Datasets:

Modalities:
Tabular
Text
Formats:
parquet
Libraries:
Datasets
pandas
Dataset Viewer
Auto-converted to Parquet
id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2018-13087
The mintToken function of a smart contract implementation for Coinstar (CSTR), an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
[ "cpe:2.3:a:coinstar_myadvancedtoken_project:coinstar_myadvancedtoken:-:*:*:*:*:*:*:*" ]
null
7.5
null
5
CVE-2022-45728
Doctor Appointment Management System v1.0.0 was discovered to contain a cross-site scripting (XSS) vulnerability.
[ "cpe:2.3:a:phpgurukul:doctor_appointment_management_system:1.0.0:*:*:*:*:*:*:*" ]
null
6.1
null
null
GHSA-qjrq-hm79-49ww
ginuerzh/gost vulnerable to Timing Attack
[Timing attacks](https://en.wikipedia.org/wiki/Timing_attack) occur when an attacker can guess a secret by observing a difference in processing time for valid and invalid inputs. Sensitive secrets such as passwords, token and API keys should be compared only using a constant-time comparision function. More information on this attack type can be found in [this blog post](https://verboselogging.com/2012/08/20/a-timing-attack-in-action).Root Cause AnalysisIn this case, the vulnerability occurs due to the following code.https://github.com/ginuerzh/gost/blob/1c62376e0880e4094bd3731e06bd4f7842638f6a/auth.go#L46-L46Here, a untrusted input, sourced from a HTTP header, is compared directly with a secret. Since, this comparision is not secure, an attacker can mount a side-channel timing attack to guess the password.RemediationThis can be easily fixed using a constant time comparing function such as `crypto/subtle`'s `ConstantTimeCompare`. An example fix can be found in https://github.com/runatlantis/atlantis/commit/48870911974adddaa4c99c8089e79b7d787fa820 Alternatively, one can apply the patch below
[]
null
5.9
null
null
CVE-2017-9602
KBVault Mysql Free Knowledge Base application package 0.16a comes with a FileExplorer/Explorer.aspx?id=/Uploads file-management component. An unauthenticated user can access the file upload and deletion functionality. Through this functionality, a user can upload an ASPX script to Uploads/Documents/ to run any arbitrary code.
[ "cpe:2.3:a:kbvault_mysql_project:kbvault_mysql:0.16a:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
CVE-2023-3614
Denial of Service via specially crafted gif image
Mattermost fails to properly validate a gif image file, allowing an attacker to consume a significant amount of server resources, making the server unresponsive for an extended period of time by linking to specially crafted image file.
[ "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*" ]
null
4.3
null
null
CVE-2022-44946
Rukovoditel v3.2.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the Add Page function at /index.php?module=help_pages/pages&entities_id=24. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title field.
[ "cpe:2.3:a:rukovoditel:rukovoditel:3.2.1:*:*:*:*:*:*:*" ]
null
5.4
null
null
GHSA-3598-xggf-5767
A vulnerability has been discovered in BigProf Online Invoicing System 2.6, which does not sufficiently encode user-controlled input, resulting in persistent XSS through /invoicing/app/invoices_view.php, in the FirstRecord parameter. Exploitation of this vulnerability could allow an attacking user to store dangerous JavaScript payloads on the system that will be triggered when the page loads.
[]
null
6.3
null
null
CVE-2024-6558
HMS Industrial Networks Anybus-CompactCom 30 Cross-site Scripting
HMS Industrial Networks Anybus-CompactCom 30 products are vulnerable to a XSS attack caused by the lack of input sanitation checks. As a consequence, it is possible to insert HTML code into input fields and store the HTML code. The stored HTML code will be embedded in the page and executed by host browser the next time the page is loaded, enabling social engineering attacks.
[ "cpe:2.3:o:hms-networks:anybus_compactcom_30_module_ethernet\\/ip_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hms-networks:anybus_compactcom_30_module_ethernet\\/ip:-:*:*:*:*:*:*:*", "cpe:2.3:o:hms-networks:anybus_compactcom_30_module_usb_without_housing_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:hms-networks:anybus_compactcom_30_module_usb_without_housing:-:*:*:*:*:*:*:*" ]
6.3
6.3
null
null
CVE-2023-6572
Command Injection in gradio-app/gradio
Command Injection in GitHub repository gradio-app/gradio prior to main.
[ "cpe:2.3:a:gradio_project:gradio:*:*:*:*:*:python:*:*" ]
null
null
9.6
null
RHSA-2023:4947
Red Hat Security Advisory: thunderbird security update
Mozilla: Full screen notification obscured by file open dialog Mozilla: Full screen notification obscured by external program Mozilla: Memory corruption in IPC CanvasTranslator Mozilla: Memory corruption in IPC ColorPickerShownCallback Mozilla: Memory corruption in IPC FilePickerShownCallback Mozilla: Memory corruption in JIT UpdateRegExpStatics Mozilla: Error reporting methods in SpiderMonkey could have triggered an Out of Memory Exception Mozilla: Push notifications saved to disk unencrypted Mozilla: XLL file extensions were downloadable without warnings Mozilla: Browsing Context potentially not cleared when closing Private Window Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 102.15, Firefox ESR 115.2, Thunderbird 102.15, and Thunderbird 115.2 Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2
[ "cpe:/a:redhat:rhel_eus:9.0::appstream" ]
null
8.8
null
null
CVE-2019-3905
Zoho ManageEngine ADSelfService Plus 5.x before build 5703 has SSRF.
[ "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5000:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5001:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5002:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5010:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5011:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5020:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5021:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5022:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5030:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5032:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5040:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.0:5041:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5100:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5101:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5102:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5103:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5104:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5105:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5106:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5107:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5108:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5109:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5110:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5111:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5112:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5113:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5114:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.1:5115:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.2:5200:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.2:5201:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.2:5202:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.2:5203:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.2:5204:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.2:5205:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.2:5206:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.2:5207:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5300:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5301:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5302:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5303:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5304:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5305:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5306:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5307:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5308:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5309:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5310:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5311:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5312:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5313:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5314:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5315:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5316:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5317:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5318:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5319:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5320:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5321:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5322:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5323:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5324:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5325:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5326:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5327:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5328:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5329:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.3:5330:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.4:5400:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5500:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5501:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5502:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5503:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5504:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5505:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5506:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5507:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5508:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5509:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5510:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5511:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5512:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5513:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5514:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5515:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5516:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5517:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5518:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5519:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5520:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.5:5521:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.6:5600:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.6:5601:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.6:5602:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.6:5603:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.6:5604:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.6:5605:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.6:5606:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.6:5607:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5700:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5701:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_adselfservice_plus:5.7:5702:*:*:*:*:*:*" ]
null
null
10
7.5
CVE-2023-35312
Microsoft VOLSNAP.SYS Elevation of Privilege Vulnerability
Microsoft VOLSNAP.SYS Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-2x2q-xfv9-3v6p
The School Management System – WPSchoolPress plugin for WordPress is vulnerable to SQL Injection via the 'addNotify' action in all versions up to, and including, 2.2.16 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with teacher-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
[]
null
6.5
null
null
GHSA-qr4x-6cmr-2rc9
aStats 1.6.5 allows local users to overwrite arbitrary files via a symlink attack on (1) the aStats-Graphic-Signature-Generation file and (2) certain PNG image files.
[]
null
null
null
null
GHSA-w5pq-93h6-w2rr
NetApp AFF A700s Baseboard Management Controller (BMC) firmware versions 1.22 and higher were shipped with a default account enabled that could allow unauthorized arbitrary command execution.
[]
null
null
9.8
null
CVE-2023-36408
Windows Hyper-V Elevation of Privilege Vulnerability
Windows Hyper-V Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-ww8h-5j5h-fmwm
Cross-site scripting (XSS) vulnerability in viewcat.php in geoBlog 1.0 allows remote attackers to inject arbitrary web script or HTML via the cat parameter.
[]
null
null
null
null
CVE-2022-21888
Windows Modern Execution Server Remote Code Execution Vulnerability
Windows Modern Execution Server Remote Code Execution Vulnerability
[ "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server:2022:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-v4f3-8wwc-j9x2
Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability
[]
null
8.1
null
null
CVE-2020-1919
Incorrect bounds calculations in substr_compare could lead to an out-of-bounds read when the second string argument passed in is longer than the first. This issue affects HHVM versions prior to 4.56.3, all versions between 4.57.0 and 4.80.1, all versions between 4.81.0 and 4.93.1, and versions 4.94.0, 4.95.0, 4.96.0, 4.97.0, 4.98.0.
[ "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*", "cpe:2.3:a:facebook:hhvm:4.94.0:*:*:*:*:*:*:*", "cpe:2.3:a:facebook:hhvm:4.95.0:*:*:*:*:*:*:*", "cpe:2.3:a:facebook:hhvm:4.96.0:*:*:*:*:*:*:*", "cpe:2.3:a:facebook:hhvm:4.97.0:*:*:*:*:*:*:*", "cpe:2.3:a:facebook:hhvm:4.98.0:*:*:*:*:*:*:*" ]
null
7.5
null
5
CVE-2021-46988
userfaultfd: release page in error path to avoid BUG_ON
In the Linux kernel, the following vulnerability has been resolved: userfaultfd: release page in error path to avoid BUG_ON Consider the following sequence of events: 1. Userspace issues a UFFD ioctl, which ends up calling into shmem_mfill_atomic_pte(). We successfully account the blocks, we shmem_alloc_page(), but then the copy_from_user() fails. We return -ENOENT. We don't release the page we allocated. 2. Our caller detects this error code, tries the copy_from_user() after dropping the mmap_lock, and retries, calling back into shmem_mfill_atomic_pte(). 3. Meanwhile, let's say another process filled up the tmpfs being used. 4. So shmem_mfill_atomic_pte() fails to account blocks this time, and immediately returns - without releasing the page. This triggers a BUG_ON in our caller, which asserts that the page should always be consumed, unless -ENOENT is returned. To fix this, detect if we have such a "dangling" page when accounting fails, and if so, release it before returning.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-q45w-f72f-v464
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in National Keep Cyber Security Services CyberMath allows Reflected XSS.This issue affects CyberMath: from v.1.4 before v.1.5.
[]
null
6.1
null
null
PYSEC-2022-49
null
Tensorflow is an Open Source Machine Learning Framework. The estimator for the cost of some convolution operations can be made to execute a division by 0. The function fails to check that the stride argument is strictly positive. Hence, the fix is to add a check for the stride argument to ensure it is valid. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
[]
null
null
null
null
CVE-2006-1871
SQL injection vulnerability in Oracle Database Server 9.2.0.7 and 10.1.0.5 allows remote attackers to execute arbitrary SQL commands via the DELETE_FROM_TABLE function in the DBMS_LOGMNR_SESSION (Log Miner) package, aka Vuln# DB06.
[ "cpe:2.3:a:oracle:database_server:9.2.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:database_server:10.1.0.5:*:*:*:*:*:*:*" ]
null
null
null
6.5
CVE-2024-6656
Hardcoded Credentals in TNB Mobile Solutions' Cockpit Software
Use of Hard-coded Credentials vulnerability in TNB Mobile Solutions Cockpit Software allows Read Sensitive Strings Within an Executable.This issue affects Cockpit Software: before v2.13.
[ "cpe:2.3:a:tnb_mobile_solutions:cockpit_software:*:*:*:*:*:*:*:*", "cpe:2.3:a:tnbmobil:cockpit:*:*:*:*:*:*:*:*" ]
8.8
null
null
null
GHSA-cc95-94rx-4f96
Directory traversal vulnerability in the web interface on the D-Link DWR-116 device with firmware before V1.05b09 allows remote attackers to read arbitrary files via a .. (dot dot) in a "GET /uir/" request.
[]
null
null
7.5
null
GHSA-8v7w-j6g2-p6j2
HTTP::Body::Multipart in the HTTP-Body 1.08, 1.17, and earlier module for Perl uses the part of the uploaded file's name after the first "." character as the suffix of a temporary file, which makes it easier for remote attackers to conduct attacks by leveraging subsequent behavior that may assume the suffix is well-formed.
[]
null
null
null
null
GHSA-gx4q-m69p-mf52
The DVC from TRCore has a Path Traversal vulnerability and does not restrict the types of uploaded files. This allows unauthenticated remote attackers to upload arbitrary files to any directory, leading to arbitrary code execution by uploading webshells.
[]
null
9.8
null
null
CVE-2024-35286
A vulnerability in NuPoint Messenger (NPM) of Mitel MiCollab through 9.8.0.33 allows an unauthenticated attacker to conduct a SQL injection attack due to insufficient sanitization of user input. A successful exploit could allow an attacker to access sensitive information and execute arbitrary database and management operations.
[ "cpe:2.3:a:mitel:micollab:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-p4xh-4869-8vrg
AdaptiveScale LXDUI Hardcoded JWT Secret Key
A Hardcoded JWT Secret Key in `__metadata__.py` metadata.py in AdaptiveScale LXDUI through 2.1.3 allows attackers to gain admin access to the host system.
[]
9.3
9.8
null
null
GHSA-r6wx-j8f2-9xr4
Multiple unspecified vulnerabilities in the IBM Proventia engine 4.9.0.0.44 20081231, as used in IBM Proventia Network Mail Security System, Network Mail Security System Virtual Appliance, Desktop Endpoint Security, Network Multi-Function Security (MFS), and possibly other products, allow remote attackers to bypass detection of malware via a modified (1) ZIP or (2) CAB archive, a related issue to CVE-2009-1240.
[]
null
null
null
null
GHSA-88qf-h86p-x7q9
The popup-by-supsystic plugin before 1.7.9 for WordPress has CSRF.
[]
null
null
8.8
null
GHSA-2m4j-g6x3-4mgf
Cross-site scripting (XSS) vulnerability in ScareCrow 2.13 and earlier allows remote attackers to inject arbitrary web script or HTML via the forum parameter to (1) forum.cgi and (2) post.cgi, or (3) the user parameter to profile.cgi.
[]
null
null
null
null
GHSA-c6w6-vvhg-83vr
A potential vulnerability was reported in Radeon™ Software Crimson ReLive Edition which may allow escalation of privilege. Radeon™ Software Crimson ReLive Edition falls outside of the security support lifecycle and AMD does not plan to release any mitigations
[]
null
9.8
null
null
CVE-2003-1525
Unspecified vulnerability in My Photo Gallery 3.5, and possibly earlier versions, has unknown impact and attack vectors.
[ "cpe:2.3:a:my_photo_gallery:my_photo_gallery:*:*:*:*:*:*:*:*" ]
null
null
null
10
RHSA-2020:0168
Red Hat Security Advisory: openvswitch2.12 security and bug fix update
dpdk: possible memory leak leads to denial of service
[ "cpe:/o:redhat:enterprise_linux:7::fastdatapath" ]
null
null
7.5
null
CVE-2010-0341
SQL injection vulnerability in the BB Simple Jobs (bb_simplejobs) extension 0.1.0 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
[ "cpe:2.3:a:typo3:bb_simplejobs:*:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-g2wp-w28c-8vg2
Unspecified vulnerability in the U3D component in Adobe Reader and Acrobat 10.1.1 and earlier on Windows and Mac OS X, and Adobe Reader 9.x through 9.4.6 on UNIX, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, as exploited in the wild in December 2011.
[]
null
9.8
null
null
GHSA-v2f6-mg42-536m
The transform_save function in transform.c in Augeas before 1.0.0 allows local users to overwrite arbitrary files and obtain sensitive information via a symlink attack on a .augnew file.
[]
null
null
null
null
GHSA-vrh3-hvpj-7864
Cross-site scripting (XSS) vulnerability in sidebar.php in WordPress, when custom 404 pages that call get_sidebar are used, allows remote attackers to inject arbitrary web script or HTML via the query string (PHP_SELF), a different vulnerability than CVE-2007-1622.
[]
null
null
null
null
GHSA-2grf-mxvh-rqrf
PhpSecInfo 0.2.1 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by Test/Test_Suhosin.php and certain other files.
[]
null
null
null
null
GHSA-3c25-qgc5-wqhf
Cross-site request forgery (CSRF) vulnerability in Claroline before 1.8.10 allows remote attackers to change passwords, related to lack of a requirement for the previous password.
[]
null
null
null
null
CVE-2021-43611
Belledonne Belle-sip before 5.0.20 can crash applications such as Linphone via " \ " in the display name of a From header.
[ "cpe:2.3:a:linphone:belle-sip:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
GHSA-96c7-3xcm-hwgm
When a user opens a manipulated Tagged Image File Format (.tiff, 2d.x3d)) received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9.0, the application crashes and becomes temporarily unavailable to the user until restart of the application. The file format details along with their CVE relevant information can be found below.
[]
null
6.5
null
null
GHSA-ffrj-w536-5xrc
The mod_dav module in Apache 2.0.50 and earlier allows remote attackers to cause a denial of service (child process crash) via a certain sequence of LOCK requests for a location that allows WebDAV authoring access.
[]
null
null
null
null
CVE-2018-1999029
A cross-site scripting vulnerability exists in Jenkins Shelve Project Plugin 1.5 and earlier in ShelveProjectAction/index.jelly, ShelvedProjectsAction/index.jelly that allows attackers with Job/Configure permission to define JavaScript that would be executed in another user's browser when that other user performs some UI actions.
[ "cpe:2.3:a:jenkins:shelve_project:*:*:*:*:*:jenkins:*:*" ]
null
null
5.4
3.5
CVE-2025-2116
Beijing Founder Electronics Founder Enjoys All-Media Acquisition and Editing System File Protocol imageProxy.do server-side request forgery
A vulnerability has been found in Beijing Founder Electronics Founder Enjoys All-Media Acquisition and Editing System 3.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /newsedit/newsedit/xy/imageProxy.do of the component File Protocol Handler. The manipulation of the argument xyImgUrl leads to server-side request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
5.3
4.3
4.3
4
RHSA-2024:4719
Red Hat Security Advisory: httpd:2.4 security update
httpd: Substitution encoding issue in mod_rewrite httpd: Improper escaping of output in mod_rewrite httpd: NULL pointer dereference in mod_proxy
[ "cpe:/a:redhat:rhel_eus:8.8::appstream" ]
null
7.5
null
null
GHSA-8xpj-rxm7-wgf9
The Icegram Express plugin for WordPress is vulnerable to SQL Injection via the ‘options[list_id]’ parameter in all versions up to, and including, 5.7.22 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
[]
null
8.8
null
null
CVE-2022-36584
In Tenda G3 US_G3V3.0br_V15.11.0.6(7663)_EN_TDE, the getsinglepppuser function has a buffer overflow caused by sscanf.
[ "cpe:2.3:o:tenda:g3_firmware:15.11.0.6\\(7663\\):*:*:*:*:*:*:*", "cpe:2.3:h:tenda:g3:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-3f49-xrvw-r3qr
Directory traversal vulnerability in scripts/export.php in ClaSS before 0.8.61 allows remote attackers to read arbitrary files via directory traversal sequences in the ftype parameter.
[]
null
null
null
null
CVE-2016-7577
An issue was discovered in certain Apple products. iOS before 10.1 is affected. macOS before 10.12.1 is affected. The issue involves the "FaceTime" component, which allows remote attackers to trigger memory corruption and obtain audio data from a call that appeared to have ended.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ]
null
null
3.7
4.3
CVE-2019-20022
An invalid memory address dereference was discovered in load_pnm in frompnm.c in libsixel before 1.8.3.
[ "cpe:2.3:a:libsixel_project:libsixel:*:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
GHSA-gw7x-jcrq-44c3
In the Linux kernel, the following vulnerability has been resolved:ALSA: core: Fix possible NULL dereference caused by kunit_kzalloc()kunit_kzalloc() may return a NULL pointer, dereferencing it without NULL check may lead to NULL dereference. Add NULL checks for all the kunit_kzalloc() in sound_kunit.c
[]
null
5.5
null
null
GHSA-7qx7-x5h7-hv59
The OSPF implementation on the Brocade Vyatta vRouter with software before 6.6R1 does not consider the possibility of duplicate Link State ID values in Link State Advertisement (LSA) packets before performing operations on the LSA database, which allows remote attackers to cause a denial of service (routing disruption) or obtain sensitive packet information via a crafted LSA packet, a related issue to CVE-2013-0149.
[]
null
null
null
null
GHSA-xcq3-grf2-3xgj
A local file inclusion vulnerability in Juniper Networks Junos Space Network Management Platform may allow an authenticated user to retrieve files from the system.
[]
null
null
6.5
null
ICSA-18-324-01
Teledyne DALSA Sherlock
A stack-based buffer overflow vulnerability has been identified, which may allow remote code execution.CVE-2018-17930 has been assigned to this vulnerability. A CVSS v3 base score of 7.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H).
[]
null
null
7.3
null
GHSA-382w-q3v4-xc76
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.7, macOS Sonoma 14.7, macOS Sequoia 15. Processing a maliciously crafted texture may lead to unexpected app termination.
[]
null
7.8
null
null
CVE-2020-9433
openssl_x509_check_email in lua-openssl 0.7.7-1 mishandles X.509 certificate validation because it uses lua_pushboolean for certain non-boolean return values.
[ "cpe:2.3:a:lua-openssl_project:lua-openssl:0.7.7-1:*:*:*:*:*:*:*" ]
null
9.1
null
6.4
CVE-2022-31047
Insertion of Sensitive Information into Log File in typo3/cms-core
TYPO3 is an open source web content management system. Prior to versions 7.6.57 ELTS, 8.7.47 ELTS, 9.5.34 ELTS, 10.4.29, and 11.5.11, system internal credentials or keys (e.g. database credentials) can be logged as plaintext in exception handlers, when logging the complete exception stack trace. TYPO3 versions 7.6.57 ELTS, 8.7.47 ELTS, 9.5.34 ELTS, 10.4.29, 11.5.11 contain a fix for the problem.
[ "cpe:2.3:a:typo3:typo3:*:*:*:*:elts:*:*:*", "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*" ]
null
5.3
null
null
CVE-2019-11426
An XSS issue was discovered in app/admincp/template/admincp.header.php in idreamsoft iCMS 7.0.14 via the admincp.php?app=config tab parameter.
[ "cpe:2.3:a:idreamsoft:icms:7.0.14:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
GHSA-xmj7-p9qw-8chx
The Application Lifecycle Service (ALS) in HP Helion Cloud Development Platform 1.0, when a virtual machine is derived from the Seed Node image, uses the same security keys across different customers' installations, which allows remote attackers to execute arbitrary code by leveraging these keys for a connection.
[]
null
null
null
null
PYSEC-2022-174
null
An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. When configured as a Master-of-Masters, with a publisher_acl, if a user configured in the publisher_acl targets any minion connected to the Syndic, the Salt Master incorrectly interpreted no valid targets as valid, allowing configured users to target any of the minions connected to the syndic with their configured commands. This requires a syndic master combined with publisher_acl configured on the Master-of-Masters, allowing users specified in the publisher_acl to bypass permissions, publishing authorized commands to any configured minion.
[]
null
null
null
null
GHSA-8pmf-5vv3-gw7f
Internet Connection Sharing (ICS) Denial of Service Vulnerability
[]
null
7.5
null
null
GHSA-cvv4-6q3f-p9gx
Cross-Site Request Forgery (CSRF) vulnerability in Perfmatters allows Cross Site Request Forgery.This issue affects Perfmatters: from n/a through 2.1.6.
[]
null
5.4
null
null
CVE-2017-12912
The "mpglibDBL/layer3.c" file in MP3Gain 1.5.2.r2 has a vulnerability which results in a read access violation when opening a crafted MP3 file.
[ "cpe:2.3:a:mp3gain:mp3gain:1.5.2:r2:*:*:*:*:*:*" ]
null
null
5.5
4.3
GHSA-3g4c-hjhr-73rj
CometVisu Backend for openHAB has a sensitive information disclosure vulnerability
Several endpoints in the CometVisu add-on of openHAB don't require authentication. This makes it possible for unauthenticated attackers to modify or to steal sensitive data.ImpactThis issue may lead to sensitive Information Disclosure.
[]
6.9
6.5
null
null
CVE-2021-44829
Cross Site Scripting (XSS) vulnerability exists in index.html in AFI WebACMS through 2.1.0 via the the ID parameter.
[ "cpe:2.3:a:afi-solutions:webacms:*:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
GHSA-9rgx-hh7j-v8gc
Directory traversal vulnerability in dna/viewfilecontents.do in the Dialed Number Analyzer (DNA) component in Cisco Unified Communications Manager allows remote authenticated users to read arbitrary files via a crafted URL, aka Bug ID CSCup76318.
[]
null
null
null
null
GHSA-2f2g-f3rf-qmx3
The Ping and Traceroute features on TP-Link TL-WR841N v13 00000001 0.9.1 4.16 v0001.0 Build 180119 Rel.65243n devices allow authenticated blind Command Injection.
[]
null
null
8.8
null
CVE-2019-5046
A specifically crafted jpeg2000 file embedded in a PDF file can lead to a heap corruption when opening a PDF document in NitroPDF 12.12.1.522. With careful memory manipulation, this can lead to arbitrary code execution. In order to trigger this vulnerability, the victim would need to open the malicious file.
[ "cpe:2.3:a:gonitro:nitropdf:12.12.1.522:*:*:*:*:*:*:*" ]
null
null
8.8
null
GHSA-w9r8-xh84-c8wx
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Wikimedia Foundation Mediawiki - GlobalBlocking Extension allows Retrieve Embedded Sensitive Data.This issue affects Mediawiki - GlobalBlocking Extension: from 1.39.X before 1.39.11, from 1.41.X before 1.41.3, from 1.42.X before 1.42.2.
[]
null
3.5
null
null
GHSA-w56m-wcpr-36rf
The Modal Window – create popup modal window plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'iframeBox' shortcode in all versions up to, and including, 6.1.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
GHSA-vg32-fmv3-phhm
Android intents can be used to launch Firefox for Android in reader mode with a user specified URL. This allows an attacker to spoof the contents of the addressbar as displayed to users. Note: This attack only affects Firefox for Android. Other operating systems are not affected. This vulnerability affects Firefox < 53.
[]
null
null
5.3
null
CVE-2012-5562
rhn-proxy: may transmit credentials over clear-text when accessing RHN Satellite
[ "cpe:2.3:a:redhat:satellite:*:*:*:*:*:*:*:*" ]
null
6.5
null
3.3
CVE-2021-4095
A NULL pointer dereference was found in the Linux kernel's KVM when dirty ring logging is enabled without an active vCPU context. An unprivileged local attacker on the host may use this flaw to cause a kernel oops condition and thus a denial of service by issuing a KVM_XEN_HVM_SET_ATTR ioctl. This flaw affects Linux kernel versions prior to 5.17-rc1.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*" ]
null
5.5
null
1.9
GHSA-9w4g-fp9h-3q2v
Apache Flume vulnerable to remote code execution via deserialization of unsafe providerURL
Flume’s JMSSource class can be configured with a providerUrl parameter. A JNDI lookup is performed on this name without performing validation. This could result in untrusted data being deserialized, leading to remote code execution (RCE) attack when a configuration uses a JMS Source with an unsafe providerURL. This issue is fixed in version 1.11.0.
[]
null
9.8
null
null
RHSA-2023:3580
Red Hat Security Advisory: .NET 6.0 security, bug fix, and enhancement update
dotnet: Bypass restrictions when deserializing a DataSet or DataTable from XML dotnet: .NET Kestrel: Denial of Service processing X509 Certificates dotnet: vulnerability exists in NuGet where a potential race condition can lead to a symlink attack dotnet: Remote Code Execution - Source generators issue can lead to a crash due to unmanaged heap corruption
[ "cpe:/a:redhat:rhel_dotnet:6.0::el7" ]
null
7.3
null
null
GHSA-4x65-257r-7p2q
ftp on HP-UX 11.00 allows local users to gain privileges.
[]
null
null
null
null
CVE-2024-38819
Applications serving static resources through the functional web frameworks WebMvc.fn or WebFlux.fn are vulnerable to path traversal attacks. An attacker can craft malicious HTTP requests and obtain any file on the file system that is also accessible to the process in which the Spring application is running.
[]
null
7.5
null
null
CVE-2020-8703
Improper buffer restrictions in a subsystem in the Intel(R) CSME versions before 11.8.86, 11.12.86, 11.22.86, 12.0.81, 13.0.47, 13.30.17, 14.1.53, 14.5.32 and 15.0.22 may allow a privileged user to potentially enable escalation of privilege via local access.
[ "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:b360:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:b365:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:c242:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:c246:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_4205u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_4305u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_4305ue:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8121u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8140u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8257u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8260u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8279u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8365ue:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:h310:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:h370:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:mobile_cm246:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_6500y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g6400e:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g6400te:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:q370:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-11855m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-11955m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1250e:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1250te:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1270e:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1270p:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1270te:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1290e:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1290te:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:z370:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:z390:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1000ng4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1030ng7:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1060ng7:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10910:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3_l13g4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5_l16g7:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:b460:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:h410:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:h420e:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:h470:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:q470:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:q470e:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:w480:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:w480e:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:z490:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:b150:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:b250:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-7020u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-7100:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-7100e:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-7100h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-7100t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-7100u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-7101e:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-7101te:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-7102e:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-7130u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-7167u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-7300:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-7300t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-7320:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-7350k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7200u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7260u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7267u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7287u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7300hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7300u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7360u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7400:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7400t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7440eq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7440hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7442eq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7500:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7500t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7600:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7600k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7600t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7y54:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7y57:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m3-7y30:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m3-7y32:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:h110:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:h170:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:h270:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:q150:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:q170:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:q250:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:q270:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:x299:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:z170:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:z270:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:c420:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:c621:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:c621a:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:c622:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:c624:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:c625:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:c626:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:c627:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:c627a:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:c628:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:c629:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:c629a:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_6305:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_6305e:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-11100b:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1115g4e:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1115gre:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11260h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11300h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11320h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11400:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11400f:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11400h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11400t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1140g7:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1145g7:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1145g7e:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1145gre:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11500:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11500b:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11500h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11500t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1155g7:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11600:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11600k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11600kf:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11600t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11390h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11700b:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11900:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11900f:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11900h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11900k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11900kb:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11900kf:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11900t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11950h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11980hk:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_ipc527g_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_ipc527g:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*" ]
null
6.7
null
4.6
GHSA-cr7m-mx45-3638
A buffer overflow vulnerability has been identified in PostScript interpreter in various Lexmark devices. The vulnerability can be leveraged by an attacker to execute arbitrary code.
[]
null
9
null
null
GHSA-hxfq-xgwq-x3w2
The Auto More Tag WordPress plugin through 4.0.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed (for example in multisite setup)
[]
null
4.8
null
null
CVE-2022-49202
Bluetooth: hci_uart: add missing NULL check in h5_enqueue
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_uart: add missing NULL check in h5_enqueue Syzbot hit general protection fault in __pm_runtime_resume(). The problem was in missing NULL check. hu->serdev can be NULL and we should not blindly pass &serdev->dev somewhere, since it will cause GPF.
[]
null
null
null
null
GHSA-p57f-xjpf-cxwg
Integer underflow in X MultiMedia System (xmms) 1.2.10 allows user-assisted remote attackers to execute arbitrary code via crafted header information in a skin bitmap image, which results in a stack-based buffer overflow.
[]
null
null
null
null
CVE-2024-30345
Foxit PDF Reader AcroForm Use-After-Free Remote Code Execution Vulnerability
Foxit PDF Reader AcroForm Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Doc objects in AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22742.
[ "cpe:2.3:a:foxit:pdf_editor:11.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:foxit:pdf_editor:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:foxit:pdf_editor:13.0:*:*:*:*:*:*:*", "cpe:2.3:a:foxit:pdf_reader:-:*:*:*:*:*:*:*", "cpe:2.3:a:foxit:pdf_editor:2023.0:*:*:*:*:*:*:*" ]
null
null
7.8
null
CVE-2018-10383
Lantronix SecureLinx Spider (SLS) 2.2+ devices have XSS in the auth.asp login page.
[ "cpe:2.3:o:lantronix:securelinx_spider_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lantronix:securelinx_spider:-:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
GHSA-p7qh-5g9w-v5fr
A Relative Path Traversal issue was discovered in LOYTEC LVIS-3ME versions prior to 6.2.0. The web user interface fails to prevent access to critical files that non administrative users should not have access to, which could allow an attacker to create or modify files or execute arbitrary code.
[]
null
null
8.8
null
CVE-2024-41369
RPi-Jukebox-RFID v2.7.0 was discovered to contain a remote code execution (RCE) vulnerability via htdocs\inc.setWifi.php
[ "cpe:2.3:a:sourcefabric:rpi-jukebox-rfid:*:*:*:*:*:*:*:*", "cpe:2.3:a:sourcefabric:phoniebox:2.7.0:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2024-56433
shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.
[]
null
3.6
null
null
GHSA-jfpp-cqw2-38m3
Mozilla Firefox 3.0.1 and earlier allows remote attackers to cause a denial of service (browser hang) by calling the window.print function in a loop, aka a "printing DoS attack," possibly a related issue to CVE-2009-0821.
[]
null
null
null
null
GHSA-4w2x-cc74-p5mq
Vulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are 12.1.0.2, 12.2.0.1, 18c and 19c. Difficult to exploit vulnerability allows low privileged attacker having Create Session privilege with network access via Oracle Net to compromise Java VM. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java VM accessible data. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N).
[]
null
null
null
null
RHSA-2013:1518
Red Hat Security Advisory: flash-plugin security update
flash-plugin: multiple code execution flaws (APSB13-26) flash-plugin: multiple code execution flaws (APSB13-26)
[ "cpe:/a:redhat:rhel_extras:5::client", "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
CVE-2015-8568
Memory leak in QEMU, when built with a VMWARE VMXNET3 paravirtual NIC emulator support, allows local guest users to cause a denial of service (host memory consumption) by trying to activate the vmxnet3 device repeatedly.
[ "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ]
null
6.5
null
4.7
CVE-2022-24069
An issue was discovered in AhciBusDxe in Insyde InsydeH2O with kernel 5.0 before 05.08.41, 5.1 before 05.16.29, 5.2 before 05.26.29, 5.3 before 05.35.29, 5.4 before 05.43.29, and 5.5 before 05.51.29. An SMM callout vulnerability allows an attacker to hijack the execution flow of code running in System Management Mode. Exploiting this issue could lead to escalating privileges to SMM.
[ "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*" ]
null
8.2
null
7.2
GHSA-c665-2rvm-477f
Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability
[]
null
7.8
null
null
GHSA-32mv-32jr-45q9
A vulnerability has been found in Weaver OA up to 9.5 and classified as problematic. This vulnerability affects unknown code of the file /E-mobile/App/System/File/downfile.php. The manipulation of the argument url leads to absolute path traversal. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-229270 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[]
null
null
4.3
null
CVE-2023-5447
Use-After-Free in Service for Hardware Support App for Fingerprint Driver
Missing lock check in SynHsaService may create a use-after-free condition which causes abnormal termination of the service, resulting in denial of service for the Synaptics Hardware Support App.
[]
null
5.5
null
null
CVE-2021-29967
Mozilla developers reported memory safety bugs present in Firefox 88 and Firefox ESR 78.11. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 78.11, Firefox < 89, and Firefox ESR < 78.11.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
GHSA-x6pp-pchx-wvc7
Improper Control of Generation of Code ('Code Injection') vulnerability in Membership Software WishList Member X allows Code Injection.This issue affects WishList Member X: from n/a through 3.25.1.
[]
null
9.9
null
null
End of preview. Expand in Data Studio

Sources of the data

  • CVE Program (enriched with data from vulnrichment and Fraunhofer FKIE)
  • GitHub Security Advisories
  • PySec advisories
  • CSAF Red Hat
  • CSAF Cisco
  • CSAF CISA

Extracted from the database of Vulnerability-Lookup.
Dumps of the data are available here.

Query with datasets

import json
from datasets import load_dataset

dataset = load_dataset("CIRCL/vulnerability-scores")

vulnerabilities = ["CVE-2012-2339", "RHSA-2023:5964", "GHSA-7chm-34j8-4f22", "PYSEC-2024-225"]

filtered_entries = dataset.filter(lambda elem: elem["id"] in vulnerabilities)

for entry in filtered_entries["train"]:
    print(json.dumps(entry, indent=4))
Downloads last month
369

Models trained or fine-tuned on CIRCL/vulnerability-scores