id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-w5qh-2x4h-crww
|
The Workplace (aka WP) component in IBM FileNet P8 Application Engine (P8AE) 4.0.2.x before 4.0.2.2-P8AE-FP002 grants a document's Creator-Owner full control over an annotation object, even if the default instance security has changed, which might allow remote authenticated users to bypass intended access restrictions in opportunistic circumstances.
|
[] | null | null | null | null | null |
|
CVE-2024-45155
|
Animate | Access of Uninitialized Pointer (CWE-824)
|
Animate versions 23.0.8, 24.0.5 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
GHSA-2w2x-v275-f37c
|
Cross-site scripting (XSS) vulnerability in the Andy Frank Beatnik 1.0 extension for Firefox allows remote attackers to inject arbitrary web script or HTML via an RSS feed. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[] | null | null | null | null | null |
|
CVE-2018-5526
|
Under certain conditions, on F5 BIG-IP ASM 13.1.0-13.1.0.5, Behavioral DOS (BADOS) protection may fail during an attack.
|
[
"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 | null |
|
CVE-2025-6092
|
comfyanonymous comfyui Incomplete Fix CVE-2024-10099 image cross site scripting
|
A vulnerability was found in comfyanonymous comfyui up to 0.3.39. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /upload/image of the component Incomplete Fix CVE-2024-10099. The manipulation of the argument image leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 5.3 | 4.3 | 4.3 | 5 | null |
CVE-2011-1980
|
Untrusted search path vulnerability in Microsoft Office 2003 SP3 and 2007 SP2 allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .doc, .ppt, or .xls file, aka "Office Component Insecure Library Loading Vulnerability."
|
[
"cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2007:sp2:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
GHSA-42m6-g935-5vmq
|
@ianwalter/merge Prototype Pollution via `merge` function
|
All versions of package @ianwalter/merge are vulnerable to Prototype Pollution via the main (`merge`) function. @ianwalter/merge is [deprecated](https://github.com/ianwalter/merge/blob/master/README.md) and the maintainer suggests using [@generates/merger](https://github.com/generates/generates/tree/main/packages/merger) instead.
|
[] | null | 5.6 | null | null | null |
GHSA-h9jg-5wxv-6jq7
|
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.
|
[] | null | 5.4 | null | null | null |
|
CVE-2019-18817
|
Istio 1.3.x before 1.3.5 allows Denial of Service because continue_on_listener_filters_timeout is set to True, a related issue to CVE-2019-18836.
|
[
"cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-1999-1000
|
The web administration interface for Cisco Cache Engine allows remote attackers to view performance statistics.
|
[
"cpe:2.3:h:cisco:cache_engine:2:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2020-23639
|
A command injection vulnerability exists in Moxa Inc VPort 461 Series Firmware Version 3.4 or lower that could allow a remote attacker to execute arbitrary commands in Moxa's VPort 461 Series Industrial Video Servers.
|
[
"cpe:2.3:o:moxa:vport_461_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:moxa:vport_461:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 | null |
|
CVE-2024-39596
|
[CVE-2024-39596] Missing Authorization check vulnerability in SAP Enable Now
|
Due to missing authorization checks, SAP Enable
Now allows an author to escalate privileges to access information which should
otherwise be restricted. On successful exploitation, the attacker can cause
limited impact on confidentiality of the application.
|
[] | null | 4.3 | null | null | null |
CVE-2017-13834
|
An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "Kernel" component. It allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted mach binary.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 | null |
|
GHSA-55wr-vpmr-8325
|
Vulnerability in the Sun ZFS Storage Appliance Kit (AK) component of Oracle Sun Systems Products Suite (subcomponent: API frameworks). The supported version that is affected is Prior to 8.7.18. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise Sun ZFS Storage Appliance Kit (AK). Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Sun ZFS Storage Appliance Kit (AK). CVSS 3.0 Base Score 2.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L).
|
[] | null | null | 2.7 | null | null |
|
CVE-2024-11717
|
Tokens in CTFd used for account activation and password resetting can be used interchangeably for these operations. When used, they are sent to the server as a GET parameter and they are not single use, which means, that during token expiration time an on-path attacker might reuse such a token to change user's password and take over the account. Moreover, the tokens also include base64 encoded user email.
This issue impacts releases up to 3.7.4 and was addressed by pull request 2679 https://github.com/CTFd/CTFd/pull/2679 included in 3.7.5 release.
|
[] | 6.3 | null | null | null |
https://github.com/CTFd/CTFd/pull/2679
|
|
GHSA-7vpv-wgcj-h638
|
The /proc filesystem in Linux allows local users to obtain sensitive information by opening various entries in /proc/self before executing a setuid program, which causes the program to fail to change the ownership and permissions of those entries.
|
[] | null | null | null | null | null |
|
GHSA-rf3m-rwff-vvwc
|
The 3D FlipBook plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Bookmark URL field in all versions up to, and including, 1.15.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
GHSA-2289-pqfq-6wx7
|
Unrestricted upload of file with dangerous type in Apache Solr
|
The 8.1.1 and 8.2.0 releases of Apache Solr contain an insecure setting for the ENABLE_REMOTE_JMX_OPTS configuration option in the default solr.in.sh configuration file shipping with Solr. If you use the default solr.in.sh file from the affected releases, then JMX monitoring will be enabled and exposed on RMI_PORT (default=18983), without any authentication. If this port is opened for inbound traffic in your firewall, then anyone with network access to your Solr nodes will be able to access JMX, which may in turn allow them to upload malicious code for execution on the Solr server.
|
[] | null | 9.8 | null | null | null |
CVE-2018-1002200
|
plexus-archiver before 3.6.0 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in an archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'.
|
[
"cpe:2.3:a:codehaus-plexus:plexus-archiver:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 | null |
|
CVE-2014-125038
|
IS_Projecto2 NewsBean.java sql injection
|
A vulnerability has been found in IS_Projecto2 and classified as critical. This vulnerability affects unknown code of the file Cnn-EJB/ejbModule/ejbs/NewsBean.java. The manipulation of the argument date leads to sql injection. The name of the patch is aa128b2c9c9fdcbbf5ecd82c1e92103573017fe0. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217192.
|
[
"cpe:2.3:a:is_projecto2_project:is_projecto2:*:*:*:*:*:*:*:*"
] | null | 5.5 | 5.5 | 5.2 |
https://github.com/rfsimoes/IS_Projecto2/commit/aa128b2c9c9fdcbbf5ecd82c1e92103573017fe0
|
RHSA-2013:1457
|
Red Hat Security Advisory: libgcrypt security update
|
GnuPG susceptible to Yarom/Falkner flush+reload cache side-channel attack
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null | null |
CVE-2020-22036
|
A heap-based Buffer Overflow vulnerability exists in FFmpeg 4.2 in filter_intra at libavfilter/vf_bwdif.c, which might lead to memory corruption and other potential consequences.
|
[
"cpe:2.3:a:ffmpeg:ffmpeg:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 | null |
|
CVE-2024-46432
|
Tenda W18E V16.01.0.8(1625) is vulnerable to Incorrect Access Control. An attacker can send a specially crafted HTTP POST request to the setQuickCfgWifiAndLogin function, which allows unauthorized changes to WiFi configuration settings and administrative credentials.
|
[] | null | 8.8 | null | null | null |
|
RHSA-2016:2749
|
Red Hat Security Advisory: rh-mysql56-mysql security update
|
mysql: unspecified vulnerability in subcomponent: Server: Optimizer (CPU October 2016) mysql: unspecified vulnerability in subcomponent: Server: InnoDB (CPU October 2016) mysql: race condition while setting stats during MyISAM table repair (CPU Oct 2016) mysql: insecure error log file handling in mysqld_safe (CPU Oct 2016) mysql: unspecified vulnerability in subcomponent: Server: GIS (CPU October 2016) mysql: unspecified vulnerability in subcomponent: Server: Federated (CPU October 2016) mysql: general_log can write to configuration files, leading to privilege escalation (CPU Oct 2016) mysql: race condition while setting stats during MyISAM table repair (CPU Oct 2016) mysql: insecure error log file handling in mysqld_safe (CPU Oct 2016) mysql: unspecified vulnerability in subcomponent: Server: Types (CPU October 2016)
|
[
"cpe:/a:redhat:rhel_software_collections:2::el6",
"cpe:/a:redhat:rhel_software_collections:2::el7"
] | null | null | 4.3 | null | null |
CVE-2018-3629
|
Buffer overflow in event handler in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x, and 11.x may allow an attacker to cause a denial of service via the same subnet.
|
[
"cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e4300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e4400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e4500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e4600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e4700:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e6300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e6320:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e6400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e6420:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e6540:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e6550:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e6600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e6700:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e6750:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e6850:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e7200:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e7300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e7400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e7500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e7600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e8190:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e8200:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e8300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e8400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e8500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e8600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:l7200:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:l7300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:l7400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:l7500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:l7700:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:p7350:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:p7370:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:p7450:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:p7550:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:p7570:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:p8400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:p8600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:p8700:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:p8800:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:p9500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:p9600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:p9700:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:sl9300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:sl9380:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:sl9400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:sl9600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:sp9300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:sp9400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:sp9600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:su9300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:su9400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:su9600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t5200:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t5250:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t5270:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t5300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t5450:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t5470:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t5500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t5550:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t5600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t5670:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t5750:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t5800:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t5870:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t6400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t6500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t6600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t6670:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t7100:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t7200:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t7250:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t7300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t7400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t7500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t7600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t7700:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t7800:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t8100:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t8300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t9300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t9400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t9500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t9550:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t9600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t9800:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t9900:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:u7500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:u7600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:u7700:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6500u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6560u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6567u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6600u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6650u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6660u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6700:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6700hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6700k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6700t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6700te:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6770hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6785r:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6820eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6820hk:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6820hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6822eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6870hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6920hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6970hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7020u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7100:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7100e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7100h:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7100t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7100u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7101e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7101te:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7102e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7130u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7167u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7300t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7320:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7350k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7y54:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7y57:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7200u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7260u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7267u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7287u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7300hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7300u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7360u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7400t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7440eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7440hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7442eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7500t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7600k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7600t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:700t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:8100h:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:8100t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:8109u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:8130u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:8145u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:8300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:8300t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8200y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8259u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8265u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8269u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8300h:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8305g:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8400b:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8400h:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8400t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8500b:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8500t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8600t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8086k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8500y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8559u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8565u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8700b:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8700t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8705g:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8706g:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8709g:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8750h:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8809g:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8850h:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9:8950hk:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_extreme:qx6700:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_extreme:qx6800:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_extreme:qx6850:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_extreme:qx9300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_extreme:qx9650:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_extreme:qx9770:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_extreme:qx9775:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_extreme:x6800:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_extreme:x7800:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_extreme:x7900:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_extreme:x9000:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_extreme:x9100:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_quad:q6600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_quad:q6700:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_quad:q8200:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_quad:q8200s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_quad:q8300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_quad:q8400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_quad:q8400s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_quad:q9000:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_quad:q9100:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_quad:q9300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_quad:q9400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_quad:q9400s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_quad:q9450:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_quad:q9500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_quad:q9505:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_quad:q9505s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_quad:q9550:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_quad:q9550s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_quad:q9650:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_solo:su3500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_solo:u2100:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_solo:u2200:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_solo:ulv_su3300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_solo:ulv_su3500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_duo:l2300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_duo:l2400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_duo:l2500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_duo:t2050:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_duo:t2250:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_duo:t2300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_duo:t2300e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_duo:t2350:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_duo:t2400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_duo:t2450:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_duo:t2500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_duo:t2600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_duo:t2700:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_duo:u2400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_duo:u2500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3450_:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_solo:t1250:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_solo:t1300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_solo:t1350:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_solo:t1400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_solo:u1300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_solo:u1400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_solo:u1500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:5118:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:5119t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:5120:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:5120t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:5122:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6126:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6126f:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6126t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6128:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6130:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6130f:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6130t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6132:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6134:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6134m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6136:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6138:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6138f:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6138t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6140:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6140m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6142:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6142f:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6142m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6144:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6146:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6148:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6148f:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6150:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6152:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6154:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:w2123:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:w2125:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:w2133:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:w2135:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:w2145:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:w2155:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:w2175:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:w2195:*:*:*:*:*:*:*"
] | null | 6.5 | null | 3.3 | null |
|
CVE-2007-2582
|
Multiple buffer overflows in the DB2 JDBC Applet Server (DB2JDS) service in IBM DB2 9.x and earlier allow remote attackers to (1) execute arbitrary code via a crafted packet to the DB2JDS service on tcp/6789; and cause a denial of service via (2) an invalid LANG parameter or (2) a long packet that generates a "MemTree overflow."
|
[
"cpe:2.3:a:ibm:db2:*:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
CVE-2025-49485
|
Extension - balbooa.com - SQL injection in Balbooa Forms component version 1.0.0 - 2.3.1.1 for Joomla
|
A SQL injection vulnerability in the Balbooa Forms plugin 1.0.0-2.3.1.1 for Joomla allows privileged users to execute arbitrary SQL commands via the 'id' parameter.
|
[] | 8.6 | null | null | null | null |
GHSA-pphr-vx2j-3836
|
An issue was discovered in the Tatsuya Kinoshita w3m fork before 0.5.3-31. Heap-based buffer overflow in the addMultirowsForm function in w3m allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTML page.
|
[] | null | null | 8.8 | null | null |
|
GHSA-ggr7-f8rm-974h
|
Google Chrome before 15.0.874.120 does not properly perform VP8 decoding, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted stream.
|
[] | null | null | null | null | null |
|
GHSA-vm5w-p85f-gq6r
|
Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.
|
[] | null | 6.5 | null | null | null |
|
CVE-2022-43773
|
Hitachi Vantara Pentaho Business Analytics Server - Incorrect Permission Assignment for Critical Resource
|
Hitachi Vantara Pentaho Business Analytics Server prior to versions 9.4.0.1 and 9.3.0.2, including 8.3.x is installed with a sample HSQLDB data source configured with stored procedures enabled.
|
[
"cpe:2.3:a:hitachi:vantara_pentaho_business_analytics_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi:vantara_pentaho_business_analytics_server:9.4.0.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
CVE-2024-28772
|
IBM Security Directory Integrator cross-site scripting
|
IBM Security Directory Integrator 7.2.0 and IBM Security Verify Directory Integrator 10.0.0 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 285645.
|
[
"cpe:2.3:a:ibm:security_verify_directory:10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_directory_integrator:7.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_directory_server:-:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_verify_access:10.0.0:*:*:*:*:*:*:*"
] | null | 6.8 | null | null | null |
CVE-2012-4394
|
Cross-site scripting (XSS) vulnerability in apps/files/js/filelist.js in ownCloud before 4.0.5 allows remote attackers to inject arbitrary web script or HTML via the file parameter.
|
[
"cpe:2.3:a:owncloud:owncloud:*:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:owncloud:owncloud:4.0.3:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-r6fx-55x3-f9x6
|
Crafter CMS Crafter Studio vulnerable to Improper Control of Dynamically-Managed Code Resources
|
Improper Control of Dynamically-Managed Code Resources vulnerability in Crafter Studio of Crafter CMS allows authenticated developers to execute OS commands via FreeMarker static methods.
|
[] | null | 8.8 | null | null | null |
GHSA-ch9g-c5wp-jf2p
|
IBM Security Directory Server 6.4.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 165813.
|
[] | null | null | null | null | null |
|
CVE-2006-2313
|
PostgreSQL 8.1.x before 8.1.4, 8.0.x before 8.0.8, 7.4.x before 7.4.13, 7.3.x before 7.3.15, and earlier versions allows context-dependent attackers to bypass SQL injection protection methods in applications via invalid encodings of multibyte characters, aka one variant of "Encoding-Based SQL Injection."
|
[
"cpe:2.3:a:postgresql:postgresql:7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.13:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.14:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.3:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2018-11476
|
An issue was discovered on Vgate iCar 2 Wi-Fi OBD2 Dongle devices. The dongle opens an unprotected wireless LAN that cannot be configured with encryption or a password. This enables anyone within the range of the WLAN to connect to the network without authentication.
|
[
"cpe:2.3:o:vgate:icar_2_wi-fi_obd2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:vgate:icar_2_wi-fi_obd2:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 5.8 | null |
|
GHSA-95rp-6gqp-6622
|
Command Injection Vulnerability in find-exec
|
Older versions of the package are vulnerable to Command Injection as an attacker controlled parameter. As a result, attackers may run malicious commands.For example:This creates a file named "hacked" on the filesystem.You should never allow users to control commands to find, since this package attempts to run every command provided.Thanks to @miguelafmonteiro for reporting.
|
[] | null | 9.8 | null | null | null |
GHSA-c635-w8p8-6666
|
The Everest Poker (aka com.wEverestPoker) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] | null | null | null | null | null |
|
GHSA-whfp-4v96-fx4x
|
HP Insight Management Agents before 8.6 allows remote attackers to obtain sensitive information via an unspecified request that triggers disclosure of the full path.
|
[] | null | null | null | null | null |
|
GHSA-f792-vqmh-qc7h
|
While processing camera buffers in camera driver, a use after free condition can occur in Snapdragon Automobile, Snapdragon Mobile, Snapdragon Wear in MDM9206, MDM9607, MDM9650, MSM8996AU, SD 210/SD 212/SD 205, SD 625, SD 820, SD 820A, SD 835, SDX20.
|
[] | null | null | 7.8 | null | null |
|
GHSA-xrh7-2gfq-4rcq
|
openCart Server-Side Template Injection (SSTI) vulnerability
|
A Server-Side Template Injection (SSTI) vulnerability in the Theme Editor Function of openCart project v4.0.2.3 allows attackers to execute arbitrary code via injecting a crafted payload.
|
[] | 5.5 | 8 | null | null | null |
CVE-2018-19052
|
An issue was discovered in mod_alias_physical_handler in mod_alias.c in lighttpd before 1.4.50. There is potential ../ path traversal of a single directory above an alias target, with a specific mod_alias configuration where the matched alias lacks a trailing '/' character, but the alias target filesystem path does have a trailing '/' character.
|
[
"cpe:2.3:a:lighttpd:lighttpd:*:*:*:*:*:*:*:*",
"cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*",
"cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp4:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp1:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp2:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp3:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp4:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
RHSA-2013:0270
|
Red Hat Security Advisory: jakarta-commons-httpclient security update
|
jakarta-commons-httpclient: missing connection hostname check against X.509 certificate name
|
[
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 3.7 | null | null |
CVE-2021-38492
|
When delegating navigations to the operating system, Firefox would accept the `mk` scheme which might allow attackers to launch pages and execute scripts in Internet Explorer in unprivileged mode. *This bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox < 92, Thunderbird < 91.1, Thunderbird < 78.14, Firefox ESR < 78.14, and Firefox ESR < 91.1.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 | null |
|
GHSA-wcrg-6ghq-6288
|
Buffer overflow in Internet Explorer 4.01 and earlier allows remote attackers to execute arbitrary commands via a long URL with the "mk:" protocol, aka the "MK Overrun security issue."
|
[] | null | null | null | null | null |
|
GHSA-9xh5-35c7-hmjm
|
A vulnerability has been found in PHPGurukul Complaint Management system 1.0 and classified as critical. This vulnerability affects unknown code of the file /user/reset-password.php. The manipulation of the argument email leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 7.3 | null | null | null |
|
GHSA-wv6w-qmjm-mqmv
|
The Radio Player – Live Shoutcast, Icecast and Any Audio Stream Player for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'align' attribute within the 'wp:radio-player' Gutenberg block in all versions up to, and including, 2.0.78 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
CVE-2008-1617
|
Double free vulnerability in Web TransferCtrl Class 8,2,1,4 (iManFile.cab), as used in WorkSite Web 8.2 before SP1 P2, allows remote attackers to execute arbitrary code via JavaScript that sets the Server property to a string, then sets the string to null.
|
[
"cpe:2.3:a:interwoven:worksite_web:*:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
GHSA-2mp7-r7rc-5fh6
|
Cisco Video Surveillance Manager (VSM) before 7.0.0 allows remote attackers to obtain sensitive configuration, archive, and log information via unspecified vectors, related to the Cisco_VSBWT (aka Broadware sample code) package, aka Bug ID CSCsv37288.
|
[] | null | null | null | null | null |
|
CVE-2012-2708
|
Cross-site scripting (XSS) vulnerability in the _hosting_task_log_table function in modules/hosting/task/hosting_task.module in the Hostmaster (Aegir) module 6.x-1.x before 6.x-1.9 for Drupal allows remote authenticated users with certain permissions to inject arbitrary web script or HTML via a Drush log message in a provision task log.
|
[
"cpe:2.3:a:antoine_beaupre:hostmaster:6.x-1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:antoine_beaupre:hostmaster:6.x-1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:antoine_beaupre:hostmaster:6.x-1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:antoine_beaupre:hostmaster:6.x-1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:antoine_beaupre:hostmaster:6.x-1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:antoine_beaupre:hostmaster:6.x-1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:antoine_beaupre:hostmaster:6.x-1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:antoine_beaupre:hostmaster:6.x-1.x:dev:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*"
] | null | null | null | 2.1 | null |
|
GHSA-rjqp-837c-gqg6
|
Question2Answer Q2A Ultimate SEO Version 1.3 is affected by cross-site scripting (XSS), which may lead to arbitrary remote code execution.
|
[] | null | null | null | null | null |
|
RHSA-2020:3176
|
Red Hat Security Advisory: postgresql-jdbc security update
|
postgresql-jdbc: XML external entity (XXE) vulnerability in PgSQLXML
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.7 | null | null | null |
GHSA-2775-52x6-3w7f
|
Cross-site scripting (XSS) vulnerability in Liferay Portal before 5.3.0 allows remote attackers to inject arbitrary web script or HTML via the p_p_id parameter.
|
[] | null | null | null | null | null |
|
GHSA-jgf4-vwc3-r46v
|
Directus Allows Single Sign-On User Enumeration
|
ImpactWhen relying on SSO providers in combination with local authentication it can be possible to enumerate existing SSO users in the instance. This is possible because if an email address exists in Directus and belongs to a known SSO provider then it will throw a "helpful" error that the user belongs to another provider.ReproductionCreate a user using a SSO provider `[email protected]`.Try to log-in using the regular login form (or the API)When using a valid email address| **APP** | **API** |
| --- | --- |
|  |  |When using an invalid email address| **APP** | **API** |
| --- | --- |
|  |  |Using this differing error it is possible to determine whether a specific email address is present in the Directus instance as an SSO user.WorkaroundsWhen only using SSO for authentication then you can work around this issue by disabling local login using the following environment variable `AUTH_DISABLE_DEFAULT="true"`ReferencesImplemented as feature in https://github.com/directus/directus/pull/13184
https://owasp.org/www-project-web-security-testing-guide/v42/4-Web_Application_Security_Testing/03-Identity_Management_Testing/04-Testing_for_Account_Enumeration_and_Guessable_User_Account
|
[] | 8.7 | 7.5 | null | null | null |
GHSA-qh49-jr9r-c9mg
|
Multiple PHP remote file inclusion vulnerabilities in BosClassifieds Classified Ads allow remote attackers to execute arbitrary PHP code via a URL in the insPath parameter to (1) index.php, (2) recent.php, (3) account.php, (4) classified.php, or (5) search.php.
|
[] | null | null | null | null | null |
|
CVE-2016-2180
|
The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) implementation in OpenSSL through 1.0.2h allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted time-stamp file that is mishandled by the "openssl ts" command.
|
[
"cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1n:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1o:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1p:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1q:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1r:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1s:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.1t:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-9f97-rgpx-3p5f
|
Cross-site scripting (XSS) vulnerability in the Web Tracking Report page on Cisco Web Security Appliance (WSA) devices 8.5.0-497 allows remote attackers to inject arbitrary web script or HTML via an unspecified field, aka Bug ID CSCuu16008.
|
[] | null | null | null | null | null |
|
RHSA-2024:6428
|
Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update
|
github.com/jaraco/zipp: Denial of Service (infinite loop) via crafted zip file in jaraco/zipp automation-controller: Gain access to the k8s API server via job execution with Container Group grpc: client communicating with a HTTP/2 proxy can poison the HPACK table between the proxy and the backend python-social-auth: Improper Handling of Case Sensitivity in social-auth-app-django python-jose: algorithm confusion with OpenSSH ECDSA keys and other key formats python-django: Potential denial-of-service in django.utils.html.urlize() python-django: Username enumeration through timing difference for users with unusable passwords python-django: Potential directory-traversal in django.core.files.storage.Storage.save() python-django: Potential denial-of-service in django.utils.translation.get_supported_language_variant() python-django: Memory exhaustion in django.utils.numberformat.floatformat() python-django: Potential denial-of-service vulnerability in django.utils.html.urlize() python-django: Potential denial-of-service vulnerability in django.utils.html.urlize() and AdminURLFieldWidget python-django: Potential SQL injection in QuerySet.values() and values_list()
|
[
"cpe:/a:redhat:ansible_automation_platform:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform:2.4::el9",
"cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9",
"cpe:/a:redhat:ansible_automation_platform_inside:2.4::el8",
"cpe:/a:redhat:ansible_automation_platform_inside:2.4::el9"
] | null | 7.3 | null | null | null |
CVE-2010-3592
|
Unspecified vulnerability in the Oracle Document Capture component in Oracle Fusion Middleware 10.1.3.4 and 10.1.3.5 allows remote attackers to affect integrity and availability via unknown vectors related to Internal Operations.
|
[
"cpe:2.3:a:oracle:fusion_middleware:10.1.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:10.1.3.5:*:*:*:*:*:*:*"
] | null | null | null | 8.5 | null |
|
CVE-2023-40515
|
LG Simple Editor joinAddUser Improper Input Validation Denial-of-Service Vulnerability
|
LG Simple Editor joinAddUser Improper Input Validation Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of LG Simple Editor. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the joinAddUser method. The issue results from improper input validation. An attacker can leverage this vulnerability to create a denial-of-service condition on the system.
. Was ZDI-CAN-20048.
|
[
"cpe:2.3:a:lg:simple_editor:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | null | null |
CVE-2019-1003016
|
An exposure of sensitive information vulnerability exists in Jenkins Job Import Plugin 2.1 and earlier in src/main/java/org/jenkins/ci/plugins/jobimport/JobImportAction.java, src/main/java/org/jenkins/ci/plugins/jobimport/JobImportGlobalConfig.java, src/main/java/org/jenkins/ci/plugins/jobimport/model/JenkinsSite.java that allows attackers with Overall/Read permission to have Jenkins connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
|
[
"cpe:2.3:a:jenkins:job_import:*:*:*:*:*:jenkins:*:*"
] | null | null | 8.8 | 4.3 | null |
|
RHSA-2005:550
|
Red Hat Security Advisory: openssh security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null | null |
CVE-2024-3879
|
Tenda W30E setcfm formSetCfm stack-based overflow
|
A vulnerability, which was classified as critical, was found in Tenda W30E 1.0.1.25(633). This affects the function formSetCfm of the file /goform/setcfm. The manipulation of the argument funcpara1 leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-260913 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:o:tenda:w30e_firmware:1.0.1.25\\(633\\):*:*:*:*:*:*:*"
] | null | 8.8 | 8.8 | 9 | null |
CVE-2001-0366
|
saposcol in SAP R/3 Web Application Server Demo before 1.5 trusts the PATH environmental variable to find and execute the expand program, which allows local users to obtain root access by modifying the PATH to point to a Trojan horse expand program.
|
[
"cpe:2.3:a:sap:sap_r_3_web_application_server_demo:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:saposcol:1.0:*:linux:*:*:*:*:*",
"cpe:2.3:a:sap:saposcol:1.1:*:linux:*:*:*:*:*",
"cpe:2.3:a:sap:saposcol:1.2:*:linux:*:*:*:*:*",
"cpe:2.3:a:sap:saposcol:1.3:*:linux:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
CVE-2025-5902
|
TOTOLINK T10 POST Request cstecgi.cgi setUpgradeFW buffer overflow
|
A vulnerability was found in TOTOLINK T10 4.1.8cu.5207 and classified as critical. This issue affects the function setUpgradeFW of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. The manipulation of the argument slaveIpList leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 8.7 | 8.8 | 8.8 | 9 | null |
CVE-2013-5001
|
Cross-site scripting (XSS) vulnerability in libraries/plugins/transformations/abstract/TextLinkTransformationsPlugin.class.php in phpMyAdmin 4.0.x before 4.0.4.2 allows remote authenticated users to inject arbitrary web script or HTML via a crafted object name associated with a TextLinkTransformationPlugin link.
|
[
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:4.0.4.1:*:*:*:*:*:*:*"
] | null | null | null | 3.5 | null |
|
CVE-2009-4932
|
Stack-based buffer overflow in 1by1 1.67 (aka 1.6.7.0) allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long string in a .m3u playlist file.
|
[
"cpe:2.3:a:mpesch3.de1:1by1:1.67:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-3563-r2q2-w883
|
Cisco Unified Communications Manager (aka CUCM or Unified CM) allows remote attackers to cause a denial of service (service restart) via a crafted SIP message, aka Bug ID CSCub54349.
|
[] | null | null | null | null | null |
|
GHSA-3264-h8mv-qcrp
|
A vulnerability classified as critical has been found in TOTOLINK A702R, A3002R and A3002RU 3.0.0-B20230809.1615. This affects an unknown part of the file /boafrm/formWsc of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] | 8.7 | 8.8 | null | null | null |
|
CVE-2006-2856
|
ActiveState ActivePerl 5.8.8.817 for Windows configures the site/lib directory with "Users" group permissions for changing files, which allows local users to gain privileges by creating a malicious sitecustomize.pl file in that directory. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information.
|
[
"cpe:2.3:a:activestate:activeperl:5.8.8.817:*:windows:*:*:*:*:*"
] | null | null | null | 4.6 | null |
|
GHSA-x2r3-qg8c-ghw6
|
There is a NULL pointer dereference at liblas::SpatialReference::GetGTIF() (spatialreference.cpp) in libLAS 1.8.1 that will cause a denial of service.
|
[] | null | null | 6.5 | null | null |
|
GHSA-qxhh-6r2j-rgm9
|
In onTransact of IncidentService.cpp, there is a possible out of bounds write due to memory corruption. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[] | null | 7.8 | null | null | null |
|
GHSA-9fgf-m63q-p2m6
|
Netgear R6850 1.1.0.88 was discovered to contain a command injection vulnerability via the c4-IPAddr parameter.
|
[] | null | 9.8 | null | null | null |
|
GHSA-hpv4-59m7-pq6c
|
XnView Classic for Windows Version 2.40 allows remote attackers to execute code via a crafted .fpx file, related to a "User Mode Write AV starting at Xfpx+0x0000000000004efd."
|
[] | null | null | 7.8 | null | null |
|
GHSA-jpmh-qrhq-g32f
|
AlgoSec FireFlow Reflected Cross-Site-Scripting (RXSS): A malicious user injects JavaScript code into a parameter called IntersectudRule on the search/result.html page. The malicious user changes the request from POST to GET and sends the URL to another user (victim). JavaScript code is executed on the browser of the other user.
|
[] | null | 5.4 | null | null | null |
|
CVE-2020-9659
|
Adobe Audition versions 13.0.6 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution .
|
[
"cpe:2.3:a:adobe:audition:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 9.3 | null |
|
RHSA-2020:1429
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Uninitialized memory could be read when using the WebGL copyTexSubImage method Mozilla: Out of bounds write in GMPDecodeData when processing large images Mozilla: Memory safety bugs fixed in Firefox 75 and Firefox ESR 68.7
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 9.8 | null | null | null |
GHSA-4j57-jr5f-ppvg
|
Multiple integer overflows in (1) readbmp.c, (2) readgif.c, (3) readgif.c, (4) readmrf.c, (5) readpcx.c, (6) readpng.c,(7) readpnm.c, (8) readprf.c, (9) readtiff.c, (10) readxbm.c, (11) readxpm.c in zgv 5.8 allow remote attackers to execute arbitrary code via certain image headers that cause calculations to be overflowed and small buffers to be allocated, leading to buffer overflows. NOTE: CVE-2004-0994 and CVE-2004-1095 identify sets of bugs that only partially overlap, despite having the same developer. Therefore, they should be regarded as distinct.
|
[] | null | null | null | null | null |
|
CVE-2025-39557
|
WordPress Kadence WooCommerce Email Designer plugin <= 1.5.14 - Arbitrary File Upload vulnerability
|
Unrestricted Upload of File with Dangerous Type vulnerability in Ben Ritner - Kadence WP Kadence WooCommerce Email Designer allows Upload a Web Shell to a Web Server. This issue affects Kadence WooCommerce Email Designer: from n/a through 1.5.14.
|
[] | null | 9.1 | null | null | null |
CVE-2008-3981
|
Unspecified vulnerability in the Oracle Secure Backup component in Oracle Secure Backup 10.1.0.1 allows remote attackers to affect confidentiality via unknown vectors.
|
[
"cpe:2.3:a:oracle:secure_backup:10.1.0.1:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
RHSA-2024:4743
|
Red Hat Security Advisory: krb5 security update
|
krb5: GSS message token handling krb5: GSS message token handling
|
[
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 6.5 | null | null | null |
CVE-2016-2807
|
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 46.0, Firefox ESR 38.x before 38.8, and Firefox ESR 45.x before 45.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:45.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*"
] | null | null | 8.8 | 10 | null |
|
CVE-2020-8986
|
lib/NSSDropbox.php in ZendTo prior to 5.22-2 Beta failed to properly check for equality when validating the session cookie, allowing an attacker to gain administrative access with a large number of requests.
|
[
"cpe:2.3:a:zend:zendto:3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:3.13:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:3.20:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:3.51:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:3.52:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:3.53:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:3.54:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:3.55:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:3.56-2:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:3.57:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:3.58:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:3.59:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:3.60:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:3.61:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:3.62:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:3.63:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:3.64:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:3.65:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:3.70-2:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:3.71:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:3.72:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:3.73:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:3.74:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:3.75:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:3.90:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:3.91:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:3.92:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:3.93:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:3.94:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:4.00:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:4.01:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:4.02:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:4.03-3:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:4.05-2:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:4.06-2:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:4.07-1:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:4.08-4:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:4.09-1:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:4.10-4:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:4.10-5:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:4.11-1:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:4.11-2:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:4.11-3:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:4.11-4:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:4.11-5:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:4.11-7:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:4.11-8:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:4.11-9:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:4.11-10:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:4.11-11:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:4.11-12:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:4.11-13:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:4.11-14:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:4.12-5:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:4.12-6:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:4.13-1:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:4.20-2:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:4.20-3:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:4.20-5:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:4.20-6:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:4.20-7:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:4.25-3:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:4.27-1:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:4.27-2:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:4.27-4:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:4.27-5:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:4.27-6:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:4.27-7:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:4.28-1:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:4.28-2:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.00-1:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.00-2:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.01-5:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.02-5:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.03-1:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.04-7:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.09-13:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.10-1:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.10-2:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.11-1:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.11-2:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.11-3:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.11-4:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.11-5:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.11-6:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.12-3:beta:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.12-4:beta:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.12-6:beta:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.12-7:beta:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.12-8:beta:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.13-1:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.13-2:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.14-2:beta:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.14-5:beta:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.15-1:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.16-1:beta:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.16-4:beta:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.16-5:beta:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.16-7:beta:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.16-8:beta:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.16.6:beta:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.17-1:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.17-2:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.17-3:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.17-4:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.17-5:beta:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.17-6:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.18-1:beta:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.18-2:beta:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.19-1:production:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.20-1:beta:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.20-2:beta:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.20-3:beta:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.20-5:beta:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.20-6:beta:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.20-7:beta:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.20-8:beta:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.20-9:beta:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.21-1:production:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.21-2:production:*:*:*:*:*:*",
"cpe:2.3:a:zend:zendto:5.22-1:beta:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-wmx6-vxcf-c3gr
|
Validation Bypass in slp-validate
|
Versions of `slp-validate` prior to 1.0.1 are vulnerable to a validation bypass. Bitcoin scripts may cause the validation result from `slp-validate` to differ from the specified SLP consensus. This allows an attacker to create a Bitcoin script that causes a hard-fork from the SLP consensus.RecommendationUpgrade to version 1.0.1 or later.
|
[] | null | 5.7 | null | null | null |
GHSA-3q5v-jr96-99g5
|
Judging Management System 1.0 was discovered to contain an arbitrary file upload vulnerability via the component edit_organizer.php.
|
[] | null | 8.1 | null | null | null |
|
GHSA-2xf8-rjh6-9866
|
IBM Security Access Manager for Mobile 8.x before 8.0.1 and Security Access Manager for Web 7.x before 7.0.0 FP10 and 8.x before 8.0.1 make it easier for remote attackers to obtain sensitive information by sniffing the network during use of a weak SSL cipher.
|
[] | null | null | null | null | null |
|
CVE-2023-2813
|
Multiple Themes - Reflected XSS
|
All of the above Aapna WordPress theme through 1.3, Anand WordPress theme through 1.2, Anfaust WordPress theme through 1.1, Arendelle WordPress theme before 1.1.13, Atlast Business WordPress theme through 1.5.8.5, Bazaar Lite WordPress theme before 1.8.6, Brain Power WordPress theme through 1.2, BunnyPressLite WordPress theme before 2.1, Cafe Bistro WordPress theme before 1.1.4, College WordPress theme before 1.5.1, Connections Reloaded WordPress theme through 3.1, Counterpoint WordPress theme through 1.8.1, Digitally WordPress theme through 1.0.8, Directory WordPress theme before 3.0.2, Drop WordPress theme before 1.22, Everse WordPress theme before 1.2.4, Fashionable Store WordPress theme through 1.3.4, Fullbase WordPress theme before 1.2.1, Ilex WordPress theme before 1.4.2, Js O3 Lite WordPress theme through 1.5.8.2, Js Paper WordPress theme through 2.5.7, Kata WordPress theme before 1.2.9, Kata App WordPress theme through 1.0.5, Kata Business WordPress theme through 1.0.2, Looki Lite WordPress theme before 1.3.0, moseter WordPress theme through 1.3.1, Nokke WordPress theme before 1.2.4, Nothing Personal WordPress theme through 1.0.7, Offset Writing WordPress theme through 1.2, Opor Ayam WordPress theme through 18, Pinzolo WordPress theme before 1.2.10, Plato WordPress theme before 1.1.9, Polka Dots WordPress theme through 1.2, Purity Of Soul WordPress theme through 1.9, Restaurant PT WordPress theme before 1.1.3, Saul WordPress theme before 1.1.0, Sean Lite WordPress theme before 1.4.6, Tantyyellow WordPress theme through 1.0.0.5, TIJAJI WordPress theme through 1.43, Tiki Time WordPress theme through 1.3, Tuaug4 WordPress theme through 1.4, Tydskrif WordPress theme through 1.1.3, UltraLight WordPress theme through 1.2, Venice Lite WordPress theme before 1.5.5, Viala WordPress theme through 1.3.1, viburno WordPress theme before 1.3.2, Wedding Bride WordPress theme before 1.0.2, Wlow WordPress theme before 1.2.7 suffer from the same issue about the search box reflecting the results causing XSS which allows an unauthenticated attacker to exploit against users if they click a malicious link.
|
[
"cpe:2.3:a:ajaydsouza:connections_reloaded:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:archimidismertzanos:atlast_business:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:archimidismertzanos:fashionable_store:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:archimidismertzanos:nothing_personal:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:arthousewebdesign:brain_power:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:asmedia:moseter:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:asmedia:tuaug4:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:ayecode:cafe_bistro:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:ayecode:college:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:ayecode:directory:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:ayecode:plato:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:ayecode:restaurant_pt:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:ayecode:wedding_bride:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:climaxthemes:kata:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:competethemes:drop:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:davidgarlitz:viala:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:deothemes:arendelle:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:deothemes:everse:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:deothemes:nokke:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:dotecsa:ilex:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:dotecsa:viburno:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:fredriksoerlie:ultralight:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:fyrewurks:polka_dots:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:fyrewurks:tiki_time:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:henleythemes:counterpoint:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:iznyn:opor_ayam:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:iznyn:purity_of_soul:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:jinwen:js_o3_lite:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:jinwen:js_paper:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:marchettidesign:fullbase:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:marchettidesign:wlow:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:omarfolgheraiter:digitally:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:saumendra:aapna:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:saumendra:anand:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:ta2g:tantyyellow:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:themeinprogress:bazaar_lite:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:themeinprogress:looki_lite:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:themeinprogress:saul:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:themeinprogress:saul_lite:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:themeinprogress:venice_lite:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:thewebhunter:anfaust:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:thewebhunter:offset_writing:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:thriveweb:pinzolo:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:tijaji:tijaji:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpmole:tydskrif:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:yws:bunnypress_lite:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | null | null |
GHSA-3jcr-m733-wp5w
|
After Effects versions 24.6.2, 25.0.1 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 7.8 | null | null | null |
|
CVE-2011-2311
|
Unspecified vulnerability in Oracle Solaris 10 allows local users to affect availability, related to ZFS, a different vulnerability than CVE-2011-2313.
|
[
"cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*"
] | null | null | null | 1.7 | null |
|
CVE-2017-7557
|
dnsdist version 1.1.0 is vulnerable to a flaw in authentication mechanism for REST API potentially allowing CSRF attack.
|
[
"cpe:2.3:a:powerdns:dnsdist:1.1.0:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
GHSA-jc6g-647j-w9g6
|
The Baseboard Management Controller (BMC) firmware in HPE Apollo 70 System prior to version 3.0.14.0 has a path traversal vulnerability in libifc.so webdeletesolvideofile function.
|
[] | null | null | null | null | null |
|
GHSA-278p-2ghg-cvch
|
A denial of service vulnerability exists in the IOCTL handling functionality of Kaspersky Internet Security KL1 driver. A specially crafted IOCTL signal can cause an access violation in KL1 kernel driver resulting in local system denial of service. An attacker can run a program from user-mode to trigger this vulnerability.
|
[] | null | null | 5.5 | null | null |
|
CVE-2023-21415
|
Sandro Poppi, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API overlay_del.cgi is vulnerable to path traversal attacks that allows for file deletion. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
|
[
"cpe:2.3:o:axis:axis_os:*:*:*:*:-:*:*:*",
"cpe:2.3:o:axis:axis_os:*:*:*:*:active:*:*:*",
"cpe:2.3:o:axis:axis_os_2016:*:*:*:*:lts:*:*:*",
"cpe:2.3:o:axis:axis_os_2018:*:*:*:*:lts:*:*:*",
"cpe:2.3:o:axis:axis_os_2020:*:*:*:*:lts:*:*:*",
"cpe:2.3:o:axis:axis_os_2022:*:*:*:*:lts:*:*:*"
] | null | 6.5 | null | null | null |
|
CVE-2022-4883
|
A flaw was found in libXpm. When processing files with .Z or .gz extensions, the library calls external programs to compress and uncompress files, relying on the PATH environment variable to find these programs, which could allow a malicious user to execute other programs by manipulating the PATH environment variable.
|
[
"cpe:2.3:a:x.org:libxpm:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
CVE-2024-0864
|
RCE in Laragon
|
Enabling Simple Ajax Uploader plugin included in Laragon open-source software allows for a remote code execution (RCE) attack via an improper input validation in a file_upload.php file which serves as an example.
By default, Laragon is not vulnerable until a user decides to use the aforementioned plugin.
|
[
"cpe:2.3:a:leokhoa:laragon:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
CVE-2024-1458
|
The Elementor Addons by Livemesh plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘text_alignment’ attribute of the Animated Text widget in all versions up to, and including, 8.3.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null | null |
|
GHSA-jg47-pq6h-vjmw
|
Libreswan 3.6 allows remote attackers to cause a denial of service (crash) via a small length value and (1) no version or (2) an invalid major number in an IKE packet.
|
[] | null | null | null | null | null |
|
GHSA-w6mg-vrx4-r5j4
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Scott Reilly Post-to-Post Links allows Stored XSS.This issue affects Post-to-Post Links: from n/a through 4.2.
|
[] | null | 5.9 | null | null | null |
|
CVE-2021-39636
|
In do_ipt_get_ctl and do_ipt_set_ctl of ip_tables.c, there is a possible way to leak kernel information due to uninitialized data. This could lead to local information disclosure with system execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-120612905References: Upstream kernel
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 4.4 | null | 2.1 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.