id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2018-10862 | WildFly Core before version 6.0.0.Alpha3 does not properly validate file paths in .war archives, allowing for the extraction of crafted .war archives to overwrite arbitrary files. This is an instance of the 'Zip Slip' vulnerability. | [
"cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:wildfly_core:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:wildfly_core:6.0.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:redhat:wildfly_core:6.0.0:alpha2:*:*:*:*:*:*"
]
| null | null | 5.5 | 4.9 | null |
|
CVE-2020-9987 | An inconsistent user interface issue was addressed with improved state management. This issue is fixed in Safari 14.0. Visiting a malicious website may lead to address bar spoofing. | [
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*"
]
| null | 4.3 | null | 4.3 | null |
|
GHSA-q554-wwwv-mpv6 | Buffer overflow in Progress 4GL Compiler 9.1D06 and earlier allows attackers to execute arbitrary code via source code containing a long, invalid data type. | []
| null | null | null | null | null |
|
CVE-2019-15372 | The Hisense F17 Android device with a build fingerprint of Hisense/F17_4G/HS6739MT:8.1.0/O11019/Hisense_F17_4G_00_S01:user/release-keys contains a pre-installed app with a package name of com.mediatek.wfo.impl app (versionCode=27, versionName=8.1.0) that allows any app co-located on the device to modify a system property through an exported interface without proper authorization. | [
"cpe:2.3:o:hisense:infinity_f17_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hisense:infinity_f17:-:*:*:*:*:*:*:*"
]
| null | 5.5 | null | 2.1 | null |
|
ICSA-22-193-01 | Dahua ASI7213X-T1 (Update A) | Dahua ASI7XXX allows users to upload a promotional picture or video displayed when device is in standby, which may allow an attacker to upload unvalidated files other than a picture or a video, such as an executable file; this could lead to a denial-of-service. CVE-2022-30560 has been assigned to this vulnerability. A CVSS v3 base score of 7.6 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H). Dahua ASI7XXX is vulnerable to Pass the Hash of a captured authentication hash, which could allow an attacker to sniff the authentication process and access the device without needing a password. CVE-2022-30561 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N). Dahua ASI7XXX is vulnerable when an unknown username is entered; the web server returns a valid username in an error message. This could allow an attacker to gain valid username values to use in authentication attacks. CVE-2022-30562 has been assigned to this vulnerability. A CVSS v3 base score of 3.7 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N). Dahua ASI7XXX is vulnerable to an authentication replay in the ONVIF web interaction. An attacker capable of sniffing the network traffic could replay the authentication data and access the device as the captured authenticated user. CVE-2022-30563 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N). | []
| null | null | 6.8 | null | null |
GHSA-x3fp-6hv6-r4pq | Windows DNS Server Remote Code Execution Vulnerability | []
| null | 9.8 | null | null | null |
|
CVE-2023-32372 | An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 16.5 and iPadOS 16.5, watchOS 9.5, tvOS 16.5, macOS Ventura 13.4. Processing an image may result in disclosure of process memory. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
]
| null | 5.5 | null | null | null |
|
CVE-2005-4342 | ColdFusion Sandbox on Adobe (formerly Macromedia) ColdFusion MX 6.0, 6.1, 6.1 with JRun, and 7.0 does not throw an exception if the SecurityManager is disabled, which might allow remote attackers to "bypass security controls," aka "JRun Clustered Sandbox Security Vulnerability." | [
"cpe:2.3:a:macromedia:coldfusion:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:macromedia:coldfusion:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:macromedia:coldfusion:6.1:*:enterprise_with_jrun:*:*:*:*:*",
"cpe:2.3:a:macromedia:coldfusion:6.1:*:j2ee_application_server:*:*:*:*:*",
"cpe:2.3:a:macromedia:coldfusion:7.0:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 | null |
|
CVE-2017-20141 | Itech Movie Portal Script movie.php Union sql injection | A vulnerability classified as critical has been found in Itech Movie Portal Script 7.36. This affects an unknown part of the file /movie.php. The manipulation of the argument f leads to sql injection (Union). It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:a:ambit:movie_portal_script:7.36:*:*:*:*:*:*:*"
]
| null | 6.3 | null | null | null |
CVE-2021-20624 | Improper access control vulnerability in Scheduler of Cybozu Office 10.0.0 to 10.8.4 allows an authenticated attacker to bypass access restriction and alter the data of Scheduler via unspecified vectors. | [
"cpe:2.3:a:cybozu:office:*:*:*:*:*:*:*:*"
]
| null | 6.5 | null | 4 | null |
|
CVE-2022-28449 | nopCommerce 4.50.1 is vulnerable to Cross Site Scripting (XSS). At Apply for vendor account feature, an attacker can upload an arbitrary file to the system. | [
"cpe:2.3:a:nopcommerce:nopcommerce:4.50.1:*:*:*:*:*:*:*"
]
| null | 6.1 | null | 4.3 | null |
|
GHSA-c28h-3w95-v6xg | An out-of-bounds write flaw was found in X.Org and Xwayland. The function GetBarrierDevice() searches for the pointer device based on its device ID and returns the matching value, or supposedly NULL, if no match was found. However, the code will return the last element of the list if no matching device ID is found, which can lead to out-of-bounds memory access. | []
| null | 7.8 | null | null | null |
|
GHSA-mf5j-wgq9-9jj2 | An issue was discovered in Int15MicrocodeSmm in Insyde InsydeH2O before 2021-10-14 on Intel client chipsets. A caller may be able to escalate privileges. | []
| null | 9.8 | null | null | null |
|
CVE-2005-3106 | Race condition in Linux 2.6, when threads are sharing memory mapping via CLONE_VM (such as linuxthreads and vfork), might allow local users to cause a denial of service (deadlock) by triggering a core dump while waiting for a thread that has just performed an exec. | [
"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*"
]
| null | 4.7 | null | 1.2 | null |
|
GHSA-9v96-cvr8-jw8x | In the Linux kernel, the following vulnerability has been resolved:phy: rockchip: samsung-hdptx: Set drvdata before enabling runtime PMIn some cases, rk_hdptx_phy_runtime_resume() may be invoked before
platform_set_drvdata() is executed in ->probe(), leading to a NULL
pointer dereference when using the return of dev_get_drvdata().Ensure platform_set_drvdata() is called before devm_pm_runtime_enable(). | []
| null | 5.5 | null | null | null |
|
GHSA-m5j8-qcx5-8gx7 | IBM QRadar WinCollect Agent 10.0 through 10.1.7 could allow a privileged user to obtain sensitive information due to missing best practices. IBM X-Force ID: 213551. | []
| null | 2.7 | null | null | null |
|
CVE-2018-1999036 | An exposure of sensitive information vulnerability exists in Jenkins SSH Agent Plugin 1.15 and earlier in SSHAgentStepExecution.java that exposes the SSH private key password to users with permission to read the build log. | [
"cpe:2.3:a:jenkins:ssh_agent:*:*:*:*:*:jenkins:*:*"
]
| null | null | 6.5 | 4 | null |
|
CVE-2025-24797 | Meshtastic incorrectly hands malformed packets leads to controlled buffer overflow | Meshtastic is an open source mesh networking solution. A fault in the handling of mesh packets containing invalid protobuf data can result in an attacker-controlled buffer overflow, allowing an attacker to hijack execution flow, potentially resulting in remote code execution. This attack does not require authentication or user interaction, as long as the target device rebroadcasts packets on the default channel. This vulnerability fixed in 2.6.2. | []
| null | 9.4 | null | null | null |
CVE-2022-48506 | A flawed pseudorandom number generator in Dominion Voting Systems ImageCast Precinct (ICP and ICP2) and ImageCast Evolution (ICE) scanners allows anyone to determine the order in which ballots were cast from public ballot-level data, allowing deanonymization of voted ballots, in several types of scenarios. This issue was observed for use of the following versions of Democracy Suite: 5.2, 5.4-NM, 5.5, 5.5-A, 5.5-B, 5.5-C, 5.5-D, 5.7-A, 5.10, 5.10A, 5.15. NOTE: the Democracy Suite 5.17 EAC Certificate of Conformance mentions "Improved pseudo random number algorithm," which may be relevant. | [
"cpe:2.3:h:dominionvoting:democracy_suite:5.2:*:*:*:*:*:*:*",
"cpe:2.3:h:dominionvoting:democracy_suite:5.4-nm:*:*:*:*:*:*:*",
"cpe:2.3:h:dominionvoting:democracy_suite:5.5:*:*:*:*:*:*:*",
"cpe:2.3:h:dominionvoting:democracy_suite:5.5-a:*:*:*:*:*:*:*",
"cpe:2.3:h:dominionvoting:democracy_suite:5.5-b:*:*:*:*:*:*:*",
"cpe:2.3:h:dominionvoting:democracy_suite:5.5-c:*:*:*:*:*:*:*",
"cpe:2.3:h:dominionvoting:democracy_suite:5.5-d:*:*:*:*:*:*:*",
"cpe:2.3:h:dominionvoting:democracy_suite:5.7-a:*:*:*:*:*:*:*",
"cpe:2.3:h:dominionvoting:democracy_suite:5.10:*:*:*:*:*:*:*",
"cpe:2.3:h:dominionvoting:democracy_suite:5.10a:*:*:*:*:*:*:*",
"cpe:2.3:h:dominionvoting:democracy_suite:5.15:*:*:*:*:*:*:*"
]
| null | 2.4 | null | null | null |
|
GHSA-5j3m-26vx-5q73 | qdPM V9.1 is vulnerable to Cross Site Scripting (XSS) via qdPM\install\modules\database_config.php. | []
| null | null | null | null | null |
|
CVE-2022-34182 | Jenkins Nested View Plugin 1.20 through 1.25 (both inclusive) does not escape search parameters, resulting in a reflected cross-site scripting (XSS) vulnerability. | [
"cpe:2.3:a:jenkins:nested_view:*:*:*:*:*:jenkins:*:*"
]
| null | 6.1 | null | 4.3 | null |
|
CVE-2016-6975 | Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.006.30243, and Acrobat and Acrobat Reader DC Continuous before 15.020.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-6940, CVE-2016-6941, CVE-2016-6942, CVE-2016-6943, CVE-2016-6947, CVE-2016-6948, CVE-2016-6950, CVE-2016-6951, CVE-2016-6954, CVE-2016-6955, CVE-2016-6956, CVE-2016-6959, CVE-2016-6960, CVE-2016-6966, CVE-2016-6970, CVE-2016-6972, CVE-2016-6973, CVE-2016-6974, CVE-2016-6976, CVE-2016-6977, CVE-2016-6978, CVE-2016-6995, CVE-2016-6996, CVE-2016-6997, CVE-2016-6998, CVE-2016-7000, CVE-2016-7001, CVE-2016-7002, CVE-2016-7003, CVE-2016-7004, CVE-2016-7005, CVE-2016-7006, CVE-2016-7007, CVE-2016-7008, CVE-2016-7009, CVE-2016-7010, CVE-2016-7011, CVE-2016-7012, CVE-2016-7013, CVE-2016-7014, CVE-2016-7015, CVE-2016-7016, CVE-2016-7017, CVE-2016-7018, and CVE-2016-7019. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:reader:*:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 10 | null |
|
CVE-2024-33967 | SQL injection in Janobe products | SQL injection vulnerability in PayPal, Credit Card and Debit Card Payment affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted query to the server and retrieve all the information stored in it through the following 'view' in 'Attendance' and 'YearLevel' in '/AttendanceMonitoring/report/attendance_print.php' parameter. | [
"cpe:2.3:a:janobe:school_attendance_monitoring_system:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:janobe:credit_card:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:janobe:debit_card_payment:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:janobe:paypal:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:janobe:school_attendence_monitoring_system:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:janobe:school_event_management_system:1.0:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null | null |
CVE-2024-21259 | Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.22 and prior to 7.1.2. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H). | [
"cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:prior_to_7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null | null |
|
GHSA-rhfv-c52c-x747 | A maliciously crafted RFA file, when linked or imported into Autodesk Revit, can force a Use-After-Free vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process. | []
| null | 7.8 | null | null | null |
|
GHSA-92w6-8752-jf23 | In priorLinearAllocation of C2AllocatorIon.cpp, there is a possible use-after-free due to improper locking. This could lead to local information disclosure in the media codec with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-152239213 | []
| null | null | null | null | null |
|
GHSA-53rx-4vfw-28rw | In the Linux kernel, the following vulnerability has been resolved:ext4: fix slab-out-of-bounds in ext4_mb_find_good_group_avg_frag_lists()We can trigger a slab-out-of-bounds with the following commands:==================================================================
BUG: KASAN: slab-out-of-bounds in ext4_mb_find_good_group_avg_frag_lists+0x8a/0x200 [ext4]
Read of size 8 at addr ffff888121b9d0f0 by task kworker/u2:0/11
CPU: 0 PID: 11 Comm: kworker/u2:0 Tainted: GL 6.7.0-next-20240118 #521
Call Trace:
dump_stack_lvl+0x2c/0x50
kasan_report+0xb6/0xf0
ext4_mb_find_good_group_avg_frag_lists+0x8a/0x200 [ext4]
ext4_mb_regular_allocator+0x19e9/0x2370 [ext4]
ext4_mb_new_blocks+0x88a/0x1370 [ext4]
ext4_ext_map_blocks+0x14f7/0x2390 [ext4]
ext4_map_blocks+0x569/0xea0 [ext4]
ext4_do_writepages+0x10f6/0x1bc0 [ext4]
[...]The flow of issue triggering is as follows:// Set s_mb_group_prealloc to 2147483647 via sysfs
ext4_mb_new_blocks
ext4_mb_normalize_request
ext4_mb_normalize_group_request
ac->ac_g_ex.fe_len = EXT4_SB(sb)->s_mb_group_prealloc
ext4_mb_regular_allocator
ext4_mb_choose_next_group
ext4_mb_choose_next_group_best_avail
mb_avg_fragment_size_order
order = fls(len) - 2 = 29
ext4_mb_find_good_group_avg_frag_lists
frag_list = &sbi->s_mb_avg_fragment_size[order]
if (list_empty(frag_list)) // Trigger SOOB!At 4k block size, the length of the s_mb_avg_fragment_size list is 14,
but an oversized s_mb_group_prealloc is set, causing slab-out-of-bounds
to be triggered by an attempt to access an element at index 29.Add a new attr_id attr_clusters_in_group with values in the range
[0, sbi->s_clusters_per_group] and declare mb_group_prealloc as
that type to fix the issue. In addition avoid returning an order
from mb_avg_fragment_size_order() greater than MB_NUM_ORDERS(sb)
and reduce some useless loops. | []
| null | 5.5 | null | null | null |
|
GHSA-wvhc-7m5x-j7jj | Use after free in reader mode in Google Chrome on Android prior to 83.0.4103.61 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. | []
| null | 9.6 | null | null | null |
|
CVE-2013-7011 | The read_header function in libavcodec/ffv1dec.c in FFmpeg before 2.1 does not prevent changes to global parameters, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted FFV1 data. | [
"cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.4.9:pre1:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.5.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.7.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.8.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ffmpeg:ffmpeg:2.0:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 | null |
|
GHSA-wf3q-774p-8m3p | A buffer overflow was addressed with improved bounds checking. This issue is fixed in macOS Monterey 12.6.6, macOS Big Sur 11.7.7, macOS Ventura 13.4. Parsing an office document may lead to an unexpected app termination or arbitrary code execution. | []
| null | 7.8 | null | null | null |
|
CVE-2013-6723 | IBM WebSphere Portal 8.0.0.1 before CF09 does not properly handle references in compute="always" Web Content Manager (WCM) navigator components, which allows remote attackers to obtain sensitive component information via unspecified vectors. | [
"cpe:2.3:a:ibm:websphere_portal:8.0.0.1:*:*:*:*:*:*:*"
]
| null | null | null | 5 | null |
|
CVE-2020-9740 | Stored XSS in AEM Design Importer Component | AEM versions 6.5.5.0 (and below), 6.4.8.1 (and below), 6.3.3.8 (and below) and 6.2 SP1-CFP20 (and below) are affected by a stored XSS vulnerability that allows users with 'Author' privileges to store malicious scripts in fields associated with the Design Importer. These scripts may be executed in a victim’s browser when they open the page containing the vulnerable field. | [
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp10:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp11:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp12.1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp13:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp14:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp15:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp16:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp17:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp18:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp19:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp20:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp4:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp5:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp6:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp7:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp8:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:6.2.0.0:sp1-cfp9:*:*:*:*:*:*"
]
| null | 9 | null | null | null |
CVE-2022-34633 | CVA6 commit d315ddd0f1be27c1b3f27eb0b8daf471a952299a executes crafted or incorrectly formatted sfence.vma instructions rather create an exception. | [
"cpe:2.3:a:openhwgroup:cva6:-:*:*:*:*:*:*:*"
]
| null | 5.5 | null | null | null |
|
CVE-2022-4930 | nuxsmin sysPass URL cross site scripting | A vulnerability classified as problematic was found in nuxsmin sysPass up to 3.2.4. Affected by this vulnerability is an unknown functionality of the component URL Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 3.2.5 is able to address this issue. The patch is named 4da4d031732ecca67519851fd0c34597dbb8ee55. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-222319. | [
"cpe:2.3:a:syspass:syspass:*:*:*:*:*:*:*:*"
]
| null | 3.5 | 3.5 | 4 | https://github.com/nuxsmin/sysPass/commit/4da4d031732ecca67519851fd0c34597dbb8ee55 |
CVE-2000-0922 | Directory traversal vulnerability in Bytes Interactive Web Shopper shopping cart program (shopper.cgi) 2.0 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) attack on the newpage parameter. | [
"cpe:2.3:a:bytes_interactive:web_shopper:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bytes_interactive:web_shopper:2.0:*:*:*:*:*:*:*"
]
| null | null | null | 5 | null |
|
GHSA-mx44-hvmf-57mm | On Insteon Hub 2245-222 devices with firmware version 1012, specially crafted replies received from the PubNub service can cause buffer overflows on a global section overwriting arbitrary data. An attacker should impersonate PubNub and answer an HTTPS GET request to trigger this vulnerability. A strcpy overflows the buffer insteon_pubnub.channel_ad_r, which has a size of 16 bytes. An attacker can send an arbitrarily long "ad_r" parameter in order to exploit this vulnerability. | []
| null | null | 8.8 | null | null |
|
GHSA-jx4g-3xqm-62vh | io.jmix.localfs:jmix-localfs has a Path Traversal in Local File Storage | ImpactAttackers could manipulate the `FileRef` parameter to access files on the system where the Jmix application is deployed, provided the application server has the necessary permissions. This can be accomplished either by modifying the `FileRef` directly in the database or by supplying a harmful value in the `fileRef` parameter of the `/files` endpoint of the generic REST API.Arbitrary file reading on the operating system where the Jmix process is running.The severity of the vulnerability is mitigated by the fact that the application UI and the generic REST API are typically accessible only to authenticated users. Additionally, the `/files` endpoint in Jmix requires specific permissions and is disabled by default.WorkaroundsA workaround for those who are unable to upgrade: [Fix Path Traversal in Jmix Application](https://docs.jmix.io/jmix/files-vulnerabilities.html#fix-path-traversal-in-jmix-application).CreditCai, Qi Qi of Siemens China Cybersecurity Testing Center - Shadowless Lab | []
| null | 6.5 | null | null | null |
GHSA-jr8x-c265-m3fr | Buffer overflow in mstm in HP-UX allows local users to gain root access. | []
| null | null | null | null | null |
|
GHSA-cpvx-jwgh-3v74 | A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package, aka 'Microsoft SharePoint Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1023, CVE-2020-1102. | []
| null | null | null | null | null |
|
CVE-2015-8078 | Integer overflow in the index_urlfetch function in imap/index.c in Cyrus IMAP 2.3.19, 2.4.18, and 2.5.6 allows remote attackers to have unspecified impact via vectors related to urlfetch range checks and the section_offset variable. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8076. | [
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.13:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.14:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.15:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.16:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.17:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.3.18:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.14:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.15:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.16:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.4.17:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cyrus:imap:2.5.3:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 | null |
|
GHSA-ch3c-v47x-4pgp | Cleartext Signed Message Signature Spoofing in openpgp | ImpactOpenPGP Cleartext Signed Messages are cryptographically signed messages where the signed text is readable without special tools:These messages typically contain a "Hash: ..." header declaring the hash algorithm used to compute the signature digest.
OpenPGP.js up to v5.9.0 ignored any data preceding the "Hash: ..." texts when verifying the signature. As a result, malicious parties could add arbitrary text to a third-party Cleartext Signed Message, to lead the victim to believe that the arbitrary text was signed.A user or application is vulnerable to said attack vector if it verifies the CleartextMessage by only checking the returned `verified` property, discarding the associated `data` information, and instead _visually trusting_ the contents of the original message:Since `verificationResult.data` would always contain the actual signed data, users and apps that check this information are not vulnerable.
Similarly, given a CleartextMessage object, retrieving the data using `getText()` or the `text` field returns only the contents that are considered when verifying the signature.
Finally, re-armoring a CleartextMessage object (using `armor()` will also result in a "sanitised" version, with the extraneous text being removed.
Because of this, we consider the vulnerability impact to be very limited when the CleartextMessage is processed programmatically; this is reflected in the Severity CVSS assessment, specifically in the scope's score ("Unchanged").Patchesv5.10.1 (current stable version) will reject messages when calling `openpgp.readCleartextMessage()`v4.10.11 (legacy version) will reject messages when calling `openpgp.cleartext.readArmored()`WorkaroundsCheck the contents of `verificationResult.data` to see what data was actually signed, rather than visually trusting the contents of the armored message.ReferencesSimilar CVE: https://sec-consult.com/vulnerability-lab/advisory/cleartext-message-spoofing-in-go-cryptography-libraries-cve-2019-11841/ | []
| null | 4.3 | null | null | null |
CVE-2022-1691 | Realty Workstation < 1.0.15 - Agent SQLi | The Realty Workstation WordPress plugin before 1.0.15 does not sanitise and escape the trans_edit parameter before using it in a SQL statement when an agent edit a transaction, leading to an SQL injection | [
"cpe:2.3:a:realtyworkstation:realty_workstation:*:*:*:*:*:wordpress:*:*"
]
| null | 4.9 | null | 4 | null |
CVE-2024-1227 | Multiple vulnerabilities in Rejetto's Http File Server | An open redirect vulnerability, the exploitation of which could allow an attacker to create a custom URL and redirect a legitimate page to a malicious site. | []
| null | 6.5 | null | null | null |
RHSA-2024:8723 | Red Hat Security Advisory: firefox security update | firefox: thunderbird: Permission leak via embed or object elements firefox: thunderbird: Use-after-free in layout with accessibility firefox: thunderbird: Confusing display of origin for external protocol handler prompt firefox: thunderbird: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response firefox: thunderbird: Origin of permission prompt could be spoofed by long URL firefox: thunderbird: Cross origin video frame leak firefox: thunderbird: History interface could have been used to cause a Denial of Service condition in the browser firefox: thunderbird: Clipboard "paste" button persisted across tabs firefox: DOM push subscription message could hang Firefox firefox: thunderbird: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4 | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
]
| null | 8.8 | null | null | null |
CVE-2023-42238 | An issue was discovered in Selesta Visual Access Manager (VAM) prior to 4.42.2. An authenticated attacker can perform SQL Injection in multiple POST parameters of /vam/vam_eps.php. | []
| null | 3.8 | null | null | null |
|
CVE-2019-17234 | includes/class-coming-soon-creator.php in the igniteup plugin through 3.4 for WordPress allows unauthenticated arbitrary file deletion. | [
"cpe:2.3:a:getigniteup:igniteup:*:*:*:*:*:wordpress:*:*"
]
| null | 7.5 | null | 6.4 | null |
|
GHSA-h634-xhf8-75fp | A specially-crafted HTTP request can lead to SQL injection. An attacker can make authenticated HTTP requests to trigger this vulnerability at ord’ parameter. However, the high privilege super-administrator account needs to be used to achieve exploitation without cross-site request forgery attack. | []
| null | 8.8 | null | null | null |
|
GHSA-7777-pw9w-4gm5 | Integer overflow in the JavaScript engine in Avant Browser 11.7 Build 9 and earlier allows remote attackers to cause a denial of service (application crash) by attempting to URL encode a string containing many instances of an invalid character. | []
| null | null | null | null | null |
|
GHSA-cghh-3pf5-8ppp | WebAdmin in Axigen 10.3.x before 10.3.3.61, 10.4.x before 10.4.24, and 10.5.x before 10.5.10 allows XSS attacks against admins because of mishandling of viewing the usage of SSL certificates. | []
| null | 6.1 | null | null | null |
|
GHSA-8vv2-p6c9-46c2 | show_config_errors.php in phpMyAdmin 3.5.x before 3.5.2.1 allows remote attackers to obtain sensitive information via a direct request, which reveals the installation path in an error message, related to lack of inclusion of the common.inc.php library file. | []
| null | null | null | null | null |
|
CVE-2017-12619 | Apache Zeppelin prior to 0.7.3 was vulnerable to session fixation which allowed an attacker to hijack a valid user session. Issue was reported by "stone lone". | [
"cpe:2.3:a:apache:zeppelin:*:*:*:*:*:*:*:*"
]
| null | null | 8.1 | 5.8 | null |
|
CVE-2019-5623 | Accellion File Transfer Appliance Improper Neutralization of Special Elements used in a Command ('Command Injection') | Accellion File Transfer Appliance version FTA_8_0_540 suffers from an instance of CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection'). | [
"cpe:2.3:a:accellion:file_transfer_appliance:8_0_540:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 7.5 | null |
CVE-2024-50145 | octeon_ep: Add SKB allocation failures handling in __octep_oq_process_rx() | In the Linux kernel, the following vulnerability has been resolved:
octeon_ep: Add SKB allocation failures handling in __octep_oq_process_rx()
build_skb() returns NULL in case of a memory allocation failure so handle
it inside __octep_oq_process_rx() to avoid NULL pointer dereference.
__octep_oq_process_rx() is called during NAPI polling by the driver. If
skb allocation fails, keep on pulling packets out of the Rx DMA queue: we
shouldn't break the polling immediately and thus falsely indicate to the
octep_napi_poll() that the Rx pressure is going down. As there is no
associated skb in this case, don't process the packets and don't push them
up the network stack - they are skipped.
Helper function is implemented to unmmap/flush all the fragment buffers
used by the dropped packet. 'alloc_failures' counter is incremented to
mark the skb allocation error in driver statistics.
Found by Linux Verification Center (linuxtesting.org) with SVACE. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*"
]
| null | 5.5 | null | null | null |
GHSA-3m46-hchf-588q | KonaKart 8.9.0.0 is vulnerable to Remote Code Execution by uploading a web shell as a product category image. | []
| null | null | 9.8 | null | null |
|
CVE-2020-7510 | A CWE-200: Information Exposure vulnerability exists in Easergy T300 (Firmware version 1.5.2 and older) which could allow attacker to obtain private keys. | [
"cpe:2.3:o:schneider-electric:easergy_t300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:easergy_t300:-:*:*:*:*:*:*:*"
]
| null | 7.5 | null | 5 | null |
|
CVE-2022-26855 | Dell PowerScale OneFS, versions 8.2.x-9.3.0.x, contains an incorrect default permissions vulnerability. A local malicious user could potentially exploit this vulnerability, leading to a denial of service. | [
"cpe:2.3:o:dell:emc_powerscale_onefs:*:*:*:*:*:*:*:*"
]
| null | 5.5 | null | null | null |
|
GHSA-8r8f-xjrf-5453 | Multiple SQL injection vulnerabilities in code/guestadd.php in PHP-Update 2.7 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) newmessage, (2) newname, (3) newwebsite, or (4) newemail parameter. | []
| null | null | null | null | null |
|
GHSA-g93j-j4g4-hr9q | Munin before 2.0.6 stores plugin state files that run as root in the same group-writable directory as non-root plugins, which allows local users to execute arbitrary code by replacing a state file, as demonstrated using the smart_ plugin. | []
| null | null | null | null | null |
|
GHSA-cp45-5rc8-pf33 | IBM Curam Social Program Management 6.0, 6.1, 6.2 and 7.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 119761. | []
| null | null | 5.4 | null | null |
|
CVE-2018-19244 | An XML External Entity (XXE) vulnerability exists in the Charles 4.2.7 import/export setup option. If a user imports a "Charles Settings.xml" file from an attacker, an intranet network may be accessed and information may be leaked. | [
"cpe:2.3:a:charlesproxy:charles:4.2.7:*:*:*:*:*:*:*"
]
| null | null | 8.6 | 5 | null |
|
GHSA-633j-m2qh-phpg | Adobe Photoshop versions 22.5.8 (and earlier) and 23.4.2 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | []
| null | 7.8 | null | null | null |
|
CVE-2024-32684 | WordPress WP Ultimate Review plugin <= 2.2.5 - Broken Access Control on Review vulnerability | Missing Authorization vulnerability in Wpmet Wp Ultimate Review.This issue affects Wp Ultimate Review: from n/a through 2.2.5.
| []
| null | 5.3 | null | null | null |
CVE-2011-3495 | Multiple directory traversal vulnerabilities in service.exe in Measuresoft ScadaPro 4.0.0 and earlier allow remote attackers to read, modify, or delete arbitrary files via the (1) RF, (2) wF, (3) UF, or (4) NF command. | [
"cpe:2.3:a:measuresoft:scadapro:*:*:*:*:*:*:*:*",
"cpe:2.3:a:measuresoft:scadapro:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:measuresoft:scadapro:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:measuresoft:scadapro:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:measuresoft:scadapro:2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:measuresoft:scadapro:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:measuresoft:scadapro:2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:measuresoft:scadapro:2.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:measuresoft:scadapro:2.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:measuresoft:scadapro:2.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:measuresoft:scadapro:2.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:measuresoft:scadapro:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:measuresoft:scadapro:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:measuresoft:scadapro:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:measuresoft:scadapro:2.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:measuresoft:scadapro:2.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:measuresoft:scadapro:2.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:measuresoft:scadapro:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:measuresoft:scadapro:2.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:measuresoft:scadapro:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:measuresoft:scadapro:2.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:measuresoft:scadapro:2.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:measuresoft:scadapro:2.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:measuresoft:scadapro:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:measuresoft:scadapro:3.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:measuresoft:scadapro:3.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:measuresoft:scadapro:3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:measuresoft:scadapro:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:measuresoft:scadapro:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:measuresoft:scadapro:3.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:measuresoft:scadapro:3.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:measuresoft:scadapro:3.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:measuresoft:scadapro:3.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:measuresoft:scadapro:3.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:measuresoft:scadapro:3.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:measuresoft:scadapro:3.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:measuresoft:scadapro:3.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:measuresoft:scadapro:3.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:measuresoft:scadapro:3.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:measuresoft:scadapro:3.9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:measuresoft:scadapro:3.9.11:*:*:*:*:*:*:*",
"cpe:2.3:a:measuresoft:scadapro:3.9.12:*:*:*:*:*:*:*",
"cpe:2.3:a:measuresoft:scadapro:3.9.13:*:*:*:*:*:*:*",
"cpe:2.3:a:measuresoft:scadapro:3.9.14:*:*:*:*:*:*:*",
"cpe:2.3:a:measuresoft:scadapro:3.9.15:*:*:*:*:*:*:*"
]
| null | null | null | 10 | null |
|
CVE-2022-4321 | PDF Generator for WordPress < 1.1.2 - Reflected XSS | The PDF Generator for WordPress plugin before 1.1.2 includes a vendored dompdf example file which is susceptible to Reflected Cross-Site Scripting and could be used against high privilege users such as admin | [
"cpe:2.3:a:wpswings:pdf_generator_for_wordpress:*:*:*:*:*:wordpress:*:*"
]
| null | 6.1 | null | null | null |
GHSA-37gx-jqx9-fwmg | Improper Certificate Validation in Apache DolphinScheduler | Because the HttpUtils class did not verify certificates, an attacker that could perform a Man-in-the-Middle (MITM) attack on outgoing https connections could impersonate the server.This issue affects Apache DolphinScheduler: before 3.2.1.Users are recommended to upgrade to version 3.2.1, which fixes the issue. | []
| null | 7.3 | null | null | null |
CVE-2024-45560 | Time-of-check Time-of-use (TOCTOU) Race Condition in Camera | Memory corruption while taking a snapshot with hardware encoder due to unvalidated userspace buffer. | []
| null | 7.8 | null | null | null |
CVE-2017-13871 | An issue was discovered in certain Apple products. macOS before 10.13.2 is affected. The issue involves the "Mail" component. It allows remote attackers to read cleartext e-mail content (for which S/MIME encryption was intended) by leveraging the lack of installation of an S/MIME certificate by the recipient. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 5 | null |
|
GHSA-g2w3-6c6j-74qw | SAP NetWeaver AS Java allows an unauthenticated attacker to brute force the login functionality in order to identify the legitimate user IDs. This has an impact on confidentiality but not on integrity or availability. | []
| null | 5.3 | null | null | null |
|
GHSA-pj4h-x8qh-45r9 | A directory traversal issue was discovered in Gradle gradle-enterprise-test-distribution-agent before 1.3.2, test-distribution-gradle-plugin before 1.3.2, and gradle-enterprise-maven-extension before 1.8.2. A malicious actor (with certain credentials) can perform a registration step such that crafted TAR archives lead to extraction of files into arbitrary filesystem locations. | []
| null | null | null | null | null |
|
GHSA-8h95-8w2q-whv4 | The management website of the Verint S5120FD Verint_FW_0_42 unit features a CGI endpoint ('ipfilter.cgi') that allows the user to manage network filtering on the unit. This endpoint is vulnerable to a command injection. An authenticated attacker can leverage this issue to execute arbitrary commands as 'root'. | []
| null | null | null | null | null |
|
GHSA-r5h8-q4jm-864x | A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sequoia 15. An app may be able to read sensitive location information. | []
| null | 3.3 | null | null | null |
|
GHSA-ww8x-v93c-fjgj | Tenda AC1206 V15.03.06.23 was discovered to contain a stack overflow via the startIp parameter in the function formSetPPTPServer. | []
| null | 9.8 | null | null | null |
|
CVE-2005-1628 | apage.cgi in WebAPP 0.9.9.2.1, and possibly earlier versions, allows remote attackers to execute arbitrary commands via shell metacharacters in the f parameter. | [
"cpe:2.3:a:web-app.org:webapp:0.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:web-app.org:webapp:0.9.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:web-app.org:webapp:0.9.9.2.1:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 | null |
|
GHSA-wx94-8j26-vf7x | ImageCast Control Center 4.1.0 allows remote attackers to cause a denial of service (resource exhaustion or system crash) via a long string to port 12002. | []
| null | null | null | null | null |
|
CVE-2023-40434 | A configuration issue was addressed with additional restrictions. This issue is fixed in iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to access a user's Photos Library. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
]
| null | 3.3 | null | null | null |
|
GHSA-47pg-9x77-9rv9 | SQL injection vulnerability in mobile/search/index.php in Tube Ace (Adult PHP Tube Script) 1.6 allows remote attackers to execute arbitrary SQL commands via the q parameter. NOTE: some of these details are obtained from third party information. | []
| null | null | null | null | null |
|
GHSA-p4j2-vxxx-3hcm | Uncontrolled search path in Intel(R) Graphics Drivers before version 26.20.100.7158 may allow an authenticated user to potentially enable escalation of privilege via local access. | []
| null | null | null | null | null |
|
CVE-2021-27254 | This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R7800. Authentication is not required to exploit this vulnerability. The specific flaw exists within the apply_save.cgi endpoint. This issue results from the use of hard-coded encryption key. An attacker can leverage this vulnerability to execute arbitrary code in the context of root. Was ZDI-CAN-12287. | [
"cpe:2.3:o:netgear:br200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:br200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:br500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:br500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d7800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d7800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ex6100v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ex6100v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ex6150v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ex6150v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ex6250_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ex6250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ex6400_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ex6400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ex6400v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ex6400v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ex6410_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ex6410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ex6420_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ex6420:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ex7300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ex7300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ex7300v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ex7300v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ex7320_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ex7320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ex7700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ex7700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ex8000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ex8000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:lbr20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:lbr20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r9000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r9000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk12_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk12:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk13_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk13:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk14_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk14:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk15_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk15:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk23_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk23:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk40_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk40:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk43_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk43:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk43s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk43s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk44_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk44:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk53_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk53:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr40_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr40:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbr50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs40_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs40:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs50y_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs50y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:xr450_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:xr450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:xr500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:xr500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:xr700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:xr700:-:*:*:*:*:*:*:*"
]
| null | null | 6.3 | null | null |
|
CVE-2022-0002 | Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access. | [
"cpe:2.3:h:intel:atom_c3308:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c3336:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c3338:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c3338r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c3436l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c3508:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c3538:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c3558:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c3558r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c3558rc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c3708:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c3750:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c3758:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c3758r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c3808:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c3830:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c3850:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c3858:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c3950:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c3955:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c3958:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_p5921b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_p5931b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_p5942b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_p5962b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_x5-a3930:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_x5-a3940:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_x5-a3950:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_x5-a3960:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_x5-z8300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_x5-z8330:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_x5-z8350:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_x5-z8500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_x5-z8550:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_x6200fe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_x6211e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_x6212re:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_x6413e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_x6425e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_x6425re:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_x6427fe:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_x7-z8700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_x7-z8750:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_5305u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_6305:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_6305e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_6600he:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g5205u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g5305u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g5900:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g5900t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g5905:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g5905t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g5920:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g5925:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g6900:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g6900t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j3355:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j3355e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j3455:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j3455e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j4005:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j4025:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j4105:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j4125:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j6413:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n3350:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n3450:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n4500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n4504:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n5100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n5105:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n6211:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-11100he:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1115g4e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1115gre:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-12100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-12100f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-12100t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1220p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-12300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-12300t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-l13g4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10110y:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11260h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11300h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11320h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11400f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11400h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11400t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1140g7:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1145g7:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1145g7e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1145gre:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11500h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11500t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1155g7:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11600k:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11600kf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11600t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12400f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12400t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1240p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12450h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12500h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12500t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1250p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12600h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12600k:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12600kf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12600t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-9300h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-9400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-9400f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-9400h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-9600k:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-9600kf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-l16g7:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11390h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11850he:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1260p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-12650h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-12700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-12700f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-12700h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-12700k:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-12700kf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-12700t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1270p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-12800h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1280p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7640x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7740x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7800x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7820x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-9700kf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-9750hf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10850h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10900x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10920x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10940x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-11900:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-11900f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-11900h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-11900k:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-11900kf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-11900t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-11950h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-11980hk:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-12900:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-12900f:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-12900h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-12900hk:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-12900k:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-12900kf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-12900t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-7900x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-7920x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-7940x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-7960x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9800x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9820x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9880h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9900kf:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9900x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9920x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9940x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9960x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9980hk:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g6405u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g7400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g7400t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_j4205:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_j6425:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_n4200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_n4200e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_n6415:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_silver_j5005:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_silver_j5040:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_silver_n5000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_silver_n5030:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_silver_n6000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_silver_n6005:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:puma_7:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_bronze_3206r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d1700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d2700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2314:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2324g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2334:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2336:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2356g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2374g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2378:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2378g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2386g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2388g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5218r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5220r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5315y:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5317:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5318h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5318n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5318s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5318y:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5320:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5320h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5320t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6208u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6226r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6230n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6230r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6230t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6234:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6238r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6240r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6242r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6246r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6248r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6250:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6250l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6256:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6258r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6312u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6314u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6326:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6328h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6328hl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6330:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6330h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6330n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6334:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6336y:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6338:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6338n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6338t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6342:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6346:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6348:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6348h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6354:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8351n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8352m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8352s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8352v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8352y:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8353h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8354h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8356h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8358:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8358p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8360h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8360hl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8360y:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8362:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8368:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8368q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8376h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8376hl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8380:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8380h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8380hl:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_9221:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_9222:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4210r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4210t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4214r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4215r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4309y:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4310t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4314:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4316:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-10855:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-11155mle:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-11155mre:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-11555mle:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-11555mre:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-11855m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-11865mld:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-11865mre:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-11955m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1270p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1290e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1290te:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1350:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1350p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1370:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1370p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1390:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1390p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1390t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2223:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2225:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2235:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2245:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2255:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2265:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2275:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2295:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3235:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.2.0:*:*:*:*:*:*:*"
]
| null | 6.5 | null | 2.1 | null |
|
GHSA-pphx-h3mg-g6cq | In the NFC stack, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-121267042 | []
| null | 6.5 | null | null | null |
|
CVE-2017-14238 | SQL injection vulnerability in admin/menus/edit.php in Dolibarr ERP/CRM version 6.0.0 allows remote attackers to execute arbitrary SQL commands via the menuId parameter. | [
"cpe:2.3:a:dolibarr:dolibarr:6.0.0:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 7.5 | null |
|
GHSA-54rc-hfr6-cj3x | Cross-site scripting (XSS) vulnerability in Microsoft Exchange Outlook Web Access (OWA) allows remote attackers to inject arbitrary web script or HTML via a crafted email or chat client, aka "Microsoft Exchange Server Elevation of Privilege Vulnerability." | []
| null | null | 6.1 | null | null |
|
CVE-2021-22423 | A component of the HarmonyOS has a Out-of-bounds Write Vulnerability. Local attackers may exploit this vulnerability to cause integer overflow. | [
"cpe:2.3:o:huawei:harmonyos:-:*:*:*:*:*:*:*"
]
| null | 7.8 | null | 7.2 | null |
|
CVE-2002-1082 | The Image Upload capability for ezContents 1.40 and earlier allows remote attackers to cause ezContents to perform operations on local files as if they were uploaded. | [
"cpe:2.3:a:visualshapers:ezcontents:*:*:*:*:*:*:*:*"
]
| null | null | null | 5 | null |
|
CVE-2005-1739 | The XWD Decoder in ImageMagick before 6.2.2.3, and GraphicsMagick before 1.1.6-r1, allows remote attackers to cause a denial of service (infinite loop) via an image with a zero color mask. | [
"cpe:2.3:a:graphicsmagick:graphicsmagick:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:graphicsmagick:graphicsmagick:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:graphicsmagick:graphicsmagick:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:graphicsmagick:graphicsmagick:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:5.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:5.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:5.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:5.4.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:5.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:5.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:5.4.8.2.1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:5.5.3.2.1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:5.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:5.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:5.5.6.0_2003-04-09:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:5.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.0.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.2.2:*:*:*:*:*:*:*"
]
| null | null | null | 5 | null |
|
GHSA-xhvv-3jww-c487 | ActiveAdmin CSV Injection leading to sensitive information disclosure | ImpactIn ActiveAdmin versions prior to 3.2.0, maliciously crafted spreadsheet formulas could be uploaded as part of admin data that, when exported to a CSV file and the imported to a spreadsheet program like libreoffice, could lead to remote code execution and private data exfiltration.The attacker would need privileges to upload data to the same ActiveAdmin application as the victim, and would need the victim to possibly ignore security warnings from their spreadsheet program.PatchesVersions 3.2.0 and above fixed the problem by escaping any data starting with `=` and other characters used by spreadsheet programs.WorkaroundsOnly turn on formula evaluation in spreadsheet programs when importing CSV after explicitly reviewing the file.Referenceshttps://owasp.org/www-community/attacks/CSV_Injection
https://github.com/activeadmin/activeadmin/pull/8167 | []
| null | 5.2 | null | null | null |
CVE-2024-38610 | drivers/virt/acrn: fix PFNMAP PTE checks in acrn_vm_ram_map() | In the Linux kernel, the following vulnerability has been resolved:
drivers/virt/acrn: fix PFNMAP PTE checks in acrn_vm_ram_map()
Patch series "mm: follow_pte() improvements and acrn follow_pte() fixes".
Patch #1 fixes a bunch of issues I spotted in the acrn driver. It
compiles, that's all I know. I'll appreciate some review and testing from
acrn folks.
Patch #2+#3 improve follow_pte(), passing a VMA instead of the MM, adding
more sanity checks, and improving the documentation. Gave it a quick test
on x86-64 using VM_PAT that ends up using follow_pte().
This patch (of 3):
We currently miss handling various cases, resulting in a dangerous
follow_pte() (previously follow_pfn()) usage.
(1) We're not checking PTE write permissions.
Maybe we should simply always require pte_write() like we do for
pin_user_pages_fast(FOLL_WRITE)? Hard to tell, so let's check for
ACRN_MEM_ACCESS_WRITE for now.
(2) We're not rejecting refcounted pages.
As we are not using MMU notifiers, messing with refcounted pages is
dangerous and can result in use-after-free. Let's make sure to reject them.
(3) We are only looking at the first PTE of a bigger range.
We only lookup a single PTE, but memmap->len may span a larger area.
Let's loop over all involved PTEs and make sure the PFN range is
actually contiguous. Reject everything else: it couldn't have worked
either way, and rather made use access PFNs we shouldn't be accessing. | []
| null | null | null | null | null |
GHSA-gmqw-wmq7-g35r | When a user opens manipulated Interchange File Format (.IFF) format files received from untrusted sources in SAP 3D Visual Enterprise Viewer version 9, the application crashes and becomes temporarily unavailable to the user until restart of the application. | []
| null | null | null | null | null |
|
GHSA-c6x7-f9cf-48mg | Cross-site request forgery (CSRF) vulnerability in the All in One Webmaster plugin before 8.2.4 for WordPress allows remote attackers to hijack the authentication of arbitrary users for requests that insert XSS sequences. | []
| null | null | null | null | null |
|
GHSA-457g-f88f-3329 | Directory traversal vulnerability in AttacheCase for Java 0.60 and earlier, AttacheCase Lite 1.4.6 and earlier, and AttacheCase Pro 1.5.7 and earlier allows remote attackers to read arbitrary files via specially crafted ATC file. | []
| null | null | 5.5 | null | null |
|
GHSA-c2c3-chmq-vwx2 | Information disclosure vulnerability in HCL Commerce 9.0.1.9 through 9.0.1.14 and 9.1 through 9.1.4 could allow a remote attacker to obtain user personal data via unknown vectors. | []
| null | null | null | null | null |
|
GHSA-69rr-wvh9-6c4q | Directory Traversal in st | Versions of `st` prior to 0.2.5 are affected by a directory traversal vulnerability. Vulnerable versions fail to properly handle URL encoded dots, which caused `%2e` to be interpreted as `.` by the filesystem, resulting the potential for an attacker to read sensitive files on the server.RecommendationUpdate to version 0.2.5 or later. | []
| null | null | 7.5 | null | null |
GHSA-w9cq-9q3x-399x | SQL injection vulnerability in ad_click.asp for PortalApp allows remote attackers to execute arbitrary SQL commands via the banner_id parameter. | []
| null | null | null | null | null |
|
GHSA-3965-7vwp-wr38 | class.xmail.php in PhpXmail 0.7 through 1.1 does not properly handle large passwords, which prevents an error message from being returned and allows remote attackers to bypass authentication and gain unauthorized access. | []
| null | null | null | null | null |
|
CVE-2021-3342 | EPrints 3.4.2 allows remote attackers to read arbitrary files and possibly execute commands via crafted LaTeX input to a cgi/latex2png?latex= URI. | [
"cpe:2.3:a:eprints:eprints:3.4.2:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 6.8 | null |
|
GHSA-fc4v-676g-hqh4 | A vulnerability regarding buffer copy without checking size of input ('Classic Buffer Overflow') is found in the libjansson component and it does not affect the upstream library. This allows remote attackers to execute arbitrary code via unspecified vectors. The following models with Synology Camera Firmware versions before 1.0.7-0298 may be affected: BC500 and TC500. | []
| null | 9.8 | null | null | null |
|
RHSA-2023:4461 | Red Hat Security Advisory: firefox security update | Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions Mozilla: Incorrect value used during WASM compilation Mozilla: Potential permissions request bypass via clickjacking Mozilla: Crash in DOMParser due to out-of-memory conditions Mozilla: Fix potential race conditions when releasing platform objects Mozilla: Stack buffer overflow in StorageManager Mozilla: Cookie jar overflow caused unexpected cookie jar state Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 Mozilla: Memory safety bugs fixed in Firefox ESR 115.1, and Thunderbird 115.1 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | 9.8 | null | null | null |
CVE-2021-1330 | Cisco Small Business RV Series Routers Management Interface Remote Command Execution and Denial of Service Vulnerabilities | Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. These vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. | [
"cpe:2.3:o:cisco:rv016_multi-wan_vpn_router_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv016_multi-wan_vpn_router:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv042_dual_wan_vpn_router_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv042_dual_wan_vpn_router:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv042g_dual_gigabit_wan_vpn_router_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv042g_dual_gigabit_wan_vpn_router:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv082_dual_wan_vpn_router_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv082_dual_wan_vpn_router:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv320_dual_gigabit_wan_vpn_router_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv320_dual_gigabit_wan_vpn_router:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv325_dual_gigabit_wan_vpn_router_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv325_dual_gigabit_wan_vpn_router:-:*:*:*:*:*:*:*"
]
| null | 7.2 | null | null | null |
GHSA-5mwv-pv28-2ghw | The Bello - Directory & Listing WordPress theme before 1.6.0 did not sanitise the bt_bb_listing_field_price_range_to, bt_bb_listing_field_now_open, bt_bb_listing_field_my_lng, listing_list_view and bt_bb_listing_field_my_lat parameters before using them in a SQL statement, leading to SQL Injection issues | []
| null | null | null | null | null |
|
CVE-2014-125105 | Broken Link Checker Plugin Settings Page core.php options_page cross site scripting | A vulnerability was found in Broken Link Checker Plugin up to 1.10.1 on WordPress. It has been declared as problematic. Affected by this vulnerability is the function options_page of the file core/core.php of the component Settings Page. The manipulation of the argument exclusion_list/blc_custom_fields leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.10.2 is able to address this issue. The patch is named 90615fe9b0b6f9e6fb254d503c302e53a202e561. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-230659. | [
"cpe:2.3:a:managewp:broken_link_checker:*:*:*:*:*:wordpress:*:*"
]
| null | 2.4 | 2.4 | 3.3 | https://github.com/wp-plugins/broken-link-checker/commit/90615fe9b0b6f9e6fb254d503c302e53a202e561 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.