id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2024-2952 | Server-Side Template Injection in BerriAI/litellm | BerriAI/litellm is vulnerable to Server-Side Template Injection (SSTI) via the `/completions` endpoint. The vulnerability arises from the `hf_chat_template` method processing the `chat_template` parameter from the `tokenizer_config.json` file through the Jinja template engine without proper sanitization. Attackers can exploit this by crafting malicious `tokenizer_config.json` files that execute arbitrary code on the server. | [
"cpe:2.3:a:berriai:litellm:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | null |
GHSA-66h3-v5f7-5w52 | PHP Scripts Mall PHP Multivendor Ecommerce has SQL Injection via the shopping-cart.php cusid parameter. | [] | null | null | 9.8 | null |
|
CVE-2024-9924 | Hgiga OAKlouds - Arbitrary File Read And Delete | The fix for CVE-2024-26261 was incomplete, and and the specific package for OAKlouds from Hgiga remains at risk. Unauthenticated remote attackers still can download arbitrary system files, which may be deleted subsequently . | [
"cpe:2.3:a:hgiga:oaklouds:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
CVE-2021-46270 | JFrog Artifactory before 7.31.10, is vulnerable to Broken Access Control where a project admin user is able to list all available repository names due to insufficient permission validation. | [
"cpe:2.3:a:jfrog:artifactory:*:*:*:*:*:-:*:*"
] | null | 2.7 | null | null |
|
GHSA-r852-hw69-2f8j | SQL injection vulnerability in the photo-edit subsystem in Piwigo 2.6.x and 2.7.x before 2.7.0beta2 allows remote authenticated administrators to execute arbitrary SQL commands via the associate[] field. | [] | null | null | null | null |
|
CVE-2023-20059 | Cisco DNA Center Information Disclosure Vulnerability | A vulnerability in the implementation of the Cisco Network Plug-and-Play (PnP) agent of Cisco DNA Center could allow an authenticated, remote attacker to view sensitive information in clear text. The attacker must have valid low-privileged user credentials. This vulnerability is due to improper role-based access control (RBAC) with the integration of PnP. An attacker could exploit this vulnerability by authenticating to the device and sending a query to an internal API. A successful exploit could allow the attacker to view sensitive information in clear text, which could include configuration files. | [
"cpe:2.3:a:cisco:dna_center:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
CVE-2025-23932 | WordPress Quick Count Plugin <= 3.00 - PHP Object Injection vulnerability | Deserialization of Untrusted Data vulnerability in NotFound Quick Count allows Object Injection. This issue affects Quick Count: from n/a through 3.00. | [] | null | 9.8 | null | null |
GHSA-v36p-8f79-m9mx | Cross-site scripting (XSS) vulnerability in admin/search_links.php in Freeway eCommerce 1.4.1.171 allows remote attackers to inject arbitrary web script or HTML via the search_link parameter. | [] | null | null | null | null |
|
CVE-2006-0702 | admin/upload.php in imageVue 16.1 allows remote attackers to upload arbitrary files to certain allowed folders via .. (dot dot) sequences in the path parameter. NOTE: due to the lack of details, the specific vulnerability type cannot be determined, although it might be due to directory traversal. | [
"cpe:2.3:a:imagevue:imagevue:0.16.1:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-8m2v-3fvw-xhgv | Jensen of Scandinavia Eagle 1200AC V15.03.06.33_en was discovered to contain a stack overflow via the wepauth parameter at /goform/WifiBasicSet. | [] | null | 6.5 | null | null |
|
CVE-2019-0023 | Juniper ATP: Persistent Cross-Site Scripting vulnerability in the Golden VM menu | A persistent cross-site scripting (XSS) vulnerability in the Golden VM menu of Juniper ATP may allow authenticated user to inject arbitrary script and steal sensitive data and credentials from a web administration session, possibly tricking a follow-on administrative user to perform administrative actions on the device. This issue affects Juniper ATP 5.0 versions prior to 5.0.3. | [
"cpe:2.3:o:juniper:advanced_threat_prevention:*:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:atp400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:atp700:-:*:*:*:*:*:*:*"
] | null | null | 5.4 | null |
CVE-2021-40086 | An issue was discovered in PrimeKey EJBCA before 7.6.0. As part of the configuration of the aliases for SCEP, CMP, EST, and Auto-enrollment, the enrollment secret was reflected on a page (that can only be viewed by an administrator). While hidden from direct view, checking the page source would reveal the secret. | [
"cpe:2.3:a:primekey:ejbca:*:*:*:*:enterprise:*:*:*"
] | null | 2.2 | null | 3.5 |
|
CVE-2019-15212 | An issue was discovered in the Linux kernel before 5.1.8. There is a double-free caused by a malicious USB device in the drivers/usb/misc/rio500.c driver. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:data_availability_services:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:solidfire_\\&_hci_management_node:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
] | null | 4.6 | null | 4.9 |
|
GHSA-6h5m-c899-vgw5 | obs-server before 1.7.7 allows logins by 'unconfirmed' accounts due to a bug in the REST api implementation. | [] | null | null | null | null |
|
GHSA-46fx-qwv3-wcfm | Race condition in the NSURLConnection cache management functionality in Foundation for Apple Mac OS X 10.4.11 allows remote attackers to execute arbitrary code via unspecified manipulations that cause messages to be sent to a deallocated object. | [] | null | null | null | null |
|
GHSA-2293-ph8w-45mf | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in GregRoss Just Writing Statistics allows SQL Injection.This issue affects Just Writing Statistics: from n/a through 4.7. | [] | null | 7.6 | null | null |
|
CVE-2006-1628 | Adobe LiveCycle Workflow 7.01 and LiveCycle Forum Manager 7.01 allows users to authenticate and perform privileged actions when their account is marked "OBSOLETE" but the account is also active, within the authentication system. | [
"cpe:2.3:a:adobe:livecycle_form_manager:7.01:*:*:*:*:*:*:*"
] | null | null | null | 4.6 |
|
CVE-2024-33869 | An issue was discovered in Artifex Ghostscript before 10.03.1. Path traversal and command execution can occur (via a crafted PostScript document) because of path reduction in base/gpmisc.c. For example, restrictions on use of %pipe% can be bypassed via the aa/../%pipe%command# output filename. | [] | null | 5.3 | null | null |
|
CVE-2022-39144 | A vulnerability has been identified in Parasolid V33.1 (All versions < V33.1.262), Parasolid V33.1 (All versions >= V33.1.262 < V33.1.263), Parasolid V34.0 (All versions < V34.0.252), Parasolid V34.1 (All versions < V34.1.242), Parasolid V35.0 (All versions < V35.0.161), Parasolid V35.0 (All versions >= V35.0.161 < V35.0.164), Simcenter Femap V2022.1 (All versions < V2022.1.3), Simcenter Femap V2022.2 (All versions < V2022.2.2). The affected application contains an out of bounds write past the end of an allocated buffer while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-17494) | [
"cpe:2.3:a:siemens:simcenter_femap:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:parasolid:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
GHSA-fr7x-2p56-7pxr | Vulnerability in the Oracle SOA Suite component of Oracle Fusion Middleware (subcomponent: Fabric Layer). The supported version that is affected is 11.1.1.7.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle SOA Suite. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle SOA Suite, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle SOA Suite accessible data as well as unauthorized update, insert or delete access to some of Oracle SOA Suite accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). | [] | null | null | 8.2 | null |
|
GHSA-86vp-x3pr-79rx | Apache Airflow cross-site scripting due to incomplete fix for CVE-2020-13944 | The `origin` parameter passed to some of the endpoints like `/trigger` was vulnerable to XSS exploit. This issue affects Apache Airflow versions prior to 1.10.15. This is same as CVE-2020-13944 but the implemented fix in Airflow 1.10.13 did not fix the issue completely. | [] | null | 6.1 | null | null |
GHSA-h2x7-2ff6-v32p | gobase subject to Incorrect routing of some HTTP requests when using httpauth due to a race condition | ImpactIncorrect routing of some HTTP requests when using httpauth due to a race conditionPatchesUpgrade to version 0.7.2 for fixWorkaroundsNoneFor more informationIf you have any questions or comments about this advisory:Email us at [[email protected]](mailto:[email protected]) | [] | null | 3.7 | null | null |
CVE-2016-6812 | The HTTP transport module in Apache CXF prior to 3.0.12 and 3.1.x prior to 3.1.9 uses FormattedServiceListWriter to provide an HTML page which lists the names and absolute URL addresses of the available service endpoints. The module calculates the base URL using the current HttpServletRequest. The calculated base URL is used by FormattedServiceListWriter to build the service endpoint absolute URLs. If the unexpected matrix parameters have been injected into the request URL then these matrix parameters will find their way back to the client in the services list page which represents an XSS risk to the client. | [
"cpe:2.3:a:apache:cxf:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:cxf:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:cxf:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:cxf:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:cxf:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:cxf:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:cxf:3.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:cxf:3.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:cxf:3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:cxf:3.1.8:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
CVE-2005-1290 | Multiple cross-site scripting (XSS) vulnerabilities in phpBB 2.0.14 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) u parameter to profile.php, (2) highlight parameter to viewtopic.php, or (3) forumname or forumdesc parameters to admin_forums.php. | [
"cpe:2.3:a:phpbb_group:phpbb:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.8a:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:phpbb_group:phpbb:2.0.14:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-jxhx-66x5-h397 | IBM Security Verify Access OIDC Provider could disclose directory information that could aid attackers in further attacks against the system. IBM X-Force ID: 239445. | [] | null | 5.3 | null | null |
|
GHSA-8c72-3wxv-57h3 | Nik Sharpener Pro, possibly 2.0, uses world-writable permissions for plug-in files, which allows local users to gain privileges by replacing a plug-in with a Trojan horse. | [] | null | null | null | null |
|
CVE-2002-1676 | BindView NetInventory 1.0, when used with NetRC 1.0, allows local users to read sensitive information (passwords) by deleting the HOSTCFG._NI file and forcing an audit, which rewrites the HOSTCFG._NI to HOSTCFG.INI and stores the passwords in cleartext until the audit is complete. | [
"cpe:2.3:a:bindview:netinventory:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bindview:netrc:1.0:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
CVE-2017-2293 | Versions of Puppet Enterprise prior to 2016.4.5 or 2017.2.1 shipped with an MCollective configuration that allowed the package plugin to install or remove arbitrary packages on all managed agents. This release adds default configuration to not allow these actions. Customers who rely on this functionality can change this policy. | [
"cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:2016.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:2016.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:2017.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:2017.1.1:*:*:*:*:*:*:*"
] | null | null | 4.9 | 5.5 |
|
GHSA-mrxv-65rv-6hxq | OpenStack Keystone does not invalidate existing tokens when granting or revoking roles | OpenStack Keystone before 2012.1.3 does not invalidate existing tokens when granting or revoking roles, which allows remote authenticated users to retain the privileges of the revoked roles. | [] | null | null | null | null |
CVE-2022-49214 | powerpc/64s: Don't use DSISR for SLB faults | In the Linux kernel, the following vulnerability has been resolved:
powerpc/64s: Don't use DSISR for SLB faults
Since commit 46ddcb3950a2 ("powerpc/mm: Show if a bad page fault on data
is read or write.") we use page_fault_is_write(regs->dsisr) in
__bad_page_fault() to determine if the fault is for a read or write, and
change the message printed accordingly.
But SLB faults, aka Data Segment Interrupts, don't set DSISR (Data
Storage Interrupt Status Register) to a useful value. All ISA versions
from v2.03 through v3.1 specify that the Data Segment Interrupt sets
DSISR "to an undefined value". As far as I can see there's no mention of
SLB faults setting DSISR in any BookIV content either.
This manifests as accesses that should be a read being incorrectly
reported as writes, for example, using the xmon "dump" command:
0:mon> d 0x5deadbeef0000000
5deadbeef0000000
[359526.415354][ C6] BUG: Unable to handle kernel data access on write at 0x5deadbeef0000000
[359526.415611][ C6] Faulting instruction address: 0xc00000000010a300
cpu 0x6: Vector: 380 (Data SLB Access) at [c00000000ffbf400]
pc: c00000000010a300: mread+0x90/0x190
If we disassemble the PC, we see a load instruction:
0:mon> di c00000000010a300
c00000000010a300 89490000 lbz r10,0(r9)
We can also see in exceptions-64s.S that the data_access_slb block
doesn't set IDSISR=1, which means it doesn't load DSISR into pt_regs. So
the value we're using to determine if the fault is a read/write is some
stale value in pt_regs from a previous page fault.
Rework the printing logic to separate the SLB fault case out, and only
print read/write in the cases where we can determine it.
The result looks like eg:
0:mon> d 0x5deadbeef0000000
5deadbeef0000000
[ 721.779525][ C6] BUG: Unable to handle kernel data access at 0x5deadbeef0000000
[ 721.779697][ C6] Faulting instruction address: 0xc00000000014cbe0
cpu 0x6: Vector: 380 (Data SLB Access) at [c00000000ffbf390]
0:mon> d 0
0000000000000000
[ 742.793242][ C6] BUG: Kernel NULL pointer dereference at 0x00000000
[ 742.793316][ C6] Faulting instruction address: 0xc00000000014cbe0
cpu 0x6: Vector: 380 (Data SLB Access) at [c00000000ffbf390] | [] | null | null | null | null |
GHSA-h3vj-c927-89ww | Arbitrary Code Execution through Sanitizer Bypass in GitHub repository jgraph/drawio prior to 18.0.0. - Arbitrary (remote) code execution in the desktop app. - Stored XSS in the web app. | [] | null | 9.6 | null | null |
|
GHSA-c89v-fg7j-r5qj | Vanna v0.3.4 is vulnerable to SQL injection in its DuckDB integration exposed to its Flask Web APIs. Attackers can inject malicious SQL training data and generate corresponding queries to write arbitrary files on the victim's file system, such as backdoor.php with contents `<?php system($_GET[0]); ?>`. This can lead to command execution or the creation of backdoors. | [] | null | null | 9.8 | null |
|
GHSA-w6pc-jf6c-2mr8 | Puppet Enterprise before 3.0.1 does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session. | [] | null | null | null | null |
|
CVE-2023-40170 | cross-site inclusion (XSSI) of files in jupyter-server | jupyter-server is the backend for Jupyter web applications. Improper cross-site credential checks on `/files/` URLs could allow exposure of certain file contents, or accessing files when opening untrusted files via "Open image in new tab". This issue has been addressed in commit `87a49272728` which has been included in release `2.7.2`. Users are advised to upgrade. Users unable to upgrade may use the lower performance `--ContentsManager.files_handler_class=jupyter_server.files.handlers.FilesHandler`, which implements the correct checks. | [
"cpe:2.3:a:jupyter:jupyter_server:*:*:*:*:*:*:*:*"
] | null | 4.6 | null | null |
CVE-2023-40293 | Harman Infotainment 20190525031613 and later allows command injection via unauthenticated RPC with a D-Bus connection object. | [
"cpe:2.3:a:samsung:harman_infotainment:20190525031613:*:*:*:*:*:*:*"
] | null | 6.8 | null | null |
|
GHSA-43h5-8p3v-hfvv | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in aniketji007 Ultimate Flipbox Addon for Elementor allows Stored XSS.This issue affects Ultimate Flipbox Addon for Elementor: from n/a through .4. | [] | null | 6.5 | null | null |
|
CVE-2022-46774 | IBM Manage Application security bypass | IBM Manage Application 8.8.0 and 8.9.0 in the IBM Maximo Application Suite is vulnerable to incorrect default permissions which could give access to a user to actions that they should not have access to. IBM X-Force ID: 242953. | [
"cpe:2.3:a:ibm:manage_application:8.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:manage_application:8.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_application_suite:8.8.0:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
CVE-2013-6966 | Open redirect vulnerability in Cisco WebEx Training Center allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors, aka Bug ID CSCul36031. | [
"cpe:2.3:a:cisco:webex_training_center:-:*:*:*:*:*:*:*"
] | null | null | null | 5.8 |
|
CVE-2008-7083 | Multiple SQL injection vulnerabilities in ReVou Micro Blogging Twitter clone allow remote attackers to execute arbitrary SQL commands via the (1) username and (2) password fields. | [
"cpe:2.3:a:revou:micro_blogging_twitter_clone:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-hwgv-8256-p54x | In the Linux kernel, the following vulnerability has been resolved:drm/amdgpu: Reset IH OVERFLOW_CLEAR bitAllows us to detect subsequent IH ring buffer overflows as well. | [] | null | 5.5 | null | null |
|
GHSA-gcm9-cc3r-c6vj | Cross-site Scripting (XSS) in Eclipse Theia | In Eclipse Theia versions up to and including 1.2.0, the Markdown Preview (@theia/preview), can be exploited to execute arbitrary code. | [] | null | 9.6 | null | null |
RHSA-2022:6174 | Red Hat Security Advisory: firefox security update | Mozilla: Address bar spoofing via XSLT error handling Mozilla: Cross-origin XSLT Documents would have inherited the parent's permissions Mozilla: Data race and potential use-after-free in PK11_ChangePW Mozilla: Memory safety bugs fixed in Firefox 104 and Firefox ESR 102.2 Mozilla: Memory safety bugs fixed in Firefox 104, Firefox ESR 102.2, and Firefox ESR 91.13 | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.8 | 7.5 | null |
CVE-2023-3024 | Bluetooth LE segmented 'prepare write response' packet may lead to out-of-bounds memory access | Forcing the Bluetooth LE stack to segment 'prepare write response' packets can lead to an out-of-bounds memory access. | [
"cpe:2.3:a:silabs:gecko_software_development_kit:*:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:csrb31024:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*"
] | null | 5.9 | null | null |
GHSA-vw47-mr44-3jf9 | Confused Deputy in Kubernetes | A security issue was discovered with Kubernetes that could enable users to send network traffic to locations they would otherwise not have access to via a confused deputy attack. | [] | null | 3.1 | null | null |
CVE-2020-8493 | A stored XSS vulnerability in Kronos Web Time and Attendance (webTA) affects 3.8.x and later 3.x versions before 4.0 via multiple input fields (Login Message, Banner Message, and Password Instructions) of the com.threeis.webta.H261configMenu servlet via an authenticated administrator. | [
"cpe:2.3:a:kronos:web_time_and_attendance:*:*:*:*:*:*:*:*"
] | null | null | 6.9 | null |
|
RHSA-2021:5170 | Red Hat Security Advisory: Red Hat Single Sign-On 7.4.10 security update | undertow: potential security issue in flow control over HTTP/2 may lead to DOS wildfly-elytron: possible timing attack in ScramServer wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users resteasy: Error message exposes endpoint class information jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck xml-security: XPath Transform abuse allows for information disclosure | [
"cpe:/a:redhat:red_hat_single_sign_on:7"
] | null | 7.5 | null | null |
CVE-2021-39217 | OpenMage LTS arbitrary command execution in custom layout update through blocks | OpenMage LTS is an e-commerce platform. Prior to versions 19.4.22 and 20.0.19, Custom Layout enabled admin users to execute arbitrary commands via block methods. Versions 19.4.22 and 20.0.19 contain patches for this issue. | [
"cpe:2.3:a:openmage:magento:*:*:*:*:lts:*:*:*"
] | null | 7.2 | null | null |
GHSA-x3q7-hmmp-xprv | Malwarebytes Anti-Exploit 4.4.0.220 is vulnerable to arbitrary file deletion and denial of service via an ALPC message in which FullFileNamePath lacks a '\0' character. | [] | null | 7.1 | null | null |
|
CVE-2025-25042 | Authenticated Access Control Vulnerability allows Sensitive Information Disclosure in AOS-CX REST Interface | A vulnerability in the AOS-CX REST interface could allow an authenticated remote attacker with low privileges to view sensitive information. Successful exploitation could allow an attacker to read encrypted credentials of other users on the switch, potentially leading to further unauthorized access or data breaches. | [] | null | 4.3 | null | null |
GHSA-pxvj-4wx4-gv6w | The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification. As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications. | [] | null | 5.3 | null | null |
|
GHSA-cjmw-x525-6p4f | Possible buffer overflow due to improper data validation of external commands sent via DIAG interface in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables | [] | null | 5.5 | null | null |
|
CVE-2005-1341 | Apple Terminal 1.4.4 allows attackers to execute arbitrary commands via terminal escape sequences. | [
"cpe:2.3:a:apple:terminal:1.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*"
] | null | null | null | 5.1 |
|
CVE-2017-8821 | In Tor before 0.2.5.16, 0.2.6 through 0.2.8 before 0.2.8.17, 0.2.9 before 0.2.9.14, 0.3.0 before 0.3.0.13, and 0.3.1 before 0.3.1.9, an attacker can cause a denial of service (application hang) via crafted PEM input that signifies a public key requiring a password, which triggers an attempt by the OpenSSL library to ask the user for the password, aka TROVE-2017-011. | [
"cpe:2.3:a:tor_project:tor:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
RHSA-2024:11237 | Red Hat Security Advisory: libsndfile:1.0.31 security update | libsndfile: Segmentation fault error in ogg_vorbis.c:417 vorbis_analysis_wrote() | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
] | null | 5.5 | null | null |
GHSA-4fwf-7mx6-7ph9 | Self - Stored XSS exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code in the view 'log' as it insecurely prints the 'Log Message' value on the web page without applying any proper filtration. This relates to the view=logs value. | [] | null | null | 6.1 | null |
|
GHSA-58g4-8h86-63xr | Cross-site scripting (XSS) vulnerability in org/chromium/chrome/browser/UrlUtilities.java in Google Chrome before 44.0.2403.89 on Android allows remote attackers to inject arbitrary web script or HTML via a crafted intent: URL, as demonstrated by a trailing alert(document.cookie);// substring, aka "Universal XSS (UXSS)." | [] | null | null | null | null |
|
CVE-2025-36004 | IBM i privilege escalation | IBM i 7.2, 7.3, 7.4, and 7.5 could allow a user to gain elevated privileges due to an unqualified library call in IBM Facsimile Support for i. A malicious actor could cause user-controlled code to run with administrator privilege. | [
"cpe:2.3:a:ibm:i:7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:i:7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:i:7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:i:7.5:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
CVE-2025-20008 | Insecure inherited permissions for some Intel(R) Simics(R) Package Manager software before version 1.12.0 may allow a privileged user to potentially enable escalation of privilege via local access. | [] | 5.4 | 7.7 | null | null |
|
GHSA-vxw6-wm7v-4qx6 | libmpeg2 in libstagefright in Android 6.x before 2016-03-01 allows attackers to obtain sensitive information, and consequently bypass an unspecified protection mechanism, via crafted Bitstream data, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 25765591. | [] | null | null | 5.3 | null |
|
CVE-2021-27398 | A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V16.0.5). The PlantSimCore.dll library lacks proper validation of user-supplied data when parsing SPP files. This could result in a stack based buffer overflow, a different vulnerability than CVE-2021-27396. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-13290) | [
"cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
GHSA-fqg4-3q52-9x7c | A vulnerability, which was classified as critical, has been found in Bylancer QuickOrder 6.3.7. Affected by this issue is some unknown functionality of the file /blog of the component GET Parameter Handler. The manipulation of the argument s leads to sql injection. The attack may be launched remotely. The identifier of this vulnerability is VDB-234236. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] | null | null | 6.3 | null |
|
GHSA-3f8f-56cp-m994 | A CSV injection vulnerability in Taiga v6.8.1 allows attackers to execute arbitrary code via uploading a crafted CSV file. | [] | null | 8.8 | null | null |
|
CVE-2019-18236 | Multiple buffer overflow vulnerabilities exist when the PLC Editor Version 1.3.5_20190129 processes project files. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application. | [
"cpe:2.3:a:we-con:plc_editor:1.3.5:20190129:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
CVE-2023-28448 | Versionize is lacking bound checks, potentially leading to out of bounds memory access | Versionize is a framework for version tolerant serializion/deserialization of Rust data structures, designed for usecases that need fast deserialization times and minimal size overhead. An issue was discovered in the ‘Versionize::deserialize’ implementation provided by the ‘versionize’ crate for ‘vmm_sys_utils::fam::FamStructWrapper', which can lead to out of bounds memory accesses. The impact started with version 0.1.1. The issue was corrected in version 0.1.10 by inserting a check that verifies, for any deserialized header, the lengths of compared flexible arrays are equal and aborting deserialization otherwise.
| [
"cpe:2.3:a:versionize_project:versionize:*:*:*:*:*:rust:*:*"
] | null | 5.7 | null | null |
GHSA-r459-g36p-564m | Unknown vulnerability in BIND 9.2.0 in HP-UX B.11.00, B.11.11, and B.11.23 allows remote attackers to cause a denial of service. | [] | null | null | null | null |
|
CVE-2024-4582 | Faraday GM8181/GM828x NTP Service os command injection | A vulnerability classified as critical has been found in Faraday GM8181 and GM828x up to 20240429. Affected is an unknown function of the component NTP Service. The manipulation of the argument ntp_srv leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-263304. | [
"cpe:2.3:a:faraday:gm8181:20240429:*:*:*:*:*:*:*",
"cpe:2.3:a:faraday:gm828x:20240429:*:*:*:*:*:*:*"
] | null | 7.3 | 7.3 | 7.5 |
CVE-2016-5871 | In all Qualcomm products with Android releases from CAF using the Linux kernel, an integer overflow to buffer overflow vulnerability exists when loading an image file. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
GHSA-46v3-9g82-r8f2 | FATEK Automation WinProladder versions 3.30 and prior is vulnerable to an out-of-bounds read, which may allow an attacker to read unauthorized information. | [] | null | null | null | null |
|
CVE-2004-0245 | Web Crossing 4.x and 5.x allows remote attackers to cause a denial of service (crash) by sending a HTTP POST request with a large or negative Content-Length, which causes an integer divide-by-zero. | [
"cpe:2.3:a:web_crossing_inc:web_crossing:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:web_crossing_inc:web_crossing:5.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-rjcm-vx5r-p83h | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | [] | null | null | null | null |
|
GHSA-r86w-fr4c-7rfq | EyesOfNetwork Web Interface v5.3 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the component /lilac/main.php. | [] | null | 6.1 | null | null |
|
GHSA-f4v8-58f6-mwj4 | org.xwiki.platform:xwiki-platform-flamingo-theme-ui Eval Injection vulnerability | ImpactAny user with view rights on commonly accessible documents can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation. The root cause is improper escaping of the `documentTree` macro parameters in This macro is installed by default in `FlamingoThemesCode.WebHome`. This page is installed by default.Example of reproduction:
Open `<xwiki_host>/xwiki/bin/view/%22%20%2F%7D%7D%20%7B%7Basync%20async%3D%22true%22%20cached%3D%22false%22%20context%3D%22doc.reference%22%7D%7D%7B%7Bgroovy%7D%7Dprintln(%22Hello%20%22%20%2B%20%22from%20groovy!%22)%7B%7B%2Fgroovy%7D%7D%7B%7B%2Fasync%7D%7D?sheet=FlamingoThemesCode.WebHome&xpage=view` where `<xwiki_host>` is the URL of your XWiki installation.The [documentTree] macro is a standalone macro and it cannot be used inline. Click on this message for details.
Hello from groovy!.WebHome" /}}is displayed. This shows that the Groovy macro that is passed in the URL has been executed and thus demonstrates a privilege escalation from view to programming rights.PatchesThe vulnerability has been patched in XWiki 13.10.11, 14.4.7 and 14.10.WorkaroundsThe issue can be fixed by replacing the code of `FlamingoThemesCode.WebHome` by the [patched version](https://github.com/xwiki/xwiki-platform/commit/80d5be36f700adcd56b6c8eb3ed8b973f62ec0ae).Referenceshttps://jira.xwiki.org/browse/XWIKI-20279https://github.com/xwiki/xwiki-platform/commit/80d5be36f700adcd56b6c8eb3ed8b973f62ec0aeFor more informationIf you have any questions or comments about this advisory:Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)Email us at [Security Mailing List](mailto:[email protected]) | [] | null | 9.9 | null | null |
CVE-2023-4606 | An authenticated XCC user with Read-Only permission can change a different user’s password through a crafted API command.
This affects ThinkSystem v2 and v3 servers with XCC; ThinkSystem v1 servers are not affected. | [
"cpe:2.3:o:lenovo:thinkagile_hx5530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx5530:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx7530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx7530:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx3331_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx3331:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx1331_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx1331:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx2330_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx2330:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx2331_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx2331:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx3330_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx3330:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx3331_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx3331:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx3375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx3375:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx3376_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx3376:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx5531_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx5531:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_hx7531_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx7531:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_mx3330-f_all-flash_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_mx3330-f_all-flash:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_mx3330-h_hybrid_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_mx3330-h_hybrid:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_mx3331-f_all-flash_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_mx3331-f_all-flash:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_mx3331-h_hybrid_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_mx3331-h_hybrid:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_mx3530_f_all_flash_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_mx3530_f_all_flash:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_mx3530-h_hybrid_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_mx3530-h_hybrid:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_mx3531_h_hybrid_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_mx3531_h_hybrid:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_mx3531-f_all-flash_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_mx3531-f_all-flash:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx2330_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx2330:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx3330_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx3330:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx3530-g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx3530-g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx5530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx5530:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx7330_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx7330:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx7530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx7530:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkagile_vx7531_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx7531:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sd630_v2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sd630_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sd650_v2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sd650_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sd650_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sd650-n_v2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sd650-n_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sd665_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sn550_v2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sn550_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr250_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr258_v2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr258_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr630_v2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr630_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr630_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr635_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr645_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr645:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr645_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr645_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr650_v2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr650_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr650_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr655_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr665_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr665:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr665_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr670_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr670:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr670_v2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr670_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr675_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr850_v2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr850_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr850_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr860_v2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_sr860_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_sr860_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_st250_v2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_st250_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_st258_v2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_st258_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_st650_v2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_st650_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_st650_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_st658_v2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_st658_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinksystem_st658_v3_firmware:-:*:*:*:*:*:*:*"
] | null | 8.1 | null | null |
|
CVE-2020-12920 | A potential denial of service issue exists in the AMD Display driver Escape 0x130007 Call handler. An attacker with low privilege could potentially induce a Windows BugCheck. | [
"cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | 2.1 |
|
CVE-2014-3392 | The Clientless SSL VPN portal in Cisco ASA Software 8.2 before 8.2(5.51), 8.3 before 8.3(2.42), 8.4 before 8.4(7.23), 8.6 before 8.6(1.15), 9.0 before 9.0(4.24), 9.1 before 9.1(5.12), 9.2 before 9.2(2.8), and 9.3 before 9.3(1.1) allows remote attackers to obtain sensitive information from process memory or modify memory contents via crafted parameters, aka Bug ID CSCuq29136. | [
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.0.45:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2.10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2.12:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2.16:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2.17:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.13:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.22:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.26:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.33:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.40:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.41:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.46:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.48:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.5.50:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.1.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.13:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.23:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.25:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.31:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.33:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.34:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.37:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.39:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.40:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3.2.41:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.1.11:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.3.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.3.9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.5.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.15:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4.7.22:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.12:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.13:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6.1.14:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.2.10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.3.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.17:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.20:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0.4.24:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.12:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1.5.15:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3.1.1:*:*:*:*:*:*:*"
] | null | null | null | 8.3 |
|
CVE-2019-9827 | Hawt Hawtio through 2.5.0 is vulnerable to SSRF, allowing a remote attacker to trigger an HTTP request from an affected server to an arbitrary host via the initial /proxy/ substring of a URI. | [
"cpe:2.3:a:hawt:hawtio:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
CVE-2019-0174 | Logic condition in specific microprocessors may allow an authenticated user to potentially enable partial physical address information disclosure via local access. | [
"cpe:2.3:o:intel:i9-9900x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i9-9900x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i9-9920x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i9-9920x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i9-9960x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i9-9960x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i9-9980xe_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i9-9980xe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i9-9940x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i9-9940x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i9-7960x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i9-7960x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i9-7980xe_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i9-7980xe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i9-7940x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i9-7940x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i9-7920x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i9-7920x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i9-7900x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i9-7900x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i7-7820x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i7-7820x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i7-7800x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i7-7800x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4422e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4422e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4410e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4410e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4402ec_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4402ec:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4402e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4402e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4400e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4400e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4460t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4460t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4460s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4460s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4460_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4460:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4440s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4440s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4440_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4440:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4430s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4430s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4300m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4300m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4300u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4300u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4300y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4300y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4302y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4302y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4308u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4308u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4310m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4310m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4310u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4310u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4330m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4330m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4340m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4340m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4350u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4350u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4360u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4360u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4200h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4200h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4200m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4200m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4200u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4200u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4200y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4200y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4202y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4202y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4210h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4210h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4210m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4210m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4210u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4210u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4210y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4210y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4220y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4220y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4250u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4250u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4258u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4258u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4260u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4260u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4278u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4278u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i5-4288u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i5-4288u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4330_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4330:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4330t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4330t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4330te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4330te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4340_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4340:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4340te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4340te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4350_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4350t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4350t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4360_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4360:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4360t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4360t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4370_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4370t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4370t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4100e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4100e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4100m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4100m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4100u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4100u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4102e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4102e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4110e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4110e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4110m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4110m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4112e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4112e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4120u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4120u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4158u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4158u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4170t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4170t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4170_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4170:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4160t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4160t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4160_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4160:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4150t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4150t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4130t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4130t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4130:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4000m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4000m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4005u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4005u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4010u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4010u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4010y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4010y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4012y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4012y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4020y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4020y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4025u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4025u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4030u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4030u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:i3-4030y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:i3-4030y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:3550m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:3550m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:3556u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:3556u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:3558u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:3558u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:3560m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:3560m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:3560y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:3560y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:3561y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:3561y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:3805u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:3805u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:3825u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:3825u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:2981u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:2981u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:2980u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:2980u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:2970m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:2970m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:2961y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:2961y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:2957u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:2957u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:2955u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:2955u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:2950m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:2950m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:2002e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:2002e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:2000e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:2000e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e7-8893_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e7-8893:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e7-8891_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e7-8891:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e7-8890_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e7-8890:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e7-8880l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e7-8880l:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e7-8880_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e7-8880:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e7-8870_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e7-8870:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e7-8867_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e7-8867:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e7-8860_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e7-8860:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e7-4850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e7-4850:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e7-4830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e7-4830:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e7-4820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e7-4820:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e7-4809_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e7-4809:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2699_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2699:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-4669_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-4669:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2438l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2438l:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-1428l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-1428l:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-4667_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-4667:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2428l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2428l:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-1620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-1620:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-4660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-4660:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2418l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2418l:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-1630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-1630:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2698_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2698:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-4655_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-4655:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2408l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2408l:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2697_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2697:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-1650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-1650:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-4650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-4650:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-1660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-1660:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-4648_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-4648:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-1680_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-1680:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2695_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2695:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-4640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-4640:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2690_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2690:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-4627_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-4627:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2687w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2687w:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-4620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-4620:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-4610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-4610:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2683_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2683:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2680_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2680:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2670_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2670:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2667_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2667:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2660:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2658a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2658a:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2658_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2658:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2650l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2650l:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2650:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2648l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2648l:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2643_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2643:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2640:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2637_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2637:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2630l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2630l:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2630:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2628l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2628l:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2623_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2623:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2620:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2618l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2618l:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2609_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2609:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2608l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2608l:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e5-2603_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e5-2603:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1286l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1286l:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1286_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1286:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1285l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1285l:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1285_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1285:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1281_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1281:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1280_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1280:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1276_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1276:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1275l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1275l:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1270_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1270:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1268l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1268l:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1271_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1271:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1275_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1275:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1265l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1265l:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1246_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1246:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1245_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1245:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1241_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1241:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1240l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1240l:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1240_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1240:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1231_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1231:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1230l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1230l:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1230_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1230:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1226_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1226:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1225_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1225:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1220l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1220l:3:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:e3-1220_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:e3-1220:3:*:*:*:*:*:*:*"
] | null | null | 3.3 | 2.1 |
|
GHSA-75cq-q7qc-2mc2 | TOTOLINK EX200 V4.0.3c.7646_B20201211 was discovered to contain a remote code execution (RCE) vulnerability via the FileName parameter in the setUpgradeFW function. | [] | null | 8.8 | null | null |
|
CVE-2023-0722 | The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_save_state function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin. | [
"cpe:2.3:a:wickedplugins:wicked_folders:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null |
|
GHSA-8725-gx62-5qhc | Cross-Site Request Forgery (CSRF) vulnerability in Turcu Ciprian Advanced Fancybox allows Stored XSS.This issue affects Advanced Fancybox: from n/a through 1.1.1. | [] | null | 7.1 | null | null |
|
CVE-2021-3826 | Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol. | [
"cpe:2.3:a:gnu:gcc:11.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
ICSA-19-281-03 | Siemens SIMATIC WinAC RTX (F) 2010 (Update A) | Affected versions of the software contain a vulnerability that could allow an unauthenticated attacker to trigger a denial-of-service condition. The vulnerability can be triggered if a large HTTP request is sent to the executing service. The security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise availability of the service provided by the software. | [] | null | 7.5 | null | null |
GHSA-jpgj-9vvg-wqmh | Memory corruption vulnerability in the driver file component in McAfee GetSusp prior to 4.0.0 could allow a program being investigated on the local machine to trigger a buffer overflow in GetSusp, leading to the execution of arbitrary code, potentially triggering a BSOD. | [] | null | 7.8 | null | null |
|
CVE-2024-39488 | arm64: asm-bug: Add .align 2 to the end of __BUG_ENTRY | In the Linux kernel, the following vulnerability has been resolved:
arm64: asm-bug: Add .align 2 to the end of __BUG_ENTRY
When CONFIG_DEBUG_BUGVERBOSE=n, we fail to add necessary padding bytes
to bug_table entries, and as a result the last entry in a bug table will
be ignored, potentially leading to an unexpected panic(). All prior
entries in the table will be handled correctly.
The arm64 ABI requires that struct fields of up to 8 bytes are
naturally-aligned, with padding added within a struct such that struct
are suitably aligned within arrays.
When CONFIG_DEBUG_BUGVERPOSE=y, the layout of a bug_entry is:
struct bug_entry {
signed int bug_addr_disp; // 4 bytes
signed int file_disp; // 4 bytes
unsigned short line; // 2 bytes
unsigned short flags; // 2 bytes
}
... with 12 bytes total, requiring 4-byte alignment.
When CONFIG_DEBUG_BUGVERBOSE=n, the layout of a bug_entry is:
struct bug_entry {
signed int bug_addr_disp; // 4 bytes
unsigned short flags; // 2 bytes
< implicit padding > // 2 bytes
}
... with 8 bytes total, with 6 bytes of data and 2 bytes of trailing
padding, requiring 4-byte alginment.
When we create a bug_entry in assembly, we align the start of the entry
to 4 bytes, which implicitly handles padding for any prior entries.
However, we do not align the end of the entry, and so when
CONFIG_DEBUG_BUGVERBOSE=n, the final entry lacks the trailing padding
bytes.
For the main kernel image this is not a problem as find_bug() doesn't
depend on the trailing padding bytes when searching for entries:
for (bug = __start___bug_table; bug < __stop___bug_table; ++bug)
if (bugaddr == bug_addr(bug))
return bug;
However for modules, module_bug_finalize() depends on the trailing
bytes when calculating the number of entries:
mod->num_bugs = sechdrs[i].sh_size / sizeof(struct bug_entry);
... and as the last bug_entry lacks the necessary padding bytes, this entry
will not be counted, e.g. in the case of a single entry:
sechdrs[i].sh_size == 6
sizeof(struct bug_entry) == 8;
sechdrs[i].sh_size / sizeof(struct bug_entry) == 0;
Consequently module_find_bug() will miss the last bug_entry when it does:
for (i = 0; i < mod->num_bugs; ++i, ++bug)
if (bugaddr == bug_addr(bug))
goto out;
... which can lead to a kenrel panic due to an unhandled bug.
This can be demonstrated with the following module:
static int __init buginit(void)
{
WARN(1, "hello\n");
return 0;
}
static void __exit bugexit(void)
{
}
module_init(buginit);
module_exit(bugexit);
MODULE_LICENSE("GPL");
... which will trigger a kernel panic when loaded:
------------[ cut here ]------------
hello
Unexpected kernel BRK exception at EL1
Internal error: BRK handler: 00000000f2000800 [#1] PREEMPT SMP
Modules linked in: hello(O+)
CPU: 0 PID: 50 Comm: insmod Tainted: G O 6.9.1 #8
Hardware name: linux,dummy-virt (DT)
pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : buginit+0x18/0x1000 [hello]
lr : buginit+0x18/0x1000 [hello]
sp : ffff800080533ae0
x29: ffff800080533ae0 x28: 0000000000000000 x27: 0000000000000000
x26: ffffaba8c4e70510 x25: ffff800080533c30 x24: ffffaba8c4a28a58
x23: 0000000000000000 x22: 0000000000000000 x21: ffff3947c0eab3c0
x20: ffffaba8c4e3f000 x19: ffffaba846464000 x18: 0000000000000006
x17: 0000000000000000 x16: ffffaba8c2492834 x15: 0720072007200720
x14: 0720072007200720 x13: ffffaba8c49b27c8 x12: 0000000000000312
x11: 0000000000000106 x10: ffffaba8c4a0a7c8 x9 : ffffaba8c49b27c8
x8 : 00000000ffffefff x7 : ffffaba8c4a0a7c8 x6 : 80000000fffff000
x5 : 0000000000000107 x4 : 0000000000000000 x3 : 0000000000000000
x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff3947c0eab3c0
Call trace:
buginit+0x18/0x1000 [hello]
do_one_initcall+0x80/0x1c8
do_init_module+0x60/0x218
load_module+0x1ba4/0x1d70
__do_sys_init_module+0x198/0x1d0
__arm64_sys_init_module+0x1c/0x28
invoke_syscall+0x48/0x114
el0_svc
---truncated--- | [] | null | null | null | null |
GHSA-qp2w-5j73-m364 | A use after free issue was addressed with improved memory management. This issue is fixed in macOS Mojave 10.14.6. A remote attacker may be able to cause arbitrary code execution. | [] | null | null | null | null |
|
GHSA-g38h-vjf2-59hp | Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). | [] | null | 7.5 | null | null |
|
CVE-2024-1406 | Linksys WRT54GL Web Management Interface SysInfo1.htm information disclosure | A vulnerability was found in Linksys WRT54GL 4.30.18. It has been declared as problematic. This vulnerability affects unknown code of the file /SysInfo1.htm of the component Web Management Interface. The manipulation leads to information disclosure. The exploit has been disclosed to the public and may be used. VDB-253330 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:h:linksys:wrt54gl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linksys:wrt54gl_firmware:4.30.18:*:*:*:*:*:*:*"
] | null | 4.3 | 4.3 | 3.3 |
RHSA-2021:1544 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.0.4 security update | kiali/kiali-operator: can deploy specified image to any namespace | [
"cpe:/a:redhat:service_mesh:2.0::el8"
] | null | 8.8 | null | null |
GHSA-hqcr-58jc-rrhm | In vowifiservice, there is a possible missing permission check.This could lead to local information disclosure with no additional execution privileges | [] | null | 5.5 | null | null |
|
GHSA-vc3j-83qc-fgg9 | Multiple cross-site request forgery (CSRF) vulnerabilities in MyBB 1.2.11 and earlier allow remote attackers to (1) hijack the authentication of moderators or administrators for requests that delete threads via a do_multideletethreads action to moderation.php and (2) hijack the authentication of arbitrary users for requests that delete private messages (PM) via a delete action to private.php. | [] | null | null | null | null |
|
CVE-2008-0477 | Stack-based buffer overflow in the QMPUpgrade.Upgrade.1 ActiveX control in QMPUpgrade.dll 1.0.0.1 in Move Networks Upgrade Manager allows remote attackers to execute arbitrary code via a long first argument to the Upgrade method. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:move_networks_inc:move_media_player:1.0.0.1:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-63fp-wh7p-9g57 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Sam Perrow Pre* Party Resource Hints.This issue affects Pre* Party Resource Hints: from n/a through 1.8.18. | [] | null | 7.6 | null | null |
|
CVE-2016-8442 | Possible unauthorized memory access in the hypervisor. Lack of input validation could allow hypervisor memory to be accessed by the HLOS. Product: Android. Versions: Kernel 3.18. Android ID: A-31625910. QC-CR#1038173. | [
"cpe:2.3:o:linux:linux_kernel:3.18:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 |
|
GHSA-92rr-frfh-hpr7 | A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specifically crafted http get request parameters. | [] | null | 9.8 | null | null |
|
CVE-2022-46861 | WordPress Login Page Styler Plugin <= 6.2 is vulnerable to Cross Site Scripting (XSS) | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Zia Imtiaz Custom Login Page Styler for WordPress plugin <= 6.2 versions. | [
"cpe:2.3:a:web-settler:custom_login_page_styler:*:*:*:*:*:wordpress:*:*"
] | null | 5.9 | null | null |
GHSA-3v34-4mg9-5rvc | Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. These vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. | [] | null | null | null | null |
|
CVE-2021-3557 | A flaw was found in argocd. Any unprivileged user is able to deploy argocd in their namespace and with the created ServiceAccount argocd-argocd-server, the unprivileged user is able to read all resources of the cluster including all secrets which might enable privilege escalations. The highest threat from this vulnerability is to data confidentiality. | [
"cpe:2.3:a:argoproj:argo_cd:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_gitops:1.1:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4 |
|
GHSA-cm2x-4wx2-45q8 | A vulnerability, which was classified as critical, has been found in PHPGurukul Medical Card Generation System 1.0. This issue affects some unknown processing of the file /admin/view-enquiry.php of the component View Enquiry Page. The manipulation of the argument viewid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | [] | 5.1 | 4.7 | null | null |
|
CVE-2009-1168 | Cisco IOS 12.0(32)S12 through 12.0(32)S13 and 12.0(33)S3 through 12.0(33)S4, 12.0(32)SY8 through 12.0(32)SY9, 12.2(33)SXI1, 12.2XNC before 12.2(33)XNC2, 12.2XND before 12.2(33)XND1, and 12.4(24)T1; and IOS XE 2.3 through 2.3.1t and 2.4 through 2.4.0; when RFC4893 BGP routing is enabled, allows remote attackers to cause a denial of service (memory corruption and device reload) by using an RFC4271 peer to send an update with a long series of AS numbers, aka Bug ID CSCsy86021. | [
"cpe:2.3:o:cisco:ios:12.0\\(32\\)s12:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0\\(32\\)s13:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0\\(32\\)sy8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0\\(32\\)sy9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0\\(33\\)s3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0\\(33\\)s4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xnc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xnd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4\\(24\\)t1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:2.3.1t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:2.4.0:*:*:*:*:*:*:*"
] | null | null | null | 7.1 |
|
CVE-2020-12829 | In QEMU through 5.0.0, an integer overflow was found in the SM501 display driver implementation. This flaw occurs in the COPY_AREA macro while handling MMIO write operations through the sm501_2d_engine_write() callback. A local attacker could abuse this flaw to crash the QEMU process in sm501_2d_operation() in hw/display/sm501.c on the host, resulting in a denial of service. | [
"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 3.8 | null | 2.1 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.