id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2024-2952
Server-Side Template Injection in BerriAI/litellm
BerriAI/litellm is vulnerable to Server-Side Template Injection (SSTI) via the `/completions` endpoint. The vulnerability arises from the `hf_chat_template` method processing the `chat_template` parameter from the `tokenizer_config.json` file through the Jinja template engine without proper sanitization. Attackers can exploit this by crafting malicious `tokenizer_config.json` files that execute arbitrary code on the server.
[ "cpe:2.3:a:berriai:litellm:*:*:*:*:*:*:*:*" ]
null
null
9.8
null
GHSA-66h3-v5f7-5w52
PHP Scripts Mall PHP Multivendor Ecommerce has SQL Injection via the shopping-cart.php cusid parameter.
[]
null
null
9.8
null
CVE-2024-9924
Hgiga OAKlouds - Arbitrary File Read And Delete
The fix for CVE-2024-26261 was incomplete, and and the specific package for OAKlouds from Hgiga remains at risk. Unauthenticated remote attackers still can download arbitrary system files, which may be deleted subsequently .
[ "cpe:2.3:a:hgiga:oaklouds:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2021-46270
JFrog Artifactory before 7.31.10, is vulnerable to Broken Access Control where a project admin user is able to list all available repository names due to insufficient permission validation.
[ "cpe:2.3:a:jfrog:artifactory:*:*:*:*:*:-:*:*" ]
null
2.7
null
null
GHSA-r852-hw69-2f8j
SQL injection vulnerability in the photo-edit subsystem in Piwigo 2.6.x and 2.7.x before 2.7.0beta2 allows remote authenticated administrators to execute arbitrary SQL commands via the associate[] field.
[]
null
null
null
null
CVE-2023-20059
Cisco DNA Center Information Disclosure Vulnerability
A vulnerability in the implementation of the Cisco Network Plug-and-Play (PnP) agent of Cisco DNA Center could allow an authenticated, remote attacker to view sensitive information in clear text. The attacker must have valid low-privileged user credentials. This vulnerability is due to improper role-based access control (RBAC) with the integration of PnP. An attacker could exploit this vulnerability by authenticating to the device and sending a query to an internal API. A successful exploit could allow the attacker to view sensitive information in clear text, which could include configuration files.
[ "cpe:2.3:a:cisco:dna_center:*:*:*:*:*:*:*:*" ]
null
4.3
null
null
CVE-2025-23932
WordPress Quick Count Plugin <= 3.00 - PHP Object Injection vulnerability
Deserialization of Untrusted Data vulnerability in NotFound Quick Count allows Object Injection. This issue affects Quick Count: from n/a through 3.00.
[]
null
9.8
null
null
GHSA-v36p-8f79-m9mx
Cross-site scripting (XSS) vulnerability in admin/search_links.php in Freeway eCommerce 1.4.1.171 allows remote attackers to inject arbitrary web script or HTML via the search_link parameter.
[]
null
null
null
null
CVE-2006-0702
admin/upload.php in imageVue 16.1 allows remote attackers to upload arbitrary files to certain allowed folders via .. (dot dot) sequences in the path parameter. NOTE: due to the lack of details, the specific vulnerability type cannot be determined, although it might be due to directory traversal.
[ "cpe:2.3:a:imagevue:imagevue:0.16.1:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-8m2v-3fvw-xhgv
Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the wepauth parameter at /goform/WifiBasicSet.
[]
null
6.5
null
null
CVE-2019-0023
Juniper ATP: Persistent Cross-Site Scripting vulnerability in the Golden VM menu
A persistent cross-site scripting (XSS) vulnerability in the Golden VM menu of Juniper ATP may allow authenticated user to inject arbitrary script and steal sensitive data and credentials from a web administration session, possibly tricking a follow-on administrative user to perform administrative actions on the device. This issue affects Juniper ATP 5.0 versions prior to 5.0.3.
[ "cpe:2.3:o:juniper:advanced_threat_prevention:*:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:atp400:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:atp700:-:*:*:*:*:*:*:*" ]
null
null
5.4
null
CVE-2021-40086
An issue was discovered in PrimeKey EJBCA before 7.6.0. As part of the configuration of the aliases for SCEP, CMP, EST, and Auto-enrollment, the enrollment secret was reflected on a page (that can only be viewed by an administrator). While hidden from direct view, checking the page source would reveal the secret.
[ "cpe:2.3:a:primekey:ejbca:*:*:*:*:enterprise:*:*:*" ]
null
2.2
null
3.5
CVE-2019-15212
An issue was discovered in the Linux kernel before 5.1.8. There is a double-free caused by a malicious USB device in the drivers/usb/misc/rio500.c driver.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:a:netapp:data_availability_services:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:solidfire_\\&_hci_management_node:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*" ]
null
4.6
null
4.9
GHSA-6h5m-c899-vgw5
obs-server before 1.7.7 allows logins by 'unconfirmed' accounts due to a bug in the REST api implementation.
[]
null
null
null
null
GHSA-46fx-qwv3-wcfm
Race condition in the NSURLConnection cache management functionality in Foundation for Apple Mac OS X 10.4.11 allows remote attackers to execute arbitrary code via unspecified manipulations that cause messages to be sent to a deallocated object.
[]
null
null
null
null
GHSA-2293-ph8w-45mf
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in GregRoss Just Writing Statistics allows SQL Injection.This issue affects Just Writing Statistics: from n/a through 4.7.
[]
null
7.6
null
null
CVE-2006-1628
Adobe LiveCycle Workflow 7.01 and LiveCycle Forum Manager 7.01 allows users to authenticate and perform privileged actions when their account is marked "OBSOLETE" but the account is also active, within the authentication system.
[ "cpe:2.3:a:adobe:livecycle_form_manager:7.01:*:*:*:*:*:*:*" ]
null
null
null
4.6
CVE-2024-33869
An issue was discovered in Artifex Ghostscript before 10.03.1. Path traversal and command execution can occur (via a crafted PostScript document) because of path reduction in base/gpmisc.c. For example, restrictions on use of %pipe% can be bypassed via the aa/../%pipe%command# output filename.
[]
null
5.3
null
null
CVE-2022-39144
A vulnerability has been identified in Parasolid V33.1 (All versions < V33.1.262), Parasolid V33.1 (All versions >= V33.1.262 < V33.1.263), Parasolid V34.0 (All versions < V34.0.252), Parasolid V34.1 (All versions < V34.1.242), Parasolid V35.0 (All versions < V35.0.161), Parasolid V35.0 (All versions >= V35.0.161 < V35.0.164), Simcenter Femap V2022.1 (All versions < V2022.1.3), Simcenter Femap V2022.2 (All versions < V2022.2.2). The affected application contains an out of bounds write past the end of an allocated buffer while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-17494)
[ "cpe:2.3:a:siemens:simcenter_femap:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:parasolid:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-fr7x-2p56-7pxr
Vulnerability in the Oracle SOA Suite component of Oracle Fusion Middleware (subcomponent: Fabric Layer). The supported version that is affected is 11.1.1.7.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle SOA Suite. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle SOA Suite, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle SOA Suite accessible data as well as unauthorized update, insert or delete access to some of Oracle SOA Suite accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
[]
null
null
8.2
null
GHSA-86vp-x3pr-79rx
Apache Airflow cross-site scripting due to incomplete fix for CVE-2020-13944
The `origin` parameter passed to some of the endpoints like `/trigger` was vulnerable to XSS exploit. This issue affects Apache Airflow versions prior to 1.10.15. This is same as CVE-2020-13944 but the implemented fix in Airflow 1.10.13 did not fix the issue completely.
[]
null
6.1
null
null
GHSA-h2x7-2ff6-v32p
gobase subject to Incorrect routing of some HTTP requests when using httpauth due to a race condition
ImpactIncorrect routing of some HTTP requests when using httpauth due to a race conditionPatchesUpgrade to version 0.7.2 for fixWorkaroundsNoneFor more informationIf you have any questions or comments about this advisory:Email us at [[email protected]](mailto:[email protected])
[]
null
3.7
null
null
CVE-2016-6812
The HTTP transport module in Apache CXF prior to 3.0.12 and 3.1.x prior to 3.1.9 uses FormattedServiceListWriter to provide an HTML page which lists the names and absolute URL addresses of the available service endpoints. The module calculates the base URL using the current HttpServletRequest. The calculated base URL is used by FormattedServiceListWriter to build the service endpoint absolute URLs. If the unexpected matrix parameters have been injected into the request URL then these matrix parameters will find their way back to the client in the services list page which represents an XSS risk to the client.
[ "cpe:2.3:a:apache:cxf:*:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:3.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:3.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:3.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:3.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cxf:3.1.8:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
CVE-2005-1290
Multiple cross-site scripting (XSS) vulnerabilities in phpBB 2.0.14 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) u parameter to profile.php, (2) highlight parameter to viewtopic.php, or (3) forumname or forumdesc parameters to admin_forums.php.
[ "cpe:2.3:a:phpbb_group:phpbb:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:phpbb_group:phpbb:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpbb_group:phpbb:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:phpbb_group:phpbb:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:phpbb_group:phpbb:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:phpbb_group:phpbb:2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:phpbb_group:phpbb:2.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:phpbb_group:phpbb:2.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:phpbb_group:phpbb:2.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:phpbb_group:phpbb:2.0.8a:*:*:*:*:*:*:*", "cpe:2.3:a:phpbb_group:phpbb:2.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:phpbb_group:phpbb:2.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:phpbb_group:phpbb:2.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:phpbb_group:phpbb:2.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:phpbb_group:phpbb:2.0.13:*:*:*:*:*:*:*", "cpe:2.3:a:phpbb_group:phpbb:2.0.14:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-jxhx-66x5-h397
IBM Security Verify Access OIDC Provider could disclose directory information that could aid attackers in further attacks against the system. IBM X-Force ID: 239445.
[]
null
5.3
null
null
GHSA-8c72-3wxv-57h3
Nik Sharpener Pro, possibly 2.0, uses world-writable permissions for plug-in files, which allows local users to gain privileges by replacing a plug-in with a Trojan horse.
[]
null
null
null
null
CVE-2002-1676
BindView NetInventory 1.0, when used with NetRC 1.0, allows local users to read sensitive information (passwords) by deleting the HOSTCFG._NI file and forcing an audit, which rewrites the HOSTCFG._NI to HOSTCFG.INI and stores the passwords in cleartext until the audit is complete.
[ "cpe:2.3:a:bindview:netinventory:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:bindview:netrc:1.0:*:*:*:*:*:*:*" ]
null
null
null
2.1
CVE-2017-2293
Versions of Puppet Enterprise prior to 2016.4.5 or 2017.2.1 shipped with an MCollective configuration that allowed the package plugin to install or remove arbitrary packages on all managed agents. This release adds default configuration to not allow these actions. Customers who rely on this functionality can change this policy.
[ "cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:2016.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:2016.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:2017.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:2017.1.1:*:*:*:*:*:*:*" ]
null
null
4.9
5.5
GHSA-mrxv-65rv-6hxq
OpenStack Keystone does not invalidate existing tokens when granting or revoking roles
OpenStack Keystone before 2012.1.3 does not invalidate existing tokens when granting or revoking roles, which allows remote authenticated users to retain the privileges of the revoked roles.
[]
null
null
null
null
CVE-2022-49214
powerpc/64s: Don't use DSISR for SLB faults
In the Linux kernel, the following vulnerability has been resolved: powerpc/64s: Don't use DSISR for SLB faults Since commit 46ddcb3950a2 ("powerpc/mm: Show if a bad page fault on data is read or write.") we use page_fault_is_write(regs->dsisr) in __bad_page_fault() to determine if the fault is for a read or write, and change the message printed accordingly. But SLB faults, aka Data Segment Interrupts, don't set DSISR (Data Storage Interrupt Status Register) to a useful value. All ISA versions from v2.03 through v3.1 specify that the Data Segment Interrupt sets DSISR "to an undefined value". As far as I can see there's no mention of SLB faults setting DSISR in any BookIV content either. This manifests as accesses that should be a read being incorrectly reported as writes, for example, using the xmon "dump" command: 0:mon> d 0x5deadbeef0000000 5deadbeef0000000 [359526.415354][ C6] BUG: Unable to handle kernel data access on write at 0x5deadbeef0000000 [359526.415611][ C6] Faulting instruction address: 0xc00000000010a300 cpu 0x6: Vector: 380 (Data SLB Access) at [c00000000ffbf400] pc: c00000000010a300: mread+0x90/0x190 If we disassemble the PC, we see a load instruction: 0:mon> di c00000000010a300 c00000000010a300 89490000 lbz r10,0(r9) We can also see in exceptions-64s.S that the data_access_slb block doesn't set IDSISR=1, which means it doesn't load DSISR into pt_regs. So the value we're using to determine if the fault is a read/write is some stale value in pt_regs from a previous page fault. Rework the printing logic to separate the SLB fault case out, and only print read/write in the cases where we can determine it. The result looks like eg: 0:mon> d 0x5deadbeef0000000 5deadbeef0000000 [ 721.779525][ C6] BUG: Unable to handle kernel data access at 0x5deadbeef0000000 [ 721.779697][ C6] Faulting instruction address: 0xc00000000014cbe0 cpu 0x6: Vector: 380 (Data SLB Access) at [c00000000ffbf390] 0:mon> d 0 0000000000000000 [ 742.793242][ C6] BUG: Kernel NULL pointer dereference at 0x00000000 [ 742.793316][ C6] Faulting instruction address: 0xc00000000014cbe0 cpu 0x6: Vector: 380 (Data SLB Access) at [c00000000ffbf390]
[]
null
null
null
null
GHSA-h3vj-c927-89ww
Arbitrary Code Execution through Sanitizer Bypass in GitHub repository jgraph/drawio prior to 18.0.0. - Arbitrary (remote) code execution in the desktop app. - Stored XSS in the web app.
[]
null
9.6
null
null
GHSA-c89v-fg7j-r5qj
Vanna v0.3.4 is vulnerable to SQL injection in its DuckDB integration exposed to its Flask Web APIs. Attackers can inject malicious SQL training data and generate corresponding queries to write arbitrary files on the victim's file system, such as backdoor.php with contents `<?php system($_GET[0]); ?>`. This can lead to command execution or the creation of backdoors.
[]
null
null
9.8
null
GHSA-w6pc-jf6c-2mr8
Puppet Enterprise before 3.0.1 does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.
[]
null
null
null
null
CVE-2023-40170
cross-site inclusion (XSSI) of files in jupyter-server
jupyter-server is the backend for Jupyter web applications. Improper cross-site credential checks on `/files/` URLs could allow exposure of certain file contents, or accessing files when opening untrusted files via "Open image in new tab". This issue has been addressed in commit `87a49272728` which has been included in release `2.7.2`. Users are advised to upgrade. Users unable to upgrade may use the lower performance `--ContentsManager.files_handler_class=jupyter_server.files.handlers.FilesHandler`, which implements the correct checks.
[ "cpe:2.3:a:jupyter:jupyter_server:*:*:*:*:*:*:*:*" ]
null
4.6
null
null
CVE-2023-40293
Harman Infotainment 20190525031613 and later allows command injection via unauthenticated RPC with a D-Bus connection object.
[ "cpe:2.3:a:samsung:harman_infotainment:20190525031613:*:*:*:*:*:*:*" ]
null
6.8
null
null
GHSA-43h5-8p3v-hfvv
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in aniketji007 Ultimate Flipbox Addon for Elementor allows Stored XSS.This issue affects Ultimate Flipbox Addon for Elementor: from n/a through .4.
[]
null
6.5
null
null
CVE-2022-46774
IBM Manage Application security bypass
IBM Manage Application 8.8.0 and 8.9.0 in the IBM Maximo Application Suite is vulnerable to incorrect default permissions which could give access to a user to actions that they should not have access to. IBM X-Force ID: 242953.
[ "cpe:2.3:a:ibm:manage_application:8.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:manage_application:8.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_application_suite:8.8.0:*:*:*:*:*:*:*" ]
null
5.4
null
null
CVE-2013-6966
Open redirect vulnerability in Cisco WebEx Training Center allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors, aka Bug ID CSCul36031.
[ "cpe:2.3:a:cisco:webex_training_center:-:*:*:*:*:*:*:*" ]
null
null
null
5.8
CVE-2008-7083
Multiple SQL injection vulnerabilities in ReVou Micro Blogging Twitter clone allow remote attackers to execute arbitrary SQL commands via the (1) username and (2) password fields.
[ "cpe:2.3:a:revou:micro_blogging_twitter_clone:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-hwgv-8256-p54x
In the Linux kernel, the following vulnerability has been resolved:drm/amdgpu: Reset IH OVERFLOW_CLEAR bitAllows us to detect subsequent IH ring buffer overflows as well.
[]
null
5.5
null
null
GHSA-gcm9-cc3r-c6vj
Cross-site Scripting (XSS) in Eclipse Theia
In Eclipse Theia versions up to and including 1.2.0, the Markdown Preview (@theia/preview), can be exploited to execute arbitrary code.
[]
null
9.6
null
null
RHSA-2022:6174
Red Hat Security Advisory: firefox security update
Mozilla: Address bar spoofing via XSLT error handling Mozilla: Cross-origin XSLT Documents would have inherited the parent's permissions Mozilla: Data race and potential use-after-free in PK11_ChangePW Mozilla: Memory safety bugs fixed in Firefox 104 and Firefox ESR 102.2 Mozilla: Memory safety bugs fixed in Firefox 104, Firefox ESR 102.2, and Firefox ESR 91.13
[ "cpe:/a:redhat:enterprise_linux:9::appstream" ]
null
8.8
7.5
null
CVE-2023-3024
Bluetooth LE segmented 'prepare write response' packet may lead to out-of-bounds memory access
Forcing the Bluetooth LE stack to segment 'prepare write response' packets can lead to an out-of-bounds memory access.
[ "cpe:2.3:a:silabs:gecko_software_development_kit:*:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:csrb31024:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*" ]
null
5.9
null
null
GHSA-vw47-mr44-3jf9
Confused Deputy in Kubernetes
A security issue was discovered with Kubernetes that could enable users to send network traffic to locations they would otherwise not have access to via a confused deputy attack.
[]
null
3.1
null
null
CVE-2020-8493
A stored XSS vulnerability in Kronos Web Time and Attendance (webTA) affects 3.8.x and later 3.x versions before 4.0 via multiple input fields (Login Message, Banner Message, and Password Instructions) of the com.threeis.webta.H261configMenu servlet via an authenticated administrator.
[ "cpe:2.3:a:kronos:web_time_and_attendance:*:*:*:*:*:*:*:*" ]
null
null
6.9
null
RHSA-2021:5170
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.10 security update
undertow: potential security issue in flow control over HTTP/2 may lead to DOS wildfly-elytron: possible timing attack in ScramServer wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users resteasy: Error message exposes endpoint class information jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck xml-security: XPath Transform abuse allows for information disclosure
[ "cpe:/a:redhat:red_hat_single_sign_on:7" ]
null
7.5
null
null
CVE-2021-39217
OpenMage LTS arbitrary command execution in custom layout update through blocks
OpenMage LTS is an e-commerce platform. Prior to versions 19.4.22 and 20.0.19, Custom Layout enabled admin users to execute arbitrary commands via block methods. Versions 19.4.22 and 20.0.19 contain patches for this issue.
[ "cpe:2.3:a:openmage:magento:*:*:*:*:lts:*:*:*" ]
null
7.2
null
null
GHSA-x3q7-hmmp-xprv
Malwarebytes Anti-Exploit 4.4.0.220 is vulnerable to arbitrary file deletion and denial of service via an ALPC message in which FullFileNamePath lacks a '\0' character.
[]
null
7.1
null
null
CVE-2025-25042
Authenticated Access Control Vulnerability allows Sensitive Information Disclosure in AOS-CX REST Interface
A vulnerability in the AOS-CX REST interface could allow an authenticated remote attacker with low privileges to view sensitive information. Successful exploitation could allow an attacker to read encrypted credentials of other users on the switch, potentially leading to further unauthorized access or data breaches.
[]
null
4.3
null
null
GHSA-pxvj-4wx4-gv6w
The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification. As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.
[]
null
5.3
null
null
GHSA-cjmw-x525-6p4f
Possible buffer overflow due to improper data validation of external commands sent via DIAG interface in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
[]
null
5.5
null
null
CVE-2005-1341
Apple Terminal 1.4.4 allows attackers to execute arbitrary commands via terminal escape sequences.
[ "cpe:2.3:a:apple:terminal:1.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*" ]
null
null
null
5.1
CVE-2017-8821
In Tor before 0.2.5.16, 0.2.6 through 0.2.8 before 0.2.8.17, 0.2.9 before 0.2.9.14, 0.3.0 before 0.3.0.13, and 0.3.1 before 0.3.1.9, an attacker can cause a denial of service (application hang) via crafted PEM input that signifies a public key requiring a password, which triggers an attempt by the OpenSSL library to ask the user for the password, aka TROVE-2017-011.
[ "cpe:2.3:a:tor_project:tor:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
null
7.5
5
RHSA-2024:11237
Red Hat Security Advisory: libsndfile:1.0.31 security update
libsndfile: Segmentation fault error in ogg_vorbis.c:417 vorbis_analysis_wrote()
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
5.5
null
null
GHSA-4fwf-7mx6-7ph9
Self - Stored XSS exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code in the view 'log' as it insecurely prints the 'Log Message' value on the web page without applying any proper filtration. This relates to the view=logs value.
[]
null
null
6.1
null
GHSA-58g4-8h86-63xr
Cross-site scripting (XSS) vulnerability in org/chromium/chrome/browser/UrlUtilities.java in Google Chrome before 44.0.2403.89 on Android allows remote attackers to inject arbitrary web script or HTML via a crafted intent: URL, as demonstrated by a trailing alert(document.cookie);// substring, aka "Universal XSS (UXSS)."
[]
null
null
null
null
CVE-2025-36004
IBM i privilege escalation
IBM i 7.2, 7.3, 7.4, and 7.5 could allow a user to gain elevated privileges due to an unqualified library call in IBM Facsimile Support for i. A malicious actor could cause user-controlled code to run with administrator privilege.
[ "cpe:2.3:a:ibm:i:7.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:i:7.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:i:7.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:i:7.5:*:*:*:*:*:*:*" ]
null
8.8
null
null
CVE-2025-20008
Insecure inherited permissions for some Intel(R) Simics(R) Package Manager software before version 1.12.0 may allow a privileged user to potentially enable escalation of privilege via local access.
[]
5.4
7.7
null
null
GHSA-vxw6-wm7v-4qx6
libmpeg2 in libstagefright in Android 6.x before 2016-03-01 allows attackers to obtain sensitive information, and consequently bypass an unspecified protection mechanism, via crafted Bitstream data, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 25765591.
[]
null
null
5.3
null
CVE-2021-27398
A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V16.0.5). The PlantSimCore.dll library lacks proper validation of user-supplied data when parsing SPP files. This could result in a stack based buffer overflow, a different vulnerability than CVE-2021-27396. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-13290)
[ "cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
GHSA-fqg4-3q52-9x7c
A vulnerability, which was classified as critical, has been found in Bylancer QuickOrder 6.3.7. Affected by this issue is some unknown functionality of the file /blog of the component GET Parameter Handler. The manipulation of the argument s leads to sql injection. The attack may be launched remotely. The identifier of this vulnerability is VDB-234236. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[]
null
null
6.3
null
GHSA-3f8f-56cp-m994
A CSV injection vulnerability in Taiga v6.8.1 allows attackers to execute arbitrary code via uploading a crafted CSV file.
[]
null
8.8
null
null
CVE-2019-18236
Multiple buffer overflow vulnerabilities exist when the PLC Editor Version 1.3.5_20190129 processes project files. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application.
[ "cpe:2.3:a:we-con:plc_editor:1.3.5:20190129:*:*:*:*:*:*" ]
null
7.8
null
6.8
CVE-2023-28448
Versionize is lacking bound checks, potentially leading to out of bounds memory access
Versionize is a framework for version tolerant serializion/deserialization of Rust data structures, designed for usecases that need fast deserialization times and minimal size overhead. An issue was discovered in the ‘Versionize::deserialize’ implementation provided by the ‘versionize’ crate for ‘vmm_sys_utils::fam::FamStructWrapper', which can lead to out of bounds memory accesses. The impact started with version 0.1.1. The issue was corrected in version 0.1.10 by inserting a check that verifies, for any deserialized header, the lengths of compared flexible arrays are equal and aborting deserialization otherwise.
[ "cpe:2.3:a:versionize_project:versionize:*:*:*:*:*:rust:*:*" ]
null
5.7
null
null
GHSA-r459-g36p-564m
Unknown vulnerability in BIND 9.2.0 in HP-UX B.11.00, B.11.11, and B.11.23 allows remote attackers to cause a denial of service.
[]
null
null
null
null
CVE-2024-4582
Faraday GM8181/GM828x NTP Service os command injection
A vulnerability classified as critical has been found in Faraday GM8181 and GM828x up to 20240429. Affected is an unknown function of the component NTP Service. The manipulation of the argument ntp_srv leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-263304.
[ "cpe:2.3:a:faraday:gm8181:20240429:*:*:*:*:*:*:*", "cpe:2.3:a:faraday:gm828x:20240429:*:*:*:*:*:*:*" ]
null
7.3
7.3
7.5
CVE-2016-5871
In all Qualcomm products with Android releases from CAF using the Linux kernel, an integer overflow to buffer overflow vulnerability exists when loading an image file.
[ "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
null
null
9.8
10
GHSA-46v3-9g82-r8f2
FATEK Automation WinProladder versions 3.30 and prior is vulnerable to an out-of-bounds read, which may allow an attacker to read unauthorized information.
[]
null
null
null
null
CVE-2004-0245
Web Crossing 4.x and 5.x allows remote attackers to cause a denial of service (crash) by sending a HTTP POST request with a large or negative Content-Length, which causes an integer divide-by-zero.
[ "cpe:2.3:a:web_crossing_inc:web_crossing:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:web_crossing_inc:web_crossing:5.0:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-rjcm-vx5r-p83h
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
[]
null
null
null
null
GHSA-r86w-fr4c-7rfq
EyesOfNetwork Web Interface v5.3 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the component /lilac/main.php.
[]
null
6.1
null
null
GHSA-f4v8-58f6-mwj4
org.xwiki.platform:xwiki-platform-flamingo-theme-ui Eval Injection vulnerability
ImpactAny user with view rights on commonly accessible documents can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the `documentTree` macro parameters in This macro is installed by default in `FlamingoThemesCode.WebHome`. This page is installed by default.Example of reproduction: Open `<xwiki_host>/xwiki/bin/view/%22%20%2F%7D%7D%20%7B%7Basync%20async%3D%22true%22%20cached%3D%22false%22%20context%3D%22doc.reference%22%7D%7D%7B%7Bgroovy%7D%7Dprintln(%22Hello%20%22%20%2B%20%22from%20groovy!%22)%7B%7B%2Fgroovy%7D%7D%7B%7B%2Fasync%7D%7D?sheet=FlamingoThemesCode.WebHome&xpage=view` where `<xwiki_host>` is the URL of your XWiki installation.The [documentTree] macro is a standalone macro and it cannot be used inline. Click on this message for details. Hello from groovy!.WebHome" /}}is displayed. This shows that the Groovy macro that is passed in the URL has been executed and thus demonstrates a privilege escalation from view to programming rights.PatchesThe vulnerability has been patched in XWiki 13.10.11, 14.4.7 and 14.10.WorkaroundsThe issue can be fixed by replacing the code of `FlamingoThemesCode.WebHome` by the [patched version](https://github.com/xwiki/xwiki-platform/commit/80d5be36f700adcd56b6c8eb3ed8b973f62ec0ae).Referenceshttps://jira.xwiki.org/browse/XWIKI-20279https://github.com/xwiki/xwiki-platform/commit/80d5be36f700adcd56b6c8eb3ed8b973f62ec0aeFor more informationIf you have any questions or comments about this advisory:Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)Email us at [Security Mailing List](mailto:[email protected])
[]
null
9.9
null
null
CVE-2023-4606
An authenticated XCC user with Read-Only permission can change a different user’s password through a crafted API command.   This affects ThinkSystem v2 and v3 servers with XCC; ThinkSystem v1 servers are not affected.
[ "cpe:2.3:o:lenovo:thinkagile_hx5530_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx5530:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx7530_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx7530:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx3331_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx3331:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx1331_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx1331:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx2330_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx2330:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx2331_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx2331:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx3330_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx3330:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx3331_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx3331:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx3375_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx3375:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx3376_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx3376:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx5531_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx5531:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx7531_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx7531:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx3330-f_all-flash_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx3330-f_all-flash:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx3330-h_hybrid_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx3330-h_hybrid:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx3331-f_all-flash_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx3331-f_all-flash:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx3331-h_hybrid_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx3331-h_hybrid:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx3530_f_all_flash_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx3530_f_all_flash:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx3530-h_hybrid_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx3530-h_hybrid:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx3531_h_hybrid_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx3531_h_hybrid:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx3531-f_all-flash_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx3531-f_all-flash:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx2330_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx2330:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx3330_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx3330:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx3530-g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx3530-g:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx5530_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx5530:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx7330_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx7330:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx7530_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx7530:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx7531_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx7531:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sd630_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sd630_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sd650_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sd650_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sd650_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sd650-n_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sd650-n_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sd665_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sn550_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sn550_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr250_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr250_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr258_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr258_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr630_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr630_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr630_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr635_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr645_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr645:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr645_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr645_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr650_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr650_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr650_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr655_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr665_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr665:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr665_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr670_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr670:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr670_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr670_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr675_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr850_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr850_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr850_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr860_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr860_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr860_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_st250_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_st250_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_st258_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_st258_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_st650_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_st650_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_st650_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_st658_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_st658_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_st658_v3_firmware:-:*:*:*:*:*:*:*" ]
null
8.1
null
null
CVE-2020-12920
A potential denial of service issue exists in the AMD Display driver Escape 0x130007 Call handler. An attacker with low privilege could potentially induce a Windows BugCheck.
[ "cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*" ]
null
5.5
null
2.1
CVE-2014-3392
The Clientless SSL VPN portal in Cisco ASA Software 8.2 before 8.2(5.51), 8.3 before 8.3(2.42), 8.4 before 8.4(7.23), 8.6 before 8.6(1.15), 9.0 before 9.0(4.24), 9.1 before 9.1(5.12), 9.2 before 9.2(2.8), and 9.3 before 9.3(1.1) allows remote attackers to obtain sensitive information from process memory or modify memory contents via crafted parameters, aka Bug ID CSCuq29136.
[ "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.0.45:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2.10:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2.12:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2.16:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2.17:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.13:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.22:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.26:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.33:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.40:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.41:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.46:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.48:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.50:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1.6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.13:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.23:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.25:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.31:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.33:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.34:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.37:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.39:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.40:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.41:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.1.11:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.3.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.3.9:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.9:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.5.6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.15:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.22:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.10:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.12:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.13:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.14:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.2.10:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3.6:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.7:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.17:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.20:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.24:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.10:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.12:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.15:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.1.1:*:*:*:*:*:*:*" ]
null
null
null
8.3
CVE-2019-9827
Hawt Hawtio through 2.5.0 is vulnerable to SSRF, allowing a remote attacker to trigger an HTTP request from an affected server to an arbitrary host via the initial /proxy/ substring of a URI.
[ "cpe:2.3:a:hawt:hawtio:*:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
CVE-2019-0174
Logic condition in specific microprocessors may allow an authenticated user to potentially enable partial physical address information disclosure via local access.
[ "cpe:2.3:o:intel:i9-9900x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i9-9900x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i9-9920x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i9-9920x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i9-9960x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i9-9960x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i9-9980xe_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i9-9980xe:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i9-9940x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i9-9940x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i9-7960x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i9-7960x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i9-7980xe_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i9-7980xe:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i9-7940x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i9-7940x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i9-7920x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i9-7920x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i9-7900x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i9-7900x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i7-7820x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i7-7820x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i7-7800x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i7-7800x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4422e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4422e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4410e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4410e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4402ec_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4402ec:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4402e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4402e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4400e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4400e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4460t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4460t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4460s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4460s:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4460_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4460:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4440s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4440s:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4440_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4440:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4430s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4430s:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4300m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4300m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4300u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4300u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4300y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4300y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4302y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4302y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4308u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4308u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4310m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4310m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4310u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4310u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4330m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4330m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4340m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4340m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4350u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4350u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4360u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4360u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4200h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4200h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4200m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4200m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4200u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4200u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4200y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4200y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4202y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4202y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4210h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4210h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4210m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4210m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4210u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4210u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4210y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4210y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4220y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4220y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4250u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4250u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4258u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4258u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4260u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4260u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4278u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4278u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i5-4288u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i5-4288u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4330_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4330:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4330t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4330t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4330te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4330te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4340_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4340:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4340te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4340te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4350_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4350:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4350t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4350t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4360_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4360:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4360t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4360t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4370_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4370:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4370t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4370t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4100e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4100e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4100m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4100m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4100u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4100u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4102e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4102e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4110e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4110e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4110m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4110m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4112e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4112e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4120u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4120u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4158u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4158u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4170t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4170t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4170_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4170:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4160t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4160t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4160_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4160:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4150t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4150t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4150:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4130t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4130t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4130_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4130:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4000m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4000m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4005u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4005u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4010u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4010u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4010y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4010y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4012y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4012y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4020y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4020y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4025u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4025u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4030u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4030u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:i3-4030y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:i3-4030y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:3550m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:3550m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:3556u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:3556u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:3558u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:3558u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:3560m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:3560m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:3560y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:3560y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:3561y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:3561y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:3805u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:3805u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:3825u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:3825u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:2981u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:2981u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:2980u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:2980u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:2970m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:2970m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:2961y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:2961y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:2957u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:2957u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:2955u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:2955u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:2950m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:2950m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:2002e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:2002e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:2000e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:2000e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-8893_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e7-8893:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-8891_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e7-8891:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-8890_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e7-8890:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-8880l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e7-8880l:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-8880_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e7-8880:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-8870_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e7-8870:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-8867_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e7-8867:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-8860_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e7-8860:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-4850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e7-4850:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-4830_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e7-4830:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-4820_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e7-4820:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e7-4809_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e7-4809:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2699_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2699:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-4669_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-4669:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2438l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2438l:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-1428l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-1428l:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-4667_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-4667:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2428l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2428l:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-1620_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-1620:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-4660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-4660:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2418l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2418l:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-1630_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-1630:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2698_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2698:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-4655_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-4655:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2408l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2408l:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2697_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2697:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-1650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-1650:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-4650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-4650:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-1660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-1660:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-4648_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-4648:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-1680_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-1680:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2695_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2695:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-4640_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-4640:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2690_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2690:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-4627_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-4627:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2687w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2687w:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-4620_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-4620:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-4610_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-4610:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2683_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2683:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2680_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2680:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2670_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2670:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2667_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2667:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2660:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2658a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2658a:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2658_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2658:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2650l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2650l:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2650:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2648l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2648l:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2643_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2643:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2640_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2640:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2637_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2637:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2630l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2630l:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2630_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2630:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2628l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2628l:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2623_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2623:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2620_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2620:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2618l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2618l:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2609_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2609:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2608l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2608l:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e5-2603_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e5-2603:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1286l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1286l:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1286_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1286:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1285l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1285l:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1285_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1285:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1281_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1281:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1280_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1280:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1276_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1276:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1275l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1275l:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1270_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1270:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1268l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1268l:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1271_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1271:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1275_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1275:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1265l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1265l:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1246_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1246:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1245_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1245:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1241_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1241:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1240l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1240l:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1240_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1240:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1231_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1231:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1230l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1230l:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1230_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1230:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1226_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1226:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1225_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1225:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1220l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1220l:3:*:*:*:*:*:*:*", "cpe:2.3:o:intel:e3-1220_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:e3-1220:3:*:*:*:*:*:*:*" ]
null
null
3.3
2.1
GHSA-75cq-q7qc-2mc2
TOTOLINK EX200 V4.0.3c.7646_B20201211 was discovered to contain a remote code execution (RCE) vulnerability via the FileName parameter in the setUpgradeFW function.
[]
null
8.8
null
null
CVE-2023-0722
The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_save_state function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin.
[ "cpe:2.3:a:wickedplugins:wicked_folders:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
GHSA-8725-gx62-5qhc
Cross-Site Request Forgery (CSRF) vulnerability in Turcu Ciprian Advanced Fancybox allows Stored XSS.This issue affects Advanced Fancybox: from n/a through 1.1.1.
[]
null
7.1
null
null
CVE-2021-3826
Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.
[ "cpe:2.3:a:gnu:gcc:11.2:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*" ]
null
6.5
null
null
ICSA-19-281-03
Siemens SIMATIC WinAC RTX (F) 2010 (Update A)
Affected versions of the software contain a vulnerability that could allow an unauthenticated attacker to trigger a denial-of-service condition. The vulnerability can be triggered if a large HTTP request is sent to the executing service. The security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise availability of the service provided by the software.
[]
null
7.5
null
null
GHSA-jpgj-9vvg-wqmh
Memory corruption vulnerability in the driver file component in McAfee GetSusp prior to 4.0.0 could allow a program being investigated on the local machine to trigger a buffer overflow in GetSusp, leading to the execution of arbitrary code, potentially triggering a BSOD.
[]
null
7.8
null
null
CVE-2024-39488
arm64: asm-bug: Add .align 2 to the end of __BUG_ENTRY
In the Linux kernel, the following vulnerability has been resolved: arm64: asm-bug: Add .align 2 to the end of __BUG_ENTRY When CONFIG_DEBUG_BUGVERBOSE=n, we fail to add necessary padding bytes to bug_table entries, and as a result the last entry in a bug table will be ignored, potentially leading to an unexpected panic(). All prior entries in the table will be handled correctly. The arm64 ABI requires that struct fields of up to 8 bytes are naturally-aligned, with padding added within a struct such that struct are suitably aligned within arrays. When CONFIG_DEBUG_BUGVERPOSE=y, the layout of a bug_entry is: struct bug_entry { signed int bug_addr_disp; // 4 bytes signed int file_disp; // 4 bytes unsigned short line; // 2 bytes unsigned short flags; // 2 bytes } ... with 12 bytes total, requiring 4-byte alignment. When CONFIG_DEBUG_BUGVERBOSE=n, the layout of a bug_entry is: struct bug_entry { signed int bug_addr_disp; // 4 bytes unsigned short flags; // 2 bytes < implicit padding > // 2 bytes } ... with 8 bytes total, with 6 bytes of data and 2 bytes of trailing padding, requiring 4-byte alginment. When we create a bug_entry in assembly, we align the start of the entry to 4 bytes, which implicitly handles padding for any prior entries. However, we do not align the end of the entry, and so when CONFIG_DEBUG_BUGVERBOSE=n, the final entry lacks the trailing padding bytes. For the main kernel image this is not a problem as find_bug() doesn't depend on the trailing padding bytes when searching for entries: for (bug = __start___bug_table; bug < __stop___bug_table; ++bug) if (bugaddr == bug_addr(bug)) return bug; However for modules, module_bug_finalize() depends on the trailing bytes when calculating the number of entries: mod->num_bugs = sechdrs[i].sh_size / sizeof(struct bug_entry); ... and as the last bug_entry lacks the necessary padding bytes, this entry will not be counted, e.g. in the case of a single entry: sechdrs[i].sh_size == 6 sizeof(struct bug_entry) == 8; sechdrs[i].sh_size / sizeof(struct bug_entry) == 0; Consequently module_find_bug() will miss the last bug_entry when it does: for (i = 0; i < mod->num_bugs; ++i, ++bug) if (bugaddr == bug_addr(bug)) goto out; ... which can lead to a kenrel panic due to an unhandled bug. This can be demonstrated with the following module: static int __init buginit(void) { WARN(1, "hello\n"); return 0; } static void __exit bugexit(void) { } module_init(buginit); module_exit(bugexit); MODULE_LICENSE("GPL"); ... which will trigger a kernel panic when loaded: ------------[ cut here ]------------ hello Unexpected kernel BRK exception at EL1 Internal error: BRK handler: 00000000f2000800 [#1] PREEMPT SMP Modules linked in: hello(O+) CPU: 0 PID: 50 Comm: insmod Tainted: G O 6.9.1 #8 Hardware name: linux,dummy-virt (DT) pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : buginit+0x18/0x1000 [hello] lr : buginit+0x18/0x1000 [hello] sp : ffff800080533ae0 x29: ffff800080533ae0 x28: 0000000000000000 x27: 0000000000000000 x26: ffffaba8c4e70510 x25: ffff800080533c30 x24: ffffaba8c4a28a58 x23: 0000000000000000 x22: 0000000000000000 x21: ffff3947c0eab3c0 x20: ffffaba8c4e3f000 x19: ffffaba846464000 x18: 0000000000000006 x17: 0000000000000000 x16: ffffaba8c2492834 x15: 0720072007200720 x14: 0720072007200720 x13: ffffaba8c49b27c8 x12: 0000000000000312 x11: 0000000000000106 x10: ffffaba8c4a0a7c8 x9 : ffffaba8c49b27c8 x8 : 00000000ffffefff x7 : ffffaba8c4a0a7c8 x6 : 80000000fffff000 x5 : 0000000000000107 x4 : 0000000000000000 x3 : 0000000000000000 x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff3947c0eab3c0 Call trace: buginit+0x18/0x1000 [hello] do_one_initcall+0x80/0x1c8 do_init_module+0x60/0x218 load_module+0x1ba4/0x1d70 __do_sys_init_module+0x198/0x1d0 __arm64_sys_init_module+0x1c/0x28 invoke_syscall+0x48/0x114 el0_svc ---truncated---
[]
null
null
null
null
GHSA-qp2w-5j73-m364
A use after free issue was addressed with improved memory management. This issue is fixed in macOS Mojave 10.14.6. A remote attacker may be able to cause arbitrary code execution.
[]
null
null
null
null
GHSA-g38h-vjf2-59hp
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
[]
null
7.5
null
null
CVE-2024-1406
Linksys WRT54GL Web Management Interface SysInfo1.htm information disclosure
A vulnerability was found in Linksys WRT54GL 4.30.18. It has been declared as problematic. This vulnerability affects unknown code of the file /SysInfo1.htm of the component Web Management Interface. The manipulation leads to information disclosure. The exploit has been disclosed to the public and may be used. VDB-253330 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:h:linksys:wrt54gl:-:*:*:*:*:*:*:*", "cpe:2.3:o:linksys:wrt54gl_firmware:4.30.18:*:*:*:*:*:*:*" ]
null
4.3
4.3
3.3
RHSA-2021:1544
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.0.4 security update
kiali/kiali-operator: can deploy specified image to any namespace
[ "cpe:/a:redhat:service_mesh:2.0::el8" ]
null
8.8
null
null
GHSA-hqcr-58jc-rrhm
In vowifiservice, there is a possible missing permission check.This could lead to local information disclosure with no additional execution privileges
[]
null
5.5
null
null
GHSA-vc3j-83qc-fgg9
Multiple cross-site request forgery (CSRF) vulnerabilities in MyBB 1.2.11 and earlier allow remote attackers to (1) hijack the authentication of moderators or administrators for requests that delete threads via a do_multideletethreads action to moderation.php and (2) hijack the authentication of arbitrary users for requests that delete private messages (PM) via a delete action to private.php.
[]
null
null
null
null
CVE-2008-0477
Stack-based buffer overflow in the QMPUpgrade.Upgrade.1 ActiveX control in QMPUpgrade.dll 1.0.0.1 in Move Networks Upgrade Manager allows remote attackers to execute arbitrary code via a long first argument to the Upgrade method. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:move_networks_inc:move_media_player:1.0.0.1:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-63fp-wh7p-9g57
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Sam Perrow Pre* Party Resource Hints.This issue affects Pre* Party Resource Hints: from n/a through 1.8.18.
[]
null
7.6
null
null
CVE-2016-8442
Possible unauthorized memory access in the hypervisor. Lack of input validation could allow hypervisor memory to be accessed by the HLOS. Product: Android. Versions: Kernel 3.18. Android ID: A-31625910. QC-CR#1038173.
[ "cpe:2.3:o:linux:linux_kernel:3.18:*:*:*:*:*:*:*" ]
null
null
7.8
7.2
GHSA-92rr-frfh-hpr7
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specifically crafted http get request parameters.
[]
null
9.8
null
null
CVE-2022-46861
WordPress Login Page Styler Plugin <= 6.2 is vulnerable to Cross Site Scripting (XSS)
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Zia Imtiaz Custom Login Page Styler for WordPress plugin <= 6.2 versions.
[ "cpe:2.3:a:web-settler:custom_login_page_styler:*:*:*:*:*:wordpress:*:*" ]
null
5.9
null
null
GHSA-3v34-4mg9-5rvc
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. These vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device.
[]
null
null
null
null
CVE-2021-3557
A flaw was found in argocd. Any unprivileged user is able to deploy argocd in their namespace and with the created ServiceAccount argocd-argocd-server, the unprivileged user is able to read all resources of the cluster including all secrets which might enable privilege escalations. The highest threat from this vulnerability is to data confidentiality.
[ "cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift_gitops:1.1:*:*:*:*:*:*:*" ]
null
6.5
null
4
GHSA-cm2x-4wx2-45q8
A vulnerability, which was classified as critical, has been found in PHPGurukul Medical Card Generation System 1.0. This issue affects some unknown processing of the file /admin/view-enquiry.php of the component View Enquiry Page. The manipulation of the argument viewid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
5.1
4.7
null
null
CVE-2009-1168
Cisco IOS 12.0(32)S12 through 12.0(32)S13 and 12.0(33)S3 through 12.0(33)S4, 12.0(32)SY8 through 12.0(32)SY9, 12.2(33)SXI1, 12.2XNC before 12.2(33)XNC2, 12.2XND before 12.2(33)XND1, and 12.4(24)T1; and IOS XE 2.3 through 2.3.1t and 2.4 through 2.4.0; when RFC4893 BGP routing is enabled, allows remote attackers to cause a denial of service (memory corruption and device reload) by using an RFC4271 peer to send an update with a long series of AS numbers, aka Bug ID CSCsy86021.
[ "cpe:2.3:o:cisco:ios:12.0\\(32\\)s12:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(32\\)s13:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(32\\)sy8:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(32\\)sy9:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(33\\)s3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.0\\(33\\)s4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xnc:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.2xnd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:12.4\\(24\\)t1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:2.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:2.3.1t:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:2.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:2.4.0:*:*:*:*:*:*:*" ]
null
null
null
7.1
CVE-2020-12829
In QEMU through 5.0.0, an integer overflow was found in the SM501 display driver implementation. This flaw occurs in the COPY_AREA macro while handling MMIO write operations through the sm501_2d_engine_write() callback. A local attacker could abuse this flaw to crash the QEMU process in sm501_2d_operation() in hw/display/sm501.c on the host, resulting in a denial of service.
[ "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
3.8
null
2.1