id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2015-2553
The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 mishandles junctions during mountpoint creation, which makes it easier for local users to gain privileges by leveraging certain sandbox access, aka "Windows Mount Point Elevation of Privilege Vulnerability."
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*" ]
null
null
null
7.2
CVE-2019-9387
In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-117569833
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*" ]
null
7.5
null
5
CVE-2025-5213
projectworlds Responsive E-Learning System delete_file.php sql injection
A vulnerability was found in projectworlds Responsive E-Learning System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/delete_file.php. The manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
7.3
7.3
7.5
GHSA-4mpv-9j83-cm3q
Osprey Pump Controller version 1.01 inputs passed to a GET parameter are not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML/JS code in a user's browser session in context of an affected site.
[]
null
6.1
null
null
CVE-2007-1325
The PMA_ArrayWalkRecursive function in libraries/common.lib.php in phpMyAdmin before 2.10.0.2 does not limit recursion on arrays provided by users, which allows context-dependent attackers to cause a denial of service (web server crash) via an array with many dimensions. NOTE: it could be argued that this vulnerability is caused by a problem in PHP (CVE-2006-1549) and the proper fix should be in PHP; if so, then this should not be treated as a vulnerability in phpMyAdmin.
[ "cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*" ]
null
null
null
7.1
CVE-2009-0871
The SIP channel driver in Asterisk Open Source 1.4.22, 1.4.23, and 1.4.23.1; 1.6.0 before 1.6.0.6; 1.6.1 before 1.6.1.0-rc2; and Asterisk Business Edition C.2.3, with the pedantic option enabled, allows remote authenticated users to cause a denial of service (crash) via a SIP INVITE request without any headers, which triggers a NULL pointer dereference in the (1) sip_uri_headers_cmp and (2) sip_uri_params_cmp functions.
[ "cpe:2.3:a:digium:asterisk:1.4.22:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.23:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.4.23.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.0:beta6:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.0:beta7:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.0:beta7.1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.0:beta8:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.0:beta9:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.0:rc5:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.0:rc6:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.0.3:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.0.4:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.1:beta1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.1:beta2:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.1:beta3:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.1:beta4:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:1.6.1:rc1:*:*:*:*:*:*", "cpe:2.3:a:digium:asterisk:c.2.3:-:business:*:*:*:*:*" ]
null
null
null
3.5
CVE-2008-3163
Directory traversal vulnerability in dodosmail.php in DodosMail 2.5 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the dodosmail_header_file parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:regretless:dodos_mail:2.5:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2022-31060
Banner topic data is exposed on login-required Discourse sites
Discourse is an open-source discussion platform. Prior to version 2.8.4 in the `stable` branch and version `2.9.0.beta5` in the `beta` and `tests-passed` branches, banner topic data is exposed on login-required sites. This issue is patched in version 2.8.4 in the `stable` branch and version `2.9.0.beta5` in the `beta` and `tests-passed` branches of Discourse. As a workaround, one may disable banners.
[ "cpe:2.3:a:discourse:discourse:*:*:*:*:*:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta4:*:*:*:*:*:*" ]
null
5.3
null
null
CVE-2021-41345
Storage Spaces Controller Elevation of Privilege Vulnerability
Storage Spaces Controller Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2237:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2237:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2237:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2237:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1854:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1854:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1854:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1288:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1288:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1288:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.288:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1288:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1288:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1288:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1288:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.1288:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.258:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.258:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19086:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19086:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4704:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4704:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4704:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20144:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20144:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20144:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23490:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012_r2:6.3.9600.20144:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:-:*:-:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-v352-rg37-5q5m
Apache Linkis vulnerable to privilege escalation
In Apache Linkis <= 1.5.0, Privilege Escalation in Basic management services where the attacking user is a trusted account allows access to Linkis's Token information. Users are advised to upgrade to version 1.6.0, which fixes this issue.
[]
7.1
5.3
null
null
CVE-2019-5368
A remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09.
[ "cpe:2.3:a:hp:intelligent_management_center:*:*:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:-:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0503:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0504:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p02:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p04:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0506:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p03:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p07:*:*:*:*:*:*" ]
null
null
8.8
9
CVE-2024-47347
WordPress Chartify plugin <= 2.7.6 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Chart Builder Team Chartify allows Reflected XSS.This issue affects Chartify: from n/a through 2.7.6.
[]
null
7.1
null
null
CVE-2015-4196
Platform Software before 4.4.5 in Cisco Unified Communications Domain Manager (CDM) 8.x has a hardcoded password for a privileged account, which allows remote attackers to obtain root access by leveraging knowledge of this password and entering it in an SSH session, aka Bug ID CSCuq45546.
[ "cpe:2.3:a:cisco:unified_communications_domain_manager:4.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_domain_manager:4.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_domain_manager:4.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:unified_communications_domain_manager:4.4.4:*:*:*:*:*:*:*" ]
null
null
null
5
RHEA-2023:7327
Red Hat Enhancement Advisory: Red Hat 3scale API Management 2.13.7 Release - Container Images
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:3scale:2.13::el7", "cpe:/a:redhat:3scale:2.13::el8" ]
null
7.5
null
null
GHSA-fwv9-7f7h-g7mm
Multiple cross-site scripting (XSS) vulnerabilities in pafiledb.php in paFileDB 3.1 allow remote attackers to inject arbitrary web script or HTML via the (1) sortby or (2) filelist parameters to the category action (category.php), or (3) pages parameter in the viewall action (viewall.php).
[]
null
null
null
null
CVE-2007-1109
Multiple cross-site scripting (XSS) vulnerabilities in Phpwebgallery 1.4.1 allow remote attackers to inject arbitrary web script or HTML via the (1) login or (2) mail_address field in Register.php, or the (3) search_author, (4) mode, (5) start_year, (6) end_year, or (7) date_type field in Search.php, a different vulnerability than CVE-2006-1674. NOTE: 1.6.2 and other versions might also be affected.
[ "cpe:2.3:a:phpwebgallery:phpwebgallery:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2021-34668
WordPress Real Media Library <= 4.14.1 Author-only Stored Cross-Site Scripting
The WordPress Real Media Library WordPress plugin is vulnerable to Stored Cross-Site Scripting via the name parameter in the ~/inc/overrides/lite/rest/Folder.php file which allows author-level attackers to inject arbitrary web scripts in folder names, in versions up to and including 4.14.1.
[ "cpe:2.3:a:devowl:wordpress_real_media_library:*:*:*:*:*:wordpress:*:*" ]
null
6.4
null
null
CVE-2020-9460
Octech Oempro 4.7 through 4.11 allow XSS by an authenticated user. The parameter CampaignName in Campaign.Create is vulnerable.
[ "cpe:2.3:a:octech:oempro:*:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
CVE-2020-1196
An elevation of privilege vulnerability exists in the way that the printconfig.dll handles objects in memory, aka 'Windows Print Configuration Elevation of Privilege Vulnerability'.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
7.8
null
4.6
GHSA-7xp8-p4r3-6rv8
A vulnerability was discovered in the firmware builds up to 10.10.2.2 in Poly Clariti Manager devices. The flaw does not properly neutralize input during a web page generation.
[]
null
5.4
null
null
GHSA-c655-qv2v-73rm
In FFmpeg version n6.1.1, specifically within the avcodec/speexdec.c module, a potential security vulnerability exists due to insufficient validation of certain parameters when parsing Speex codec extradata. This vulnerability could lead to integer overflow conditions, potentially resulting in undefined behavior or crashes during the decoding process.
[]
null
5.5
null
null
RHSA-2018:2552
Red Hat Security Advisory: Red Hat OpenShift Application Runtimes Node.js 8.11.4 security update
openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang nodejs: Out of bounds (OOB) write via UCS-2 encoding
[ "cpe:/a:redhat:openshift_application_runtimes:1.0::el7" ]
null
null
8.1
null
CVE-2006-0590
MyTopix 1.2.3 allows remote attackers to obtain the installation path via an invalid hl parameter to index.php, which leads to path disclosure, possibly related to invalid SQL syntax.
[ "cpe:2.3:a:jaia_interactive:mytopix:1.2.3:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2021-33755
Windows Hyper-V Denial of Service Vulnerability
Windows Hyper-V Denial of Service Vulnerability
[ "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2061:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2061:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1679:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1110:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1110:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1110:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.1110:*:*:*:*:*:*:*" ]
null
6.3
null
null
GHSA-qjw3-35px-c96q
A memory corruption vulnerability was found in the kernel function kern_getfsstat in MidnightBSD before 1.2.7 and 1.3 through 2020-08-19, and FreeBSD through 11.4, that allows an attacker to trigger an invalid free and crash the system via a crafted size value in conjunction with an invalid mode.
[]
null
null
null
null
GHSA-frm5-362q-rgg4
A vulnerability was found in Tenda AC23 16.03.07.45_cn. It has been declared as critical. This vulnerability affects unknown code of the file /bin/ate of the component Service Port 7329. The manipulation of the argument v2 leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-228778 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[]
null
null
7.2
null
CVE-2020-16213
Advantech WebAccess HMI Designer, Versions 2.1.9.31 and prior. Processing specially crafted project files lacking proper validation of user supplied data may cause the system to write outside the intended buffer area, which may allow remote code execution, disclosure/modification of information, or cause the application to crash.
[ "cpe:2.3:a:advantech:webaccess\\/hmi_designer:*:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
CVE-2010-2146
PHP remote file inclusion vulnerability in banned.php in Visitor Logger allows remote attackers to execute arbitrary PHP code via a URL in the VL_include_path parameter.
[ "cpe:2.3:a:graviton-mediatech:visitor_logger:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-6jcx-jf58-7hch
Out-of-Bounds Write vulnerability in Jungo WinDriver before 12.1.0 allows local attackers to cause a Windows blue screen error and Denial of Service (DoS).
[]
null
5.5
null
null
CVE-2023-26014
WordPress Minify HTML Plugin <= 2.1.7 is vulnerable to Cross Site Request Forgery (CSRF)
Cross-Site Request Forgery (CSRF) vulnerability in Tim Eckel Minify HTML plugin <= 2.1.7 vulnerability.
[ "cpe:2.3:a:dogblocker:minify_html:*:*:*:*:*:wordpress:*:*" ]
null
4.3
null
null
CVE-2010-0480
Multiple stack-based buffer overflows in the MPEG Layer-3 audio codecs in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allow remote attackers to execute arbitrary code via a crafted AVI file, aka "MPEG Layer-3 Audio Decoder Stack Overflow Vulnerability."
[ "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:x86:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*" ]
null
null
null
9.3
GHSA-h7hj-mf8m-2h22
Race condition in ESET NOD32 Antivirus before 2.2289 allows remote attackers to execute arbitrary code via a crafted CAB file, which triggers heap corruption.
[]
null
null
null
null
CVE-2015-7766
PGSQL:SubmitQuery.do in ZOHO ManageEngine OpManager 11.6, 11.5, and earlier allows remote administrators to bypass SQL query restrictions via a comment in the query to api/json/admin/SubmitQuery, as demonstrated by "INSERT/**/INTO."
[ "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:11.6:*:*:*:*:*:*:*" ]
null
null
null
9
GHSA-x2r5-97q9-ch4c
Adobe Reader and Acrobat 8.x before 8.3.1, 9.x before 9.4.6, and 10.x before 10.1.1 allow attackers to execute arbitrary code via unspecified vectors, related to a "memory leakage condition vulnerability."
[]
null
null
null
null
GHSA-m2cw-vw6v-jp5c
Buffer overflow in the IGDstartelt function in igd_desc_parse.c in the MiniUPnP client (aka MiniUPnPc) before 1.9.20150917 allows remote UPNP servers to cause a denial of service (application crash) and possibly execute arbitrary code via an "oversized" XML element name.
[]
null
null
null
null
GHSA-89cv-84hg-jg67
dtc 0.29.6 allows local users to overwrite arbitrary files via a symlink attack on (a) /tmp/awstats.log, (b) /tmp/spam.log.#####, and (c) /tmp/spam_err.log temporary files, related to the (1) accesslog.php and (2) sa-wrapper scripts.
[]
null
null
null
null
RHSA-2021:3160
Red Hat Security Advisory: thunderbird security update
Mozilla: Uninitialized memory in a canvas object could have led to memory corruption Mozilla: Incorrect instruction reordering during JIT optimization Mozilla: Use-after-free media channels Mozilla: Race condition when resolving DNS names could have led to memory corruption Mozilla: Memory corruption as a result of incorrect style treatment Mozilla: Memory safety bugs fixed in Thunderbird 78.13
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
8.8
7.5
null
CVE-2023-21725
Windows Malicious Software Removal Tool Elevation of Privilege Vulnerability
Windows Malicious Software Removal Tool Elevation of Privilege Vulnerability
[ "cpe:2.3:a:microsoft:windows_malicious_software_removal_tool:*:*:*:*:*:*:*:*" ]
null
6.3
null
null
CVE-2025-1701
Local Privilege Escalation in MIM Admin Service
CVE-2025-1701 is a high-severity vulnerability in the MIM Admin service. An attacker could exploit this vulnerability by sending a specially crafted request over the RMI interface to execute arbitrary code with the privileges of the MIM Admin service. The RMI interface is only accessible locally (listening on 127.0.0.1), limiting the attack vector to the local machine. This means that in a properly configured hospital environment, an attacker must have already compromised the network and additionally compromised the system where the MIM Admin service is running. From there, attackers with sufficient knowledge of MIM's implementation, library usage, and functionality with access to extend the MIM RMI library could force the MIM Admin service to run commands on the local machine with its privileges. Users of MIM Software products exposed via RDP or multi-user application virtualization system should take note that the system being exposed is the environment hosting the virtualized MIM client. This issue affects MIM Admin Service: before 7.2.13, 7.3.8, 7.4.3
[]
8.9
null
null
null
GHSA-hh2c-85xj-jphm
Unknown vulnerability in the regex_replace modifier (modifier.regex_replace.php) in Smarty before 2.6.8 allows attackers to execute arbitrary PHP code.
[]
null
null
null
null
GHSA-p5q8-553c-rh75
A vulnerability in the command line interface (cli) management interface of Cisco SD-WAN vManage could allow an authenticated, local attacker to bypass authorization and allow the attacker to roll back the configuration on vManage controllers and edge router device.This vulnerability is due to improper access control in the cli-management interface of an affected system. An attacker with low-privilege (read only) access to the cli could exploit this vulnerability by sending a request to roll back the configuration on for other controller and devices managed by an affected system. A successful exploit could allow the attacker to to roll back the configuration on for other controller and devices managed by an affected system.
[]
null
7.1
null
null
RHSA-2018:2462
Red Hat Security Advisory: qemu-kvm security and bug fix update
QEMU: i386: multiboot OOB access while loading kernel image QEMU: slirp: heap buffer overflow while reassembling fragmented datagrams
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5.1
null
RHSA-2012:1604
Red Hat Security Advisory: Fuse ESB Enterprise 7.1.0 update
jetty: hash table collisions CPU usage DoS (oCERT-2011-003) jruby: Murmur hash function collisions (oCERT-2012-001)
[ "cpe:/a:redhat:fuse_esb_enterprise:7.1.0" ]
null
null
null
null
CVE-2022-32799
An out-of-bounds read issue was addressed with improved bounds checking. This issue is fixed in Security Update 2022-005 Catalina, macOS Monterey 12.5. A user in a privileged network position may be able to leak sensitive information.
[ "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-007:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-008:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-001:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-002:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-003:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:10.15.7:-:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:10.15.7:security_update_2022-004:*:*:*:*:*:*" ]
null
5.9
null
null
GHSA-9hv6-pv7m-2p8w
PHP remote file inclusion vulnerability in includes/class_template.php in Categories hierarchy (aka CH or mod-CH) 2.1.2 in ptirhiikmods allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter.
[]
null
null
null
null
cisco-sa-wsa-prv-esc-nPzWZrQj
Cisco Secure Web Appliance Privilege Escalation Vulnerability
A vulnerability in the log subscription subsystem of Cisco AsyncOS for the Cisco Secure Web Appliance (formerly Web Security Appliance) could allow an authenticated, local attacker to perform command injection and elevate privileges to root. This vulnerability is due to insufficient validation of user-supplied input for the web interface and CLI. An attacker could exploit this vulnerability by authenticating to the affected device and injecting scripting commands in the scope of the log subscription subsystem. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
[]
null
null
5.3
null
CVE-2023-33136
Azure DevOps Server Remote Code Execution Vulnerability
Azure DevOps Server Remote Code Execution Vulnerability
[ "cpe:2.3:o:microsoft:azure_devops_server:2019.0.1:-:*:*:*:*:*:*", "cpe:2.3:o:microsoft:azure_devops_server:2019.1.2:-:*:*:*:*:*:*", "cpe:2.3:o:microsoft:azure_devops_server:2020.0.2:-:*:*:*:*:*:*", "cpe:2.3:o:microsoft:azure_devops_server:2020.1.2:-:*:*:*:*:*:*", "cpe:2.3:o:microsoft:azure_devops_server:2022.0.1:-:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-cr8r-7g9p-hcx6
Long pressing on a download link could potentially allow Javascript commands to be executed within the browser This vulnerability affects Firefox for iOS < 129.
[]
null
9.8
null
null
CVE-2020-15966
Insufficient policy enforcement in extensions in Google Chrome prior to 85.0.4183.121 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information via a crafted Chrome Extension.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:opensuse:backports_sle:15.0:sp2:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*" ]
null
4.3
null
4.3
GHSA-8635-3hm7-3j8p
InvoicePlane version 1.4.10 is vulnerable to a Stored Cross Site Scripting resulting in allowing an authenticated user to inject malicious client side script which will be executed in the browser of users if they visit the manipulated site.
[]
null
null
5.4
null
GHSA-v9mp-rrg9-4gxj
SQL injection vulnerability found in Online Travel Agency System v.1.0 allows a remote attacker to execute arbitrary code via the emp_id parameter at employee_detail.php.
[]
null
7.2
null
null
GHSA-rhh5-9m4r-jmx3
In ppmp_validate_wsm of drm_fw.c, there is a possible EoP due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238720411References: N/A
[]
null
7.8
null
null
GHSA-x6hg-f949-cqff
The Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Accordion widget in all versions up to, and including, 5.9.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
5.4
null
null
CVE-2020-9063
NCR SelfServ ATMs running APTRA XFS 05.01.00 or earlier do not authenticate or protect the integrity of USB HID communications between the currency dispenser and the host computer, permitting an attacker with physical access to internal ATM components the ability to inject a malicious payload and execute arbitrary code with SYSTEM privileges on the host computer by causing a buffer overflow on the host.
[ "cpe:2.3:o:ncr:aptra_xfs:*:*:*:*:*:*:*:*", "cpe:2.3:h:ncr:selfserv_atm:-:*:*:*:*:*:*:*" ]
null
7.6
null
7.2
GHSA-jwfx-xhgw-72r8
The Horoscope And Tarot plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'divine_horoscope' shortcode in all versions up to, and including, 1.3.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
GHSA-g26h-2qw9-qc67
Directory traversal vulnerability in body.php in phpSpamManager (phpSM) 0.53 beta allows remote attackers to read arbitrary local files via a .. (dot dot) in the filename parameter.
[]
null
null
null
null
CVE-2020-14608
Vulnerability in the Oracle Fusion Middleware MapViewer product of Oracle Fusion Middleware (component: Tile Server). The supported version that is affected is 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Fusion Middleware MapViewer. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Fusion Middleware MapViewer accessible data as well as unauthorized read access to a subset of Oracle Fusion Middleware MapViewer accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N).
[ "cpe:2.3:a:oracle:fusion_middleware_mapviewer:12.2.1.3.0:*:*:*:*:*:*:*" ]
null
8.2
null
null
CVE-2010-5081
Stack-based buffer overflow in Mini-Stream RM-MP3 Converter 3.1.2.1 allows remote attackers to execute arbitrary code via a long URL in a .pls file.
[ "cpe:2.3:a:mini-stream:rm-mp3_converter:3.1.2.1:*:*:*:*:*:*:*" ]
null
null
null
9.3
GHSA-643h-952w-33f5
In the Linux kernel, the following vulnerability has been resolved:x86/bugs: Use code segment selector for VERW operandRobert Gill reported below #GP in 32-bit mode when dosemu software was executing vm86() system call:general protection fault: 0000 [#1] PREEMPT SMP CPU: 4 PID: 4610 Comm: dosemu.bin Not tainted 6.6.21-gentoo-x86 #1 Hardware name: Dell Inc. PowerEdge 1950/0H723K, BIOS 2.7.0 10/30/2010 EIP: restore_all_switch_stack+0xbe/0xcf EAX: 00000000 EBX: 00000000 ECX: 00000000 EDX: 00000000 ESI: 00000000 EDI: 00000000 EBP: 00000000 ESP: ff8affdc DS: 0000 ES: 0000 FS: 0000 GS: 0033 SS: 0068 EFLAGS: 00010046 CR0: 80050033 CR2: 00c2101c CR3: 04b6d000 CR4: 000406d0 Call Trace: show_regs+0x70/0x78 die_addr+0x29/0x70 exc_general_protection+0x13c/0x348 exc_bounds+0x98/0x98 handle_exception+0x14d/0x14d exc_bounds+0x98/0x98 restore_all_switch_stack+0xbe/0xcf exc_bounds+0x98/0x98 restore_all_switch_stack+0xbe/0xcfThis only happens in 32-bit mode when VERW based mitigations like MDS/RFDS are enabled. This is because segment registers with an arbitrary user value can result in #GP when executing VERW. Intel SDM vol. 2C documents the following behavior for VERW instruction:#GP(0) - If a memory operand effective address is outside the CS, DS, ES, FS, or GS segment limit.CLEAR_CPU_BUFFERS macro executes VERW instruction before returning to user space. Use %cs selector to reference VERW operand. This ensures VERW will not #GP for an arbitrary user %ds.[ mingo: Fixed the SOB chain. ]
[]
null
5.5
null
null
GHSA-jwvq-qvwv-pjcm
A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, local attacker to inject a command to the underlying operating system that will execute with root privileges upon the next reboot of the device. The authenticated user must have privileged EXEC permissions on the device. The vulnerability is due to insufficient protection of values passed to a script that executes during device startup. An attacker could exploit this vulnerability by writing values to a specific file. A successful exploit could allow the attacker to execute commands with root privileges each time the affected device is restarted.
[]
null
7.8
null
null
GHSA-6j2f-925p-c58v
A vulnerability has been identified in SIMATIC PCS 7 V8.0 and earlier (All versions), SIMATIC PCS 7 V8.1 and newer (All versions), SIMATIC WinCC V7.2 and earlier (All versions), SIMATIC WinCC V7.3 and newer (All versions). An attacker with network access to affected installations, which are configured without "Encrypted Communication", can execute arbitrary code. The security vulnerability could be exploited by an unauthenticated attacker with network access to the affected installation. No user interaction is required to exploit this security vulnerability. The vulnerability impacts confidentiality, integrity, and availability of the device. At the time of advisory publication no public exploitation of this security vulnerability was known.
[]
null
null
null
null
CVE-2019-12155
interface_release_resource in hw/display/qxl.c in QEMU 3.1.x through 4.0.0 has a NULL pointer dereference.
[ "cpe:2.3:a:qemu:qemu:4.0.0:*:*:*:*:*:*:*" ]
null
null
7.5
5
GHSA-8375-fmxf-g8pv
Improper access control in the installer for Intel(R) SSD DCT versions before 3.0.23 may allow a privileged user to potentially enable escalation of privilege via local access.
[]
null
null
null
null
GHSA-pqh4-m6j8-9g8m
The Animal Kaiser Zangetsu (aka com.wAnimalKaiserZangetsu) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
null
null
CVE-2023-44834
D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the StartTime parameter in the SetParentsControlInfo function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
[ "cpe:2.3:o:dlink:dir-823g_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-823g_firmware:1.0.2b05:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-823g:a1:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2024-30868
netentsec NS-ASG 6.3 is vulnerable to SQL Injection via /admin/add_getlogin.php.
[ "cpe:2.3:o:netentsec:ns-asg_firmware:6.3:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2022-48590
A SQL injection vulnerability exists in the “admin dynamic app mib errors” feature of the ScienceLogic SL1 that takes unsanitized user‐controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database.
[ "cpe:2.3:a:sciencelogic:sl1:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-8w8g-mrpm-gm4f
Race condition in the Symantec Enterprise Security Manager (ESM) 6.5.3 managers and agents on Windows before 20070524 allows remote attackers to cause a denial of service (CPU consumption and application hang) via certain network scans to ESM ports.
[]
null
null
null
null
GHSA-8h28-pjqh-fhj2
Dell Repository Manager, 3.4.3 and prior, contains an Improper Access Control vulnerability in its installation module. A local low-privileged attacker could potentially exploit this vulnerability, leading to gaining escalated privileges.
[]
null
6.7
null
null
CVE-2022-0518
Heap-based Buffer Overflow in radareorg/radare2
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.2.
[ "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*" ]
null
null
6.3
null
GHSA-xrhc-fgm3-x2h4
In the Linux kernel, the following vulnerability has been resolved:scsi: lpfc: Fix use-after-free in lpfc_unreg_rpi() routineAn error is detected with the following report when unloading the driver: "KASAN: use-after-free in lpfc_unreg_rpi+0x1b1b"The NLP_REG_LOGIN_SEND nlp_flag is set in lpfc_reg_fab_ctrl_node(), but the flag is not cleared upon completion of the login.This allows a second call to lpfc_unreg_rpi() to proceed with nlp_rpi set to LPFC_RPI_ALLOW_ERROR. This results in a use after free access when used as an rpi_ids array index.Fix by clearing the NLP_REG_LOGIN_SEND nlp_flag in lpfc_mbx_cmpl_fc_reg_login().
[]
null
7.8
null
null
GHSA-x853-pp6c-h684
The WP-Members Membership Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 3.4.9.5. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[]
null
6.1
null
null
CVE-2021-25429
Improper privilege management vulnerability in Bluetooth application prior to SMR July-2021 Release 1 allows untrusted application to access the Bluetooth information in Bluetooth application.
[ "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*" ]
null
4.3
null
3.3
CVE-2024-43697
Liteos_a has an Improper Input Validation vulnerability
in OpenHarmony v4.1.0 and prior versions allow a local attacker cause DOS through improper input.
[ "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*" ]
null
3.3
null
null
CVE-2022-38476
A data race could occur in the <code>PK11_ChangePW</code> function, potentially leading to a use-after-free vulnerability. In Firefox, this lock protected the data when a user changed their master password. This vulnerability affects Firefox ESR < 102.2 and Thunderbird < 102.2.
[ "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-3h96-5r7w-m7vq
Ruckus Networks Solo APs firmware releases R110.x or before and Ruckus Networks SZ managed APs firmware releases R5.x or before contain authenticated Root Command Injection in the web-GUI that could allow authenticated valid users to execute privileged commands on the respective systems.
[]
null
null
8.8
null
GHSA-hf39-c8p3-whjw
AirDroid 1.0.4 beta uses the MD5 algorithm for values in the checklogin key parameter and 7bb cookie, which makes it easier for remote attackers to obtain cleartext data by sniffing the local wireless network and then conducting a (1) brute-force attack or (2) rainbow-table attack.
[]
null
null
null
null
RHSA-2019:2483
Red Hat Security Advisory: Red Hat Single Sign-On 7.3.3 security update
keycloak: CSRF check missing in My Resources functionality in the Account Console keycloak: SAML broker does not check existence of signature on document allowing any user impersonation
[ "cpe:/a:redhat:jboss_single_sign_on:7.3" ]
null
null
8.1
null
GHSA-hqvp-wjr7-fp87
Possible buffer out of bound read can occur due to improper validation of TBTT count and length while parsing the beacon response in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking
[]
null
null
null
null
CVE-2024-41810
HTML injection in HTTP redirect body
Twisted is an event-based framework for internet applications, supporting Python 3.6+. The `twisted.web.util.redirectTo` function contains an HTML injection vulnerability. If application code allows an attacker to control the redirect URL this vulnerability may result in Reflected Cross-Site Scripting (XSS) in the redirect response HTML body. This vulnerability is fixed in 24.7.0rc1.
[ "cpe:2.3:a:twistedmatrix:twisted:*:*:*:*:*:*:*:*", "cpe:2.3:a:twisted:twisted:*:*:*:*:*:*:*:*" ]
null
6.1
null
null
CVE-2022-30704
Improper initialization in the Intel(R) TXT SINIT ACM for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
[ "cpe:2.3:o:intel:core_i7-11850he_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11850he:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11600h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11600h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11390h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11390h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1195g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11800h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11850h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11700f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11700k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11700kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11700t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11370h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11375h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1180g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1185g7e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1185gre_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1160g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1165g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1185g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-11900h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11900h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-11950h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11950h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-11980hk_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11980hk:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-11900_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11900:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-11900f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11900f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-11900k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11900k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-11900kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11900kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-11900t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11900t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11500he_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11500he:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11320h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11320h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1155g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1155g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11260h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11260h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11400h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11400h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11500h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11500h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11400:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11400f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11400f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11400t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11400t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11500:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11500t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11500t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11600:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11600k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11600k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11600kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11600kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11600t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11600t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11300h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11300h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1140g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1140g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1145g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1145g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1145g7e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1145g7e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1145gre_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1145gre:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1130g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1135g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-11100he_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-11100he:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1115g4e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1115g4e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1115gre_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1115gre:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1120g4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1125g4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1110g4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1115g4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-12900hx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-12900hx:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-12950hx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-12950hx:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-12900ks_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-12900ks:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-12900_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-12900:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-12900e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-12900e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-12900f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-12900f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-12900h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-12900h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-12900hk_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-12900hk:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-12900t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-12900t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-12900te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-12900te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-12900k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-12900k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-12900kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-12900kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1255ul_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1255ul:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1265ul_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1265ul:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-12700hl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-12700hl:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-12800hl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-12800hl:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-12650hx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-12650hx:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-12800hx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-12800hx:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-12850hx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-12850hx:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1265ue_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1265ue:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1270pe_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1270pe:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1250u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1250u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1255u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1255u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1260p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1260p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1260u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1260u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1265u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1265u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1270p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1270p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1280p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1280p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-12650h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-12650h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-12700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-12700:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-12700e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-12700e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-12700f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-12700f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-12700h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-12700h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-12700t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-12700t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-12700te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-12700te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-12800h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-12800h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-12800he_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-12800he:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-12700k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-12700k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-12700kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-12700kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1235ul_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1235ul:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1245ul_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1245ul:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12500hl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12500hl:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12600hl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12600hl:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12450hx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12450hx:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12600hx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12600hx:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1245ue_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1245ue:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1250pe_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1250pe:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1230u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1230u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1235u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1235u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1240p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1240p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1240u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1240u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1245u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1245u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1250p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1250p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12400:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12400f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12400f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12400t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12400t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12450h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12450h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12500:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12500e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12500e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12500h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12500h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12500t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12500t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12500te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12500te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12600:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12600h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12600h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12600he_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12600he:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12600t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12600t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12600k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12600k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12600kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12600kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1215ul_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1215ul:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-12300hl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-12300hl:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1215ue_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1215ue:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1220pe_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1220pe:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1210u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1210u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1215u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1215u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1220p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1220p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-12100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-12100:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-12100e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-12100e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-12100f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-12100f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-12100t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-12100t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-12100te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-12100te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-12300_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-12300:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-12300he_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-12300he:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-12300t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-12300t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10850k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10885h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10900_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10900e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10900f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10900k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10900kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10900t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10900te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10980hk_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10870h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10610u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10810u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1068ng7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10700e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10700f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10700k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10700kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10700t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10700te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10750h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10850h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10875h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10510u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10510y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10710u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1060g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1065g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10505_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10500h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10200h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10310u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1038ng7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10400f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10400t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10500e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10500t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10500te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10600k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10600kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10600t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10300h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10400h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10210u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10210y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10310y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1030g4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1030g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1035g1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1035g4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1035g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10105_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10105f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10105t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10305_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10305t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10325_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10100y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10100f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10100e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10100t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10100te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10300_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10300t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10320_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10110u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10110y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1000g1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1000g4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1005g1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_8500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_8500:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_8505_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_8505:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g7400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g7400:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g7400e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g7400e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g7400t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g7400t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g7400te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g7400te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g6405_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g6405t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g6505_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g6505t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g6605_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_6500y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_6500y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_7505_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g6400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g6400e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g6400e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g6400t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g6400te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g6400te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g6500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g6500t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g6600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_6405u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g5420_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g5420t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g5600t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g5620_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_5405u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_4417u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_4425y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g5400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g5400t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g5500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g5500t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g5600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_4415y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_4410y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_4415u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g6900_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g6900:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g6900e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g6900e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g6900t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g6900t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g6900te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g6900te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g5905_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g5905:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g5905t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g5905t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g5925_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g5925:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g5900_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g5900:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g5900e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g5900e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g5900t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g5900t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g5900te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g5900te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g5920_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g5920:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g4930e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g4930e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g4932e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g4932e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g4930_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g4930:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g4930t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g4930t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g4950_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g4950:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g4900_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g4900:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g4900t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g4900t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g4920_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g4920:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g3930e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g3930e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g3930te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g3930te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g3930_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g3930:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g3930t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g3930t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g3950_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g3950:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g3900e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g3900e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g3902e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g3902e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g3900_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g3900:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g3900t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g3900t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g3900te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g3900te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g3920_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g3920:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g1840_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g1840:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g1840t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g1840t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g1850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g1850:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g1820te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g1820te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g1820_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g1820:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g1820t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g1820t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g1830_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g1830:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g1620t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g1620t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g1630_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g1630:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g1610_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g1610:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g1610t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g1610t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g1620_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g1620:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_j6412_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j6412:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_j6413_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j6413:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_j4025_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j4025:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_j4125_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j4125:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_j3355e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j3355e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_j3455e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j3455e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_j4005_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j4005:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_j4105_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j4105:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_j3355_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j3355:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_j3455_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j3455:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_j3060_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j3060:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_j3160_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j3160:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_j1800_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j1800:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_j1900_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j1900:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_j1750_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j1750:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_j1850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j1850:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n6210_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n6210:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n4500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n4500:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n4505_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n4505:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n5100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n5100:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n5105_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n5105:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n6211_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n6211:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n4020_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n4120_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n3350e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n4000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n4100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n3350_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n3350:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n3450_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n3450:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n3010_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n3010:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n3060_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n3060:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n3160_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n3160:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n3000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n3000:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n3050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n3050:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n3150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n3150:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n2808_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n2808:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n2840_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n2840:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n2940_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n2940:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n2807_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n2807:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n2830_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n2830:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n2930_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n2930:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n2806_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n2806:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n2815_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n2815:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n2820_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n2820:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n2920_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n2920:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n2805_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n2805:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n2810_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n2810:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n2910_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n2910:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_7305l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_7305l:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_7305e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_7305e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_7300_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_7300:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_7305_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_7305:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_6600he_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_6600he:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_6305_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_6305:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_6305e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_6305e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_5305u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_5305u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_5205u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_5205u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_4305ue_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_4305ue:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_4305u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_4305u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_4205u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_4205u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_3867u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_3867u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_3965y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_3965y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_3865u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_3865u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_3965u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_3965u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_3855u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_3855u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_3955u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_3955u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_3215u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_3215u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_3765u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_3765u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_3205u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_3205u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_3755u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_3755u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_2970m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_2970m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_2000e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_2000e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_2002e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_2002e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_2957u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_2957u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_2961y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_2961y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_2981u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_2981u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_2950m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_2950m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_2955u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_2955u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_2980u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_2980u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_1005m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_1005m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_1017u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_1017u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_1019y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_1019y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_1000m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_1000m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_1007u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_1007u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_1020e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_1020e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_1020m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_1020m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_1037u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_1037u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_1047ue_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_1047ue:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2314_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2314:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2324g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2324g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2334_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2334:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2336_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2336:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2356g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2356g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2374g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2374g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2378_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2378:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2378g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2378g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2386g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2386g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2388g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2388g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w3-2423_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w3-2423:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w3-2425_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w3-2425:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w3-2435_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w3-2435:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w5-2445_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w5-2445:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w5-2455x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w5-2455x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w5-2465x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w5-2465x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w5-3425_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w5-3425:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w5-3435x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w5-3435x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w7-2475x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w7-2475x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w7-2495x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w7-2495x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w7-3445_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w7-3445:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w7-3455_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w7-3455:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w7-3465x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w7-3465x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w9-3475x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w9-3475x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w9-3495x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w9-3495x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-11155mle_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-11155mle:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-11155mre_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-11155mre:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-11555mle_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-11555mle:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-11555mre_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-11555mre:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-11865mle_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-11865mle:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-11865mre_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-11865mre:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-3323_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3323:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-3335_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3335:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-3345_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3345:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-3365_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3365:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-3375_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3375:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-11855m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-11855m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-11955m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-11955m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1350_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1350:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1350p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1350p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1370_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1370:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1370p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1370p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1390_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1390:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1390p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1390p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1390t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1390t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-10855m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-10885m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1250_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1250e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1250e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1250p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1250te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1250te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1270_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1270e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1270e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1270p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1270p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1270te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1270te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1290_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1290e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1290e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1290p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1290t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1290te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1290te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2223_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2223:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2225_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2225:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2235_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2235:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2245_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2245:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2255_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2255:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2265_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2265:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2275_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2275:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2295_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2295:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-3223_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-3225_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-3235_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3235:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-3245_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-3245m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-3265_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-3265m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-3275_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-3275m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-3175x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3175x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2123_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2123:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2125_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2125:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2133_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2133:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2135_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2135:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2145_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2145:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2155_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2155:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2175_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2175:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2195_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2195:-:*:*:*:*:*:*:*" ]
null
7.2
null
null
GHSA-f43w-mfrf-mv66
TeamViewer Desktop for Windows before 15.8.3 does not properly quote its custom URI handlers. A malicious website could launch TeamViewer with arbitrary parameters, as demonstrated by a teamviewer10: --play URL. An attacker could force a victim to send an NTLM authentication request and either relay the request or capture the hash for offline password cracking. This affects teamviewer10, teamviewer8, teamviewerapi, tvchat1, tvcontrol1, tvfiletransfer1, tvjoinv8, tvpresent1, tvsendfile1, tvsqcustomer1, tvsqsupport1, tvvideocall1, and tvvpn1. The issue is fixed in 8.0.258861, 9.0.258860, 10.0.258873, 11.0.258870, 12.0.258869, 13.2.36220, 14.2.56676, 14.7.48350, and 15.8.3.
[]
null
null
null
null
CVE-2010-0807
Microsoft Internet Explorer 7 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, leading to memory corruption, aka "HTML Rendering Memory Corruption Vulnerability."
[ "cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*" ]
null
null
null
9.3
GHSA-gjfh-x4fj-rg67
Use of Out-of-range Pointer Offset vulnerability in Cesanta Mongoose Web Server v7.14 allows an attacker to send an unexpected TLS packet and produce a segmentation fault on the application.
[]
null
8.2
null
null
CVE-2000-0358
ORBit and gnome-session in Red Hat Linux 6.1 allows remote attackers to crash a program.
[ "cpe:2.3:o:redhat:linux:6.1:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-5w76-2v5j-77r4
Inductive Automation Ignition ParameterVersionJavaSerializationCodec Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Inductive Automation Ignition. Authentication is not required to exploit this vulnerability.The specific flaw exists within the ParameterVersionJavaSerializationCodec class. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-20290.
[]
null
null
9.8
null
GHSA-7496-f8r6-4592
Microsoft Edge (Chromium-based) Update Elevation of Privilege Vulnerability.
[]
null
6.6
null
null
CVE-2025-21515
Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC). Supported versions that are affected are Prior to 9.2.9.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks of this vulnerability can result in takeover of JD Edwards EnterpriseOne Tools. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
[ "cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:prior_to_9.2.9.0:*:*:*:*:*:*:*" ]
null
8.8
null
null
CVE-2014-2355
The (1) CimView and (2) CimEdit components in GE Proficy HMI/SCADA-CIMPLICITY 8.2 and earlier allow remote attackers to gain privileges via a crafted CIMPLICITY screen (aka .CIM) file.
[ "cpe:2.3:a:ge:intelligent_platforms_proficy_hmi\\/scada_cimplicity:*:*:*:*:*:*:*:*" ]
null
null
null
6.9
RHSA-2024:0577
Red Hat Security Advisory: linux-firmware security update
hw: intel: Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi
[ "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
8.2
null
null
RHSA-2023:0856
Red Hat Security Advisory: kernel security update
kernel: memory corruption in AX88179_178A based USB ethernet device. kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c kernel: stack overflow in do_proc_dointvec and proc_skip_spaces
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
7.8
null
null
GHSA-xqrw-f62h-4ff2
Reflected cross-site scripting (XSS) vulnerabilities in WithSecure through 2022-08-10) exists within the F-Secure Policy Manager due to an unvalidated parameter in the endpoint, which allows remote attackers to provide a malicious input.
[]
null
6.1
null
null
CVE-2003-0818
Multiple integer overflows in Microsoft ASN.1 library (MSASN1.DLL), as used in LSASS.EXE, CRYPT32.DLL, and other Microsoft executables and libraries on Windows NT 4.0, 2000, and XP, allow remote attackers to execute arbitrary code via ASN.1 BER encodings with (1) very large length fields that cause arbitrary heap data to be overwritten, or (2) modified bit strings.
[ "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:enterprise:*:64-bit:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:r2:*:64-bit:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:standard:*:64-bit:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:*:server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:*:terminal_server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:*:workstation:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:terminal_server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:workstation:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:terminal_server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:workstation:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:terminal_server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:workstation:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:terminal_server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:workstation:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:terminal_server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:workstation:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:terminal_server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:workstation:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:workstation:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp1:64-bit:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*" ]
null
null
null
7.5
GHSA-pppx-wxx4-46j2
GE CIMPICITY versions 2022 and prior is vulnerable when data from a faulting address controls code flow starting at gmmiObj!CGmmiRootOptionTable, which could allow an attacker to execute arbitrary code.
[]
null
7.8
null
null
CVE-2024-39934
Robotmk before 2.0.1 allows a local user to escalate privileges (e.g., to SYSTEM) if automated Python environment setup is enabled, because the "shared holotree usage" feature allows any user to edit any Python environment.
[ "cpe:2.3:a:robotmk:robotmk:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-958m-4rv5-24cm
An attacker can craft a specific IdaPro *.i64 file that will cause the BinDiff plugin to load an invalid memory offset. This can allow the attacker to control the instruction pointer and execute arbitrary code. It is recommended to upgrade BinDiff 7
[]
null
null
null
null
RHSA-2018:2692
Red Hat Security Advisory: firefox security update
Mozilla: Proxy bypass using automount and autofs Mozilla: Memory safety bugs fixed in Firefox 62 and Firefox ESR 60.2 Mozilla: Use-after-free in driver timers Mozilla: Use-after-free in IndexedDB Mozilla: Out-of-bounds write with malicious MAR file Mozilla: Same-origin policy violation using meta refresh and performance.getEntries to steal cross-origin URLs
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
6.5
null
CVE-2016-3246
Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Microsoft Edge Memory Corruption Vulnerability."
[ "cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*" ]
null
null
7.5
7.6
CVE-2007-5145
Multiple buffer overflows in system DLL files in Microsoft Windows XP, as used by Microsoft Windows Explorer (explorer.exe) 6.00.2900.2180, Don Ho Notepad++, unspecified Adobe Macromedia applications, and other programs, allow user-assisted remote attackers to cause a denial of service (application crash) via long strings in the (1) author, (2) title, (3) subject, and (4) comment Properties fields of a file, possibly involving improper handling of extended file attributes by the (a) NtQueryInformationFile, (b) NtQueryDirectoryFile, (c) NtSetInformationFile, (d) FileAllInformation, (e) FileNameInformation, and other FILE_INFORMATION_CLASS functions in ntdll.dll and the (f) GetFileAttributesExW and (g) GetFileAttributesW functions in kernel32.dll, a related issue to CVE-2007-1347.
[ "cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2015-0133
IBM WebSphere Commerce 7.0 Feature Pack 4 through 8 allows remote attackers to read arbitrary files and possibly obtain administrative privileges via an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
[ "cpe:2.3:a:ibm:websphere_commerce:7.0:*:*:*:*:*:*:*" ]
null
null
null
5