id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
listlengths
0
4.89k
CVE-2021-39222
XSS in Talk
Nextcloud is an open-source, self-hosted productivity platform. The Nextcloud Talk application was vulnerable to a stored Cross-Site Scripting (XSS) vulnerability. For exploitation, a user would need to right-click on a malicious file and open the file in a new tab. Due the strict Content-Security-Policy shipped with Nextcloud, this issue is not exploitable on modern browsers supporting Content-Security-Policy. It is recommended that the Nextcloud Talk application is upgraded to patched versions 10.0.7, 10.1.4, 11.1.2, 11.2.0 or 12.0.0. As a workaround, use a browser that has support for Content-Security-Policy.
[ "cpe:2.3:a:nextcloud:talk:*:*:*:*:*:*:*:*" ]
GHSA-8mfg-j523-2x92
Double free vulnerability in the krb5_recvauth function in MIT Kerberos 5 (krb5) 1.4.1 and earlier allows remote attackers to execute arbitrary code via certain error conditions.
[]
CVE-2003-1591
NWFTPD.nlm in the FTP server in Novell NetWare 6.0 before SP4 and 6.5 before SP1 allows user-assisted remote attackers to cause a denial of service (console hang) via a large number of FTP sessions, which are not properly handled during an NLM unload.
[ "cpe:2.3:o:novell:netware:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:novell:netware:6.0:sp1:*:*:*:*:*:*", "cpe:2.3:o:novell:netware:6.0:sp2:*:*:*:*:*:*", "cpe:2.3:o:novell:netware:6.0:sp3:*:*:*:*:*:*", "cpe:2.3:o:novell:netware:6.5:*:*:*:*:*:*:*" ]
GHSA-53gv-p4jm-h5xv
The Bold Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's AI features all versions up to, and including, 4.8.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
CVE-2023-47650
WordPress Add Local Avatar Plugin <= 12.1 is vulnerable to Cross Site Request Forgery (CSRF)
Cross-Site Request Forgery (CSRF) vulnerability in Peter Sterling Add Local Avatar.This issue affects Add Local Avatar: from n/a through 12.1.
[ "cpe:2.3:a:petersterling:add_local_avatar:*:*:*:*:*:wordpress:*:*" ]
CVE-2012-6505
Cross-site scripting (XSS) vulnerability in mods/hours/data/get_hours.php in PHP Volunteer Management 1.0.2 allows remote attackers to inject arbitrary web script or HTML via the id parameter.
[ "cpe:2.3:a:shawn_bradley:php_volunteer_management:1.0.2:*:*:*:*:*:*:*" ]
CVE-2021-33122
Insufficient control flow management in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable aescalation of privilege via local access.
[ "cpe:2.3:o:intel:xeon_e-2386g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2386g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2374g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2374g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2314_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2314:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2334_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2334:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2356g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2356g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2378_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2378:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2324g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2324g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2378g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2378g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2336_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2336:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2388g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2388g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1350_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1350:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1370_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1370:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1370p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1370p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1390_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1390:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1390p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1390p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1390t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1390t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1350p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1350p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1000g1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1000g4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1005g1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10100e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10100f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10100t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10100te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10100y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10105_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10105f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10105t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10110u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10110y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10300_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10300t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10305_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10305t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10320_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10325_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-11100he_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-11100he:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1110g4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1115g4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1115g4e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1115g4e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1115gre_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1115gre:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1120g4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1125g4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-9100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-9100:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-9100e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-9100e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-9100f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-9100f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-9100hl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-9100hl:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-9100t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-9100t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-9100te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-9100te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-9300_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-9300:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-9300t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-9300t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-9320_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-9320:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-9350k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-9350k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-9350kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-9350kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10200h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10210u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10210y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10300h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1030g4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1030g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10310u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10310y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1035g1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1035g4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1035g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1038ng7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10400f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10400h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10400t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10500e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10500h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10500t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10500te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10505_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10600k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10600kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10600t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11260h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11260h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11300h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11300h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1130g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11320h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11320h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1135g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11400:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11400f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11400f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11400h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11400h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11400t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11400t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1140g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1140g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1145g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1145g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1145g7e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1145g7e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1145gre_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1145gre:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11500:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11500h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11500h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11500he_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11500he:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11500t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11500t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1155g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1155g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11600:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11600k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11600k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11600kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11600kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11600t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11600t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-9300h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-9300h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-9300hf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-9300hf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-9400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-9400:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-9400f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-9400f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-9400h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-9400h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-9400t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-9400t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-9500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-9500:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-9500e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-9500e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-9500f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-9500f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-9500t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-9500t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-9500te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-9500te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-9600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-9600:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-9600k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-9600k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-9600kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-9600kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-9600t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-9600t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10510u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10510y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1060g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10610u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1065g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1068ng7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10700e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10700f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10700k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10700kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10700t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10700te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10710u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10750h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10810u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10850h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10870h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10875h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11370h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11375h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11390h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11390h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11600h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11600h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1160g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1165g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11700f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11700k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11700kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11700t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11800h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1180g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11850h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11850he_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11850he:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1185g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1185g7e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1185gre_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1195g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-9700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-9700:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-9700e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-9700e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-9700f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-9700f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-9700k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-9700kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-9700kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-9700t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-9700t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-9700te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-9700te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-9750h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-9750h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-9750hf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-9750hf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-9850h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-9850he_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-9850he:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-9850hl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-9850hl:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10850k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10885h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10900_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10900e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10900f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10900k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10900kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10900t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10900te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10980hk_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-11900_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11900:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-11900f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11900f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-11900h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11900h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-11900k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11900k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-11900kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11900kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-11900t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11900t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-11950h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11950h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-11980hk_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11980hk:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-9880h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-9880h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-9900_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-9900:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-9900k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-9900kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-9900kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-9900ks_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-9900ks:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-9900t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-9900t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-9980hk_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-9980hk:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-12900hx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-12900hx:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-12950hx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-12950hx:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-12900h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-12900h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-12900hk_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-12900hk:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-12650hx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-12650hx:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-12800hx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-12800hx:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-12850hx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-12850hx:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1250u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1250u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1255u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1255u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1260u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1260u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1265u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1265u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1270p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1270p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1280p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1280p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-12650h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-12650h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-12700h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-12700h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-12800h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-12800h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12450hx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12450hx:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12600hx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12600hx:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1230u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1230u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1235u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1235u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1240p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1240p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1240u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1240u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1245u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1245u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1250p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1250p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12450h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12450h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12500h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12500h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12600h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12600h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1210u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1210u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1215u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1215u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1220p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1220p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_silver_n6005_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_silver_n6005:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_silver_n6000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_silver_n6000:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n4500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n4500:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n4505_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n4505:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n4020_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n4120_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n4000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n4100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n5100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n5100:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n5105_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n5105:-:*:*:*:*:*:*:*" ]
GHSA-w5cv-2gw6-jxhf
IBM WebSphere Service Registry and Repository (WSRR) 8.5 before 8.5.0.1, when Chrome and WebSEAL are used, does not properly process ServiceRegistryDashboard logout actions, which allows remote attackers to bypass intended access restrictions by leveraging an unattended workstation.
[]
GHSA-xx9p-xxvh-7g8j
Aiohttp has inconsistent interpretation of `Content-Length` vs. `Transfer-Encoding` differing in C and Python fallbacks
ImpactAiohttp has a security vulnerability regarding the inconsistent interpretation of the http protocol. As we know that HTTP/1.1 is persistent, if we have both Content-Length(CL) and Transfer-Encoding(TE) it can lead to incorrect interpretation of two entities that parse the HTTP and we can poison other sockets with this incorrect interpretation.A possible Proof-of-Concept (POC) would be a configuration with a reverse proxy(frontend) that accepts both CL and TE headers and aiohttp as backend. As aiohttp parses anything with chunked, we can pass a chunked123 as TE, the frontend entity will ignore this header and will parse Content-Length. I can give a Dockerfile with the configuration if you want.The impact of this vulnerability is that it is possible to bypass any proxy rule, poisoning sockets to other users like passing Authentication Headers, also if it is present an Open Redirect (just like CVE-2021-21330) we can combine it to redirect random users to our website and log the request.Referenceshttps://github.com/aio-libs/aiohttp/commit/f016f0680e4ace6742b03a70cb0382ce86abe371
[]
GHSA-3vrj-cx4c-fgv7
Unspecified vulnerability in the PeopleSoft Enterprise HRMS component in Oracle PeopleSoft Products 9.1 allows remote authenticated users to affect confidentiality via unknown vectors related to Candidate Gateway, a different vulnerability than CVE-2012-1748.
[]
GHSA-pwwg-5g33-whmh
A vulnerability was found in Kashipara Food Management System up to 1.0. It has been rated as problematic. This issue affects some unknown processing of the file party_submit.php. The manipulation of the argument party_address leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249839.
[]
CVE-2017-1342
IBM Insights Foundation for Energy 2.0 could reveal sensitive information in error messages to authenticated users that could e used to conduct further attacks. IBM X-Force ID: 126457.
[ "cpe:2.3:a:ibm:insights_foundation_for_energy:2.0:*:*:*:*:*:*:*" ]
GHSA-q8r9-rm68-q588
The Login Logout Menu WordPress plugin before 1.4.0 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
[]
CVE-2007-6518
Multiple SQL injection vulnerabilities in search.php in WoltLab Burning Board (wBB) Lite 1.0.2 pl3e allow remote attackers to execute arbitrary SQL commands via the (1) showposts, (2) sortby, and (3) sortorder parameters.
[ "cpe:2.3:a:woltlab:burning_board_lite:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:woltlab:burning_board_lite:1.0.2_pl3e:*:*:*:*:*:*:*" ]
CVE-2024-38480
"Piccoma" App for Android and iOS versions prior to 6.20.0 uses a hard-coded API key for an external service, which may allow a local attacker to obtain the API key. Note that the users of the app are not directly affected by this vulnerability.
[]
GHSA-wjxv-ccw6-j9xh
The shopp_upload_file AJAX action of the Shopp WordPress plugin through 1.4, available to both unauthenticated and authenticated user does not have any security measure in place to prevent upload of malicious files, such as PHP, allowing unauthenticated users to upload arbitrary files and leading to RCE
[]
GHSA-hf49-gxv9-8h4v
onekeyadmin v1.3.9 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Member List module.
[]
GHSA-h73q-hjm3-vwgm
Integer overflow in Adobe Flash Player before 10.3.181.14 on Windows, Mac OS X, Linux, and Solaris and before 10.3.185.21 on Android allows attackers to execute arbitrary code via unspecified vectors.
[]
CVE-2024-43350
WordPress Propovoice CRM plugin <= 1.7.6.4 - Insecure Direct Object References (IDOR) vulnerability
Authorization Bypass Through User-Controlled Key vulnerability in Propovoice Propovoice CRM.This issue affects Propovoice CRM: from n/a through 1.7.6.4.
[ "cpe:2.3:a:propovoice:propovoice_crm:*:*:*:*:*:*:*:*" ]
GHSA-4hh7-83pv-xh8h
code.php in PC4Arb Pc4 Uploader 9.0 and earlier makes it easier for remote attackers to conduct SQL injection attacks via crafted keyword sequences that are removed from a filter in the id parameter in a banner action, as demonstrated via the "UNIunionON" string, which is collapsed into "UNION" by the filter_sql function.
[]
CVE-2018-14371
The getLocalePrefix function in ResourceManager.java in Eclipse Mojarra before 2.3.7 is affected by Directory Traversal via the loc parameter. A remote attacker can download configuration files or Java bytecodes from applications.
[ "cpe:2.3:a:eclipse:mojarra:*:*:*:*:*:*:*:*" ]
GHSA-c7p6-3c9c-f88q
Information Disclosure in TYPO3 CMS
HTTP requests being performed using the TYPO3 API expose the specific TYPO3 version to the called endpoint.
[]
CVE-2017-14271
XnView Classic for Windows Version 2.40 allows attackers to execute arbitrary code or cause a denial of service via a crafted .jb2 file, related to a "User Mode Write AV starting at ntdll_77400000!RtlImpersonateSelfEx+0x000000000000024e."
[ "cpe:2.3:a:xnview:xnview:2.40:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
CVE-2008-0826
Cross-site scripting (XSS) vulnerability in Claroline before 1.8.9 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:caroline:caroline:*:*:*:*:*:*:*:*" ]
CVE-2023-41280
QTS, QuTS hero, QuTScloud
A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.2.2533 build 20230926 and later QuTS hero h5.1.2.2534 build 20230927 and later QuTScloud c5.1.5.2651 and later
[ "cpe:2.3:o:qnap:qts:5.1.0.2348:build_20230325:*:*:*:*:*:*", "cpe:2.3:o:qnap:qts:5.1.0.2399:build_20230515:*:*:*:*:*:*", "cpe:2.3:o:qnap:qts:5.1.0.2418:build_20230603:*:*:*:*:*:*", "cpe:2.3:o:qnap:qts:5.1.0.2444:build_20230629:*:*:*:*:*:*", "cpe:2.3:o:qnap:qts:5.1.0.2466:build_20230721:*:*:*:*:*:*", "cpe:2.3:o:qnap:qts:5.1.1.2491:build_20230815:*:*:*:*:*:*", "cpe:2.3:o:qnap:qts:5.1.2.2533:-:*:*:*:*:*:*", "cpe:2.3:o:qnap:quts_hero:h5.1.0.2409:build_20230525:*:*:*:*:*:*", "cpe:2.3:o:qnap:quts_hero:h5.1.0.2424:build_20230609:*:*:*:*:*:*", "cpe:2.3:o:qnap:quts_hero:h5.1.0.2453:build_20230708:*:*:*:*:*:*", "cpe:2.3:o:qnap:quts_hero:h5.1.0.2466:build_20230721:*:*:*:*:*:*", "cpe:2.3:o:qnap:quts_hero:h5.1.1.2488:build_20230812:*:*:*:*:*:*", "cpe:2.3:o:qnap:quts_hero:h5.1.2.2534:-:*:*:*:*:*:*", "cpe:2.3:o:qnap:qutscloud:c5.1.0.2498:build_20230822:*:*:*:*:*:*" ]
CVE-2024-0611
The Master Slider – Responsive Touch Slider plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the slides callback functionality in all versions up to, and including, 3.9.5. This makes it possible for authenticated attackers, with editor-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
[ "cpe:2.3:a:averta:master_slider:*:*:*:*:*:wordpress:*:*" ]
CVE-2021-22495
An issue was discovered on Samsung mobile devices with O(8.x), P(9.0), Q(10.0), and R(11.0) (Exynos chipsets) software. The Mali GPU driver allows out-of-bounds access and a device reset. The Samsung ID is SVE-2020-19174 (January 2021).
[ "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:exynos:-:*:*:*:*:*:*:*" ]
CVE-2019-14367
Slack-Chat through 1.5.5 leaks a Slack Access Token in source code. An attacker can obtain a lot of information about the victim's Slack (channels, members, etc.).
[ "cpe:2.3:a:slack-chat_project:slack-chat:*:*:*:*:*:wordpress:*:*" ]
CVE-2018-14078
Wi2be SMART HP WMT R1.2.20_201400922 allows unauthorized remote attackers to reset the admin password via the /ConfigWizard/ChangePwd.esp?2admin URL (Attackers can login using the "admin" username with password "admin" after a successful attack).
[ "cpe:2.3:a:wi2be:smart_hp_wmt:r1.2.20_201400922:*:*:*:*:*:*:*" ]
CVE-2019-0291
Under certain conditions Solution Manager, version 7.2, allows an attacker to access information which would otherwise be restricted.
[ "cpe:2.3:a:sap:solution_manager:7.2:*:*:*:*:*:*:*" ]
GHSA-wpvr-2qhr-52v2
The ext4_orphan_del function in fs/ext4/namei.c in the Linux kernel before 3.7.3 does not properly handle orphan-list entries for non-journal filesystems, which allows physically proximate attackers to cause a denial of service (system hang) via a crafted filesystem on removable media, as demonstrated by the e2fsprogs tests/f_orphan_extents_inode/image.gz test.
[]
CVE-2019-19383
freeFTPd 1.0.8 has a Post-Authentication Buffer Overflow via a crafted SIZE command (this is exploitable even if logging is disabled).
[ "cpe:2.3:a:freeftpd:freeftpd:1.0.8:*:*:*:*:*:*:*" ]
GHSA-526j-q77m-37w5
In appendEventsToCacheLocked of SensorEventConnection.cpp, there is a possible out of bounds write due to a use-after-free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-9, Android-8.1, Android-10, Android-11; Android ID: A-168211968.
[]
GHSA-cw24-63qh-x675
An issue was discovered in the HID Global DigitalPersona (formerly Crossmatch) U.are.U 4500 Fingerprint Reader Windows Biometric Framework driver 5.0.0.5. It has a statically coded initialization vector to encrypt a user's fingerprint image, resulting in weak encryption of that. This, in combination with retrieving an encrypted fingerprint image and encryption key (through another vulnerability), allows an attacker to obtain a user's fingerprint image.
[]
CVE-2018-2943
Vulnerability in the Oracle Fusion Middleware MapViewer component of Oracle Fusion Middleware (subcomponent: Map Builder). Supported versions that are affected are 12.2.1.2.0 and 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Fusion Middleware MapViewer. Successful attacks of this vulnerability can result in takeover of Oracle Fusion Middleware MapViewer. CVSS 3.0 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
[ "cpe:2.3:a:oracle:fusion_middleware_mapviewer:12.2.1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware_mapviewer:12.2.1.3.0:*:*:*:*:*:*:*" ]
GHSA-4mxg-rfj6-76c7
Dell EMC iDRAC9 versions prior to 4.32.10.00 and 4.40.00.00 contain a reflected cross-site scripting vulnerability in the iDRAC9 web application. A remote attacker could potentially exploit this vulnerability to run malicious HTML or JavaScript in a victim’s browser by tricking a victim in to following a specially crafted link.
[]
GHSA-mgg3-mrhh-rr8r
Snapshot of IB can lead to invalid address access due to missing check for size in the related function in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8017, APQ8053, APQ8096AU, APQ8098, MDM9206, MDM9207C, MDM9607, MDM9650, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, Nicobar, QCN7605, QCS405, QCS605, QM215, SA6155P, SDA660, SDA845, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDX20, SDX24, SM6150, SM7150, SM8150, SM8250, SXR2130
[]
GHSA-2phm-q6hw-h5mw
Format string vulnerability in nslookupComplain function in BIND 4 allows remote attackers to gain root privileges.
[]
CVE-2024-56998
PHPGurukul Hospital Management System 4.0 is vulnerable to Cross Site Scripting (XSS) in /edit-profile.php via the parameter $address.
[]
GHSA-h6p7-m8x8-8xgp
WFTPD Pro Server 3.21 Release 1 allocates memory for a command until a 0Ah byte (newline) is sent, which allows local users to cause a denial of service (CPU consumption) by continuing to send a long command that does not contain a newline.
[]
CVE-2024-4362
SiteOrigin Widgets Bundle <= 1.60.0 - - Authenticated (Contributor+) Stored Cross-Site Scripting via 'siteorigin_widget' Shortcode
The SiteOrigin Widgets Bundle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'siteorigin_widget' shortcode in all versions up to, and including, 1.60.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
GHSA-ch5h-qj6v-8hfx
In Android before security patch level 2018-04-05 on Qualcomm Snapdragon Automobile, Snapdragon Mobile, and Snapdragon Wear MDM9206, MDM9607, MDM9650, SD 210/SD 212/SD 205, SD 400, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 808, SD 820, SD 820A, SD 835, SD 845, while playing an ASF file, a buffer over-read can potentially occur.
[]
GHSA-v67p-458v-rh8x
In nci_proc_ee_management_rsp of nci_hrcv.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-136565424
[]
CVE-2024-26824
crypto: algif_hash - Remove bogus SGL free on zero-length error path
In the Linux kernel, the following vulnerability has been resolved: crypto: algif_hash - Remove bogus SGL free on zero-length error path When a zero-length message is hashed by algif_hash, and an error is triggered, it tries to free an SG list that was never allocated in the first place. Fix this by not freeing the SG list on the zero-length error path.
[]
GHSA-jx4f-2jgh-g5h9
Cisco Hosted Collaboration Mediation Fulfillment 10.6(3) does not use RBAC, which allows remote authenticated users to obtain sensitive credential information by leveraging admin access and making SOAP API requests, aka Bug ID CSCuw84374.
[]
GHSA-85ch-9w9h-349j
The Rescue Shortcodes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's rescue_progressbar shortcode in all versions up to, and including, 2.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
GHSA-2rw6-f687-5qwg
Unspecified vulnerability in the Java SE and Java SE Embedded components in Oracle Java SE 6u105, 7u91, and 8u66 and Java SE Embedded 8u65 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
[]
GHSA-j4px-8jfg-f7fp
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Cozmoslabs Profile Builder Pro allows Reflected XSS.This issue affects Profile Builder Pro: from n/a through 3.10.0.
[]
CVE-2015-0102
IBM Workflow for Bluemix does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.
[ "cpe:2.3:a:ibm:workflow:-:*:*:*:*:bluemix:*:*" ]
CVE-2023-6824
WP Customer Area < 8.2.1 - Subscriber+ Account Address Leak
The WP Customer Area WordPress plugin before 8.2.1 does not properly validates user capabilities in some of its AJAX actions, allowing any users to retrieve other user's account address.
[ "cpe:2.3:a:marvinlabs:wp_customer_area:*:*:*:*:*:wordpress:*:*" ]
CVE-2022-38743
Rockwell Automation FactoryTalk VantagePoint versions 8.0, 8.10, 8.20, 8.30, 8.31 are vulnerable to an improper access control vulnerability. The FactoryTalk VantagePoint SQL Server account could allow a malicious user with read-only privileges to execute SQL statements in the back-end database. If successfully exploited, this could allow the attacker to execute arbitrary code and gain access to restricted data.
[ "cpe:2.3:a:rockwellautomation:factorytalk_vantagepoint:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:rockwellautomation:factorytalk_vantagepoint:8.10:*:*:*:*:*:*:*", "cpe:2.3:a:rockwellautomation:factorytalk_vantagepoint:8.20:*:*:*:*:*:*:*", "cpe:2.3:a:rockwellautomation:factorytalk_vantagepoint:8.30:*:*:*:*:*:*:*", "cpe:2.3:a:rockwellautomation:factorytalk_vantagepoint:8.31:*:*:*:*:*:*:*" ]
GHSA-hfjh-h3g2-p6m4
In TrendNet TW100-S4W1CA 2.3.32, due to a lack of proper session controls, a threat actor could make unauthorized changes to an affected router via a specially crafted web page. If an authenticated user were to interact with a malicious web page it could allow for a complete takeover of the router.
[]
CVE-2024-42452
A vulnerability in Veeam Backup & Replication allows a low-privileged user to start an agent remotely in server mode and obtain credentials, effectively escalating privileges to system-level access. This allows the attacker to upload files to the server with elevated privileges. The vulnerability exists because remote calls bypass permission checks, leading to full system compromise.
[ "cpe:2.3:a:veeam:agent:*:*:*:*:*:windows:*:*" ]
GHSA-vhv3-gpj3-fqm8
A vulnerability classified as critical was found in SourceCodester Online Eyewear Shop 1.0. This vulnerability affects the function registration of the file /oews/classes/Users.php?f=registration of the component Registration. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
GHSA-vww8-w2qw-qhfg
In the Linux kernel, the following vulnerability has been resolved:mm/gup: handle NULL pages in unpin_user_pages()The recent addition of "pofs" (pages or folios) handling to gup has a flaw: it assumes that unpin_user_pages() handles NULL pages in the pages** array. That's not the case, as I discovered when I ran on a new configuration on my test machine.Fix this by skipping NULL pages in unpin_user_pages(), just like unpin_folios() already does.Details: when booting on x86 with "numa=fake=2 movablecore=4G" on Linux 6.12, and running this:...I get the following crash:BUG: kernel NULL pointer dereference, address: 0000000000000008 RIP: 0010:sanity_check_pinned_pages+0x3a/0x2d0 ... Call Trace: <TASK> ? __die_body+0x66/0xb0 ? page_fault_oops+0x30c/0x3b0 ? do_user_addr_fault+0x6c3/0x720 ? irqentry_enter+0x34/0x60 ? exc_page_fault+0x68/0x100 ? asm_exc_page_fault+0x22/0x30 ? sanity_check_pinned_pages+0x3a/0x2d0 unpin_user_pages+0x24/0xe0 check_and_migrate_movable_pages_or_folios+0x455/0x4b0 __gup_longterm_locked+0x3bf/0x820 ? mmap_read_lock_killable+0x12/0x50 ? __pfx_mmap_read_lock_killable+0x10/0x10 pin_user_pages+0x66/0xa0 gup_test_ioctl+0x358/0xb20 __se_sys_ioctl+0x6b/0xc0 do_syscall_64+0x7b/0x150 entry_SYSCALL_64_after_hwframe+0x76/0x7e
[]
GHSA-99vr-7hvg-69wf
In camera driver, there is a possible memory corruption due to improper locking. This could lead to local denial of service in kernel.
[]
CVE-2003-0145
Unknown vulnerability in tcpdump before 3.7.2 related to an inability to "Handle unknown RADIUS attributes properly," allows remote attackers to cause a denial of service (infinite loop), a different vulnerability than CAN-2003-0093.
[ "cpe:2.3:a:lbl:tcpdump:3.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:lbl:tcpdump:3.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:lbl:tcpdump:3.7:*:*:*:*:*:*:*", "cpe:2.3:a:lbl:tcpdump:3.7.1:*:*:*:*:*:*:*" ]
CVE-2002-0938
Cross-site scripting vulnerability in CiscoSecure ACS 3.0 allows remote attackers to execute arbitrary script or HTML as other web users via the action argument in a link to setup.exe.
[ "cpe:2.3:a:cisco:secure_access_control_server:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:secure_access_control_server:3.0.1:*:*:*:*:*:*:*" ]
GHSA-99jj-cr4x-25gh
Possible integer overflow due to improper fragment datatype while calculating number of fragments in a request message in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile
[]
GHSA-fmcr-2q62-c3m5
dnslookup.cgi on NETGEAR DGN2200 devices with firmware through 10.0.0.50 allows remote authenticated users to execute arbitrary OS commands via shell metacharacters in the host_name field of an HTTP POST request, a different vulnerability than CVE-2017-6077.
[]
CVE-2024-34957
idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component admin/sysImages_deal.php?mudi=infoSet.
[ "cpe:2.3:a:idccms_project:idccms:*:*:*:*:*:*:*:*" ]
CVE-2023-31610
An issue in the _IO_default_xsputn component of openlink virtuoso-opensource v7.2.9 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements.
[ "cpe:2.3:a:openlinksw:virtuoso:7.2.9:*:*:*:open_source:*:*:*" ]
GHSA-h37f-vc2x-vjmj
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Buffer Errors vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
[]
CVE-2011-2688
SQL injection vulnerability in mysql/mysql-auth.pl in the mod_authnz_external module 3.2.5 and earlier for the Apache HTTP Server allows remote attackers to execute arbitrary SQL commands via the user field.
[ "cpe:2.3:a:mod_authnz_external_project:mod_authnz_external:*:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" ]
GHSA-j24h-7cpc-jxfw
This issue was addressed with improved checks to prevent unauthorized actions. This issue is fixed in iOS 15.4 and iPadOS 15.4, Security Update 2022-004 Catalina, macOS Monterey 12.3, macOS Big Sur 11.6.6. A malicious application may bypass Gatekeeper checks.
[]
GHSA-gm6q-8vw8-pwh3
Adobe Experience Manager versions 6.5.19 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[]
GHSA-2c6x-m49v-xr55
Attendance and Payroll System v1.0 was discovered to contain a SQL injection vulnerability via the component \admin\deduction_edit.php.
[]
GHSA-v4cm-27v4-325m
Unspecified vulnerability in Oracle Sun Solaris 11 allows local users to affect integrity via vectors related to NDMP Backup Service.
[]
CVE-2022-38248
Nagios XI before v5.8.7 was discovered to contain multiple cross-site scripting (XSS) vulnerabilities at auditlog.php.
[ "cpe:2.3:a:nagios:nagios_xi:*:*:*:*:*:*:*:*" ]
GHSA-mvgx-2j7g-9hxj
The setting module has a vulnerability of improper use of APIs. Successful exploitation of this vulnerability may affect data confidentiality.
[]
GHSA-vh49-3q2g-93gh
The usc-e-shop (aka Collne Welcart e-Commerce) plugin before 1.9.36 for WordPress allows Object Injection because of usces_unserialize. There is not a complete POP chain.
[]
CVE-2023-22226
Adobe Bridge SVG file Stack-based Buffer Overflow Arbitrary code execution
Adobe Bridge versions 12.0.3 (and earlier) and 13.0.1 (and earlier) are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:bridge:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
CVE-2020-23263
Persistent Cross-site scripting vulnerability on Fork CMS version 5.8.2 allows remote attackers to inject arbitrary Javascript code via the "navigation_title" parameter and the "title" parameter in /private/en/pages/add.
[ "cpe:2.3:a:fork-cms:fork_cms:5.8.2:*:*:*:*:*:*:*" ]
CVE-2024-11332
HIPAA Compliant Forms with Drag’n’Drop HIPAA Form Builder. Sign HIPAA documents <= 1.3.4 - Authenticated (Contributor+) Stored Cross-Site Scripting
The HIPAA Compliant Forms with Drag’n’Drop HIPAA Form Builder. Sign HIPAA documents plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'hipaatizer' shortcode in all versions up to, and including, 1.3.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
GHSA-wx9p-7hgq-2q2g
Cross-site scripting (XSS) vulnerability in P.A.I.D 2.2 allows remote attackers to inject arbitrary web script or HTML via the (1) read parameter in index.php, (2) farea parameter in faq.php, and (3) unspecified input fields on the "My Account" login page.
[]
GHSA-p5hc-42rh-g2ww
An issue was discovered in GNU LibreDWG 0.7 and 0.7.1645. There is a NULL pointer dereference in the function bit_convert_TU at bits.c.
[]
CVE-2004-1587
Buffer overflow in Monolith games including (1) Alien versus Predator 2 1.0.9.6 and earlier, (2) Blood 2 2.1 and earlier, (3) No one lives forever 1.004 and earlier and (4) Shogo 2.2 and earlier allows remote attackers to cause a denial of service (application crash) via a long secure Gamespy query.
[ "cpe:2.3:a:monolith_productions:alien_versus_predator:2.1.0.9.6:*:*:*:*:*:*:*", "cpe:2.3:a:monolith_productions:blood:2_2.1:*:*:*:*:*:*:*", "cpe:2.3:a:monolith_productions:no_one_lives_forever:1.0.004:*:*:*:*:*:*:*", "cpe:2.3:a:monolith_productions:shogo:2.2:*:*:*:*:*:*:*" ]
GHSA-qgc7-mgm3-q253
Uncontrolled Resource Consumption in golang.org/x/image
An attacker can craft a malformed TIFF image which will consume a significant amount of memory when passed to DecodeConfig. This could lead to a denial of service.
[]
CVE-2016-1573
Using a specially crafted fallback art property, scopes can execute arbitrary QML code in context of unity8-dash
Versions of Unity8 before 8.11+16.04.20160122-0ubuntu1 file plugins/Dash/CardCreator.js will execute any code found in place of a fallback image supplied by a scope.
[ "cpe:2.3:a:ubports:unity8:*:*:*:*:*:*:*:*" ]
CVE-2011-0781
Google Chrome before 9.0.597.84 does not properly handle autofill profile merging, which has unspecified impact and remote attack vectors.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
GHSA-3q34-45m9-2pqp
Vulnerability in the Oracle SD-WAN Edge product of Oracle Communications Applications (component: User Interface). Supported versions that are affected are 8.2 and 9.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle SD-WAN Edge. While the vulnerability is in Oracle SD-WAN Edge, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle SD-WAN Edge. CVSS 3.1 Base Score 10.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).
[]
CVE-2021-45937
wolfSSL wolfMQTT 1.9 has a heap-based buffer overflow in MqttClient_DecodePacket (called from MqttClient_WaitType and MqttClient_Connect).
[ "cpe:2.3:a:wolfssl:wolfmqtt:1.9:*:*:*:*:*:*:*" ]
GHSA-2wr3-xjqg-6q48
An issue was discovered in Fort before 1.6.3. A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) a resource certificate containing an Authority Key Identifier extension that lacks the keyIdentifier field. Fort references this pointer without sanitizing it first. Because Fort is an RPKI Relying Party, a crash can lead to Route Origin Validation unavailability, which can lead to compromised routing.
[]
GHSA-ffg7-4prh-6h36
Cross-site scripting (XSS) vulnerability in pixabay-images.php in the Pixabay Images plugin before 2.4 for WordPress allows remote attackers to inject arbitrary web script or HTML via the image_user parameter.
[]
GHSA-gr44-7grc-37vq
ActiveRecord vulnerable to modification of protected model attributes
ActiveRecord in Ruby on Rails before 2.3.17, 3.1.x before 3.1.11, and 3.2.x before 3.2.12 allows remote attackers to bypass the `attr_protected` protection mechanism and modify protected model attributes via a crafted request.
[]
GHSA-9q8j-gxp4-4c9j
A vulnerability, which was classified as critical, has been found in code-projects Online Class and Exam Scheduling System 1.0. This issue affects some unknown processing of the file /pages/department.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
CVE-2022-2736
SourceCodester Company Website CMS Background Upload Logo Icon updatelogo.php unrestricted upload
A vulnerability was found in SourceCodester Company Website CMS. It has been classified as critical. This affects an unknown part of the file /dashboard/updatelogo.php of the component Background Upload Logo Icon. The manipulation of the argument xfile/ufile leads to unrestricted upload. It is possible to initiate the attack remotely. The identifier VDB-205881 was assigned to this vulnerability.
[ "cpe:2.3:a:company_website_cms_project:company_website_cms:-:*:*:*:*:*:*:*" ]
GHSA-h28q-676m-8rq9
IBM CICS Transaction Server 3.1, 3.2, 4.1, 4.2, and 5.1 on z/OS does not properly implement CEMT transactions, which allows remote authenticated users to cause a denial of service (storage overlay) by using a 3270 emulator to send an invalid 3270 data stream.
[]
GHSA-q87g-7mp5-765q
Improper Neutralization of Input During Web Page Generation in Jenkins Script Security Plugin
Jenkins Script Security Plugin 1.72 and earlier does not correctly escape pending or approved classpath entries on the In-process Script Approval page, resulting in a stored cross-site scripting vulnerability.
[]
CVE-2019-11030
Mirasys VMS before V7.6.1 and 8.x before V8.3.2 mishandles the Mirasys.Common.Utils.Security.DataCrypt method in Common.dll in AuditTrailService in SMServer.exe. This method triggers insecure deserialization within the .NET garbage collector, in which a gadget (contained in a serialized object) may be executed with SYSTEM privileges. The attacker must properly encrypt the object; however, the hardcoded keys are available.
[ "cpe:2.3:a:mirasys:mirasys_vms:*:*:*:*:*:*:*:*" ]
CVE-2012-1620
slock 0.9 does not properly handle the XRaiseWindow event when the screen is locked, which might allow physically proximate attackers to obtain sensitive information by pressing a button, which reveals the desktop and active windows.
[ "cpe:2.3:a:suckless:slock:0.9:*:*:*:*:*:*:*" ]
CVE-2009-0611
Multiple cross-site scripting (XSS) vulnerabilities in qfsearch/AdminServlet in QuickFinder Server in Novell Open Enterprise Server 1.x allow remote attackers to inject arbitrary web script or HTML via (1) the siteloc parameter in a displayaddsite action, the site parameter in a (2) generalproperties or (3) clusterserviceproperties action, (4) the adminurl parameter in a global action, or (5) the print-list parameter.
[ "cpe:2.3:o:novell:open_enterprise_server:1.x:*:*:*:*:*:*:*" ]
GHSA-8jwg-83jp-crh2
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0117, CVE-2012-0486, CVE-2012-0488, CVE-2012-0489, CVE-2012-0491, CVE-2012-0493, and CVE-2012-0495.
[]
GHSA-m93g-73w8-3q73
Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allow an information vulnerability due to the way the Windows its:// protocol handler determines the zone of a request, aka "Microsoft Windows Information Disclosure Vulnerability".
[]
CVE-2023-3890
Campcodes Beauty Salon Management System edit-accepted-appointment.php cross site scripting
A vulnerability classified as problematic has been found in Campcodes Beauty Salon Management System 1.0. This affects an unknown part of the file /admin/edit-accepted-appointment.php. The manipulation of the argument id leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-235251.
[ "cpe:2.3:a:campcodes:beauty_salon_management_system:1.0:*:*:*:*:*:*:*" ]
GHSA-mwq3-wq3j-gq4v
QStar Archive Solutions Release RELEASE_3-0 Build 7 Patch 0 was discovered to contain a DOM Based Reflected Cross Site Scripting (XSS) vulnerability within the component qnme-ajax?method=tree_level.
[]
GHSA-j7h7-7c79-56qf
The User Profile Builder – Beautiful User Registration Forms, User Profiles & User Role Editor plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the wppb_toolbox_usermeta_handler function in all versions up to, and including, 3.10.7. This makes it possible for authenticated attackers, with contributor-level access and above, to expose sensitive information within user metadata.
[]
GHSA-vjfq-34vr-xpmm
Missing release of memory after effective lifetime in Windows Cryptographic Services allows an unauthorized attacker to execute code over a network.
[]
GHSA-5rh9-9jwh-jhmh
A vulnerability, which was classified as critical, has been found in TOTOLINK A3600R 4.1.2cu.5182_B20201102. Affected by this issue is the function loginauth of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument password/http_host leads to buffer overflow. The attack may be launched remotely. VDB-272594 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[]
GHSA-4hjh-mpfm-qhm5
An issue was discovered in GNOME gvfs 1.29.4 through 1.41.2. daemon/gvfsbackendadmin.c mishandles file ownership because setfsuid is not used.
[]