_flow_mfp_m880zm_l3u51alaserjet_enterprise_mfp_m630_l3u61alaserjet_managed_mfp_m725_l3u64aenvy_6000_5se20blaserjet_p1100_ce657aenvy_6000_6wd35alaserjet_p1100_firmwarelaserjet_pro_200_color_m251_cf146adeskjet_plus_4100_7fs79blaserjet_pro_mfp_m427_f6w18aofficejet_pro_8210_j3p68aofficejet_pro_8020_1kr67ddeskjet_3755_t8x01bcolor_laserjet_managed_m553_b5l26asmart_tank_510_wireless_y0f71aenvy_photo_7100_z3m41dlaserjet_managed_flow_mfp_e62575_j8j80alaserjet_pro_mfp_m148_g3q79asmart_tank_plus_650_wireless_7xv38aenvy_6000_5se19aofficejet_pro_8020_1kr64blaserjet_enterprise_mfp_m528_1pv67alaserjet_pro_500_color_mfp_m570_cz271asmart_tank_510_wireless_firmwareofficejet_pro_9020_1mr66alaserjet_enterprise_700_m712_cf238acolor_laserjet_enterprise_flow_mfp_m577_firmwarelaserjet_managed_m506_f2a67apagewide_managed_color_mfp_p77960_firmwaredeskjet_3755_t8w51asmart_tank_510_wireless_3yw48acolor_laserjet_pro_mfp_m177_firmwareenvy_5000_z4a61acolor_laserjet_enterprise_m553_b5l39asmart_tank_plus_650_wireless_3yw71alaserjet_pro_mfp_m148_g3q78acolor_laserjet_managed_e75245_t3u43aofficejet_enterprise_color_mfp_x585_b5l05aofficejet_8022_4kj68blaserjet_pro_mfp_m130_g3q67acolor_laserjet_pro_mfp_m177_cf547acolor_laserjet_pro_mfp_m183_7kw54acolor_laserjet_pro_mfp_m282_7kw72acolor_laserjet_managed_mfp_e77422_5rc92adeskjet_3755_j9v97bdeskjet_plus_ink_advantage_6400_5sd78aenvy_5000_z4a59alaserjet_pro_mfp_m128_firmwareenvy_6000_5se18blaserjet_enterprise_flow_mfp_m525_cf117aenvy_photo_7100_k7g95alaserjet_enterprise_mfp_m630_j7x28adeskjet_plus_4100_7fs81benvy_pro_6400_7xk12alaserjet_enterprise_m606_firmwarelaserjet_enterprise_m506_firmwarelaserjet_enterprise_m605_e6b71aHP LaserJet Printer; HP LaserJet Pro Printer; HP PageWide Printer; HP PageWide Pro Printer; HP inkjet Printer; HP OfficeJet Printer
CVE-2008-0073
Matching Score-8
Assigner-Flexera Software LLC
ShareView Details
Matching Score-8
Assigner-Flexera Software LLC
CVSS Score-6.8||MEDIUM
EPSS-2.71% / 85.33%
||
7 Day CHG~0.00%
Published-24 Mar, 2008 | 22:00
Updated-07 Aug, 2024 | 07:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Array index error in the sdpplin_parse function in input/libreal/sdpplin.c in xine-lib 1.1.10.1 allows remote RTSP servers to execute arbitrary code via a large streamid SDP parameter.

Action-Not Available
Vendor-xinen/aRed Hat, Inc.
Product-fedoraxine-libn/a
CWE ID-CWE-189
Not Available
CVE-2018-10877
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-7.3||HIGH
EPSS-0.35% / 56.67%
||
7 Day CHG~0.00%
Published-18 Jul, 2018 | 15:00
Updated-05 Aug, 2024 | 07:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Linux kernel ext4 filesystem is vulnerable to an out-of-bound access in the ext4_ext_drop_refs() function when operating on a crafted ext4 filesystem image.

Action-Not Available
Vendor-[UNKNOWN]Linux Kernel Organization, IncDebian GNU/LinuxCanonical Ltd.Red Hat, Inc.
Product-ubuntu_linuxdebian_linuxlinux_kernelenterprise_linuxkernel
CWE ID-CWE-125
Out-of-bounds Read
CVE-2007-6260
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.87% / 74.31%
||
7 Day CHG~0.00%
Published-06 Dec, 2007 | 02:00
Updated-07 Aug, 2024 | 16:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The installation process for Oracle 10g and llg uses accounts with default passwords, which allows remote attackers to obtain login access by connecting to the Listener. NOTE: at the end of the installation, if performed using the Database Configuration Assistant (DBCA), most accounts are disabled or their passwords are changed.

Action-Not Available
Vendor-n/aOracle Corporation
Product-database_servern/a
CWE ID-CWE-255
Not Available
CVE-2015-4851
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-6.8||MEDIUM
EPSS-1.42% / 79.79%
||
7 Day CHG~0.00%
Published-21 Oct, 2015 | 23:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in the Oracle iSupplier Portal component in Oracle E-Business Suite 12.0.6, 12.1.3, 12.2.3, and 12.2.4 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to XML input. NOTE: the previous information is from the October 2015 CPU. Oracle has not commented on third-party claims that this issue is an XML External Entity (XXE) vulnerability, which allows remote attackers to read arbitrary files, cause a denial of service, or conduct SMB Relay attacks via a crafted DTD in an XML request to OA_HTML/oramipp_lpr.

Action-Not Available
Vendor-n/aOracle Corporation
Product-e-business_suiten/a
CVE-2018-10884
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-8.8||HIGH
EPSS-0.18% / 39.24%
||
7 Day CHG~0.00%
Published-22 Aug, 2018 | 14:00
Updated-05 Aug, 2024 | 07:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Ansible Tower before versions 3.1.8 and 3.2.6 is vulnerable to cross-site request forgery (CSRF) in awx/api/authentication.py. An attacker could exploit this by tricking already authenticated users into visiting a malicious site and hijacking the authtoken cookie.

Action-Not Available
Vendor-Red Hat, Inc.
Product-ansible_toweransible-tower
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2015-4919
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-6.8||MEDIUM
EPSS-0.64% / 69.64%
||
7 Day CHG~0.00%
Published-21 Jan, 2016 | 02:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in the JD Edwards EnterpriseOne Tools component in Oracle JD Edwards Products 9.1 and 9.2 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Monitoring and Diagnostics SEC.

Action-Not Available
Vendor-n/aOracle Corporation
Product-jd_edwards_productsn/a
CVE-2015-4747
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-6.8||MEDIUM
EPSS-0.64% / 69.64%
||
7 Day CHG~0.00%
Published-16 Jul, 2015 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in the Oracle Event Processing component in Oracle Fusion Middleware 11.1.1.7 and 12.1.3.0 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CEP system.

Action-Not Available
Vendor-n/aOracle Corporation
Product-fusion_middlewaren/a
CVE-2018-1098
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-8.8||HIGH
EPSS-0.29% / 51.85%
||
7 Day CHG~0.00%
Published-03 Apr, 2018 | 16:00
Updated-05 Aug, 2024 | 03:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A cross-site request forgery flaw was found in etcd 3.3.1 and earlier. An attacker can set up a website that tries to send a POST request to the etcd server and modify a key. Adding a key is done with PUT so it is theoretically safe (can't PUT from an HTML form or such) but POST allows creating in-order keys that an attacker can send.

Action-Not Available
Vendor-Red Hat, Inc.Fedora Project
Product-etcdfedoraetcd
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2018-10936
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-8.1||HIGH
EPSS-1.35% / 79.30%
||
7 Day CHG~0.00%
Published-30 Aug, 2018 | 13:00
Updated-05 Aug, 2024 | 07:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A weakness was found in postgresql-jdbc before version 42.2.5. It was possible to provide an SSL Factory and not check the host name if a host name verifier was not provided to the driver. This could lead to a condition where a man-in-the-middle attacker could masquerade as a trusted server by providing a certificate for the wrong host, as long as it was signed by a trusted CA.

Action-Not Available
Vendor-[UNKNOWN]The PostgreSQL Global Development GroupRed Hat, Inc.
Product-postgresql_jdbc_driverenterprise_linuxPostgreSQL
CWE ID-CWE-297
Improper Validation of Certificate with Host Mismatch
CVE-2020-28052
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-3.78% / 87.61%
||
7 Day CHG~0.00%
Published-18 Dec, 2020 | 00:52
Updated-12 May, 2025 | 17:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Legion of the Bouncy Castle BC Java 1.65 and 1.66. The OpenBSDBCrypt.checkPassword utility method compared incorrect data when checking the password, allowing incorrect passwords to indicate they were matching with previously hashed ones that were different.

Action-Not Available
Vendor-bouncycastlen/aThe Apache Software FoundationOracle Corporation
Product-communications_messaging_servercommunications_session_route_managerbanking_virtual_account_managementcommunications_session_report_managerbanking_corporate_lending_process_managementutilities_frameworkcommunications_application_session_controllerbanking_extensibility_workbenchblockchain_platformpeoplesoft_enterprise_peopletoolskarafcommunications_pricing_design_centercommerce_guided_searchbc-javacommunications_convergencebanking_supply_chain_financewebcenter_portalbanking_credit_facilities_process_managementjd_edwards_enterpriseone_toolscommunications_cloud_native_core_network_slice_selection_functionn/a
CVE-2020-2538
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-7.1||HIGH
EPSS-1.50% / 80.40%
||
7 Day CHG~0.00%
Published-15 Jan, 2020 | 16:33
Updated-30 Sep, 2024 | 17:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Oracle WebCenter Sites product of Oracle Fusion Middleware (component: Advanced UI). The supported version that is affected is 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebCenter Sites. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebCenter Sites, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle WebCenter Sites accessible data as well as unauthorized read access to a subset of Oracle WebCenter Sites accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle WebCenter Sites. CVSS 3.0 Base Score 7.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L).

Action-Not Available
Vendor-Oracle Corporation
Product-webcenter_sitesWebCenter Sites
CVE-2018-11235
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-64.14% / 98.36%
||
7 Day CHG-3.03%
Published-30 May, 2018 | 04:00
Updated-05 Aug, 2024 | 08:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before 2.16.4, and 2.17.x before 2.17.1, remote code execution can occur. With a crafted .gitmodules file, a malicious project can execute an arbitrary script on a machine that runs "git clone --recurse-submodules" because submodule "names" are obtained from this file, and then appended to $GIT_DIR/modules, leading to directory traversal with "../" in a name. Finally, post-checkout hooks from a submodule are executed, bypassing the intended design in which hooks are not obtained from a remote server.

Action-Not Available
Vendor-git-scmgitforwindowsn/aCanonical Ltd.Red Hat, Inc.Debian GNU/Linux
Product-enterprise_linux_serverubuntu_linuxdebian_linuxenterprise_linux_server_eusenterprise_linux_workstationenterprise_linuxenterprise_linux_desktopgitn/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2015-4758
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-6.8||MEDIUM
EPSS-0.64% / 69.64%
||
7 Day CHG~0.00%
Published-16 Jul, 2015 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in the Oracle Data Integrator component in Oracle Fusion Middleware 11.1.1.3.0 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Data Quality based on Trillium, a different vulnerability than CVE-2015-0443, CVE-2015-0444, CVE-2015-0445, CVE-2015-0446, CVE-2015-2634, CVE-2015-2635, CVE-2015-2636, and CVE-2015-4759.

Action-Not Available
Vendor-n/aOracle Corporation
Product-fusion_middlewaren/a
CVE-2020-2604
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-8.1||HIGH
EPSS-1.86% / 82.33%
||
7 Day CHG~0.00%
Published-15 Jan, 2020 | 16:34
Updated-30 Sep, 2024 | 14:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Serialization). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS v3.0 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).

Action-Not Available
Vendor-Debian GNU/LinuxMcAfee, LLCNetApp, Inc.Red Hat, Inc.openSUSEOracle CorporationCanonical Ltd.
Product-enterprise_linux_serverubuntu_linuxopenjdkepolicy_orchestratoroncommand_insightenterprise_linux_server_ause-series_santricity_management_plug-inse-series_performance_analyzerenterprise_linuxactive_iq_unified_managerjdke-series_santricity_web_services_proxyoncommand_workflow_automationcommerce_guided_searchsantricity_unified_managersteelstore_cloud_integrated_storagedebian_linuxgraalvmjreenterprise_linux_workstatione-series_santricity_os_controllere-series_santricity_storage_managerenterprise_linux_eusenterprise_linux_server_tusenterprise_linux_desktopcommerce_experience_managerleapJava
CWE ID-CWE-502
Deserialization of Untrusted Data
CVE-2015-2902
Matching Score-8
Assigner-CERT/CC
ShareView Details
Matching Score-8
Assigner-CERT/CC
CVSS Score-6.8||MEDIUM
EPSS-0.95% / 75.43%
||
7 Day CHG~0.00%
Published-04 Nov, 2015 | 02:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

HP ArcSight SmartConnectors before 7.1.6 do not verify X.509 certificates from Logger devices, which allows man-in-the-middle attackers to spoof devices and obtain sensitive information via a crafted certificate.

Action-Not Available
Vendor-n/aHP Inc.
Product-arcsight_smartconnectorsn/a
CVE-2018-10120
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.18% / 39.65%
||
7 Day CHG~0.00%
Published-15 Apr, 2018 | 16:00
Updated-05 Aug, 2024 | 07:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The SwCTBWrapper::Read function in sw/source/filter/ww8/ww8toolbar.cxx in LibreOffice before 5.4.6.1 and 6.x before 6.0.2.1 does not validate a customizations index, which allows remote attackers to cause a denial of service (heap-based buffer overflow with write access) or possibly have unspecified other impact via a crafted document that contains a certain Microsoft Word record.

Action-Not Available
Vendor-libreofficen/aCanonical Ltd.Red Hat, Inc.Debian GNU/Linux
Product-enterprise_linux_serverubuntu_linuxdebian_linuxenterprise_linux_workstationlibreofficeenterprise_linux_desktopn/a
CWE ID-CWE-129
Improper Validation of Array Index
CWE ID-CWE-787
Out-of-bounds Write
CVE-2015-4759
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-6.8||MEDIUM
EPSS-0.64% / 69.64%
||
7 Day CHG~0.00%
Published-16 Jul, 2015 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in the Oracle Data Integrator component in Oracle Fusion Middleware 11.1.1.3.0 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Data Quality based on Trillium, a different vulnerability than CVE-2015-0443, CVE-2015-0444, CVE-2015-0445, CVE-2015-0446, CVE-2015-2634, CVE-2015-2635, CVE-2015-2636, and CVE-2015-4758.

Action-Not Available
Vendor-n/aOracle Corporation
Product-fusion_middlewaren/a
CVE-2007-5503
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-6.8||MEDIUM
EPSS-9.44% / 92.50%
||
7 Day CHG~0.00%
Published-30 Nov, 2007 | 01:00
Updated-07 Aug, 2024 | 15:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple integer overflows in Cairo before 1.4.12 might allow remote attackers to execute arbitrary code, as demonstrated using a crafted PNG image with large width and height values, which is not properly handled by the read_png function.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-cairon/a
CWE ID-CWE-189
Not Available
CVE-2015-5318
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.06% / 17.72%
||
7 Day CHG~0.00%
Published-25 Nov, 2015 | 20:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Jenkins before 1.638 and LTS before 1.625.2 uses a publicly accessible salt to generate CSRF protection tokens, which makes it easier for remote attackers to bypass the CSRF protection mechanism via a brute force attack.

Action-Not Available
Vendor-n/aRed Hat, Inc.Jenkins
Product-openshiftjenkinsn/a
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2020-24750
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-2.11% / 83.40%
||
7 Day CHG~0.00%
Published-17 Sep, 2020 | 18:39
Updated-04 Aug, 2024 | 15:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to com.pastdev.httpcomponents.configuration.JndiConfiguration.

Action-Not Available
Vendor-n/aDebian GNU/LinuxOracle CorporationFasterXML, LLC.
Product-communications_diameter_signaling_routercommunications_contacts_serversiebel_core_-_server_frameworkcommunications_messaging_servercommunications_offline_mediation_controlleridentity_manager_connectorsiebel_ui_frameworkcommunications_session_route_managercommunications_session_report_managercommunications_instant_messaging_serveragile_plmautovue_for_agile_product_lifecycle_managementcommunications_policy_managementbanking_supply_chain_financedebian_linuxblockchain_platformcommunications_pricing_design_centerjackson-databindcommunications_calendar_serverbanking_liquidity_managementbanking_corporate_lending_process_managementcommunications_unified_inventory_managementbanking_credit_facilities_process_managementapplication_testing_suitecommunications_services_gatekeepercommunications_element_managern/a
CWE ID-CWE-502
Deserialization of Untrusted Data
CVE-2007-4131
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-6.8||MEDIUM
EPSS-8.73% / 92.15%
||
7 Day CHG~0.00%
Published-25 Aug, 2007 | 00:00
Updated-07 Aug, 2024 | 14:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Directory traversal vulnerability in the contains_dot_dot function in src/names.c in GNU tar allows user-assisted remote attackers to overwrite arbitrary files via certain //.. (slash slash dot dot) sequences in directory symlinks in a TAR archive.

Action-Not Available
Vendor-rpathn/aRed Hat, Inc.GNU
Product-rpath_linuxenterprise_linux_desktopenterprise_linuxtarn/a
CVE-2004-0957
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.39% / 59.00%
||
7 Day CHG~0.00%
Published-21 Oct, 2004 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unknown vulnerability in MySQL 3.23.58 and earlier, when a local user has privileges for a database whose name includes a "_" (underscore), grants privileges to other databases that have similar names, which can allow the user to conduct unauthorized activities.

Action-Not Available
Vendor-trustixopenpkgn/aUbuntuSUSERed Hat, Inc.Oracle Corporation
Product-ubuntu_linuxenterprise_linuxopenpkgmysqlsuse_linuxenterprise_linux_desktopsecure_linuxn/a
CVE-2017-5813
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-6.3||MEDIUM
EPSS-0.49% / 64.72%
||
7 Day CHG~0.00%
Published-15 Feb, 2018 | 22:00
Updated-16 Sep, 2024 | 19:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A remote unauthenticated access vulnerability in HPE Network Automation version 9.1x, 9.2x, 10.0x, 10.1x and 10.2x were found.

Action-Not Available
Vendor-HP Inc.Hewlett Packard Enterprise (HPE)
Product-network_automationNetwork Automation
CVE-2018-10392
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-1.36% / 79.40%
||
7 Day CHG~0.00%
Published-26 Apr, 2018 | 05:00
Updated-05 Aug, 2024 | 07:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

mapping0_forward in mapping0.c in Xiph.Org libvorbis 1.3.6 does not validate the number of channels, which allows remote attackers to cause a denial of service (heap-based buffer overflow or over-read) or possibly have unspecified other impact via a crafted file.

Action-Not Available
Vendor-xiph.orgn/aDebian GNU/LinuxRed Hat, Inc.
Product-debian_linuxenterprise_linux_server_ausenterprise_linuxlibvorbisenterprise_linux_eusenterprise_linux_server_tusn/a
CWE ID-CWE-787
Out-of-bounds Write
CWE ID-CWE-125
Out-of-bounds Read
CVE-2007-3872
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.8||MEDIUM
EPSS-71.10% / 98.65%
||
7 Day CHG~0.00%
Published-09 Aug, 2007 | 20:00
Updated-07 Aug, 2024 | 14:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple stack-based buffer overflows in the Shared Trace Service (OVTrace) service for HP OpenView Operations A.07.50 for Windows, and possibly earlier versions, allow remote attackers to execute arbitrary code via certain crafted requests.

Action-Not Available
Vendor-n/aHP Inc.
Product-openview_operationsshared_trace_servicen/a
CVE-2007-3649
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.8||MEDIUM
EPSS-6.62% / 90.81%
||
7 Day CHG~0.00%
Published-10 Jul, 2007 | 17:00
Updated-07 Aug, 2024 | 14:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Absolute path traversal vulnerability in a certain ActiveX control in hpqvwocx.dll 2.1.0.556 in Hewlett-Packard (HP) Digital Imaging allows remote attackers to create or overwrite arbitrary files via the second argument to the SaveToFile method.

Action-Not Available
Vendor-n/aHP Inc.
Product-photo_digital_imaging_activex_controln/a
CVE-2015-5445
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-8.8||HIGH
EPSS-0.09% / 26.95%
||
7 Day CHG~0.00%
Published-05 Jan, 2016 | 11:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site request forgery (CSRF) vulnerability in HP StoreOnce Backup system software before 3.13.1 allows remote authenticated users to hijack the authentication of unspecified victims via unknown vectors.

Action-Not Available
Vendor-n/aHP Inc.
Product-storeonce_backup_system_softwaren/a
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2018-1051
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-8.1||HIGH
EPSS-0.69% / 70.82%
||
7 Day CHG~0.00%
Published-25 Jan, 2018 | 20:00
Updated-05 Aug, 2024 | 03:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

It was found that the fix for CVE-2016-9606 in versions 3.0.22 and 3.1.2 was incomplete and Yaml unmarshalling in Resteasy is still possible via `Yaml.load()` in YamlProvider.

Action-Not Available
Vendor-Red Hat, Inc.
Product-resteasyresteasy
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-502
Deserialization of Untrusted Data
CVE-2015-5451
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.11% / 30.62%
||
7 Day CHG~0.00%
Published-23 Nov, 2015 | 02:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site request forgery (CSRF) vulnerability in HP Operations Orchestration Central 10.x before 10.22.001 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.

Action-Not Available
Vendor-n/aHP Inc.
Product-operations_orchestrationn/a
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2018-1000877
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-3.60% / 87.32%
||
7 Day CHG+2.05%
Published-20 Dec, 2018 | 17:00
Updated-05 Aug, 2024 | 12:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

libarchive version commit 416694915449219d505531b1096384f3237dd6cc onwards (release v3.1.0 onwards) contains a CWE-415: Double Free vulnerability in RAR decoder - libarchive/archive_read_support_format_rar.c, parse_codes(), realloc(rar->lzss.window, new_size) with new_size = 0 that can result in Crash/DoS. This attack appear to be exploitable via the victim must open a specially crafted RAR archive.

Action-Not Available
Vendor-n/aFedora ProjectCanonical Ltd.Debian GNU/LinuxlibarchiveRed Hat, Inc.
Product-enterprise_linux_serverubuntu_linuxdebian_linuxlibarchiveenterprise_linux_workstationfedoraenterprise_linux_desktopn/a
CWE ID-CWE-415
Double Free
CVE-2018-1000156
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-42.80% / 97.39%
||
7 Day CHG~0.00%
Published-06 Apr, 2018 | 13:00
Updated-14 Apr, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD's CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.

Action-Not Available
Vendor-n/aDebian GNU/LinuxCanonical Ltd.Red Hat, Inc.GNU
Product-enterprise_linux_desktopenterprise_linux_server_eusenterprise_linux_workstationenterprise_linux_server_ausenterprise_linux_server_tusdebian_linuxpatchubuntu_linuxenterprise_linux_servern/a
CWE ID-CWE-20
Improper Input Validation
CVE-2015-2114
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.36% / 57.48%
||
7 Day CHG~0.00%
Published-14 Apr, 2015 | 22:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

HP Support Solution Framework before 11.51.0049 allows remote attackers to download an arbitrary program onto a client machine and execute this program via unspecified vectors.

Action-Not Available
Vendor-n/aHP Inc.Microsoft Corporation
Product-support_solution_frameworkwindowsn/a
CVE-2020-2537
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-7.1||HIGH
EPSS-1.54% / 80.65%
||
7 Day CHG~0.00%
Published-15 Jan, 2020 | 16:33
Updated-30 Sep, 2024 | 17:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Fusion Middleware (component: Analytics Actions). Supported versions that are affected are 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Business Intelligence Enterprise Edition, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Business Intelligence Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Business Intelligence Enterprise Edition accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Business Intelligence Enterprise Edition. CVSS 3.0 Base Score 7.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L).

Action-Not Available
Vendor-Oracle Corporation
Product-business_intelligenceOracle Business Intelligence Enterprise Edition
CVE-2015-5234
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.92% / 75.05%
||
7 Day CHG~0.00%
Published-09 Oct, 2015 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IcedTea-Web before 1.5.3 and 1.6.x before 1.6.1 does not properly sanitize applet URLs, which allows remote attackers to inject applets into the .appletTrustSettings configuration file and bypass user approval to execute the applet via a crafted web page, possibly related to line breaks.

Action-Not Available
Vendor-n/aRed Hat, Inc.Fedora ProjectopenSUSE
Product-enterprise_linux_serverenterprise_linux_hpc_nodefedoraopensuseenterprise_linux_desktopicedteaenterprise_linux_workstationn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2018-14681
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-1.82% / 82.14%
||
7 Day CHG-1.60%
Published-28 Jul, 2018 | 23:00
Updated-05 Aug, 2024 | 09:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in kwajd_read_headers in mspack/kwajd.c in libmspack before 0.7alpha. Bad KWAJ file header extensions could cause a one or two byte overwrite.

Action-Not Available
Vendor-cabextractcabextract_projectn/aCanonical Ltd.Red Hat, Inc.Debian GNU/Linux
Product-enterprise_linux_serverubuntu_linuxlibmspackdebian_linuxenterprise_linux_workstationenterprise_linux_desktopcabextractansible_towern/a
CWE ID-CWE-787
Out-of-bounds Write
CVE-2018-14637
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.25% / 48.37%
||
7 Day CHG~0.00%
Published-30 Nov, 2018 | 13:00
Updated-05 Aug, 2024 | 09:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The SAML broker consumer endpoint in Keycloak before version 4.6.0.Final ignores expiration conditions on SAML assertions. An attacker can exploit this vulnerability to perform a replay attack.

Action-Not Available
Vendor-[UNKNOWN]Red Hat, Inc.
Product-keycloakkeycloak
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-285
Improper Authorization
CVE-2015-5188
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.33% / 55.37%
||
7 Day CHG~0.00%
Published-27 Oct, 2015 | 16:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site request forgery (CSRF) vulnerability in the Web Console (web-console) in Red Hat Enterprise Application Platform before 6.4.4 and WildFly (formerly JBoss Application Server) before 2.0.0.CR9 allows remote attackers to hijack the authentication of administrators for requests that make arbitrary changes to an instance via vectors involving a file upload using a multipart/form-data submission.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-jboss_enterprise_application_platformjboss_wildfly_application_servern/a
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2007-2108
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.8||MEDIUM
EPSS-32.86% / 96.73%
||
7 Day CHG~0.00%
Published-18 Apr, 2007 | 18:00
Updated-07 Aug, 2024 | 13:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in the Core RDBMS component in Oracle Database 9.0.1.5, 9.2.0.8, 10.1.0.5, and 10.2.0.2 on Windows allows remote attackers to have an unknown impact, aka DB01. NOTE: as of 20070424, Oracle has not disputed reliable claims that this issue occurs because the NTLM SSPI AcceptSecurityContext function grants privileges based on the username provided even though all users are authenticated as Guest, which allows remote attackers to gain privileges.

Action-Not Available
Vendor-n/aMicrosoft CorporationOracle Corporation
Product-windowsdatabase_servern/a
CWE ID-CWE-264
Not Available
CVE-2015-0797
Matching Score-8
Assigner-Mozilla Corporation
ShareView Details
Matching Score-8
Assigner-Mozilla Corporation
CVSS Score-6.8||MEDIUM
EPSS-7.61% / 91.49%
||
7 Day CHG~0.00%
Published-14 May, 2015 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

GStreamer before 1.4.5, as used in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 on Linux, allows remote attackers to cause a denial of service (buffer over-read and application crash) or possibly execute arbitrary code via crafted H.264 video data in an m4v file.

Action-Not Available
Vendor-gstreamer_projectn/aMozilla CorporationLinux Kernel Organization, IncSUSERed Hat, Inc.Debian GNU/Linux
Product-enterprise_linux_serverenterprise_linux_server_ausgstreamerlinux_kernelfirefoxseamonkeyenterprise_linux_eusenterprise_linux_desktopenterprise_linux_server_tuslinux_enterprise_desktopenterprise_linux_workstationthunderbirddebian_linuxlinux_enterprise_serverlinux_enterprise_software_development_kitn/a
CVE-2015-4491
Matching Score-8
Assigner-Mozilla Corporation
ShareView Details
Matching Score-8
Assigner-Mozilla Corporation
CVSS Score-6.8||MEDIUM
EPSS-5.71% / 90.08%
||
7 Day CHG~0.00%
Published-16 Aug, 2015 | 01:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow in the make_filter_table function in pixops/pixops.c in gdk-pixbuf before 2.31.5, as used in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 on Linux, Google Chrome on Linux, and other products, allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and application crash) via crafted bitmap dimensions that are mishandled during scaling.

Action-Not Available
Vendor-n/aMozilla CorporationLinux Kernel Organization, IncopenSUSEGoogle LLCFedora ProjectThe GNOME ProjectOracle CorporationCanonical Ltd.
Product-solarislinux_kernelfirefoxfedoraopensuseubuntu_linuxchromegdk-pixbufn/a
CVE-2020-24616
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-3.78% / 87.62%
||
7 Day CHG~0.00%
Published-25 Aug, 2020 | 17:04
Updated-04 Aug, 2024 | 15:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPDataSource (aka Anteros-DBCP).

Action-Not Available
Vendor-n/aDebian GNU/LinuxOracle CorporationFasterXML, LLC.NetApp, Inc.
Product-communications_diameter_signaling_routercommunications_contacts_servercommunications_messaging_servercommunications_offline_mediation_controlleridentity_manager_connectorsiebel_ui_frameworkactive_iq_unified_managercommunications_session_report_managercommunications_instant_messaging_serverautovue_for_agile_product_lifecycle_managementagile_plmcommunications_policy_managementbanking_supply_chain_financedebian_linuxblockchain_platformcommunications_cloud_native_core_unified_data_repositoryjackson-databindcommunications_pricing_design_centercommunications_calendar_serverbanking_liquidity_managementcommunications_evolved_communications_application_servercommunications_unified_inventory_managementapplication_testing_suitecommunications_services_gatekeepercommunications_element_managern/a
CWE ID-CWE-502
Deserialization of Untrusted Data
CVE-2017-9776
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-1.25% / 78.49%
||
7 Day CHG~0.00%
Published-22 Jun, 2017 | 21:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Integer overflow leading to Heap buffer overflow in JBIG2Stream.cc in pdftocairo in Poppler before 0.56 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted PDF document.

Action-Not Available
Vendor-n/afreedesktop.orgDebian GNU/LinuxRed Hat, Inc.
Product-enterprise_linux_desktopenterprise_linux_server_tusenterprise_linux_workstationpopplerenterprise_linux_server_eusdebian_linuxenterprise_linux_serverenterprise_linux_server_ausn/a
CWE ID-CWE-190
Integer Overflow or Wraparound
CVE-2017-7798
Matching Score-8
Assigner-Mozilla Corporation
ShareView Details
Matching Score-8
Assigner-Mozilla Corporation
CVSS Score-8.8||HIGH
EPSS-2.92% / 85.87%
||
7 Day CHG~0.00%
Published-11 Jun, 2018 | 21:00
Updated-05 Aug, 2024 | 16:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Developer Tools feature suffers from a XUL injection vulnerability due to improper sanitization of the web page source code. In the worst case, this could allow arbitrary code execution when opening a malicious page with the style editor tool. This vulnerability affects Firefox ESR < 52.3 and Firefox < 55.

Action-Not Available
Vendor-Debian GNU/LinuxRed Hat, Inc.Mozilla Corporation
Product-enterprise_linux_serverdebian_linuxenterprise_linux_server_eusfirefoxfirefox_esrenterprise_linux_server_ausenterprise_linux_workstationenterprise_linuxenterprise_linux_desktopFirefoxFirefox ESR
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
  • Previous
  • 1
  • 2
  • ...
  • 5
  • 6
  • 7
  • ...
  • 15
  • 16
  • Next
Details not found