id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
RHSA-2014:1676
Red Hat Security Advisory: wireshark security update
wireshark: RTP dissector crash (wnpa-sec-2014-12) wireshark: RTP dissector crash (wnpa-sec-2014-12) wireshark: MEGACO dissector infinite loop (wnpa-sec-2014-13) wireshark: Netflow dissector crash (wnpa-sec-2014-14) wireshark: CUPS dissector crash (wnpa-sec-2014-15) wireshark: HIP dissector infinite loop (wnpa-sec-2014-16) wireshark: RTSP dissector crash (wnpa-sec-2014-17) wireshark: SES dissector crash (wnpa-sec-2014-18) wireshark: DOS Sniffer file parser flaw (wnpa-sec-2014-19) wireshark: DOS Sniffer file parser flaw (wnpa-sec-2014-19) wireshark: DOS Sniffer file parser flaw (wnpa-sec-2014-19) wireshark: DOS Sniffer file parser flaw (wnpa-sec-2014-19)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
null
CVE-2013-4014
Cross-site scripting (XSS) vulnerability in IBM Maximo Asset Management 6.2 through 6.2.8, 7.1 before 7.1.1.12, and 7.5 before 7.5.0.5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:ibm:maximo_asset_management:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.1.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:6.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:6.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:6.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:6.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:6.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:6.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:6.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:6.2.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:6.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:6.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.5.0.4:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-8x8g-w2mf-7q3v
The Ecwid by Lightspeed Ecommerce Shopping Cart plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 6.12.27. This is due to missing or incorrect nonce validation on the ecwid_deactivate_feedback() function. This makes it possible for unauthenticated attackers to send deactivation messages on behalf of a site owner via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
null
4.3
null
null
null
GHSA-wj8w-xpfm-jprq
WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, does not properly handle libxml contexts, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted HTML document, related to an "API abuse issue."
[]
null
null
null
null
null
CVE-2010-3856
ld.so in the GNU C Library (aka glibc or libc6) before 2.11.3, and 2.12.x before 2.12.2, does not properly restrict use of the LD_AUDIT environment variable to reference dynamic shared objects (DSOs) as audit objects, which allows local users to gain privileges by leveraging an unsafe DSO located in a trusted library directory, as demonstrated by libpcprofile.so.
[ "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*" ]
null
null
null
7.2
null
GHSA-7gcw-xvw2-3jf5
ASA 5515-X Adaptive Security Appliance Adaptive Security Appliance (ASA) Software 9.4.x before 9.4.1 Interim, 9.2.x before 9.2.4 Interim, ASA 5510 Adaptive Security Appliance Adaptive Security Appliance (ASA) Software 8.4.x before 8.4.7 Interim, 8.2.x before 8.2.5 Interim, 9.1.x before 9.1.6 Interim, ASA 5555-X Adaptive Security Appliance ASA for Application Centric Infrastructure (ACI) Device Package 1.2.4.x before 1.2.4.8, ASA 5512-X Adaptive Security Appliance ASA for Application Centric Infrastructure (ACI) Device Package 1.2.4.x before 1.2.4.8, ASA 5520 Adaptive Security Appliance Adaptive Security Appliance (ASA) Software 8.2.x before 8.2.5 Interim, 8.4.x before 8.4.7 Interim, 9.1.x before 9.1.6 Interim, ASA 5505 Adaptive Security Appliance Adaptive Security Appliance (ASA) Software 9.2.x before 9.2.4 Interim, 8.4.x before 8.4.7 Interim, 9.1.x before 9.1.6 Interim, ASA 5525-X Adaptive Security Appliance ASA for Application Centric Infrastructure (ACI) Device Package 1.2.4.x before 1.2.4.8, ASA 5512-X Adaptive Security Appliance Adaptive Security Appliance (ASA) Software 9.4.x before 9.4.1 Interim, 9.2.x before 9.2.4 Interim or 9.2.4.SMP, 9.1.x before 9.1.6 Interim, ASA 5545-X Adaptive Security Appliance ASA for Application Centric Infrastructure (ACI) Device Package 1.2.4.x before 1.2.4.8, ASA 5585-X Adaptive Security Appliance ASA for Application Centric Infrastructure (ACI) Device Package 1.2.4.x before 1.2.4.8, ASA 5540 Adaptive Security Appliance Adaptive Security Appliance (ASA) Software 8.2.x before 8.2.5 Interim, 8.4.x before 8.4.7 Interim, 9.1.x before 9.1.6 Interim, ASA 5515-X Adaptive Security Appliance ASA for Application Centric Infrastructure (ACI) Device Package 1.2.4.x before 1.2.4.8, ASA 5555-X Adaptive Security Appliance Adaptive Security Appliance (ASA) Software 9.2.x before 9.2.4 Interim or 9.2.4.SMP, 9.4.x before 9.4.1 Interim, 9.1.x before 9.1.6 Interim, ASA 5580 Adaptive Security Appliance Adaptive Security Appliance (ASA) Software 9.1.x before 9.1.6 Interim, ASA 5585-X Adaptive Security Appliance Adaptive Security Appliance (ASA) Software 9.2.x before 9.2.4 Interim, 9.4.x before 9.4.1 Interim, ASA 5525-X Adaptive Security Appliance Adaptive Security Appliance (ASA) Software 9.4.x before 9.4.1 Interim, 9.2.x before 9.2.4 Interim or 9.2.4.SMP, 9.1.x before 9.1.6 Interim, ASA 5545-X Adaptive Security Appliance Adaptive Security Appliance (ASA) Software 9.4.x before 9.4.1 Interim, 9.2.x before 9.2.4 Interim or 9.2.4.SMP. 9.1.x before 9.1.6 ASA does not check the source of the ARP request or GARP packets for addresses it performs NAT translation for under unspecified conditions.
[]
null
null
8.1
null
null
GHSA-387f-ggqp-ccr9
TOTOLINK CP450 v4.1.0cu.747_B20191224 was discovered to contain a hardcoded password vulnerability in /etc/shadow.sample, which allows attackers to log in as root.
[]
null
8.8
null
null
null
GHSA-7fpx-3fx4-5j76
The client in Novell GroupWise before 8.0.3 HP4, 2012 before SP3, and 2014 before SP1 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (invalid pointer dereference) via unspecified vectors.
[]
null
null
null
null
null
GHSA-vc5r-c496-3px9
Cross-site scripting (XSS) vulnerability in Microsoft Edge allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka "Microsoft Edge Information Disclosure Vulnerability," a different vulnerability than CVE-2016-7206.
[]
null
null
6.1
null
null
CVE-2018-15713
Nagios XI 5.5.6 allows persistent cross site scripting from remote authenticated attackers via the stored email address in admin/users.php.
[ "cpe:2.3:a:nagios:nagios_xi:5.5.6:*:*:*:*:*:*:*" ]
null
null
5.4
3.5
null
GHSA-hc47-w9jf-cv4v
An issue was discovered in certain Apple products. iOS before 11.3 is affected. The issue involves the "Find My iPhone" component. It allows physically proximate attackers to bypass the iCloud password requirement for disabling the "Find My iPhone" feature via vectors involving a backup restore.
[]
null
null
4.6
null
null
CVE-2025-1319
Site Mailer <= 1.2.3 - Unauthenticated Stored Cross-Site Scripting
The Site Mailer – SMTP Replacement, Email API Deliverability & Email Log plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 1.2.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
GHSA-vq2m-72gv-vff5
Unspecified vulnerability in the Oracle Human Resources component in Oracle E-Business Suite 11.5.10.2, 12.0.6, 12.1.1, 12.1.2, and 12.1.3 allows remote attackers to affect confidentiality and availability, related to PDF generation.
[]
null
null
null
null
null
GHSA-7c7p-ggr4-28g8
The StreamWeasels Kick Integration plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘status-classic-offline-text’ parameter in all versions up to, and including, 1.1.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
GHSA-288c-fr85-5qmw
The VIP.com application for IOS and Android allows remote attackers to obtain sensitive information and hijack the authentication of users via a rogue access point and a man-in-the-middle attack.
[]
null
null
8.1
null
null
GHSA-76h7-whc6-vxcf
The Advanced Schedule Posts WordPress plugin through 2.1.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admins.
[]
null
6.1
null
null
null
GHSA-p734-hj82-4cvx
A remote code execution vulnerability exists when Microsoft .NET Framework processes input, aka '.NET Framework Remote Code Execution Vulnerability'.
[]
null
7.8
null
null
null
GHSA-jhmv-3fx4-xffq
A security flaw has been discovered in FNKvision Y215 CCTV Camera 10.194.120.40. This affects an unknown part of the file /tmp/wpa_supplicant.conf. Performing manipulation results in information disclosure. The attack may be carried out on the physical device. The attack's complexity is rated as high. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
[]
0.3
1.6
null
null
null
GHSA-mpcf-6x99-gw9r
An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code.
[]
null
null
9.6
null
null
CVE-2024-50468
WordPress Raptor Editor plugin <= 1.0.20 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Michael Robinson Raptor Editor allows DOM-Based XSS.This issue affects Raptor Editor: from n/a through 1.0.20.
[]
null
6.5
null
null
null
GHSA-8qg6-mqrv-v8vv
Inappropriate implementation in Blink in Google Chrome prior to 59.0.3071.86 for Mac, Windows, and Linux, and 59.0.3071.92 for Android, allowed a remote attacker to display UI on a non attacker controlled tab via a crafted HTML page.
[]
null
4.3
null
null
null
GHSA-mgr2-3mpv-43gc
Downloads Resources over HTTP in openframe-image
Affected versions of `openframe-image` insecurely downloads resources over HTTP.In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution.RecommendationNo patch is currently available for this vulnerability.The best mitigation is currently to avoid using this package, using a different package if available.Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[]
null
null
null
null
null
GHSA-xx95-62h6-h7v3
lgsl Stored Cross-Site Scripting vulnerability
SummaryA stored cross-site scripting (XSS) vulnerability was identified in lgsl. The issue arises from improper sanitation of user input. Everyone who accesses this page will be affected by this attack.DetailsThe function `lgsl_query_40` in `lgsl_protocol.php` has implemented an HTTP crawler. This function makes a request to the registered game server, and upon crawling the malicious `/info` endpoint with our payload, will render our javascript on the info page. This information is being displayed via `lgsl_details.php`Affected Code:PoCCreate a game server with type `eco` and set the target host and port accordingly to your ttack server. I have crafted this json payload that is being parsed according to the schema and being served on `/info`Serve the following JSON payload at `/info` on your handlerAccess the corresponding server info page at `/s?=`. Upon refreshing & crawling our server, it should execute our javascript.
[]
null
null
null
null
null
ICSA-15-048-01
Siemens SIMATIC STEP 7 TIA Portal Vulnerabilities
Siemens SIMATIC STEP 7 (TIA Portal) before 13 SP1 uses a weak password-hash algorithm, which makes it easier for local users to determine cleartext passwords by reading a project file and conducting a brute-force attack. Siemens SIMATIC STEP 7 (TIA Portal) before 13 SP1 determines a user's privileges on the basis of project-file fields that lack integrity protection, which allows remote attackers to establish arbitrary authorization data via a modified file.
[]
null
null
null
null
null
GHSA-c54h-j86w-wmh6
NoMachine Enterprise Client is affected by Integer Overflow. IOCTL Handler 0x22001B in the NoMachine Enterprise Client above 4.0.346 and below 7.7.4 allow local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) via specially crafted I/O Request Packet.
[]
null
null
null
null
null
CVE-2018-18645
An issue was discovered in GitLab Community and Enterprise Edition before 11.2.7, 11.3.x before 11.3.8, and 11.4.x before 11.4.3. It allows for Information Exposure via unsubscribe links in email replies.
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*" ]
null
null
4.3
4.3
null
CVE-2022-21233
Improper isolation of shared resources in some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.
[ "cpe:2.3:o:intel:pentium_j4205_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_j4205:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_n4200_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_n4200:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_n4200e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_n4200e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_j3455_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j3455:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_j3355_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j3355:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_j3455e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j3455e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_j3355e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j3355e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n3450_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n3450:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n3350_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n3350:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n3350e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_x5-a3930_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_x5-a3930:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_x5-a3940_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_x5-a3940:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_x5-a3950_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_x5-a3950:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_x5-a3960_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_x5-a3960:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_x5-e3940_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_x5-e3930_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_x7-e3950_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3308_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3308:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3336_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3336:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3338_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3338:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3338r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3338r:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3436l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3436l:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3508_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3508:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3538_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3538:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3558_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3558:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3558r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3558r:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3558rc_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3558rc:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3708_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3708:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3750_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3750:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3758_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3758:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3758r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3758r:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3808_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3808:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3830_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3830:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3850:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3858_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3858:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3950_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3950:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3958_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3958:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3955_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3955:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8300_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8300:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6300_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6300:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5300_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5300:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4300_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4300:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1513n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1513n:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1518_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1518:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1520_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1520:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1521_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1521:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1523n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1523n:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1524n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1524n:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1527_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1527:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1528_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1528:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1529_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1529:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1531_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1531:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1533n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1533n:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1537_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1537:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1539_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1539:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1540_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1540:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1541_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1541:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1543n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1543n:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1548_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1548:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1553n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1553n:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1557_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1557:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1559_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1559:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1563n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1563n:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1564n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1564n:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1567_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1567:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1571_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1571:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1573n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1573n:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1577_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1577:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1581_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1581:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1587_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1587:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1602_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1602:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1612_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1612:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1622_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1622:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1623n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1623n:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1627_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1627:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1632_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1632:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1633n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1633n:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1637_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1637:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1649n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1649n:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1653n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1653n:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1702_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1702:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1712tr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1712tr:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1713nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1713nt:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1713nte_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1713nte:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1714_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1714:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1715ter_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1715ter:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1718t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1718t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1722ne_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1722ne:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1726_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1726:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1732te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1732te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1733nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1733nt:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1734nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1734nt:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1735tr_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1735tr:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1736_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1736:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1736nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1736nt:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1739_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1739:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1746ter_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1746ter:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1747nte_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1747nte:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1748te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1748te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1749nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1749nt:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2123it_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2141i_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2142it_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2143it_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2145nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2146nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2161i_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2163it_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2166nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2173it_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2177nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2183it_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2187nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2191_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2191:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2712t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2712t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2733nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2733nt:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2738_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2738:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2745nx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2745nx:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2752nte_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2752nte:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2752ter_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2752ter:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2753nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2753nt:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2757nx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2757nx:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2766nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2766nt:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2775te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2775te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2776nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2776nt:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2777nx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2777nx:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2779_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2779:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2786nte_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2786nte:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2795nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2795nt:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2796nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2796nt:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2796te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2796te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2798nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2798nt:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2798nx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2798nx:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2799_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2799:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_silver_j5005_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_silver_j5005:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_silver_n5000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_silver_n5000:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_j4005_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j4005:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_j4105_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j4105:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n4000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n4100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_silver_j5040_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_silver_j5040:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_silver_n5030_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_silver_n5030:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_j4025_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j4025:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_j4125_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j4125:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n4020_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n4120_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1060g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1065g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1030g4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1030g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1035g1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1035g4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1035g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1000g1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1000g4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1005g1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_p5942b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_p5942b:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_p5931b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_p5931b:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_p5962b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_p5962b:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_p5921b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_p5921b:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c5310_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c5310:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c5315_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c5315:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c5320_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c5320:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c5325_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c5325:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c5125_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c5125:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c5115_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c5115:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_p5322_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_p5322:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_p5332_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_p5332:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_p5342_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_p5342:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_p5352_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_p5352:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_p5362_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_p5362:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_p5721_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_p5721:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_p5731_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_p5731:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_p5742_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_p5742:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_p5752_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_p5752:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-l13g4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-l13g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-l16g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-l16g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1185g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1165g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1185gre_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1185g7e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1180g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1160g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1145g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1145g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1145gre_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1145gre:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1145g7e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1145g7e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1140g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1140g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1130g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1125g4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1115gre_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1115gre:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1115g4e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1115g4e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1120g4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1110g4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_6305_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_6305:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_6305e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_6305e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1195g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1155g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1155g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1135g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1115g4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11390h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11390h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11320h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11320h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_7505_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-11955m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-11955m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-11855m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-11855m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-11980hk_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11980hk:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-11950h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11950h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-11900h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11900h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11850h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11800h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11500h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11500h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11400h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11400h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11260h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11260h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11375h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11370h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11300h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11300h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11850he_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11850he:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-11100he_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-11100he:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_6600he_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_6600he:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-11865mre_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-11865mre:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-11555mre_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-11555mre:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-11155mre_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-11155mre:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-11555mle_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-11555mle:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-11865mle_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-11865mle:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-11155mle_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-11155mle:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_j6425_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_j6425:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_n6415_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_n6415:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_j6413_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j6413:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n6211_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n6211:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_x6413e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_x6413e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_x6425re_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_x6425re:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_x6427fe_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_x6427fe:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_x6212re_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_x6212re:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_x6200fe_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_x6200fe:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_x6211e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_x6211e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_x6425e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_x6425e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-12900k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-12900k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-12900kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-12900kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-12700k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-12700k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-12700kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-12700kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12600k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12600k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12600kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12600kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-12900_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-12900:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-12900f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-12900f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-12700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-12700:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-12700f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-12700f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12400:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12400f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12400f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-12900t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-12900t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-12700t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-12700t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12600:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12500:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-12300_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-12300:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-12100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-12100:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-12100f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-12100f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12600t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12600t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12500t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12500t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12400t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12400t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-12300t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-12300t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-12100t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-12100t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g7400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g7400:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g7400t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g7400t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g6900_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g6900:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g6900t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g6900t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-12900h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-12900h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-12900hk_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-12900hk:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-12800h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-12800h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-12700h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-12700h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-12650h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-12650h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12600h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12600h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12500h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12500h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12450h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12450h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1280p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1280p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1270p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1270p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1260p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1260p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1250p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1250p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1240p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1240p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1220p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1220p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1265u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1265u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1260u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1260u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1255u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1255u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1250u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1250u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1245u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1245u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1240u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1240u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1235u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1235u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1230u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1230u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1215u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1215u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1210u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1210u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_8505_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_8505:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_8500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_8500:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_7305_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_7305:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_7300_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_7300:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_silver_n6005_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_silver_n6005:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_silver_n6000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_silver_n6000:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n4505_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n4505:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n4500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n4500:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n5105_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n5105:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n5100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n5100:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-11900k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11900k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-11900kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11900kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-11900_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11900:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-11900t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11900t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-11900f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11900f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11700k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11700kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11700t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11700f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11600k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11600k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11600kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11600kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11600:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11600t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11600t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11500:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11500t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11500t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11400:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11400f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11400f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11400t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11400t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2388g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2388g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2378g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2378g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2378_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2378:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2386g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2386g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2356g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2356g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2336_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2336:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2374g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2374g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2334_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2334:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2324g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2324g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2314_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2314:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1300_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1300:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1390p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1390p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1390_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1390:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1390t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1390t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1370p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1370p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1370_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1370:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1350p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1350p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1350_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1350:-:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
GHSA-mvh5-v533-3v55
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Creative Solutions Contact Form Generator : Creative form builder for WordPress allows SQL Injection.This issue affects Contact Form Generator : Creative form builder for WordPress: from n/a through 2.6.0.
[]
null
9.8
null
null
null
CVE-2024-10757
PHPGurukul Online Shopping Portal js_data.php cross site scripting
A vulnerability, which was classified as problematic, has been found in PHPGurukul Online Shopping Portal 2.0. Affected by this issue is some unknown functionality of the file /admin/assets/plugins/DataTables/media/unit_testing/templates/js_data.php. The manipulation of the argument scripts leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:phpgurukul:online_shopping_portal:2.0:*:*:*:*:*:*:*" ]
5.3
3.5
3.5
4
null
CVE-2005-4629
SQL injection vulnerability in SMBCMS 2.1 allows remote attackers to execute arbitrary SQL commands via unspecified search parameters.
[ "cpe:2.3:a:smbcms:smbcms:2.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-77q8-crvw-8w9q
When a HTTPS pages was embedded in a HTTP page, and there was a service worker registered for the former, the service worker could have intercepted the request for the secure page despite the iframe not being a secure context due to the (insecure) framing. This vulnerability affects Firefox < 84.
[]
null
null
null
null
null
CVE-2002-0483
index.php for PHP-Nuke 5.4 and earlier allows remote attackers to determine the physical pathname of the web server when the file parameter is set to index.php, which triggers an error message that leaks the pathname.
[ "cpe:2.3:a:francisco_burzi:php-nuke:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:5.1:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:5.2:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:5.2a:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:5.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:francisco_burzi:php-nuke:5.4:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2005-2324
Cross-site scripting (XSS) vulnerability in Clever Copy 2.0 and 2.0a allows remote attackers to inject arbitrary web script or HTML via the searchtype or searchterm parameters to (1) results.php or (2) categorysearch.php.
[ "cpe:2.3:a:clever_copy:clever_copy:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:clever_copy:clever_copy:2.0a:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-hwmr-77fp-f5hf
There is a floating point exception in the kodak_radc_load_raw function in dcraw_common.cpp in LibRaw 0.18.2. It will lead to a remote denial of service attack.
[]
null
null
7.5
null
null
GHSA-gg88-q8hw-c8w4
Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure .
[]
null
null
null
null
null
GHSA-r4j3-wp5r-ggj9
NETGEAR R7000 devices before 1.0.9.42 are affected by a buffer overflow by an authenticated user.
[]
null
null
null
null
null
CVE-2022-38860
Certain The MPlayer Project products are vulnerable to Divide By Zero via function demux_open_avi() of libmpdemux/demux_avi.c which affects mencoder. This affects mplayer SVN-r38374-13.0.1 and mencoder SVN-r38374-13.0.1.
[ "cpe:2.3:a:mplayerhq:mencoder:svn-r38374-13.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mplayerhq:mplayer:svn-r38374-13.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
GHSA-9jqc-6f29-2rw7
The SAS portal of Mitel MiCollab before 9.2 could allow an attacker to access user credentials due to improper input validation, aka SQL Injection.
[]
null
null
null
null
null
CVE-2024-25524
RuvarOA v6.01 and v12.01 were discovered to contain a SQL injection vulnerability via the sys_file_storage_id parameter at /WorkPlan/WorkPlanAttachDownLoad.aspx.
[ "cpe:2.3:a:ruvar:ruvaroa:-:*:*:*:*:*:*:*" ]
null
9.4
null
null
null
RHSA-2022:0321
Red Hat Security Advisory: OpenJDK 8u322 Windows builds release and security update
OpenJDK: Incomplete deserialization class filtering in ObjectInputStream (Serialization, 8264934) OpenJDK: Insufficient URI checks in the XSLT TransformerImpl (JAXP, 8270492) OpenJDK: Unexpected exception thrown in regex Pattern (Libraries, 8268813) OpenJDK: Incomplete checks of StringBuffer and StringBuilder during deserialization (Libraries, 8270392) OpenJDK: Incorrect IdentityHashMap size checks during deserialization (Libraries, 8270416) OpenJDK: Incorrect access checks in XMLEntityManager (JAXP, 8270498) OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) OpenJDK: Array indexing issues in LIRGenerator (Hotspot, 8272014) OpenJDK: Excessive resource use when reading JAR manifest attributes (Libraries, 8272026) OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream (Serialization, 8272236) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8273756) OpenJDK: Integer overflow in BMPImageReader (ImageIO, 8273838)
[ "cpe:/a:redhat:openjdk:1.8::windows" ]
null
5.3
null
null
null
CVE-2018-0286
A vulnerability in the netconf interface of Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on affected system. The vulnerability is due to improper handling of malformed requests processed by the netconf process. An attacker could exploit this vulnerability by sending malicious requests to the affected software. An exploit could allow the attacker to cause the targeted process to restart, resulting in a DoS condition on the affected system. Cisco Bug IDs: CSCvg95792.
[ "cpe:2.3:o:cisco:ios_xr:6.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:6.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xr:6.5.1:*:*:*:*:*:*:*" ]
null
5.3
null
5
null
CVE-2010-0343
SQL injection vulnerability in the Clan Users List (pb_clanlist) extension 0.0.1 for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
[ "cpe:2.3:a:typo3:pb_clanlist:0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-mxvm-wqqj-9w63
There is a Information Disclosure vulnerability in anjuta/plugins/document-manager/anjuta-bookmarks.c. This issue was caused by the incorrect use of libxml2 API. The vendor forgot to call 'g_free()' to release the return value of 'xmlGetProp()'.
[]
null
7.5
null
null
null
CVE-2020-23660
webTareas v2.1 is affected by Cross Site Scripting (XSS) on "Search."
[ "cpe:2.3:a:webtareas_project:webtareas:2.1:-:*:*:*:*:*:*" ]
null
5.4
null
3.5
null
CVE-2019-9948
urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen('local_file:///etc/passwd') call.
[ "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:8.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_tus:8.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_tus:8.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_tus:8.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:8.0:*:*:*:*:*:*:*" ]
null
9.1
null
6.4
null
CVE-2022-34642
The component mcontrol.action in RISCV ISA Sim commit ac466a21df442c59962589ba296c702631e041b5 contains the incorrect mask which can cause a Denial of Service (DoS).
[ "cpe:2.3:a:riscv:spike_risc-v_isa_simulator:-:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
GHSA-qfcr-8mwq-9gf9
An issue was discovered in TRENDnet TEW-827DRU firmware before 2.05B11. There is a command injection in apply.cgi (exploitable with authentication) via the action set_sta_enrollee_pin_5g and the key wps_sta_enrollee_pin.
[]
null
null
null
null
null
CVE-2019-14843
A flaw was found in Wildfly Security Manager, running under JDK 11 or 8, that authorized requests for any requester. This flaw could be used by a malicious app deployed on the app server to access unauthorized information and possibly conduct further attacks. Versions shipped with Red Hat Jboss EAP 7 and Red Hat SSO 7 are vulnerable to this issue.
[ "cpe:2.3:a:redhat:single_sign-on:7.3:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:single_sign-on:-:*:*:*:text-only:*:*:*" ]
null
null
7.5
null
null
CVE-2020-11642
SiteManager Denial of Service via Local File Inclusion Vulnerability
The local file inclusion vulnerability present in B&R SiteManager versions <9.2.620236042 allows authenticated users to impact availability of SiteManager instances.
[ "cpe:2.3:a:br-automation:sitemanager:*:*:*:*:*:*:*:*" ]
null
7.7
null
null
null
CVE-2016-1643
The ImageInputType::ensurePrimaryContent function in WebKit/Source/core/html/forms/ImageInputType.cpp in Blink, as used in Google Chrome before 49.0.2623.87, does not properly maintain the user agent shadow DOM, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage "type confusion."
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
null
null
8.8
9.3
null
CVE-2017-1493
IBM UrbanCode Deploy (UCD) 6.1 and 6.2 could allow an authenticated user to edit objects that they should not have access to due to improper access controls. IBM X-Force ID: 128691.
[ "cpe:2.3:a:ibm:urbancode_deploy:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:urbancode_deploy:6.1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:urbancode_deploy:6.1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:urbancode_deploy:6.1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:urbancode_deploy:6.1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:urbancode_deploy:6.1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:urbancode_deploy:6.1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:urbancode_deploy:6.1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:urbancode_deploy:6.1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:urbancode_deploy:6.1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:urbancode_deploy:6.1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:urbancode_deploy:6.1.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:urbancode_deploy:6.1.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:urbancode_deploy:6.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:urbancode_deploy:6.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:urbancode_deploy:6.1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:urbancode_deploy:6.1.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:urbancode_deploy:6.1.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:urbancode_deploy:6.1.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:urbancode_deploy:6.1.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:urbancode_deploy:6.1.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:urbancode_deploy:6.2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:urbancode_deploy:6.2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:urbancode_deploy:6.2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:urbancode_deploy:6.2.0.201:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:urbancode_deploy:6.2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:urbancode_deploy:6.2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:urbancode_deploy:6.2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:urbancode_deploy:6.2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:urbancode_deploy:6.2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:urbancode_deploy:6.2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:urbancode_deploy:6.2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:urbancode_deploy:6.2.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:urbancode_deploy:6.2.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:urbancode_deploy:6.2.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:urbancode_deploy:6.2.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:urbancode_deploy:6.2.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:urbancode_deploy:6.2.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:urbancode_deploy:6.2.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:urbancode_deploy:6.2.6.1:*:*:*:*:*:*:*" ]
null
null
5.4
5.5
null
GHSA-q664-v9r4-qmrg
HaloITSM versions up to 2.146.1 are affected by a Password Reset Poisoning vulnerability. Poisoned password reset links can be sent to existing HaloITSM users (given their email address is known). When these poisoned links get accessed (e.g. manually by the victim or automatically by an email client software), the password reset token is leaked to the malicious actor, allowing them to set a new password for the victim's account.This potentially leads to account takeover attacks.HaloITSM versions past 2.146.1 (and patches starting from 2.143.61 ) fix the mentioned vulnerability.
[]
null
8.3
null
null
null
RHSA-2024:6889
Red Hat Security Advisory: Red Hat build of Keycloak 24.0.8 Images Update
keycloak-saml-core: Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak Keycloak: Vulnerable Redirect URI Validation Results in Open Redirec
[ "cpe:/a:redhat:build_keycloak:24::el9" ]
null
6.1
null
null
null
RHSA-2023:3949
Red Hat Security Advisory: open-vm-tools security update
open-vm-tools: authentication bypass vulnerability in the vgauth module
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
3.9
null
null
null
GHSA-x9w4-cxmc-832m
Path Traversal vulnerability in FULL. FULL Customer allows Path Traversal.This issue affects FULL Customer: from n/a through 3.1.25.
[]
null
6.5
null
null
null
CVE-2024-4529
Business Card <= 1.0.0 - Category Deletion via CSRF
The Business Card WordPress plugin through 1.0.0 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions such as deleting card categories via CSRF attacks
[ "cpe:2.3:a:esterox:business_card:*:*:*:*:*:*:*:*" ]
null
5
null
null
null
CVE-2005-1580
users.ini.php in BoastMachine 3.0 does not properly restrict the types of files that can be uploaded, which allows remote attackers to execute arbitrary code.
[ "cpe:2.3:a:boastmachine:boastmachine:3.0:*:platinum:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2022-49104
staging: vchiq_core: handle NULL result of find_service_by_handle
In the Linux kernel, the following vulnerability has been resolved: staging: vchiq_core: handle NULL result of find_service_by_handle In case of an invalid handle the function find_servive_by_handle returns NULL. So take care of this and avoid a NULL pointer dereference.
[]
null
5.5
null
null
null
CVE-2022-28056
ShopXO v2.2.5 and below was discovered to contain a system re-install vulnerability via the Add function in app/install/controller/Index.php.
[ "cpe:2.3:a:shopxo:shopxo:2.2.5:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
GHSA-v43f-6mhr-gwc4
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Booking Algorithms BA Book Everything allows Stored XSS.This issue affects BA Book Everything: from n/a through 1.6.8.
[]
null
6.5
null
null
null
GHSA-fpph-mqc8-h6q5
Withdrawn Advisory: Unrestricted File Upload affecting automad
Withdrawn AdvisoryThis advisory has been withdrawn because JavaScript execution is the intended functionality of automad. This link is maintained to preserve external references.Original DescriptionA vulnerability was found in automad up to 1.10.9. This affects the function upload of the file `FileCollectionController.php` of the component `Content Type Handler`. The manipulation leads to unrestricted upload. The attack may be launched remotely and an exploit has been disclosed publicly.
[]
null
4.7
null
null
null
GHSA-8795-x9rh-f2m7
In EffectRelease of EffectBundle.cpp, there is a possible memory corruption due to a double free. This could lead to local escalation of privilege in the audio server with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-123237974.
[]
null
null
7.8
null
null
CVE-2001-0113
statsconfig.pl in OmniHTTPd 2.07 allows remote attackers to execute arbitrary commands via the mostbrowsers parameter, whose value is used as part of a generated Perl script.
[ "cpe:2.3:a:omnicron:omnihttpd:2.0.7:*:*:*:*:*:*:*" ]
null
null
null
10
null
GHSA-j992-gmv8-p6vw
In the Linux kernel, the following vulnerability has been resolved:tpm: Change to kvalloc() in eventlog/acpi.cThe following failure was reported on HPE ProLiant D320:[ 10.693310][ T1] tpm_tis STM0925:00: 2.0 TPM (device-id 0x3, rev-id 0) [ 10.848132][ T1] ------------[ cut here ]------------ [ 10.853559][ T1] WARNING: CPU: 59 PID: 1 at mm/page_alloc.c:4727 __alloc_pages_noprof+0x2ca/0x330 [ 10.862827][ T1] Modules linked in: [ 10.866671][ T1] CPU: 59 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.12.0-lp155.2.g52785e2-default #1 openSUSE Tumbleweed (unreleased) 588cd98293a7c9eba9013378d807364c088c9375 [ 10.882741][ T1] Hardware name: HPE ProLiant DL320 Gen12/ProLiant DL320 Gen12, BIOS 1.20 10/28/2024 [ 10.892170][ T1] RIP: 0010:__alloc_pages_noprof+0x2ca/0x330 [ 10.898103][ T1] Code: 24 08 e9 4a fe ff ff e8 34 36 fa ff e9 88 fe ff ff 83 fe 0a 0f 86 b3 fd ff ff 80 3d 01 e7 ce 01 00 75 09 c6 05 f8 e6 ce 01 01 <0f> 0b 45 31 ff e9 e5 fe ff ff f7 c2 00 00 08 00 75 42 89 d9 80 e1 [ 10.917750][ T1] RSP: 0000:ffffb7cf40077980 EFLAGS: 00010246 [ 10.923777][ T1] RAX: 0000000000000000 RBX: 0000000000040cc0 RCX: 0000000000000000 [ 10.931727][ T1] RDX: 0000000000000000 RSI: 000000000000000c RDI: 0000000000040cc0The above transcript shows that ACPI pointed a 16 MiB buffer for the log events because RSI maps to the 'order' parameter of __alloc_pages_noprof(). Address the bug by moving from devm_kmalloc() to devm_add_action() and kvmalloc() and devm_add_action().
[]
null
5.5
null
null
null
CVE-2025-48165
WordPress DELUCKS SEO Plugin <= 2.6.0 - Privilege Escalation Vulnerability
Incorrect Privilege Assignment vulnerability in DELUCKS DELUCKS SEO allows Privilege Escalation. This issue affects DELUCKS SEO: from n/a through 2.6.0.
[]
null
8.8
null
null
null
GHSA-x24r-c8j9-5ghx
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Debug Info allows Stored XSS.This issue affects Debug Info: from n/a through 1.3.10.
[]
null
5.9
null
null
null
CVE-2022-32060
An arbitrary file upload vulnerability in the Update Branding Settings component of Snipe-IT v6.0.2 allows attackers to execute arbitrary code via a crafted file.
[ "cpe:2.3:a:snipeitapp:snipe-it:6.0.2:*:*:*:*:*:*:*" ]
null
4.8
null
3.5
null
CVE-2024-8842
PDF-XChange Editor RTF File Parsing Uninitialized Variable Remote Code Execution Vulnerability
PDF-XChange Editor RTF File Parsing Uninitialized Variable Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of RTF files. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24481.
[ "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:-:*:*:*:*:*:*:*", "cpe:2.3:a:pdf-xchange:pdf-tools:*:*:*:*:*:*:*:*", "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*" ]
null
null
7.8
null
null
GHSA-mc5q-54j2-f34q
The Beautiful Cookie Consent Banner for WordPress is vulnerable to Stored Cross-Site Scripting via the 'nsc_bar_content_href' parameter in versions up to, and including, 2.10.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. A partial patch was made available in 2.10.1 and the issue was fully patched in 2.10.2.
[]
null
7.2
null
null
null
GHSA-fpwp-8ghr-m986
Trendnet TEW733GR v1.03B01 contains a Static Default Credential vulnerability in /etc/init0.d/S80telnetd.sh.
[]
null
9.8
null
null
null
CVE-2023-46575
A SQL injection vulnerability exists in Meshery prior to version v0.6.179, enabling a remote attacker to retrieve sensitive information and execute arbitrary code through the “order” parameter
[ "cpe:2.3:a:layer5:meshery:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
RHSA-2019:1951
Red Hat Security Advisory: nss and nspr security, bug fix, and enhancement update
nss: NULL pointer dereference in several CMS functions resulting in a denial of service nss: Out-of-bounds read when importing curve25519 private key nss: PKCS#1 v1.5 signatures can be used for TLS 1.3 nss: Empty or malformed p256-ECDH public keys may trigger a segmentation fault nss: Handling of Netscape Certificate Sequences in CERT_DecodeCertPackage() may crash with a NULL deref leading to DoS
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.5
7.5
null
null
CVE-2019-8423
ZoneMinder through 1.32.3 has SQL Injection via the skins/classic/views/events.php filter[Query][terms][0][cnj] parameter.
[ "cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
null
GHSA-f5wf-gmvm-79qm
Buffer overflow in the Address Book of Mobile Device function of Office / Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *:Satera LBP660C Series/LBP620C Series/MF740C Series/MF640C Series firmware Ver.11.04 and earlier sold in Japan. Color imageCLASS LBP660C Series/LBP 620C Series/X LBP1127C/MF740C Series/MF640C Series/X MF1127C firmware Ver.11.04 and earlier sold in US. i-SENSYS LBP660C Series/LBP620C Series/MF740C Series/MF640C Series, C1127P, C1127iF, C1127i firmware Ver.11.04 and earlier sold in Europe.
[]
null
9.8
null
null
null
GHSA-gcv6-2v9c-rj48
Cosenary Instagram-PHP-API contains reflected XSS vulnerability
cosenary Instagram-PHP-API (aka Instagram PHP API V2), used in the UserPro plugin through 4.9.32 for WordPress, is vulnerable to cross-site scripting via the [example/success.php](https://github.com/cosenary/Instagram-PHP-API/blob/master/example/success.php#L36 ) error_description parameter.Vulnerable code:Proof-of-Concept:`https://domain.tld/wp-content/plugins/userpro/lib/instagram/vendor/cosenary/instagram/example/success.php?error=&error_description=<PAYLOAD>`
[]
null
null
6.1
null
null
GHSA-2xjh-34g7-vxf5
IBM WebSphere Automation 1.7.5 could allow a remote privileged user, who has authorized access to the swagger UI, to execute arbitrary code. Using specially crafted input, the user could exploit this vulnerability to execute arbitrary code on the system.
[]
null
7.2
null
null
null
GHSA-cfq6-3hq6-2p95
In the Linux kernel, the following vulnerability has been resolved:ipv6: use RCU protection in ip6_default_advmss()ip6_default_advmss() needs rcu protection to make sure the net structure it reads does not disappear.
[]
null
null
null
null
null
GHSA-w68v-6cjr-pcvc
Unspecified vulnerability in Apple iTunes before 9.1 allows local users to gain console privileges via vectors related to log files, "insecure file operation," and syncing an iPhone, iPad, or iPod touch.
[]
null
null
null
null
null
GHSA-8xpj-rxm7-wgf9
The Icegram Express plugin for WordPress is vulnerable to SQL Injection via the ‘options[list_id]’ parameter in all versions up to, and including, 5.7.22 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
[]
null
8.8
null
null
null
CVE-2023-38044
Extension - hikashop.com - SQLi in HikaShop component for Joomla <= 4.7.2
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability allows SQL Injection.
[ "cpe:2.3:a:hikashop:hikashop:*:*:*:*:*:joomla\\!:*:*" ]
null
9.8
null
null
null
GHSA-8pvm-7g2w-965w
SQL injection vulnerability in index.php in AproxEngine (aka Aprox CMS Engine) 5.1.0.4 allows remote attackers to execute arbitrary SQL commands via the id parameter.
[]
null
null
null
null
null
RHSA-2022:6878
Red Hat Security Advisory: expat security update
expat: a use-after-free in the doContent function in xmlparse.c
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
8.1
null
null
null
CVE-2025-24084
Windows Subsystem for Linux (WSL2) Kernel Remote Code Execution Vulnerability
Untrusted pointer dereference in Windows Subsystem for Linux allows an unauthorized attacker to execute code locally.
[]
null
8.4
null
null
null
GHSA-m444-29mg-hm99
Multiple I-O DATA network camera products (TS-WRLP firmware Ver.1.09.04 and earlier, TS-WRLA firmware Ver.1.09.04 and earlier, TS-WRLP/E firmware Ver.1.09.04 and earlier) use hardcoded credentials which may allow an remote authenticated attacker to execute arbitrary OS commands on the device via unspecified vector.
[]
null
null
8.8
null
null
CVE-2014-7832
mod/lti/launch.php in the LTI module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 performs access control at the course level rather than at the activity level, which allows remote authenticated users to bypass the mod/lti:view capability requirement by viewing an activity instance.
[ "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:moodle:moodle:2.7.2:*:*:*:*:*:*:*" ]
null
null
null
4
null
GHSA-fr47-r224-c36m
Cross-site Scripting in LimeSurvey
LimeSurvey before v3.17.14 allows stored XSS for escalating privileges from a low-privileged account to, for example, SuperAdmin. The attack uses a survey group in which the title contains JavaScript that is mishandled upon group deletion.
[]
null
5.4
null
null
null
GHSA-857j-r974-fpc4
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in RealMag777 Active Products Tables for WooCommerce allows Stored XSS. This issue affects Active Products Tables for WooCommerce: from n/a through 1.0.6.8.
[]
null
6.5
null
null
null
CVE-2008-5550
Open redirect vulnerability in console/faces/jsp/login/BeginLogin.jsp in Sun Java Web Console 3.0.2 through 3.0.5 and Solaris 10 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the redirect_url parameter.
[ "cpe:2.3:a:sun:java_web_console:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:sun:java_web_console:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:sun:java_web_console:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:sun:java_web_console:3.0.5:*:*:*:*:*:*:*", "cpe:2.3:o:sun:solaris:10:*:sparc:*:*:*:*:*", "cpe:2.3:o:sun:solaris:10:*:x86:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-xwf4-g3q4-g8hc
Directory traversal vulnerability in index.php in xtcommerce allows remote attackers to read arbitrary files via a .. (dot dot) in the template parameter.
[]
null
null
null
null
null
GHSA-xcwv-4qfh-f8xj
Cross-Site Request Forgery (CSRF) vulnerability in Automattic WooCommerce.This issue affects WooCommerce: from n/a through 8.2.2.
[]
null
4.3
null
null
null
CVE-2021-38140
The set_user extension module before 2.0.1 for PostgreSQL allows a potential privilege escalation using RESET SESSION AUTHORIZATION after set_user().
[ "cpe:2.3:a:set_user_project:set_user:*:*:*:*:*:postgresql:*:*" ]
null
9.8
null
7.5
null
CVE-2011-0782
Google Chrome before 9.0.597.84 on Mac OS X does not properly mitigate an unspecified flaw in the Mac OS X 10.5 SSL libraries, which allows remote attackers to cause a denial of service (application crash) via unknown vectors.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*" ]
null
null
null
5
null
GHSA-h4vp-6jj6-mq6g
Taocms v3.0.2 was discovered to contain a SQL injection vulnerability via the id parameter in \include\Model\Category.php.
[]
null
9.8
null
null
null
GHSA-295v-ccvg-8jrq
Data Center Expert, versions 7.5.0 and earlier, allows for the upload of a zip file from its user interface to the server. A carefully crafted, malicious file could be mistakenly uploaded by an authenticated user via this feature which could contain path traversal file names. As such, it could allow for the arbitrary upload of files contained with the zip onto the server file system outside of the intended directory. This is leveraging the more commonly known ZipSlip vulnerability within Java code.
[]
null
null
8.8
null
null
GHSA-mh64-ppph-hcxx
In the Linux kernel, the following vulnerability has been resolved:btrfs: do not BUG_ON in link_to_fixup_dirWhile doing error injection testing I got the following panickernel BUG at fs/btrfs/tree-log.c:1862! invalid opcode: 0000 [#1] SMP NOPTI CPU: 1 PID: 7836 Comm: mount Not tainted 5.13.0-rc1+ #305 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.13.0-2.fc32 04/01/2014 RIP: 0010:link_to_fixup_dir+0xd5/0xe0 RSP: 0018:ffffb5800180fa30 EFLAGS: 00010216 RAX: fffffffffffffffb RBX: 00000000fffffffb RCX: ffff8f595287faf0 RDX: ffffb5800180fa37 RSI: ffff8f5954978800 RDI: 0000000000000000 RBP: ffff8f5953af9450 R08: 0000000000000019 R09: 0000000000000001 R10: 000151f408682970 R11: 0000000120021001 R12: ffff8f5954978800 R13: ffff8f595287faf0 R14: ffff8f5953c77dd0 R15: 0000000000000065 FS: 00007fc5284c8c40(0000) GS:ffff8f59bbd00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fc5287f47c0 CR3: 000000011275e002 CR4: 0000000000370ee0 Call Trace: replay_one_buffer+0x409/0x470 ? btree_read_extent_buffer_pages+0xd0/0x110 walk_up_log_tree+0x157/0x1e0 walk_log_tree+0xa6/0x1d0 btrfs_recover_log_trees+0x1da/0x360 ? replay_one_extent+0x7b0/0x7b0 open_ctree+0x1486/0x1720 btrfs_mount_root.cold+0x12/0xea ? __kmalloc_track_caller+0x12f/0x240 legacy_get_tree+0x24/0x40 vfs_get_tree+0x22/0xb0 vfs_kern_mount.part.0+0x71/0xb0 btrfs_mount+0x10d/0x380 ? vfs_parse_fs_string+0x4d/0x90 legacy_get_tree+0x24/0x40 vfs_get_tree+0x22/0xb0 path_mount+0x433/0xa10 __x64_sys_mount+0xe3/0x120 do_syscall_64+0x3d/0x80 entry_SYSCALL_64_after_hwframe+0x44/0xaeWe can get -EIO or any number of legitimate errors from btrfs_search_slot(), panicing here is not the appropriate response. The error path for this code handles errors properly, simply return the error.
[]
null
5.5
null
null
null
GHSA-g7rp-q2cv-gcmf
Multiple use-after-free vulnerabilities in content/renderer/media/user_media_client_impl.cc in the WebRTC implementation in Google Chrome before 43.0.2357.65 allow remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that executes upon completion of a getUserMedia request.
[]
null
null
null
null
null
CVE-2022-37012
This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Unified Automation OPC UA C++ Demo Server 1.7.6-537. Authentication is not required to exploit this vulnerability. The specific flaw exists within the OpcUa_SecureListener_ProcessSessionCallRequest method. A crafted OPC UA message can force the server to incorrectly update a reference count. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-16927.
[ "cpe:2.3:a:unified-automation:opc_ua_c\\+\\+_demo_server:1.7.6.537:*:*:*:*:*:*:*" ]
null
null
7.5
null
null
CVE-2024-5243
TP-Link Omada ER605 Buffer Overflow Remote Code Execution Vulnerability
TP-Link Omada ER605 Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Omada ER605 routers. Authentication is not required to exploit this vulnerability. However, devices are vulnerable only if configured to use the Comexe DDNS service. The specific flaw exists within the handling of DNS names. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-22523.
[ "cpe:2.3:a:tp_link:omada_er605:2.6_2.2.2_build_20231017:*:*:*:*:*:*:*" ]
null
null
7.5
null
null
GHSA-4jgr-2587-qr74
The FireWire driver in IOFireWireFamily in Apple OS X before 10.10.4 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (NULL pointer dereference) via a crafted app.
[]
null
null
null
null
null
GHSA-79gx-5778-2q65
Buffer over-read can happen while parsing received SDP values due to lack of NULL termination check on SDP in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
[]
null
null
null
null
null