id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
38
232
GHSA-w5qh-2x4h-crww
The Workplace (aka WP) component in IBM FileNet P8 Application Engine (P8AE) 4.0.2.x before 4.0.2.2-P8AE-FP002 grants a document's Creator-Owner full control over an annotation object, even if the default instance security has changed, which might allow remote authenticated users to bypass intended access restrictions in opportunistic circumstances.
[]
null
null
null
null
null
CVE-2024-45155
Animate | Access of Uninitialized Pointer (CWE-824)
Animate versions 23.0.8, 24.0.5 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
GHSA-2w2x-v275-f37c
Cross-site scripting (XSS) vulnerability in the Andy Frank Beatnik 1.0 extension for Firefox allows remote attackers to inject arbitrary web script or HTML via an RSS feed. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
null
null
null
null
null
CVE-2018-5526
Under certain conditions, on F5 BIG-IP ASM 13.1.0-13.1.0.5, Behavioral DOS (BADOS) protection may fail during an attack.
[ "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
null
CVE-2025-6092
comfyanonymous comfyui Incomplete Fix CVE-2024-10099 image cross site scripting
A vulnerability was found in comfyanonymous comfyui up to 0.3.39. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /upload/image of the component Incomplete Fix CVE-2024-10099. The manipulation of the argument image leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
5.3
4.3
4.3
5
null
CVE-2011-1980
Untrusted search path vulnerability in Microsoft Office 2003 SP3 and 2007 SP2 allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .doc, .ppt, or .xls file, aka "Office Component Insecure Library Loading Vulnerability."
[ "cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2007:sp2:*:*:*:*:*:*" ]
null
null
null
9.3
null
GHSA-42m6-g935-5vmq
@ianwalter/merge Prototype Pollution via `merge` function
All versions of package @ianwalter/merge are vulnerable to Prototype Pollution via the main (`merge`) function. @ianwalter/merge is [deprecated](https://github.com/ianwalter/merge/blob/master/README.md) and the maintainer suggests using [@generates/merger](https://github.com/generates/generates/tree/main/packages/merger) instead.
[]
null
5.6
null
null
null
GHSA-h9jg-5wxv-6jq7
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.
[]
null
5.4
null
null
null
CVE-2019-18817
Istio 1.3.x before 1.3.5 allows Denial of Service because continue_on_listener_filters_timeout is set to True, a related issue to CVE-2019-18836.
[ "cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
CVE-1999-1000
The web administration interface for Cisco Cache Engine allows remote attackers to view performance statistics.
[ "cpe:2.3:h:cisco:cache_engine:2:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2020-23639
A command injection vulnerability exists in Moxa Inc VPort 461 Series Firmware Version 3.4 or lower that could allow a remote attacker to execute arbitrary commands in Moxa's VPort 461 Series Industrial Video Servers.
[ "cpe:2.3:o:moxa:vport_461_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:moxa:vport_461:-:*:*:*:*:*:*:*" ]
null
9.8
null
10
null
CVE-2024-39596
[CVE-2024-39596] Missing Authorization check vulnerability in SAP Enable Now
Due to missing authorization checks, SAP Enable Now allows an author to escalate privileges to access information which should otherwise be restricted. On successful exploitation, the attacker can cause limited impact on confidentiality of the application.
[]
null
4.3
null
null
null
CVE-2017-13834
An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "Kernel" component. It allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted mach binary.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ]
null
null
7.8
9.3
null
GHSA-55wr-vpmr-8325
Vulnerability in the Sun ZFS Storage Appliance Kit (AK) component of Oracle Sun Systems Products Suite (subcomponent: API frameworks). The supported version that is affected is Prior to 8.7.18. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise Sun ZFS Storage Appliance Kit (AK). Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Sun ZFS Storage Appliance Kit (AK). CVSS 3.0 Base Score 2.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L).
[]
null
null
2.7
null
null
CVE-2024-11717
Tokens in CTFd used for account activation and password resetting can be used interchangeably for these operations. When used, they are sent to the server as a GET parameter and they are not single use, which means, that during token expiration time an on-path attacker might reuse such a token to change user's password and take over the account. Moreover, the tokens also include base64 encoded user email. This issue impacts releases up to 3.7.4 and was addressed by pull request 2679 https://github.com/CTFd/CTFd/pull/2679  included in 3.7.5 release.
[]
6.3
null
null
null
https://github.com/CTFd/CTFd/pull/2679
GHSA-7vpv-wgcj-h638
The /proc filesystem in Linux allows local users to obtain sensitive information by opening various entries in /proc/self before executing a setuid program, which causes the program to fail to change the ownership and permissions of those entries.
[]
null
null
null
null
null
GHSA-rf3m-rwff-vvwc
The 3D FlipBook plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Bookmark URL field in all versions up to, and including, 1.15.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
GHSA-2289-pqfq-6wx7
Unrestricted upload of file with dangerous type in Apache Solr
The 8.1.1 and 8.2.0 releases of Apache Solr contain an insecure setting for the ENABLE_REMOTE_JMX_OPTS configuration option in the default solr.in.sh configuration file shipping with Solr. If you use the default solr.in.sh file from the affected releases, then JMX monitoring will be enabled and exposed on RMI_PORT (default=18983), without any authentication. If this port is opened for inbound traffic in your firewall, then anyone with network access to your Solr nodes will be able to access JMX, which may in turn allow them to upload malicious code for execution on the Solr server.
[]
null
9.8
null
null
null
CVE-2018-1002200
plexus-archiver before 3.6.0 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in an archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'.
[ "cpe:2.3:a:codehaus-plexus:plexus-archiver:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.5:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
null
CVE-2014-125038
IS_Projecto2 NewsBean.java sql injection
A vulnerability has been found in IS_Projecto2 and classified as critical. This vulnerability affects unknown code of the file Cnn-EJB/ejbModule/ejbs/NewsBean.java. The manipulation of the argument date leads to sql injection. The name of the patch is aa128b2c9c9fdcbbf5ecd82c1e92103573017fe0. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217192.
[ "cpe:2.3:a:is_projecto2_project:is_projecto2:*:*:*:*:*:*:*:*" ]
null
5.5
5.5
5.2
https://github.com/rfsimoes/IS_Projecto2/commit/aa128b2c9c9fdcbbf5ecd82c1e92103573017fe0
RHSA-2013:1457
Red Hat Security Advisory: libgcrypt security update
GnuPG susceptible to Yarom/Falkner flush+reload cache side-channel attack
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
null
CVE-2020-22036
A heap-based Buffer Overflow vulnerability exists in FFmpeg 4.2 in filter_intra at libavfilter/vf_bwdif.c, which might lead to memory corruption and other potential consequences.
[ "cpe:2.3:a:ffmpeg:ffmpeg:4.2:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
null
CVE-2024-46432
Tenda W18E V16.01.0.8(1625) is vulnerable to Incorrect Access Control. An attacker can send a specially crafted HTTP POST request to the setQuickCfgWifiAndLogin function, which allows unauthorized changes to WiFi configuration settings and administrative credentials.
[]
null
8.8
null
null
null
RHSA-2016:2749
Red Hat Security Advisory: rh-mysql56-mysql security update
mysql: unspecified vulnerability in subcomponent: Server: Optimizer (CPU October 2016) mysql: unspecified vulnerability in subcomponent: Server: InnoDB (CPU October 2016) mysql: race condition while setting stats during MyISAM table repair (CPU Oct 2016) mysql: insecure error log file handling in mysqld_safe (CPU Oct 2016) mysql: unspecified vulnerability in subcomponent: Server: GIS (CPU October 2016) mysql: unspecified vulnerability in subcomponent: Server: Federated (CPU October 2016) mysql: general_log can write to configuration files, leading to privilege escalation (CPU Oct 2016) mysql: race condition while setting stats during MyISAM table repair (CPU Oct 2016) mysql: insecure error log file handling in mysqld_safe (CPU Oct 2016) mysql: unspecified vulnerability in subcomponent: Server: Types (CPU October 2016)
[ "cpe:/a:redhat:rhel_software_collections:2::el6", "cpe:/a:redhat:rhel_software_collections:2::el7" ]
null
null
4.3
null
null
CVE-2018-3629
Buffer overflow in event handler in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x, and 11.x may allow an attacker to cause a denial of service via the same subnet.
[ "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:e4300:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:e4400:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:e4500:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:e4600:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:e4700:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:e6300:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:e6320:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:e6400:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:e6420:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:e6540:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:e6550:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:e6600:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:e6700:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:e6750:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:e6850:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:e7200:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:e7300:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:e7400:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:e7500:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:e7600:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:e8190:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:e8200:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:e8300:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:e8400:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:e8500:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:e8600:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:l7200:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:l7300:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:l7400:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:l7500:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:l7700:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:p7350:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:p7370:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:p7450:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:p7550:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:p7570:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:p8400:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:p8600:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:p8700:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:p8800:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:p9500:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:p9600:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:p9700:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:sl9300:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:sl9380:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:sl9400:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:sl9600:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:sp9300:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:sp9400:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:sp9600:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:su9300:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:su9400:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:su9600:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:t5200:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:t5250:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:t5270:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:t5300:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:t5450:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:t5470:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:t5500:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:t5550:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:t5600:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:t5670:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:t5750:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:t5800:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:t5870:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:t6400:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:t6500:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:t6600:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:t6670:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:t7100:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:t7200:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:t7250:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:t7300:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:t7400:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:t7500:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:t7600:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:t7700:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:t7800:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:t8100:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:t8300:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:t9300:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:t9400:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:t9500:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:t9550:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:t9600:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:t9800:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:t9900:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:u7500:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:u7600:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_duo:u7700:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:6500u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:6560u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:6567u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:6600u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:6650u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:6660u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:6700:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:6700hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:6700k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:6700t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:6700te:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:6770hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:6785r:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:6820eq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:6820hk:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:6820hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:6822eq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:6870hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:6920hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:6970hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:7020u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:7100:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:7100e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:7100h:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:7100t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:7100u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:7101e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:7101te:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:7102e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:7130u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:7167u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:7300:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:7300t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:7320:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:7350k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7y54:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7y57:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7200u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7260u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7267u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7287u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7300hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7300u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7360u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7400:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7400t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7440eq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7440hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7442eq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7500:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7500t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7600:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7600k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:7600t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:700t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:8100h:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:8100t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:8109u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:8130u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:8145u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:8300:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:8300t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8200y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8259u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8265u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8269u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8300h:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8305g:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8400b:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8400h:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8400t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8500:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8500b:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8500t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8600:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8600t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8086k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8500y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8559u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8565u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8700b:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8700t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8705g:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8706g:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8709g:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8750h:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8809g:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8850h:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9:8950hk:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_extreme:qx6700:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_extreme:qx6800:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_extreme:qx6850:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_extreme:qx9300:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_extreme:qx9650:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_extreme:qx9770:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_extreme:qx9775:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_extreme:x6800:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_extreme:x7800:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_extreme:x7900:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_extreme:x9000:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_extreme:x9100:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_quad:q6600:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_quad:q6700:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_quad:q8200:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_quad:q8200s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_quad:q8300:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_quad:q8400:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_quad:q8400s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_quad:q9000:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_quad:q9100:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_quad:q9300:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_quad:q9400:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_quad:q9400s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_quad:q9450:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_quad:q9500:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_quad:q9505:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_quad:q9505s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_quad:q9550:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_quad:q9550s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_quad:q9650:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_solo:su3500:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_solo:u2100:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_solo:u2200:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_solo:ulv_su3300:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_2_solo:ulv_su3500:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_duo:l2300:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_duo:l2400:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_duo:l2500:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_duo:t2050:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_duo:t2250:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_duo:t2300:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_duo:t2300e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_duo:t2350:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_duo:t2400:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_duo:t2450:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_duo:t2500:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_duo:t2600:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_duo:t2700:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_duo:u2400:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_duo:u2500:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3450_:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_solo:t1250:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_solo:t1300:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_solo:t1350:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_solo:t1400:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_solo:u1300:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_solo:u1400:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_solo:u1500:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:5118:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:5119t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:5120:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:5120t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:5122:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6126:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6126f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6126t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6128:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6130:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6130f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6130t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6132:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6134:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6134m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6136:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6138:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6138f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6138t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6140:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6140m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6142:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6142f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6142m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6144:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6146:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6148:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6148f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6150:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6152:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6154:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:w2123:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:w2125:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:w2133:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:w2135:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:w2145:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:w2155:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:w2175:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:w2195:*:*:*:*:*:*:*" ]
null
6.5
null
3.3
null
CVE-2007-2582
Multiple buffer overflows in the DB2 JDBC Applet Server (DB2JDS) service in IBM DB2 9.x and earlier allow remote attackers to (1) execute arbitrary code via a crafted packet to the DB2JDS service on tcp/6789; and cause a denial of service via (2) an invalid LANG parameter or (2) a long packet that generates a "MemTree overflow."
[ "cpe:2.3:a:ibm:db2:*:*:*:*:*:*:*:*" ]
null
null
null
10
null
CVE-2025-49485
Extension - balbooa.com - SQL injection in Balbooa Forms component version 1.0.0 - 2.3.1.1 for Joomla
A SQL injection vulnerability in the Balbooa Forms plugin 1.0.0-2.3.1.1 for Joomla allows privileged users to execute arbitrary SQL commands via the 'id' parameter.
[]
8.6
null
null
null
null
GHSA-pphr-vx2j-3836
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. Heap-based buffer overflow in the addMultirowsForm function in w3m allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTML page.
[]
null
null
8.8
null
null
GHSA-ggr7-f8rm-974h
Google Chrome before 15.0.874.120 does not properly perform VP8 decoding, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted stream.
[]
null
null
null
null
null
GHSA-vm5w-p85f-gq6r
Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.
[]
null
6.5
null
null
null
CVE-2022-43773
Hitachi Vantara Pentaho Business Analytics Server - Incorrect Permission Assignment for Critical Resource
Hitachi Vantara Pentaho Business Analytics Server prior to versions 9.4.0.1 and 9.3.0.2, including 8.3.x is installed with a sample HSQLDB data source configured with stored procedures enabled. 
[ "cpe:2.3:a:hitachi:vantara_pentaho_business_analytics_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:vantara_pentaho_business_analytics_server:9.4.0.0:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
CVE-2024-28772
IBM Security Directory Integrator cross-site scripting
IBM Security Directory Integrator 7.2.0 and IBM Security Verify Directory Integrator 10.0.0 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 285645.
[ "cpe:2.3:a:ibm:security_verify_directory:10.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_directory_integrator:7.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_directory_server:-:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_verify_access:10.0.0:*:*:*:*:*:*:*" ]
null
6.8
null
null
null
CVE-2012-4394
Cross-site scripting (XSS) vulnerability in apps/files/js/filelist.js in ownCloud before 4.0.5 allows remote attackers to inject arbitrary web script or HTML via the file parameter.
[ "cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:owncloud:owncloud:4.0.3:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-r6fx-55x3-f9x6
Crafter CMS Crafter Studio vulnerable to Improper Control of Dynamically-Managed Code Resources
Improper Control of Dynamically-Managed Code Resources vulnerability in Crafter Studio of Crafter CMS allows authenticated developers to execute OS commands via FreeMarker static methods.
[]
null
8.8
null
null
null
GHSA-ch9g-c5wp-jf2p
IBM Security Directory Server 6.4.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 165813.
[]
null
null
null
null
null
CVE-2006-2313
PostgreSQL 8.1.x before 8.1.4, 8.0.x before 8.0.8, 7.4.x before 7.4.13, 7.3.x before 7.3.15, and earlier versions allows context-dependent attackers to bypass SQL injection protection methods in applications via invalid encodings of multibyte characters, aka one variant of "Encoding-Based SQL Injection."
[ "cpe:2.3:a:postgresql:postgresql:7.3:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.3.9:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.3.10:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.3.11:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.3.12:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.3.13:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.3.14:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.4:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.4.10:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.4.11:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:7.4.12:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:8.1.3:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2018-11476
An issue was discovered on Vgate iCar 2 Wi-Fi OBD2 Dongle devices. The dongle opens an unprotected wireless LAN that cannot be configured with encryption or a password. This enables anyone within the range of the WLAN to connect to the network without authentication.
[ "cpe:2.3:o:vgate:icar_2_wi-fi_obd2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:vgate:icar_2_wi-fi_obd2:-:*:*:*:*:*:*:*" ]
null
null
8.8
5.8
null
GHSA-95rp-6gqp-6622
Command Injection Vulnerability in find-exec
Older versions of the package are vulnerable to Command Injection as an attacker controlled parameter. As a result, attackers may run malicious commands.For example:This creates a file named "hacked" on the filesystem.You should never allow users to control commands to find, since this package attempts to run every command provided.Thanks to @miguelafmonteiro for reporting.
[]
null
9.8
null
null
null
GHSA-c635-w8p8-6666
The Everest Poker (aka com.wEverestPoker) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
null
null
null
GHSA-whfp-4v96-fx4x
HP Insight Management Agents before 8.6 allows remote attackers to obtain sensitive information via an unspecified request that triggers disclosure of the full path.
[]
null
null
null
null
null
GHSA-f792-vqmh-qc7h
While processing camera buffers in camera driver, a use after free condition can occur in Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear in MDM9206, MDM9607, MDM9650, MSM8996AU, SD 210/SD 212/SD 205, SD 625, SD 820, SD 820A, SD 835, SDX20.
[]
null
null
7.8
null
null
GHSA-xrh7-2gfq-4rcq
openCart Server-Side Template Injection (SSTI) vulnerability
A Server-Side Template Injection (SSTI) vulnerability in the Theme Editor Function of openCart project v4.0.2.3 allows attackers to execute arbitrary code via injecting a crafted payload.
[]
5.5
8
null
null
null
CVE-2018-19052
An issue was discovered in mod_alias_physical_handler in mod_alias.c in lighttpd before 1.4.50. There is potential ../ path traversal of a single directory above an alias target, with a specific mod_alias configuration where the matched alias lacks a trailing '/' character, but the alias target filesystem path does have a trailing '/' character.
[ "cpe:2.3:a:lighttpd:lighttpd:*:*:*:*:*:*:*:*", "cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*", "cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp4:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp1:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp2:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp3:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp4:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
RHSA-2013:0270
Red Hat Security Advisory: jakarta-commons-httpclient security update
jakarta-commons-httpclient: missing connection hostname check against X.509 certificate name
[ "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
3.7
null
null
CVE-2021-38492
When delegating navigations to the operating system, Firefox would accept the `mk` scheme which might allow attackers to launch pages and execute scripts in Internet Explorer in unprivileged mode. *This bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox < 92, Thunderbird < 91.1, Thunderbird < 78.14, Firefox ESR < 78.14, and Firefox ESR < 91.1.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
null
GHSA-wcrg-6ghq-6288
Buffer overflow in Internet Explorer 4.01 and earlier allows remote attackers to execute arbitrary commands via a long URL with the "mk:" protocol, aka the "MK Overrun security issue."
[]
null
null
null
null
null
GHSA-9xh5-35c7-hmjm
A vulnerability has been found in PHPGurukul Complaint Management system 1.0 and classified as critical. This vulnerability affects unknown code of the file /user/reset-password.php. The manipulation of the argument email leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
7.3
null
null
null
GHSA-wv6w-qmjm-mqmv
The Radio Player – Live Shoutcast, Icecast and Any Audio Stream Player for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'align' attribute within the 'wp:radio-player' Gutenberg block in all versions up to, and including, 2.0.78 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
CVE-2008-1617
Double free vulnerability in Web TransferCtrl Class 8,2,1,4 (iManFile.cab), as used in WorkSite Web 8.2 before SP1 P2, allows remote attackers to execute arbitrary code via JavaScript that sets the Server property to a string, then sets the string to null.
[ "cpe:2.3:a:interwoven:worksite_web:*:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
GHSA-2mp7-r7rc-5fh6
Cisco Video Surveillance Manager (VSM) before 7.0.0 allows remote attackers to obtain sensitive configuration, archive, and log information via unspecified vectors, related to the Cisco_VSBWT (aka Broadware sample code) package, aka Bug ID CSCsv37288.
[]
null
null
null
null
null
CVE-2012-2708
Cross-site scripting (XSS) vulnerability in the _hosting_task_log_table function in modules/hosting/task/hosting_task.module in the Hostmaster (Aegir) module 6.x-1.x before 6.x-1.9 for Drupal allows remote authenticated users with certain permissions to inject arbitrary web script or HTML via a Drush log message in a provision task log.
[ "cpe:2.3:a:antoine_beaupre:hostmaster:6.x-1.2:*:*:*:*:*:*:*", "cpe:2.3:a:antoine_beaupre:hostmaster:6.x-1.3:*:*:*:*:*:*:*", "cpe:2.3:a:antoine_beaupre:hostmaster:6.x-1.4:*:*:*:*:*:*:*", "cpe:2.3:a:antoine_beaupre:hostmaster:6.x-1.5:*:*:*:*:*:*:*", "cpe:2.3:a:antoine_beaupre:hostmaster:6.x-1.6:*:*:*:*:*:*:*", "cpe:2.3:a:antoine_beaupre:hostmaster:6.x-1.7:*:*:*:*:*:*:*", "cpe:2.3:a:antoine_beaupre:hostmaster:6.x-1.8:*:*:*:*:*:*:*", "cpe:2.3:a:antoine_beaupre:hostmaster:6.x-1.x:dev:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*" ]
null
null
null
2.1
null
GHSA-rjqp-837c-gqg6
Question2Answer Q2A Ultimate SEO Version 1.3 is affected by cross-site scripting (XSS), which may lead to arbitrary remote code execution.
[]
null
null
null
null
null
RHSA-2020:3176
Red Hat Security Advisory: postgresql-jdbc security update
postgresql-jdbc: XML external entity (XXE) vulnerability in PgSQLXML
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
7.7
null
null
null
GHSA-2775-52x6-3w7f
Cross-site scripting (XSS) vulnerability in Liferay Portal before 5.3.0 allows remote attackers to inject arbitrary web script or HTML via the p_p_id parameter.
[]
null
null
null
null
null
GHSA-jgf4-vwc3-r46v
Directus Allows Single Sign-On User Enumeration
ImpactWhen relying on SSO providers in combination with local authentication it can be possible to enumerate existing SSO users in the instance. This is possible because if an email address exists in Directus and belongs to a known SSO provider then it will throw a "helpful" error that the user belongs to another provider.ReproductionCreate a user using a SSO provider `[email protected]`.Try to log-in using the regular login form (or the API)When using a valid email address| **APP** | **API** | | --- | --- | | ![image](https://github.com/directus/directus/assets/9389634/1da3301d-226f-46a7-bfb8-3f6fb9bc55cd) | ![image](https://github.com/directus/directus/assets/9389634/50cab310-7d1c-4241-a6be-d06542565767) |When using an invalid email address| **APP** | **API** | | --- | --- | | ![image](https://github.com/directus/directus/assets/9389634/7b97659e-b49c-410b-872e-e36786b6e41e) | ![image](https://github.com/directus/directus/assets/9389634/d26ccba7-bb27-437e-991e-99c10941bbe7) |Using this differing error it is possible to determine whether a specific email address is present in the Directus instance as an SSO user.WorkaroundsWhen only using SSO for authentication then you can work around this issue by disabling local login using the following environment variable `AUTH_DISABLE_DEFAULT="true"`ReferencesImplemented as feature in https://github.com/directus/directus/pull/13184 https://owasp.org/www-project-web-security-testing-guide/v42/4-Web_Application_Security_Testing/03-Identity_Management_Testing/04-Testing_for_Account_Enumeration_and_Guessable_User_Account
[]
8.7
7.5
null
null
null
GHSA-qh49-jr9r-c9mg
Multiple PHP remote file inclusion vulnerabilities in BosClassifieds Classified Ads allow remote attackers to execute arbitrary PHP code via a URL in the insPath parameter to (1) index.php, (2) recent.php, (3) account.php, (4) classified.php, or (5) search.php.
[]
null
null
null
null
null
CVE-2016-2180
The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) implementation in OpenSSL through 1.0.2h allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted time-stamp file that is mishandled by the "openssl ts" command.
[ "cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1n:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1o:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1p:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1q:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1r:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1s:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1t:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
GHSA-9f97-rgpx-3p5f
Cross-site scripting (XSS) vulnerability in the Web Tracking Report page on Cisco Web Security Appliance (WSA) devices 8.5.0-497 allows remote attackers to inject arbitrary web script or HTML via an unspecified field, aka Bug ID CSCuu16008.
[]
null
null
null
null
null
RHSA-2024:6428
Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update
github.com/jaraco/zipp: Denial of Service (infinite loop) via crafted zip file in jaraco/zipp automation-controller: Gain access to the k8s API server via job execution with Container Group grpc: client communicating with a HTTP/2 proxy can poison the HPACK table between the proxy and the backend python-social-auth: Improper Handling of Case Sensitivity in social-auth-app-django python-jose: algorithm confusion with OpenSSH ECDSA keys and other key formats python-django: Potential denial-of-service in django.utils.html.urlize() python-django: Username enumeration through timing difference for users with unusable passwords python-django: Potential directory-traversal in django.core.files.storage.Storage.save() python-django: Potential denial-of-service in django.utils.translation.get_supported_language_variant() python-django: Memory exhaustion in django.utils.numberformat.floatformat() python-django: Potential denial-of-service vulnerability in django.utils.html.urlize() python-django: Potential denial-of-service vulnerability in django.utils.html.urlize() and AdminURLFieldWidget python-django: Potential SQL injection in QuerySet.values() and values_list()
[ "cpe:/a:redhat:ansible_automation_platform:2.4::el8", "cpe:/a:redhat:ansible_automation_platform:2.4::el9", "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8", "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9", "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el8", "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el9" ]
null
7.3
null
null
null
CVE-2010-3592
Unspecified vulnerability in the Oracle Document Capture component in Oracle Fusion Middleware 10.1.3.4 and 10.1.3.5 allows remote attackers to affect integrity and availability via unknown vectors related to Internal Operations.
[ "cpe:2.3:a:oracle:fusion_middleware:10.1.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:10.1.3.5:*:*:*:*:*:*:*" ]
null
null
null
8.5
null
CVE-2023-40515
LG Simple Editor joinAddUser Improper Input Validation Denial-of-Service Vulnerability
LG Simple Editor joinAddUser Improper Input Validation Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of LG Simple Editor. Authentication is not required to exploit this vulnerability. The specific flaw exists within the joinAddUser method. The issue results from improper input validation. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. . Was ZDI-CAN-20048.
[ "cpe:2.3:a:lg:simple_editor:*:*:*:*:*:*:*:*" ]
null
null
7.5
null
null
CVE-2019-1003016
An exposure of sensitive information vulnerability exists in Jenkins Job Import Plugin 2.1 and earlier in src/main/java/org/jenkins/ci/plugins/jobimport/JobImportAction.java, src/main/java/org/jenkins/ci/plugins/jobimport/JobImportGlobalConfig.java, src/main/java/org/jenkins/ci/plugins/jobimport/model/JenkinsSite.java that allows attackers with Overall/Read permission to have Jenkins connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
[ "cpe:2.3:a:jenkins:job_import:*:*:*:*:*:jenkins:*:*" ]
null
null
8.8
4.3
null
RHSA-2005:550
Red Hat Security Advisory: openssh security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
null
CVE-2024-3879
Tenda W30E setcfm formSetCfm stack-based overflow
A vulnerability, which was classified as critical, was found in Tenda W30E 1.0.1.25(633). This affects the function formSetCfm of the file /goform/setcfm. The manipulation of the argument funcpara1 leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-260913 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:o:tenda:w30e_firmware:1.0.1.25\\(633\\):*:*:*:*:*:*:*" ]
null
8.8
8.8
9
null
CVE-2001-0366
saposcol in SAP R/3 Web Application Server Demo before 1.5 trusts the PATH environmental variable to find and execute the expand program, which allows local users to obtain root access by modifying the PATH to point to a Trojan horse expand program.
[ "cpe:2.3:a:sap:sap_r_3_web_application_server_demo:*:*:*:*:*:*:*:*", "cpe:2.3:a:sap:saposcol:1.0:*:linux:*:*:*:*:*", "cpe:2.3:a:sap:saposcol:1.1:*:linux:*:*:*:*:*", "cpe:2.3:a:sap:saposcol:1.2:*:linux:*:*:*:*:*", "cpe:2.3:a:sap:saposcol:1.3:*:linux:*:*:*:*:*" ]
null
null
null
7.2
null
CVE-2025-5902
TOTOLINK T10 POST Request cstecgi.cgi setUpgradeFW buffer overflow
A vulnerability was found in TOTOLINK T10 4.1.8cu.5207 and classified as critical. This issue affects the function setUpgradeFW of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. The manipulation of the argument slaveIpList leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
8.7
8.8
8.8
9
null
CVE-2013-5001
Cross-site scripting (XSS) vulnerability in libraries/plugins/transformations/abstract/TextLinkTransformationsPlugin.class.php in phpMyAdmin 4.0.x before 4.0.4.2 allows remote authenticated users to inject arbitrary web script or HTML via a crafted object name associated with a TextLinkTransformationPlugin link.
[ "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.4.1:*:*:*:*:*:*:*" ]
null
null
null
3.5
null
CVE-2009-4932
Stack-based buffer overflow in 1by1 1.67 (aka 1.6.7.0) allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long string in a .m3u playlist file.
[ "cpe:2.3:a:mpesch3.de1:1by1:1.67:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
GHSA-3563-r2q2-w883
Cisco Unified Communications Manager (aka CUCM or Unified CM) allows remote attackers to cause a denial of service (service restart) via a crafted SIP message, aka Bug ID CSCub54349.
[]
null
null
null
null
null
GHSA-3264-h8mv-qcrp
A vulnerability classified as critical has been found in TOTOLINK A702R, A3002R and A3002RU 3.0.0-B20230809.1615. This affects an unknown part of the file /boafrm/formWsc of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
[]
8.7
8.8
null
null
null
CVE-2006-2856
ActiveState ActivePerl 5.8.8.817 for Windows configures the site/lib directory with "Users" group permissions for changing files, which allows local users to gain privileges by creating a malicious sitecustomize.pl file in that directory. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:activestate:activeperl:5.8.8.817:*:windows:*:*:*:*:*" ]
null
null
null
4.6
null
GHSA-x2r3-qg8c-ghw6
There is a NULL pointer dereference at liblas::SpatialReference::GetGTIF() (spatialreference.cpp) in libLAS 1.8.1 that will cause a denial of service.
[]
null
null
6.5
null
null
GHSA-qxhh-6r2j-rgm9
In onTransact of IncidentService.cpp, there is a possible out of bounds write due to memory corruption. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
[]
null
7.8
null
null
null
GHSA-9fgf-m63q-p2m6
Netgear R6850 1.1.0.88 was discovered to contain a command injection vulnerability via the c4-IPAddr parameter.
[]
null
9.8
null
null
null
GHSA-hpv4-59m7-pq6c
XnView Classic for Windows Version 2.40 allows remote attackers to execute code via a crafted .fpx file, related to a "User Mode Write AV starting at Xfpx+0x0000000000004efd."
[]
null
null
7.8
null
null
GHSA-jpmh-qrhq-g32f
AlgoSec FireFlow Reflected Cross-Site-Scripting (RXSS): A malicious user injects JavaScript code into a parameter called IntersectudRule on the search/result.html page. The malicious user changes the request from POST to GET and sends the URL to another user (victim). JavaScript code is executed on the browser of the other user.
[]
null
5.4
null
null
null
CVE-2020-9659
Adobe Audition versions 13.0.6 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution .
[ "cpe:2.3:a:adobe:audition:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
7.8
null
9.3
null
RHSA-2020:1429
Red Hat Security Advisory: firefox security update
Mozilla: Uninitialized memory could be read when using the WebGL copyTexSubImage method Mozilla: Out of bounds write in GMPDecodeData when processing large images Mozilla: Memory safety bugs fixed in Firefox 75 and Firefox ESR 68.7
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
9.8
null
null
null
GHSA-4j57-jr5f-ppvg
Multiple integer overflows in (1) readbmp.c, (2) readgif.c, (3) readgif.c, (4) readmrf.c, (5) readpcx.c, (6) readpng.c,(7) readpnm.c, (8) readprf.c, (9) readtiff.c, (10) readxbm.c, (11) readxpm.c in zgv 5.8 allow remote attackers to execute arbitrary code via certain image headers that cause calculations to be overflowed and small buffers to be allocated, leading to buffer overflows. NOTE: CVE-2004-0994 and CVE-2004-1095 identify sets of bugs that only partially overlap, despite having the same developer. Therefore, they should be regarded as distinct.
[]
null
null
null
null
null
CVE-2025-39557
WordPress Kadence WooCommerce Email Designer plugin <= 1.5.14 - Arbitrary File Upload vulnerability
Unrestricted Upload of File with Dangerous Type vulnerability in Ben Ritner - Kadence WP Kadence WooCommerce Email Designer allows Upload a Web Shell to a Web Server. This issue affects Kadence WooCommerce Email Designer: from n/a through 1.5.14.
[]
null
9.1
null
null
null
CVE-2008-3981
Unspecified vulnerability in the Oracle Secure Backup component in Oracle Secure Backup 10.1.0.1 allows remote attackers to affect confidentiality via unknown vectors.
[ "cpe:2.3:a:oracle:secure_backup:10.1.0.1:*:*:*:*:*:*:*" ]
null
null
null
5
null
RHSA-2024:4743
Red Hat Security Advisory: krb5 security update
krb5: GSS message token handling krb5: GSS message token handling
[ "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
6.5
null
null
null
CVE-2016-2807
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 46.0, Firefox ESR 38.x before 38.8, and Firefox ESR 45.x before 45.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:38.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:45.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*" ]
null
null
8.8
10
null
CVE-2020-8986
lib/NSSDropbox.php in ZendTo prior to 5.22-2 Beta failed to properly check for equality when validating the session cookie, allowing an attacker to gain administrative access with a large number of requests.
[ "cpe:2.3:a:zend:zendto:3.10:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.11:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.12:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.13:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.20:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.51:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.52:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.53:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.54:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.55:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.56-2:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.57:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.58:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.59:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.60:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.61:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.62:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.63:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.64:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.65:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.70-2:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.71:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.72:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.73:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.74:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.75:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.90:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.91:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.92:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.93:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:3.94:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.00:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.01:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.02:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.03-3:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.05-2:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.06-2:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.07-1:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.08-4:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.09-1:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.10-4:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.10-5:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.11-1:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.11-2:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.11-3:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.11-4:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.11-5:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.11-7:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.11-8:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.11-9:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.11-10:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.11-11:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.11-12:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.11-13:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.11-14:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.12-5:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.12-6:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.13-1:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.20-2:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.20-3:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.20-5:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.20-6:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.20-7:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.25-3:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.27-1:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.27-2:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.27-4:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.27-5:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.27-6:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.27-7:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.28-1:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:4.28-2:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.00-1:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.00-2:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.01-5:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.02-5:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.03-1:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.04-7:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.09-13:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.10-1:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.10-2:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.11-1:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.11-2:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.11-3:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.11-4:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.11-5:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.11-6:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.12-3:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.12-4:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.12-6:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.12-7:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.12-8:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.13-1:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.13-2:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.14-2:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.14-5:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.15-1:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.16-1:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.16-4:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.16-5:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.16-7:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.16-8:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.16.6:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.17-1:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.17-2:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.17-3:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.17-4:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.17-5:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.17-6:*:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.18-1:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.18-2:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.19-1:production:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.20-1:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.20-2:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.20-3:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.20-5:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.20-6:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.20-7:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.20-8:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.20-9:beta:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.21-1:production:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.21-2:production:*:*:*:*:*:*", "cpe:2.3:a:zend:zendto:5.22-1:beta:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
GHSA-wmx6-vxcf-c3gr
Validation Bypass in slp-validate
Versions of `slp-validate` prior to 1.0.1 are vulnerable to a validation bypass. Bitcoin scripts may cause the validation result from `slp-validate` to differ from the specified SLP consensus. This allows an attacker to create a Bitcoin script that causes a hard-fork from the SLP consensus.RecommendationUpgrade to version 1.0.1 or later.
[]
null
5.7
null
null
null
GHSA-3q5v-jr96-99g5
Judging Management System 1.0 was discovered to contain an arbitrary file upload vulnerability via the component edit_organizer.php.
[]
null
8.1
null
null
null
GHSA-2xf8-rjh6-9866
IBM Security Access Manager for Mobile 8.x before 8.0.1 and Security Access Manager for Web 7.x before 7.0.0 FP10 and 8.x before 8.0.1 make it easier for remote attackers to obtain sensitive information by sniffing the network during use of a weak SSL cipher.
[]
null
null
null
null
null
CVE-2023-2813
Multiple Themes - Reflected XSS
All of the above Aapna WordPress theme through 1.3, Anand WordPress theme through 1.2, Anfaust WordPress theme through 1.1, Arendelle WordPress theme before 1.1.13, Atlast Business WordPress theme through 1.5.8.5, Bazaar Lite WordPress theme before 1.8.6, Brain Power WordPress theme through 1.2, BunnyPressLite WordPress theme before 2.1, Cafe Bistro WordPress theme before 1.1.4, College WordPress theme before 1.5.1, Connections Reloaded WordPress theme through 3.1, Counterpoint WordPress theme through 1.8.1, Digitally WordPress theme through 1.0.8, Directory WordPress theme before 3.0.2, Drop WordPress theme before 1.22, Everse WordPress theme before 1.2.4, Fashionable Store WordPress theme through 1.3.4, Fullbase WordPress theme before 1.2.1, Ilex WordPress theme before 1.4.2, Js O3 Lite WordPress theme through 1.5.8.2, Js Paper WordPress theme through 2.5.7, Kata WordPress theme before 1.2.9, Kata App WordPress theme through 1.0.5, Kata Business WordPress theme through 1.0.2, Looki Lite WordPress theme before 1.3.0, moseter WordPress theme through 1.3.1, Nokke WordPress theme before 1.2.4, Nothing Personal WordPress theme through 1.0.7, Offset Writing WordPress theme through 1.2, Opor Ayam WordPress theme through 18, Pinzolo WordPress theme before 1.2.10, Plato WordPress theme before 1.1.9, Polka Dots WordPress theme through 1.2, Purity Of Soul WordPress theme through 1.9, Restaurant PT WordPress theme before 1.1.3, Saul WordPress theme before 1.1.0, Sean Lite WordPress theme before 1.4.6, Tantyyellow WordPress theme through 1.0.0.5, TIJAJI WordPress theme through 1.43, Tiki Time WordPress theme through 1.3, Tuaug4 WordPress theme through 1.4, Tydskrif WordPress theme through 1.1.3, UltraLight WordPress theme through 1.2, Venice Lite WordPress theme before 1.5.5, Viala WordPress theme through 1.3.1, viburno WordPress theme before 1.3.2, Wedding Bride WordPress theme before 1.0.2, Wlow WordPress theme before 1.2.7 suffer from the same issue about the search box reflecting the results causing XSS which allows an unauthenticated attacker to exploit against users if they click a malicious link.
[ "cpe:2.3:a:ajaydsouza:connections_reloaded:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:archimidismertzanos:atlast_business:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:archimidismertzanos:fashionable_store:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:archimidismertzanos:nothing_personal:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:arthousewebdesign:brain_power:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:asmedia:moseter:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:asmedia:tuaug4:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:ayecode:cafe_bistro:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:ayecode:college:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:ayecode:directory:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:ayecode:plato:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:ayecode:restaurant_pt:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:ayecode:wedding_bride:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:climaxthemes:kata:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:competethemes:drop:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:davidgarlitz:viala:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:deothemes:arendelle:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:deothemes:everse:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:deothemes:nokke:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:dotecsa:ilex:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:dotecsa:viburno:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:fredriksoerlie:ultralight:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:fyrewurks:polka_dots:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:fyrewurks:tiki_time:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:henleythemes:counterpoint:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:iznyn:opor_ayam:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:iznyn:purity_of_soul:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:jinwen:js_o3_lite:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:jinwen:js_paper:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:marchettidesign:fullbase:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:marchettidesign:wlow:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:omarfolgheraiter:digitally:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:saumendra:aapna:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:saumendra:anand:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:ta2g:tantyyellow:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:themeinprogress:bazaar_lite:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:themeinprogress:looki_lite:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:themeinprogress:saul:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:themeinprogress:saul_lite:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:themeinprogress:venice_lite:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:thewebhunter:anfaust:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:thewebhunter:offset_writing:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:thriveweb:pinzolo:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:tijaji:tijaji:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:wpmole:tydskrif:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:yws:bunnypress_lite:*:*:*:*:*:wordpress:*:*" ]
null
6.1
null
null
null
GHSA-3jcr-m733-wp5w
After Effects versions 24.6.2, 25.0.1 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
7.8
null
null
null
CVE-2011-2311
Unspecified vulnerability in Oracle Solaris 10 allows local users to affect availability, related to ZFS, a different vulnerability than CVE-2011-2313.
[ "cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*" ]
null
null
null
1.7
null
CVE-2017-7557
dnsdist version 1.1.0 is vulnerable to a flaw in authentication mechanism for REST API potentially allowing CSRF attack.
[ "cpe:2.3:a:powerdns:dnsdist:1.1.0:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
null
GHSA-jc6g-647j-w9g6
The Baseboard Management Controller (BMC) firmware in HPE Apollo 70 System prior to version 3.0.14.0 has a path traversal vulnerability in libifc.so webdeletesolvideofile function.
[]
null
null
null
null
null
GHSA-278p-2ghg-cvch
A denial of service vulnerability exists in the IOCTL handling functionality of Kaspersky Internet Security KL1 driver. A specially crafted IOCTL signal can cause an access violation in KL1 kernel driver resulting in local system denial of service. An attacker can run a program from user-mode to trigger this vulnerability.
[]
null
null
5.5
null
null
CVE-2023-21415
Sandro Poppi, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API overlay_del.cgi is vulnerable to path traversal attacks that allows for file deletion. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
[ "cpe:2.3:o:axis:axis_os:*:*:*:*:-:*:*:*", "cpe:2.3:o:axis:axis_os:*:*:*:*:active:*:*:*", "cpe:2.3:o:axis:axis_os_2016:*:*:*:*:lts:*:*:*", "cpe:2.3:o:axis:axis_os_2018:*:*:*:*:lts:*:*:*", "cpe:2.3:o:axis:axis_os_2020:*:*:*:*:lts:*:*:*", "cpe:2.3:o:axis:axis_os_2022:*:*:*:*:lts:*:*:*" ]
null
6.5
null
null
null
CVE-2022-4883
A flaw was found in libXpm. When processing files with .Z or .gz extensions, the library calls external programs to compress and uncompress files, relying on the PATH environment variable to find these programs, which could allow a malicious user to execute other programs by manipulating the PATH environment variable.
[ "cpe:2.3:a:x.org:libxpm:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
CVE-2024-0864
RCE in Laragon
Enabling Simple Ajax Uploader plugin included in Laragon open-source software allows for a remote code execution (RCE) attack via an improper input validation in a file_upload.php file which serves as an example. By default, Laragon is not vulnerable until a user decides to use the aforementioned plugin.
[ "cpe:2.3:a:leokhoa:laragon:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
CVE-2024-1458
The Elementor Addons by Livemesh plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘text_alignment’ attribute of the Animated Text widget in all versions up to, and including, 8.3.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
null
GHSA-jg47-pq6h-vjmw
Libreswan 3.6 allows remote attackers to cause a denial of service (crash) via a small length value and (1) no version or (2) an invalid major number in an IKE packet.
[]
null
null
null
null
null
GHSA-w6mg-vrx4-r5j4
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Scott Reilly Post-to-Post Links allows Stored XSS.This issue affects Post-to-Post Links: from n/a through 4.2.
[]
null
5.9
null
null
null
CVE-2021-39636
In do_ipt_get_ctl and do_ipt_set_ctl of ip_tables.c, there is a possible way to leak kernel information due to uninitialized data. This could lead to local information disclosure with system execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-120612905References: Upstream kernel
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
4.4
null
2.1
null