id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
sequencelengths
0
5.42k
GHSA-3jhh-8hqg-j8q7
Unspecified vulnerability in Microsoft Office 2000 SP3, Office XP SP3, Office 2003 SP2, and Office 2004 for Mac allows remote attackers to execute arbitrary code via an Office document that contains a malformed object, related to a "memory handling error," aka "Microsoft Office Execution Jump Vulnerability."
[]
GHSA-wrrm-54mm-q88f
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13011.
[]
GHSA-q8pc-q7mj-47x6
net/netfilter/nfnetlink_cthelper.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for new, get, and del operations, which allows local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces.
[]
GHSA-qp59-vc39-7x3c
Debugging utility in the backdoor mode of Palm OS 3.5.2 and earlier allows attackers with physical access to a Palm device to bypass access restrictions and obtain passwords, even if the system lockout mechanism is enabled.
[]
GHSA-6c8v-9pp2-cm9x
The Quiz extension for MediaWiki allows remote attackers to cause a denial of service via regex metacharacters in a regular expression.
[]
CVE-2024-26745
powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV
In the Linux kernel, the following vulnerability has been resolved: powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV When kdump kernel tries to copy dump data over SR-IOV, LPAR panics due to NULL pointer exception: Kernel attempted to read user page (0) - exploit attempt? (uid: 0) BUG: Kernel NULL pointer dereference on read at 0x00000000 Faulting instruction address: 0xc000000020847ad4 Oops: Kernel access of bad area, sig: 11 [#1] LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA pSeries Modules linked in: mlx5_core(+) vmx_crypto pseries_wdt papr_scm libnvdimm mlxfw tls psample sunrpc fuse overlay squashfs loop CPU: 12 PID: 315 Comm: systemd-udevd Not tainted 6.4.0-Test102+ #12 Hardware name: IBM,9080-HEX POWER10 (raw) 0x800200 0xf000006 of:IBM,FW1060.00 (NH1060_008) hv:phyp pSeries NIP: c000000020847ad4 LR: c00000002083b2dc CTR: 00000000006cd18c REGS: c000000029162ca0 TRAP: 0300 Not tainted (6.4.0-Test102+) MSR: 800000000280b033 <SF,VEC,VSX,EE,FP,ME,IR,DR,RI,LE> CR: 48288244 XER: 00000008 CFAR: c00000002083b2d8 DAR: 0000000000000000 DSISR: 40000000 IRQMASK: 1 ... NIP _find_next_zero_bit+0x24/0x110 LR bitmap_find_next_zero_area_off+0x5c/0xe0 Call Trace: dev_printk_emit+0x38/0x48 (unreliable) iommu_area_alloc+0xc4/0x180 iommu_range_alloc+0x1e8/0x580 iommu_alloc+0x60/0x130 iommu_alloc_coherent+0x158/0x2b0 dma_iommu_alloc_coherent+0x3c/0x50 dma_alloc_attrs+0x170/0x1f0 mlx5_cmd_init+0xc0/0x760 [mlx5_core] mlx5_function_setup+0xf0/0x510 [mlx5_core] mlx5_init_one+0x84/0x210 [mlx5_core] probe_one+0x118/0x2c0 [mlx5_core] local_pci_probe+0x68/0x110 pci_call_probe+0x68/0x200 pci_device_probe+0xbc/0x1a0 really_probe+0x104/0x540 __driver_probe_device+0xb4/0x230 driver_probe_device+0x54/0x130 __driver_attach+0x158/0x2b0 bus_for_each_dev+0xa8/0x130 driver_attach+0x34/0x50 bus_add_driver+0x16c/0x300 driver_register+0xa4/0x1b0 __pci_register_driver+0x68/0x80 mlx5_init+0xb8/0x100 [mlx5_core] do_one_initcall+0x60/0x300 do_init_module+0x7c/0x2b0 At the time of LPAR dump, before kexec hands over control to kdump kernel, DDWs (Dynamic DMA Windows) are scanned and added to the FDT. For the SR-IOV case, default DMA window "ibm,dma-window" is removed from the FDT and DDW added, for the device. Now, kexec hands over control to the kdump kernel. When the kdump kernel initializes, PCI busses are scanned and IOMMU group/tables created, in pci_dma_bus_setup_pSeriesLP(). For the SR-IOV case, there is no "ibm,dma-window". The original commit: b1fc44eaa9ba, fixes the path where memory is pre-mapped (direct mapped) to the DDW. When TCEs are direct mapped, there is no need to initialize IOMMU tables. iommu_table_setparms_lpar() only considers "ibm,dma-window" property when initiallizing IOMMU table. In the scenario where TCEs are dynamically allocated for SR-IOV, newly created IOMMU table is not initialized. Later, when the device driver tries to enter TCEs for the SR-IOV device, NULL pointer execption is thrown from iommu_area_alloc(). The fix is to initialize the IOMMU table with DDW property stored in the FDT. There are 2 points to remember: 1. For the dedicated adapter, kdump kernel would encounter both default and DDW in FDT. In this case, DDW property is used to initialize the IOMMU table. 2. A DDW could be direct or dynamic mapped. kdump kernel would initialize IOMMU table and mark the existing DDW as "dynamic". This works fine since, at the time of table initialization, iommu_table_clear() makes some space in the DDW, for some predefined number of TCEs which are needed for kdump to succeed.
[]
GHSA-hj7m-88p5-75rw
Vulnerability in the Oracle Hospitality Guest Access component of Oracle Hospitality Applications (subcomponent: Base). Supported versions that are affected are 4.2.0 and 4.2.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hospitality Guest Access. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Hospitality Guest Access accessible data as well as unauthorized read access to a subset of Oracle Hospitality Guest Access accessible data. CVSS 3.0 Base Score 4.6 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N).
[]
CVE-2022-46848
WordPress Visualizer Plugin <= 3.9.1 is vulnerable to Cross Site Scripting (XSS)
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Themeisle Visualizer: Tables and Charts Manager for WordPress plugin <= 3.9.1 versions.
[ "cpe:2.3:a:themeisle:visualizer:*:*:*:*:*:wordpress:*:*" ]
GHSA-7h4w-6p98-r3wx
textAngular Cross-site Scripting vulnerability
textAngular is a text editor for Angular.js. Version 1.5.16 and prior are vulnerable to copy-paste cross-site scripting (XSS). For this particular type of XSS, the victim needs to be fooled into copying a malicious payload into the text editor. There are no known patches.
[]
GHSA-jgwv-m49c-9x3w
WebKit, as used in Apple iOS before 6.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-01-28-1.
[]
CVE-2013-1245
The user-management page in Cisco WebEx Social relies on client-side validation of values in the Screen Name, First Name, Middle Name, Last Name, Email Address, and Job Title fields, which allows remote authenticated users to bypass intended access restrictions via crafted requests, aka Bug ID CSCue67190.
[ "cpe:2.3:a:cisco:webex_social:-:*:*:*:*:*:*:*" ]
CVE-2024-21390
Microsoft Authenticator Elevation of Privilege Vulnerability
Microsoft Authenticator Elevation of Privilege Vulnerability
[ "cpe:2.3:a:microsoft:authenticator:*:*:*:*:*:*:*:*" ]
GHSA-whx5-3vjj-xg9h
Buffer overflow in mIRC 5.91 and earlier allows a remote server to execute arbitrary code on the client via a long nickname.
[]
CVE-2000-0161
Sample web sites on Microsoft Site Server 3.0 Commerce Edition do not validate an identification number, which allows remote attackers to execute SQL commands.
[ "cpe:2.3:a:microsoft:site_server:3.0:*:*:*:*:*:*:*" ]
CVE-2013-4879
SQL injection vulnerability in core/inc/bigtree/cms.php in BigTree CMS 4.0 RC2 and earlier allows remote attackers to execute arbitrary SQL commands via the PATH_INFO to index.php.
[ "cpe:2.3:a:bigtreecms:bigtree_cms:*:rc2:*:*:*:*:*:*", "cpe:2.3:a:bigtreecms:bigtree_cms:4.0:b1:*:*:*:*:*:*", "cpe:2.3:a:bigtreecms:bigtree_cms:4.0:b2:*:*:*:*:*:*", "cpe:2.3:a:bigtreecms:bigtree_cms:4.0:b3:*:*:*:*:*:*", "cpe:2.3:a:bigtreecms:bigtree_cms:4.0:b4:*:*:*:*:*:*", "cpe:2.3:a:bigtreecms:bigtree_cms:4.0:b5:*:*:*:*:*:*", "cpe:2.3:a:bigtreecms:bigtree_cms:4.0:b6:*:*:*:*:*:*", "cpe:2.3:a:bigtreecms:bigtree_cms:4.0:b7:*:*:*:*:*:*", "cpe:2.3:a:bigtreecms:bigtree_cms:4.0:rc1:*:*:*:*:*:*" ]
CVE-2020-4245
IBM Security Identity Governance and Intelligence 5.2.6 does not require that users should have strong passwords by default, which makes it easier for attackers to compromise user accounts. IBM X-Force ID: 175423.
[ "cpe:2.3:a:ibm:security_identity_governance_and_intelligence:5.2.6:*:*:*:*:*:*:*" ]
CVE-2014-1383
Apple TV before 6.1.2 allows remote authenticated users to bypass an intended password requirement for iTunes Store purchase transactions via unspecified vectors.
[ "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:6.1:*:*:*:*:*:*:*" ]
GHSA-6463-qrm9-ch2m
Incorrect handling of back navigations in error pages in Navigation in Google Chrome prior to 63.0.3239.84 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
[]
GHSA-m85c-qm6x-g3rc
Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 do not properly restrict calls to DOMWindowUtils (aka nsDOMWindowUtils) methods, which allows remote attackers to bypass intended access restrictions via crafted JavaScript code.
[]
GHSA-5h3h-5652-8xp5
In the Linux kernel, the following vulnerability has been resolved:binder: fix race between mmput() and do_exit()Task A calls binder_update_page_range() to allocate and insert pages on a remote address space from Task B. For this, Task A pins the remote mm via mmget_not_zero() first. This can race with Task B do_exit() and the final mmput() refcount decrement will come from Task A.Task A | Task B ------------------+------------------ mmget_not_zero() | | do_exit() | exit_mm() | mmput() mmput() | exit_mmap() | remove_vma() | fput() |In this case, the work of ____fput() from Task B is queued up in Task A as TWA_RESUME. So in theory, Task A returns to userspace and the cleanup work gets executed. However, Task A instead sleep, waiting for a reply from Task B that never comes (it's dead).This means the binder_deferred_release() is blocked until an unrelated binder event forces Task A to go back to userspace. All the associated death notifications will also be delayed until then.In order to fix this use mmput_async() that will schedule the work in the corresponding mm->async_put_work WQ instead of Task A.
[]
GHSA-3354-gp3f-v5mx
Buffer overflow in URI processing in HTTrack and WinHTTrack before 3.42-3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long URL.
[]
CVE-2023-27241
SourceCodester Water Billing System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the lastname text box under the Add Client module.
[ "cpe:2.3:a:water_billing_system_project:water_billing_system:1.0:*:*:*:*:*:*:*" ]
CVE-2021-0671
In apusys, there is a possible memory corruption due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05664273; Issue ID: ALPS05664273.
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*" ]
CVE-2007-1522
Double free vulnerability in the session extension in PHP 5.2.0 and 5.2.1 allows context-dependent attackers to execute arbitrary code via illegal characters in a session identifier, which is rejected by an internal session storage module, which calls the session identifier generator with an improper environment, leading to code execution when the generator is interrupted, as demonstrated by triggering a memory limit violation or certain PHP errors.
[ "cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*" ]
CVE-2021-45520
Certain NETGEAR devices are affected by a hardcoded password. This affects RBK352 before 4.4.0.10, RBR350 before 4.4.0.10, and RBS350 before 4.4.0.10.
[ "cpe:2.3:o:netgear:rbk352_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbk352:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbr350_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbr350:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:rbs350_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rbs350:-:*:*:*:*:*:*:*" ]
CVE-2024-6606
Clipboard code failed to check the index on an array access. This could have led to an out-of-bounds read. This vulnerability affects Firefox < 128 and Thunderbird < 128.
[ "cpe:2.3:a:mozilla:firefox:-:*:*:*:*:*:*:*" ]
CVE-2017-6269
NVIDIA Windows GPU Display Driver contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape where a pointer passed from a user to the driver is used without validation which may lead to denial of service or possible escalation of privileges.
[ "cpe:2.3:a:nvidia:gpu_driver:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
CVE-2023-20827
In ims service, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07937105; Issue ID: ALPS07937105.
[ "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*" ]
CVE-2004-1166
CRLF injection vulnerability in Microsoft Internet Explorer 6.0.2800.1106 and earlier allows remote attackers to execute arbitrary FTP commands via an ftp:// URL that contains a URL-encoded newline ("%0a") before the FTP command, which causes the commands to be inserted into the resulting FTP session, as demonstrated using a PORT command.
[ "cpe:2.3:a:microsoft:ie:6.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:ie:6.0:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:*" ]
CVE-2008-2717
TYPO3 4.0.x before 4.0.9, 4.1.x before 4.1.7, and 4.2.x before 4.2.1, uses an insufficiently restrictive default fileDenyPattern for Apache, which allows remote attackers to bypass security restrictions and upload configuration files such as .htaccess, or conduct file upload attacks using multiple extensions.
[ "cpe:2.3:a:apache:apache_webserver:*:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:4.2:*:*:*:*:*:*:*" ]
CVE-2022-41664
A vulnerability has been identified in JT2Go (All versions < V14.1.0.4), Teamcenter Visualization V13.2 (All versions < V13.2.0.12), Teamcenter Visualization V13.3 (All versions < V13.3.0.7), Teamcenter Visualization V14.0 (All versions < V14.0.0.3), Teamcenter Visualization V14.1 (All versions < V14.1.0.4). The affected application contains a stack-based buffer overflow vulnerability that could be triggered while parsing specially crafted PDF files. This could allow an attacker to execute code in the context of the current process.
[ "cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*" ]
GHSA-pjcw-v852-66p8
SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated SKP file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.
[]
GHSA-24v7-vg5j-58f6
A vulnerability, which was classified as problematic, was found in Control iD RH iD 25.2.25.0. This affects an unknown part of the file /v2/customerdb/person.svc/change_password of the component API Handler. The manipulation of the argument message leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
GHSA-6r24-85vx-c6p2
admin.php in Virtual War (VWar) 1.5 and versions before 1.2 allows remote attackers to obtain sensitive information via an invalid vwar_root parameter, which reveals the path in an error message.
[]
GHSA-gm56-4fv5-gp9q
The Per page add to head WordPress plugin before 1.4.4 is lacking any CSRF check when saving its settings, which could allow attackers to make a logged in admin change them. Furthermore, as the plugin allows arbitrary HTML to be inserted in one of the setting (feature mentioned by the plugin), this could lead to Stored XSS issue which will be triggered either in the backend, frontend or both depending on the payload used.
[]
GHSA-6f37-5xj5-jmhh
The row_is_empty function in base/4bitmap.c:272 in minidjvu 0.8 can cause a denial of service (invalid memory read and application crash) via a crafted djvu file.
[]
CVE-2020-0543
Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
[ "cpe:2.3:h:intel:celeron_1000m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_1005m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_1007u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_1017u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_1019y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_1020e:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_1020m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_1037u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_1047ue:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_2955u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_2957u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_2970m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_2980u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_2981u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_3755u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_3765u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_3855u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_3865u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_3955u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_3965u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_3965y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_5305u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_725c:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_927ue:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g1610:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g1610t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g1620:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g1620t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g1630:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g1820:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g1820t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g1830:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g1840:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g1840t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g1850:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g3900:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g3900t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g3900te:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g3902e:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g3920:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g3920t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g3930e:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g3930te:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g3940:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g4900:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g4900t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g4920:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g4930:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g4950:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_4205u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_4410y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_4415y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_5405u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_8269u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_9300h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_9750hf:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-2115c:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-3110m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-3115c:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-3120m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-3120me:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-3130m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-3210:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-3217u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-3217ue:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-3220:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-3220t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-3225:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-3227u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-3229y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-3240:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-3240t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-3245:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-3250:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-3250t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4005u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4010u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4010y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4012y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4020y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4025u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4030u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4030y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4100m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4100u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4110m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4120u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4130:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4130t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4150:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4150t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4158u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4160:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4160t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4170:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4170t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4330:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4330t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4340:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4350:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4350t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4360:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4360t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4370:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4370t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-5005u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-5006u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-5010u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-5015u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-5020u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-5157u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-6100:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-6100e:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-6100h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-6100t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-6100te:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-6100u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-6102e:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-6110u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-6120:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-6120t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-6167u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-6300:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-6300t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-6320:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-6320t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-7007u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-7020u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-7100e:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-7100h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-7100u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-7101e:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-7101te:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-7102e:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-7110u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-7120:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-7120t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-7130u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-7167u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-7320t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-7340:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8000:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8000t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8020:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8120:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-i3-8100h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10110y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3210m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3230m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3317u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3320m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3330:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3330s:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3337u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3339y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3340:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3340m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3340s:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3350p:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3360m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3380m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3427u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3437u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3439y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3450:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3450s:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3470:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3470s:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3470t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3475s:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3550:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3550s:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3570:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3570k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3570s:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3570t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3610me:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4200u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4200y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4202y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4210h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4210u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4210y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4220y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4250u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4258u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4260u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4278u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4288u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4300u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4300y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4302y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4308u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4350u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4402ec:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4430:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4430s:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4440:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4440s:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4460:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4460s:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4460t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4570:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4570r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4570s:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4570t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4590:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4590s:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4590t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4670:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4670k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4670r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4670s:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4670t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4690:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4690s:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4690t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-5200u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-5250u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-5257u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-5287u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-5350:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-5350u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-5575r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-5675c:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-5675r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6200u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6210u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6260u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6267u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6287u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6300hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6300u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6310u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6350hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6360u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6400:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6400t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6440eq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6440hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6442eq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6500:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6500t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6500te:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6600:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6600k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6600t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7200u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7210u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7260u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7267u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7287u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7300hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7300u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7360u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7400:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7400t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7440eq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7440hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7442eq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7500:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7500t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7500u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7600:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7600k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7600t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7640x:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7y54:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7y57_:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8420:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8420t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8550:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8650:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8650k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-9400:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-9400f:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-9400h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-9600k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-9600kf:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3517u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3517ue:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3520m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3537u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3540m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3555le:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3610qe:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3610qm:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3612qe:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3612qm:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3615qe:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3615qm:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3630qm:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3632qm:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3635qm:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3667u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3687u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3689y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3720qm:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3740qm:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3770:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3770k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3770s:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3770t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3820qm:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3840qm_:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3920xm:-:*:*:*:extreme:*:*:*", "cpe:2.3:h:intel:core_i7-3940xm:-:*:*:*:extreme:*:*:*", "cpe:2.3:h:intel:core_i7-4500u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4510u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4550u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4558u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4578u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4600u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4610y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4650u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4700ec:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4700eq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4700hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4700mq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4702ec:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4702hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4702mq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4710hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4710mq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4712hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4712mq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4720hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4722hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4750hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4760hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4765t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4770:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4770hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4770k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4770r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4770s:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4770t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4771:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4785t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4790:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4790s:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4790t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4800mq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4810mq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4850hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4860hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4870hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4900mq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4910mq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4950hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4960hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4980hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-5500u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-5550u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-5557u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-5600u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-5650u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-5700eq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-5700hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-5750hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-5775c:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-5775r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-5850eq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-5850hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-5950hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6500u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6510u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6560u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6567u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6600u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6650u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6660u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6700:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6700hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6700k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6700t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6700te:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6770hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6820eq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6820hk:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6820hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6822eq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6870hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6920hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6970hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7510u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7740x:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8510y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8560u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8670:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8670t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-9700kf:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-9880h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-9900kf:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-9980hk:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m-5y10:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m-5y10a:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m-5y10c:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m-5y3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m-5y51:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m-5y70:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m-5y71:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m3-6y30:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m3-7y30:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m5-6y54:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m5-6y57:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m7-6y75:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_1405_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_2020m_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_2030m_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_2117u_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_2127u_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_2129y_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_3205u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_3215u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_3556u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_3558u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_3560m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_3560y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_3561y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_3665u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_3765u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_3805u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_3825u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_4405u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_4405y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_4415u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_a1018_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_b915c:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_b925c:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g2010_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g2020_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g2020t_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g2030_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g2030t_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g2100t_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g2120_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g2120t_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g2130_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g2140_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g3220:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g3220t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g3240:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g3240t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g3250:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g3250t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g3258:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g3260:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g3260t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g3420:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g3420t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g3430:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g3440:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g3440t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g3450:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g3450t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g3460:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g3460t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g3470:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g4400:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g4400t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g4400te:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g4420:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g4420t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g4500:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g4500t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g4520:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g4520t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g4540:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g5400:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g5400t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g5420:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g5420t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g5500:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g5500t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g5600:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2184g:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2254me:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2254ml:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2276me:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2276ml:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2284g:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1105c:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1105c_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1125c:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1125c_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1220_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1220_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1220_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1220_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1220l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1220l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1221_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1225_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1225_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1225_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1225_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1226_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1230_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1230_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1230_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1230_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1230l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1231_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1235_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1235l_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1240_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1240_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1240_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1240_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1240l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1240l_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1241_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1245_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1245_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1245_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1245_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1246_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1258l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1260l_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1265l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1265l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1265l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1268l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1268l_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1270:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1270_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1270_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1270_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1271_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1275_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1275_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1275_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1275_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1275l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1276_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1278l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1280_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1280_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1280_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1280_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1281_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1285_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1285_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1285_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1285l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1286_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1286l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1290_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1501l_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1501m_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1505l_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1505l_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1505m_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1505m_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1515m_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1535m_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1535m_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1545m_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1558l_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1565l_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1575m_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1578l_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1585_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1585l_v5:-:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_field_pg_m4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_field_pg_m4:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_ipc347e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_ipc347e:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_ipc427d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_ipc427d:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_ipc477d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_ipc477d:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_ipc527g_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_ipc527g:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_ipc547e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_ipc547e:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_ipc627d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_ipc627d:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_ipc647d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_ipc647d:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_ipc677d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_ipc677d:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_ipc827d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_ipc827d:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_ipc847d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_ipc847d:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_ipc3000_smart_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_ipc3000_smart:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simotion_p320-4e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simotion_p320-4e:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simotion_p320-4s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simotion_p320-4s:-:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:threat_intelligence_exchange_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:threat_intelligence_exchange_server:3.0.0:*:*:*:*:*:*:*" ]
CVE-2016-8794
Huawei Mate 8 phones with software Versions before NXT-AL10C00B386, Versions before NXT-CL00C92B386, Versions before NXT-DL00C17B386, Versions before NXT-TL00C01B386; Mate S phones with software Versions before CRR-CL00C92B368, Versions before CRR-CL20C92B368, Versions before CRR-TL00C01B368, Versions before CRR-UL00C00B368, Versions before CRR-UL20C00B368; and P8 phones with software Versions before GRA-TL00C01B366, Versions before GRA-CL00C92B366, Versions before GRA-CL10C92B366, Versions before GRA-UL00C00B366, Versions before GRA-UL10C00B366 allow attackers with graphic or Camera privilege to crash the system or escalate privilege.
[ "cpe:2.3:o:huawei:mate_s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:mate_s:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:mate_8_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:mate_8:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:p8_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:p8:-:*:*:*:*:*:*:*" ]
GHSA-jgqp-37qx-xpp9
Improper authorization in some Intel(R) QAT drivers for Windows - HW Version 2.0 before version 2.0.4 may allow an authenticated user to potentially enable escalation of privilege via local access.
[]
CVE-2024-35189
Sensitive Data Disclosure Vulnerability in Connection Configuration Endpoints in Fides
Fides is an open-source privacy engineering platform. The Fides webserver has a number of endpoints that retrieve `ConnectionConfiguration` records and their associated `secrets` which _can_ contain sensitive data (e.g. passwords, private keys, etc.). These `secrets` are stored encrypted at rest (in the application database), and the associated endpoints are not meant to expose that sensitive data in plaintext to API clients, as it could be compromising. Fides's developers have available to them a Pydantic field-attribute (`sensitive`) that they can annotate as `True` to indicate that a given secret field should not be exposed via the API. The application has an internal function that uses `sensitive` annotations to mask the sensitive fields with a `"**********"` placeholder value. This vulnerability is due to a bug in that function, which prevented `sensitive` API model fields that were _nested_ below the root-level of a `secrets` object from being masked appropriately. Only the `BigQuery` connection configuration secrets meets these criteria: the secrets schema has a nested sensitive `keyfile_creds.private_key` property that is exposed in plaintext via the APIs. Connection types other than `BigQuery` with sensitive fields at the root-level that are not nested are properly masked with the placeholder and are not affected by this vulnerability. This vulnerability has been patched in Fides version 2.37.0. Users are advised to upgrade to this version or later to secure their systems against this threat. Users are also advised to rotate any Google Cloud secrets used for BigQuery integrations in their Fides deployments. There are no known workarounds for this vulnerability.
[ "cpe:2.3:a:ethyca:fides:*:*:*:*:*:*:*:*" ]
CVE-2019-3946
Fuji Electric V-Server before 6.0.33.0 is vulnerable to denial of service via a crafted UDP message sent to port 8005. An unauthenticated, remote attacker can crash vserver.exe due to an integer overflow in the UDP message handling logic.
[ "cpe:2.3:a:fujielectric:v-server:*:*:*:*:*:*:*:*" ]
CVE-2025-29929
Tuleap is missing CSRF protection on tracker hierarchy administration
Tuleap is an Open Source Suite to improve management of software developments and collaboration. Tuleap is missing CSRF protection on tracker hierarchy administration. An attacker could use this vulnerability to trick victims into submitting or editing artifacts or follow-up comments. This vulnerability is fixed in Tuleap Community Edition 16.5.99.1742306712 and Tuleap Enterprise Edition 16.5-5 and 16.4-8.
[]
GHSA-cxvf-5j6c-r2hw
This issue was addressed with improved checks. This issue is fixed in iOS 14.6 and iPadOS 14.6. A malicious application may disclose restricted memory.
[]
GHSA-mm4g-qrpv-xjp8
Cross-site scripting (XSS) vulnerability in Thyme 1.3 allows remote attackers to inject arbitrary web script or HTML via the search page.
[]
CVE-2022-45654
Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the ssid parameter in the form_fast_setting_wifi_set function.
[ "cpe:2.3:o:tendacn:ac6_firmware:15.03.05.19:*:*:*:*:*:*:*", "cpe:2.3:h:tendacn:ac6:1.0:*:*:*:*:*:*:*" ]
GHSA-6987-q296-ph62
Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
[]
GHSA-v6rm-r85m-cc6r
Directory traversal vulnerability in Net2Soft Flash FTP Server 1.0 allows remote attackers to read and create arbitrary files via a /.. (slash dot dot).
[]
CVE-2022-49556
KVM: SVM: Use kzalloc for sev ioctl interfaces to prevent kernel data leak
In the Linux kernel, the following vulnerability has been resolved: KVM: SVM: Use kzalloc for sev ioctl interfaces to prevent kernel data leak For some sev ioctl interfaces, the length parameter that is passed maybe less than or equal to SEV_FW_BLOB_MAX_SIZE, but larger than the data that PSP firmware returns. In this case, kmalloc will allocate memory that is the size of the input rather than the size of the data. Since PSP firmware doesn't fully overwrite the allocated buffer, these sev ioctl interface may return uninitialized kernel slab memory.
[]
GHSA-8cmm-g77p-8476
The Chamber Dashboard Business Directory plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'business_categories' shortcode in all versions up to, and including, 3.3.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
GHSA-8qvq-m6fq-4488
Cross-site scripting (XSS) vulnerability in the OpenID Connect (OIDC) client web application in IBM WebSphere Application Server (WAS) Liberty Profile 8.5.5 before 8.5.5.9 allows remote attackers to inject arbitrary web script or HTML via a crafted URL.
[]
CVE-2010-1385
Use-after-free vulnerability in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PDF document.
[ "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.0b:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.9:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.10:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*" ]
CVE-2025-24149
An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iPadOS 17.7.4, macOS Ventura 13.7.3, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Parsing a file may lead to disclosure of user information.
[]
GHSA-fm4q-mp55-8386
An elevation of privilege vulnerability exists when Windows Lockscreen fails to properly load spotlight images from a secure location, aka 'Windows Lockscreen Elevation of Privilege Vulnerability'.
[]
GHSA-j2p9-99mh-4f77
Deserialization of Untrusted Data vulnerability in Teastudio.Pl WP Posts Carousel allows Object Injection.This issue affects WP Posts Carousel: from n/a through 1.3.12.
[]
CVE-2024-3388
PAN-OS: User Impersonation in GlobalProtect SSL VPN
A vulnerability in the GlobalProtect Gateway in Palo Alto Networks PAN-OS software enables an authenticated attacker to impersonate another user and send network packets to internal assets. However, this vulnerability does not allow the attacker to receive response packets from those internal assets.
[]
GHSA-crvf-2mp8-85gm
Exiv2::ul2Data in types.cpp in Exiv2 v0.26 allows remote attackers to cause a denial of service (heap-based buffer overflow) via a crafted image file.
[]
CVE-2023-31498
A privilege escalation issue was found in PHP Gurukul Hospital Management System In v.4.0 allows a remote attacker to execute arbitrary code and access sensitive information via the session token parameter.
[ "cpe:2.3:a:phpgurukul:hospital_management_system:4.0:*:*:*:*:*:*:*" ]
CVE-2020-16862
Microsoft Dynamics 365 (on-premises) Remote Code Execution Vulnerability
<p>A remote code execution vulnerability exists in Microsoft Dynamics 365 (on-premises) when the server fails to properly sanitize web requests to an affected Dynamics server. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the SQL service account. An authenticated attacker could exploit this vulnerability by sending a specially crafted request to a vulnerable Dynamics server. The security update addresses the vulnerability by correcting how Microsoft Dynamics 365 (on-premises) validates and sanitizes user input.</p>
[ "cpe:2.3:a:microsoft:dynamics_365:9.0:*:*:*:on-premises:*:*:*", "cpe:2.3:a:microsoft:dynamics_365:9.0:*:*:*:*:*:*:*" ]
CVE-2006-2253
PHP remote file inclusion vulnerability in visible_count_inc.php in Statit 4 (060207) allows remote attackers to execute arbitrary PHP code via a URL in the statitpath parameter.
[ "cpe:2.3:a:otterware:statit:4_2006-02-07:*:*:*:*:*:*:*" ]
GHSA-fggw-qcx2-vr8w
Missing Authorization vulnerability in brandtoss WP Mailster allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Mailster: from n/a through 1.8.16.0.
[]
CVE-2024-13661
Table Editor <= 1.5.1 - Authenticated (Contributor+) Stored Cross-Site Scripting
The Table Editor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wptableeditor_vtabs' shortcode in all versions up to, and including, 1.5.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
GHSA-f57j-3gmq-w3hx
Vulnerability in the Oracle Applications Manager product of Oracle E-Business Suite (component: SQL Extensions). Supported versions that are affected are 12.1.3 and 12.2.3 - 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Applications Manager. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Applications Manager accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
[]
CVE-2020-2096
Jenkins Gitlab Hook Plugin 1.4.2 and earlier does not escape project names in the build_now endpoint, resulting in a reflected XSS vulnerability.
[ "cpe:2.3:a:jenkins:gitlab_hook:*:*:*:*:*:jenkins:*:*" ]
CVE-2010-2260
Multiple cross-site scripting (XSS) vulnerabilities in Gambit Design Bandwidth Meter, 0.72 and possibly 1.2, allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO to (1) view_by_name.php or (2) view_by_ip.php in admin/. NOTE: some sources report that the affected product is ShaPlus Bandwidth Meter, but this is incorrect.
[ "cpe:2.3:a:gambitdesign:bandwidth_meter:0.72:*:*:*:*:*:*:*", "cpe:2.3:a:gambitdesign:bandwidth_meter:1.2:*:*:*:*:*:*:*" ]
CVE-2020-15319
Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has a hardcoded RSA SSH key for the root account within the /opt/mysql chroot directory tree.
[ "cpe:2.3:a:zyxel:cloudcnm_secumanager:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:zyxel:cloudcnm_secumanager:3.1.1:*:*:*:*:*:*:*" ]
GHSA-4rg2-7c4x-vrww
Cross-site request forgery vulnerability exists in Active! mail 6 BuildInfo: 6.60.06008562 and earlier. If this vulnerability is exploited, unintended E-mail may be sent when a user accesses a specially crafted URL while being logged in.
[]
GHSA-7p4c-c4rq-7g98
Apache Allura's neighborhood settings are vulnerable to a stored XSS attack.  Only neighborhood admins can access these settings, so the scope of risk is limited to configurations where neighborhood admins are not fully trusted.This issue affects Apache Allura: from 1.4.0 through 1.17.0.Users are recommended to upgrade to version 1.17.1, which fixes the issue.
[]
GHSA-m3q9-44rg-xw34
A DLL hijacking vulnerability was identified in the Qognify VMS Client Viewer version 7.1 or higher, which allows local users to execute arbitrary code and obtain higher privileges via careful placement of a malicious DLL, if some specific pre-conditions are met.
[]
CVE-2019-16891
Liferay Portal CE 6.2.5 allows remote command execution because of deserialization of a JSON payload.
[ "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:6.1.0:b1:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:6.1.0:b2:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:6.1.0:b3:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:6.1.0:b4:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:6.1.0:ga1:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:6.1.0:rc1:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:6.1.1:ga2:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:6.1.2:ga3:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:6.2.0:b1:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:6.2.0:b2:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:6.2.0:ga1:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:6.2.0:m1:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:6.2.0:m2:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:6.2.0:m3:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:6.2.0:m4:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:6.2.0:m5:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:6.2.0:m6:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:6.2.0:rc1:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:6.2.0:rc2:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:6.2.0:rc3:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:6.2.0:rc4:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:6.2.0:rc5:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:6.2.0:rc6:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:6.2.1:ga2:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:6.2.2:ga3:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:6.2.3:ga4:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:6.2.4:ga5:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:6.2.5:ga6:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.0.0:a1:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.0.0:a2:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.0.0:a3:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.0.0:a4:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.0.0:a5:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.0.0:b1:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.0.0:b2:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.0.0:b3:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.0.0:b4:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.0.0:b5:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.0.0:b6:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.0.0:b7:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.0.0:ga1:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.0.0:m1:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.0.0:m2:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.0.0:m3:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.0.0:m4:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.0.0:m5:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.0.0:m6:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.0.0:m7:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.0.1:ga2:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.0.2:ga3:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.0.3:ga4:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.0.4:ga5:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.0.5:ga6:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.0.6:ga7:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.1.0:a1:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.1.0:a2:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.1.0:b1:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.1.0:b2:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.1.0:b3:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.1.0:ga1:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.1.0:m1:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.1.0:m2:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.1.0:rc1:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.1.1:ga2:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.1.2:ga3:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.1.3:ga4:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.2.0:alpha1:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.2.0:beta1:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.2.0:beta2:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.2.0:beta3:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.2.0:m2:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.2.0:rc1:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.2.0:rc2:*:*:community:*:*:*", "cpe:2.3:a:liferay:liferay_portal:7.2.0:rc3:*:*:community:*:*:*" ]
GHSA-mqx5-2443-fv43
ABB PCM600 before 2.7 improperly stores PCM600 authentication credentials, which allows local users to obtain sensitive information via unspecified vectors.
[]
CVE-2024-35397
TOTOLINK CP900L v4.1.5cu.798_B20221228 weas discovered to contain a command injection vulnerability in the NTPSyncWithHost function via the hostTime parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.
[ "cpe:2.3:o:totolink:cp900l_firmware:*:*:*:*:*:*:*:*" ]
CVE-2024-10650
Denial of Service (DoS) in gaizhenbiao/chuanhuchatgpt
An unauthenticated Denial of Service (DoS) vulnerability was identified in ChuanhuChatGPT version 20240918, which could be exploited by sending large data payloads using a multipart boundary. Although a patch was applied for CVE-2024-7807, the issue can still be exploited by sending data in groups with 10 characters in a line, with multiple lines. This can cause the system to continuously process these characters, resulting in prolonged unavailability of the service. The exploitation now requires low privilege if authentication is enabled due to a version upgrade in Gradio.
[]
GHSA-75h8-mgrh-mq36
The Markdown on Save Improved plugin 2.5 for WordPress has a stored XSS vulnerability in the content of a post.
[]
CVE-2015-5004
The Edge Component Caching Proxy in IBM WebSphere Application Server (WAS) 8.0 before 8.0.0.12 and 8.5 before 8.5.5.8 does not properly encrypt data, which allows remote authenticated users to obtain sensitive information via unspecified vectors.
[ "cpe:2.3:a:ibm:websphere_application_server:8.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.0.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.0.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.0.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.0.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.0.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.0.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.0.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.0.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.5.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.5.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.5.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.5.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.5.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.5.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.5.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:8.5.5.7:*:*:*:*:*:*:*" ]
CVE-2005-3657
The ActiveX control in MCINSCTL.DLL for McAfee VirusScan Security Center does not use the IObjectSafetySiteLock API to restrict access to required domains, which allows remote attackers to create or append to arbitrary files via the StartLog and AddLog methods in the MCINSTALL.McLog object.
[ "cpe:2.3:a:mcafee:mcinsctl.dll:4.0.0.83:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:virusscan_security_center:*:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:virusscan_security_center:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:virusscan_security_center:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:virusscan_security_center:4.5:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:virusscan_security_center:4.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:virusscan_security_center:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:virusscan_security_center:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:virusscan_security_center:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:virusscan_security_center:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:virusscan_security_center:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:mcafee:virusscan_security_center:9.0:*:*:*:*:*:*:*" ]
CVE-2022-24335
JetBrains TeamCity before 2021.2 was vulnerable to a Time-of-check/Time-of-use (TOCTOU) race-condition attack in agent registration via XML-RPC.
[ "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*" ]
GHSA-7w3q-ccq4-qq6w
The Internet Service Monitor (ISM) agent in IBM Tivoli Composite Application Manager (ITCAM) for Transactions 7.1 and 7.2 before 7.2.0.3 IF28, 7.3 before 7.3.0.1 IF30, and 7.4 before 7.4.0.0 IF18 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain credential information via a crafted certificate.
[]
GHSA-g2qq-c5j9-5w5w
XWiki Platform vulnerable to privilege escalation and remote code execution via the edit action
ImpactIn XWiki Platform, it's possible for a user to execute any content with the right of an existing document's content author, provided the user have edit right on it. The reason for this is that the edit action sets the content without modifying the content author.To reproduce:Log in as a user without programming or script right.Open the URL `<xwiki-host>/xwiki/bin/edit/<document>/?content=%7B%7Bgroovy%7D%7Dprintln%28%22Hello+from+Groovy%21%22%29%7B%7B%2Fgroovy%7D%7D&xpage=view`, where `<xwiki-host>` is the URL of your XWiki installation and `<document>` is the path to a document whose content author has programming right (or script right) and on which the current user has edit right.The text "Hello from Groovy!" is displayed in the page content, showing that the Groovy macro has been executed, which should not be the case for a user without programming right.PatchesThis has been patched in XWiki 14.10.6 and 15.2RC1.WorkaroundsThere are no known workarounds for it.Referenceshttps://jira.xwiki.org/browse/XWIKI-20385https://github.com/xwiki/xwiki-platform/commit/a0e6ca083b36be6f183b9af33ae735c1e02010f4For more informationIf you have any questions or comments about this advisory:Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)Email us at [Security Mailing List](mailto:[email protected])
[]
GHSA-65x7-hx22-9x77
An OS command injection vulnerability in Palo Alto Networks PAN-OS software enables an authenticated administrator to disrupt system processes and potentially execute arbitrary code with limited privileges on the firewall.
[]
GHSA-fvq6-58cc-f6vv
Cisco Hot Standby Routing Protocol (HSRP) allows local attackers to cause a denial of service by spoofing HSRP packets.
[]
CVE-2019-8558
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.
[ "cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*", "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
GHSA-g92c-j3f9-j6gh
Stack-based buffer overflow in the reply_nttrans function in Samba 2.2.7a and earlier allows remote attackers to execute arbitrary code via a crafted request, a different vulnerability than CVE-2003-0201.
[]
GHSA-h4pg-gh86-xfpg
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 could allow a user with DATAACCESS privileges to execute routines that they should not have access to. IBM X-Force ID: 260214.
[]
GHSA-4vhp-8vcj-r74x
The Backup Migration plugin for WordPress is vulnerable to Remote File Inclusion in versions 1.0.8 to 1.3.9 via the 'content-dir' HTTP header. This makes it possible for unauthenticated attackers to include remote files on the server, resulting in code execution. NOTE: Successful exploitation of this vulnerability requires that the target server's php.ini is configured with 'allow_url_include' set to 'on'. This feature is deprecated as of PHP 7.4 and is disabled by default, but can still be explicitly enabled in later versions of PHP.
[]
GHSA-gxrf-44mp-mv84
The DNP Master Driver in Software Toolbox TOP Server before 5.12.140.0 allows remote attackers to cause a denial of service (master-station infinite loop) via crafted DNP3 packets to TCP port 20000 and allows physically proximate attackers to cause a denial of service (master-station infinite loop) via crafted input over a serial line.
[]
GHSA-mr2x-vhgx-59m3
Link Following Local Privilege Escalation Vulnerability in System Speedup Service in Avira Operations GmbH Avira Prime Version 1.1.96.2 on Windows 10 x64 allows local attackers to escalate privileges and execute arbitrary code in the context of SYSTEM via creating a symbolic link and leveraging a TOCTTOU (time-of-check to time-of-use) attack.
[]
GHSA-5vvc-xx34-vxvm
A vulnerability was found in Codezips E-Commerce Website 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /login.php. The manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
[]
CVE-2024-20802
Improper access control vulnerability in Samsung DeX prior to SMR Jan-2024 Release 1 allows owner to access other users&#39; notification in a multi-user environment.
[ "cpe:2.3:a:samsung:dex:*:*:*:*:*:*:*:*" ]
GHSA-xcm3-73w3-h54h
Directory traversal vulnerability in Worm HTTP server allows remote attackers to read arbitrary files via a .. (dot dot) attack.
[]
CVE-2019-5870
Use after free in media in Google Chrome prior to 77.0.3865.75 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
CVE-2025-21117
Dell Avamar, version 19.4 or later, contains an access token reuse vulnerability in the AUI. A low privileged local attacker could potentially exploit this vulnerability, leading to fully impersonating the user.
[]
GHSA-j695-2cjc-466g
Improper Input Validation vulnerability in Avid Avid NEXIS E-series on Linux, Avid Avid NEXIS F-series on Linux, Avid Avid NEXIS PRO+ on Linux, Avid System Director Appliance (SDA+) on Linux allows code execution on underlying operating system with root permissions.This issue affects Avid NEXIS E-series: before 2024.6.0; Avid NEXIS F-series: before 2024.6.0; Avid NEXIS PRO+: before 2024.6.0; System Director Appliance (SDA+): before 2024.6.0.
[]
GHSA-6m48-4c69-4g6c
U.S. Air Force Sensor Data Management System extract75 has a buffer overflow that leads to code execution. An overflow in a global variable (sBuffer) leads to a Write-What-Where outcome. Writing beyond sBuffer will clobber most global variables until reaching a pointer such as DES_info or image_info. By controlling that pointer, one achieves an arbitrary write when its fields are assigned. The data written is from a potentially untrusted NITF file in the form of an integer. The attacker can gain control of the instruction pointer.
[]
GHSA-cxhc-5wv5-j4r5
SonicWall Email Security Virtual Appliance version 10.0.9 and earlier versions contain a default username and a password that is used at initial setup. An attacker could exploit this transitional/temporary user account from the trusted domain to access the Virtual Appliance remotely only when the device is freshly installed and not connected to Mysonicwall.
[]
GHSA-pccg-qq7f-c364
An information leak vulnerability in Juniper Networks NorthStar Controller Application prior to version 2.1.0 Service Pack 1 may allow an unprivileged, authenticated, user to elevate their permissions through reading unprivileged information stored in the NorthStar controller.
[]
GHSA-mc58-2566-fgj6
Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Uniscribe Information Disclosure Vulnerability." CVE-2017-0085, CVE-2017-0091, CVE-2017-0092, CVE-2017-0111, CVE-2017-0112, CVE-2017-0113, CVE-2017-0114, CVE-2017-0115, CVE-2017-0117, CVE-2017-0118, CVE-2017-0119, CVE-2017-0120, CVE-2017-0121, CVE-2017-0122, CVE-2017-0123, CVE-2017-0124, CVE-2017-0125, CVE-2017-0126, CVE-2017-0127, and CVE-2017-0128.
[]
GHSA-whr9-5g7w-qc2h
The Taidii Diibear Android application 2.4.0 and all its derivatives allow attackers to view private chat messages and media files via logcat because of excessive logging.
[]
CVE-2024-13786
Education Center | LMS & Online Courses WordPress Theme <= 3.6.10 - PHP Object Injection
The education theme for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.6.10 via deserialization of untrusted input in the 'themerex_callback_view_more_posts' function. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present.
[]
GHSA-mgxr-46rv-3m86
Use-after-free vulnerability in the editing implementation in Blink, as used in Google Chrome before 31.0.1650.63, allows remote attackers to cause a denial of service or possibly have unspecified other impact via JavaScript code that triggers removal of a node during processing of the DOM tree, related to CompositeEditCommand.cpp and ReplaceSelectionCommand.cpp.
[]
CVE-2019-0060
Junos OS: SRX Series: flowd process crash due to processing of specific transit IP packets
The flowd process, responsible for forwarding traffic in SRX Series services gateways, may crash and restart when processing specific transit IP packets through an IPSec tunnel. Continued processing of these packets may result in an extended Denial of Service (DoS) condition. This issue only occurs when IPSec tunnels are configured. Systems without IPSec tunnel configurations are not vulnerable to this issue. This issue affects Juniper Networks Junos OS: 15.1X49 versions prior to 15.1X49-D171, 15.1X49-D180 on SRX Series; 18.2 versions 18.2R2-S1 and later, prior to 18.2R3 on SRX Series; 18.4 versions prior to 18.4R2 on SRX Series.
[ "cpe:2.3:o:juniper:junos:15.1x49:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d10:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d100:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d110:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d120:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d130:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d140:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d150:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d160:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d170:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d20:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d30:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d35:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d40:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d45:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d50:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d55:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d60:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d65:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d70:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d75:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d80:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:15.1x49:d90:*:*:*:*:*:*", "cpe:2.3:h:juniper:csrx:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*", "cpe:2.3:h:juniper:vsrx:-:*:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.2:r1-s5:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*", "cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*" ]