id
string | title
string | description
string | cpes
list | cvss_v4_0
float64 | cvss_v3_1
float64 | cvss_v3_0
float64 | cvss_v2_0
float64 | patch_commit_url
string |
---|---|---|---|---|---|---|---|---|
CVE-2010-1681
|
Buffer overflow in VISIODWG.DLL before 10.0.6880.4 in Microsoft Office Visio allows user-assisted remote attackers to execute arbitrary code via a crafted DXF file, a different vulnerability than CVE-2010-0254 and CVE-2010-0256.
|
[
"cpe:2.3:a:microsoft:visio:2002:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:visio:2003:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:visio:2007:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:visio:2007:sp2:*:*:*:*:*:*"
] | null | null | null | 7.6 | null |
|
CVE-2017-3554
|
Vulnerability in the Oracle WebCenter Sites component of Oracle Fusion Middleware (subcomponent: Catalog Mover). Supported versions that are affected are 11.1.1.8.0, 12.2.1.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily "exploitable" vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle WebCenter Sites. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle WebCenter Sites accessible data as well as unauthorized access to critical data or complete access to all Oracle WebCenter Sites accessible data. CVSS 3.0 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
|
[
"cpe:2.3:a:oracle:webcenter_sites:11.1.1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:webcenter_sites:12.2.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:webcenter_sites:12.2.1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:webcenter_sites:12.2.1.2.0:*:*:*:*:*:*:*"
] | null | null | 8.1 | 6.5 | null |
|
CVE-2008-4562
|
Buffer overflow in the ovlaunch CGI program in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 on Windows allows remote attackers to execute arbitrary code via a crafted Host parameter. NOTE: this issue may be partially covered by CVE-2009-0205.
|
[
"cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:hp_ux:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:linux:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:solaris:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:windows:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.51:-:hp-ux:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.51:-:linux:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.51:-:solaris:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.51:-:windows:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.53:-:hp-ux:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.53:-:linux:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.53:-:solaris:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.53:-:windows:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-h445-49j7-8jw7
|
In the Linux kernel, the following vulnerability has been resolved:netfilter: ebtables: fix memory leak when blob is malformedThe bug fix was incomplete, it "replaced" crash with a memory leak.
The old code had an assignment to "ret" embedded into the conditional,
restore this.
|
[] | null | 5.5 | null | null | null |
|
CVE-2015-2905
|
Cross-site request forgery (CSRF) vulnerability on Actiontec GT784WN modems with firmware before NCS01-1.0.13 allows remote attackers to hijack the authentication or intranet connectivity of arbitrary users.
|
[
"cpe:2.3:o:actiontec:_ncs01_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:actiontec:gt784wn_wireless_n_dsl_modem:-:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-38p6-v2j3-42g3
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in UkrSolution Barcode Scanner with Inventory & Order Manager allows Reflected XSS.This issue affects Barcode Scanner with Inventory & Order Manager: from n/a through 1.5.3.
|
[] | null | 7.1 | null | null | null |
|
CVE-2012-3359
|
Luci in Red Hat Conga stores the user's username and password in a Base64 encoded string in the __ac session cookie, which allows attackers to gain privileges by accessing this cookie. NOTE: this issue has been SPLIT due to different vulnerability types. Use CVE-2013-7347 for the incorrect enforcement of a user timeout.
|
[
"cpe:2.3:a:redhat:conga:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*"
] | null | null | null | 3.7 | null |
|
CVE-2024-22525
|
dnspod-sr 0dfbd37 contains a SEGV.
|
[
"cpe:2.3:a:dnspod:dnspod_security_recursive:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
CVE-2018-3628
|
Buffer overflow in HTTP handler in Intel Active Management Technology in Intel Converged Security Manageability Engine Firmware 3.x, 4.x, 5.x, 6.x, 7.x, 8.x, 9.x, 10.x, and 11.x may allow an attacker to execute arbitrary code via the same subnet.
|
[
"cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e4300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e4400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e4500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e4600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e4700:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e6300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e6320:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e6400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e6420:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e6540:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e6550:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e6600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e6700:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e6750:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e6850:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e7200:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e7300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e7400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e7500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e7600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e8190:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e8200:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e8300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e8400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e8500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:e8600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:l7200:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:l7300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:l7400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:l7500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:l7700:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:p7350:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:p7370:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:p7450:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:p7550:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:p7570:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:p8400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:p8600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:p8700:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:p8800:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:p9500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:p9600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:p9700:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:sl9300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:sl9380:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:sl9400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:sl9600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:sp9300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:sp9400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:sp9600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:su9300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:su9400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:su9600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t5200:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t5250:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t5270:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t5300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t5450:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t5470:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t5500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t5550:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t5600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t5670:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t5750:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t5800:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t5870:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t6400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t6500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t6600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t6670:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t7100:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t7200:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t7250:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t7300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t7400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t7500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t7600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t7700:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t7800:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t8100:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t8300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t9300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t9400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t9500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t9550:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t9600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t9800:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:t9900:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:u7500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:u7600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_duo:u7700:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6500u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6560u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6567u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6600u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6650u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6660u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6700:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6700hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6700k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6700t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6700te:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6770hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6785r:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6820eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6820hk:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6820hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6822eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6870hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6920hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:6970hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7020u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7100:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7100e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7100h:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7100t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7100u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7101e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7101te:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7102e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7130u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7167u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7300t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7320:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7350k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7y54:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7y57:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7200u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7260u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7267u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7287u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7300hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7300u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7360u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7400t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7440eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7440hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7442eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7500t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7600k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7600t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:700t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:8100h:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:8100t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:8109u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:8130u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:8145u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:8300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:8300t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8200y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8259u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8265u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8269u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8300h:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8305g:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8400b:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8400h:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8400t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8500b:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8500t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8600t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8086k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8500y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8559u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8565u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8700b:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8700t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8705g:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8706g:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8709g:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8750h:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8809g:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8850h:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9:8950hk:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_extreme:qx6700:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_extreme:qx6800:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_extreme:qx6850:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_extreme:qx9300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_extreme:qx9650:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_extreme:qx9770:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_extreme:qx9775:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_extreme:x6800:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_extreme:x7800:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_extreme:x7900:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_extreme:x9000:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_extreme:x9100:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_quad:q6600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_quad:q6700:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_quad:q8200:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_quad:q8200s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_quad:q8300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_quad:q8400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_quad:q8400s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_quad:q9000:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_quad:q9100:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_quad:q9300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_quad:q9400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_quad:q9400s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_quad:q9450:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_quad:q9500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_quad:q9505:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_quad:q9505s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_quad:q9550:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_quad:q9550s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_quad:q9650:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_solo:su3500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_solo:u2100:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_solo:u2200:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_solo:ulv_su3300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_2_solo:ulv_su3500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_duo:l2300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_duo:l2400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_duo:l2500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_duo:t2050:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_duo:t2250:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_duo:t2300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_duo:t2300e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_duo:t2350:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_duo:t2400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_duo:t2450:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_duo:t2500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_duo:t2600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_duo:t2700:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_duo:u2400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_duo:u2500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3450_:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_solo:t1250:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_solo:t1300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_solo:t1350:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_solo:t1400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_solo:u1300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_solo:u1400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_solo:u1500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:5118:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:5119t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:5120:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:5120t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:5122:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6126:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6126f:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6126t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6128:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6130:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6130f:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6130t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6132:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6134:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6134m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6136:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6138:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6138f:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6138t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6140:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6140m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6142:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6142f:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6142m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6144:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6146:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6148:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6148f:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6150:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6152:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6154:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:w2123:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:w2125:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:w2133:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:w2135:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:w2145:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:w2155:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:w2175:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:w2195:*:*:*:*:*:*:*"
] | null | 8.8 | null | 8.3 | null |
|
RHSA-2025:10836
|
Red Hat Security Advisory: sudo security update
|
sudo: LPE via host option
|
[
"cpe:/o:redhat:rhel_e4s:8.8::baseos",
"cpe:/o:redhat:rhel_tus:8.8::baseos"
] | null | 7 | null | null | null |
CVE-2024-41200
|
A segmentation fault in KMPlayer v4.2.2.65 allows attackers to cause a Denial of Service (DoS) via a crafted AVI file.
|
[] | null | 5.5 | null | null | null |
|
CVE-2021-22458
|
A component of the HarmonyOS has a Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability. Local attackers may exploit this vulnerability to cause arbitrary code execution.
|
[
"cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 | null |
|
GHSA-9g78-gc68-hj3v
|
Foxit PDF Reader Doc Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of Doc objects. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-22254.
|
[] | null | null | 3.3 | null | null |
|
GHSA-8xgv-q88p-ghq4
|
Use after free in Media Session in Google Chrome prior to 125.0.6422.141 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
|
[] | null | 7.5 | null | null | null |
|
CVE-2019-11825
|
Cross-site scripting (XSS) vulnerability in Event Editor in Synology Calendar before 2.3.0-0615 allows remote attackers to inject arbitrary web script or HTML via the title parameter.
|
[
"cpe:2.3:a:synology:calendar:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
RHSA-2023:1664
|
Red Hat Security Advisory: Red Hat JBoss Web Server 5.7.2 release and security update
|
tomcat: request smuggling tomcat: JsonErrorReportValve injection
|
[
"cpe:/a:redhat:jboss_enterprise_web_server:5.7"
] | null | 7.5 | null | null | null |
CVE-1999-0883
|
Zeus web server allows remote attackers to read arbitrary files by specifying the file name in an option to the search engine.
|
[
"cpe:2.3:a:zeus_technologies:zeus_web_server:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zeus_technologies:zeus_web_server:3.3.2:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
RHSA-2013:0135
|
Red Hat Security Advisory: gtk2 security and bug fix update
|
gdk-pixbuf: DoS (GLib error and application abort) due to an integer overflow in the XBM image file format loader
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null | null |
GHSA-m76f-5v6g-6jmr
|
inventory in Atos Unify OpenScape 4000 Platform and OpenScape 4000 Manager Platform 10 R1 before 10 R1.34.4 allows an unauthenticated attacker to run arbitrary commands on the platform operating system and achieve administrative access, aka OSFOURK-23552.
|
[] | null | 9.8 | null | null | null |
|
GHSA-w86f-98cr-v2wp
|
klif.sys in Kaspersky Internet Security 6.0 and 7.0, Kaspersky Anti-Virus (KAV) 6.0 and 7.0, KAV 6.0 for Windows Workstations, and KAV 6.0 for Windows Servers does not validate certain parameters to the (1) NtCreateKey, (2) NtCreateProcess, (3) NtCreateProcessEx, (4) NtCreateSection, (5) NtCreateSymbolicLinkObject, (6) NtCreateThread, (7) NtDeleteValueKey, (8) NtLoadKey2, (9) NtOpenKey, (10) NtOpenProcess, (11) NtOpenSection, and (12) NtQueryValueKey hooked system calls, which allows local users to cause a denial of service (reboot) via an invalid parameter, as demonstrated by the ClientId parameter to NtOpenProcess.
|
[] | null | null | null | null | null |
|
CVE-2014-5609
|
The Stickman Ski Racer (aka com.djinnworks.StickmanSkiRacer.free) application 2.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:djinnworks:stickman_ski_racer:2.1:*:*:*:*:android:*:*"
] | null | null | null | 5.4 | null |
|
CVE-2024-5111
|
Campcodes Complete Web-Based School Management System student_payment_invoice1.php sql injection
|
A vulnerability was found in Campcodes Complete Web-Based School Management System 1.0. It has been classified as critical. This affects an unknown part of the file /view/student_payment_invoice1.php. The manipulation of the argument date leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-265101 was assigned to this vulnerability.
|
[
"cpe:2.3:a:campcodes:complete_web-based_school_management_system:1.0:*:*:*:*:*:*:*"
] | 5.3 | 6.3 | 6.3 | 6.5 | null |
GHSA-7x9x-m4xw-hffr
|
Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 9.2.4.0, 10.0.2.0, 10.3.3.0, 10.3.4.0, and 10.3.5.0 allows remote attackers to affect confidentiality, related to JMS.
|
[] | null | null | null | null | null |
|
CVE-2011-2295
|
Unspecified vulnerability in Oracle Solaris 8, 9, 10, and 11 Express allows local users to affect availability, related to Driver/USB.
|
[
"cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.9:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.11:*:express:*:*:*:*:*"
] | null | null | null | 4.7 | null |
|
CVE-2022-45285
|
Vsourz Digital Advanced Contact form 7 DB Versions 1.7.2 and 1.9.1 is vulnerable to Cross Site Scripting (XSS).
|
[
"cpe:2.3:a:vsourz:advanced_cf7_db:1.7.2:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:vsourz:advanced_cf7_db:1.9.1:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | null | null |
|
CVE-2023-33758
|
Splicecom Maximiser Soft PBX v1.5 and before was discovered to contain a cross-site scripting (XSS) vulnerability via the CLIENT_NAME and DEVICE_GUID fields in the login component.
|
[
"cpe:2.3:a:splicecom:maximiser_soft_pbx:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
|
CVE-2011-4646
|
SQL injection vulnerability in wp-postratings.php in the WP-PostRatings plugin 1.50, 1.61, and probably other versions before 1.62 for WordPress allows remote authenticated users with the Author role to execute arbitrary SQL commands via the id attribute of the ratings shortcode when creating a post. NOTE: some of these details are obtained from third party information.
|
[
"cpe:2.3:a:lesterchan:wp-postratings:1.50:*:*:*:*:*:*:*",
"cpe:2.3:a:lesterchan:wp-postratings:1.61:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*"
] | null | null | null | 6 | null |
|
CVE-2020-6640
|
An improper neutralization of input vulnerability in the Admin Profile of FortiAnalyzer may allow a remote authenticated attacker to perform a stored cross site scripting attack (XSS) via the Description Area.
|
[
"cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 | null |
|
GHSA-gqp4-ww82-42w3
|
Race condition in the _get_masked_mode function in Lib/os.py in Python 3.2 through 3.5, when exist_ok is set to true and multiple threads are used, might allow local users to bypass intended file permissions by leveraging a separate application vulnerability before the umask has been set to the expected value.
|
[] | null | null | null | null | null |
|
CVE-2020-3594
|
Cisco SD-WAN Software Privilege Escalation Vulnerability
|
A vulnerability in Cisco SD-WAN Software could allow an authenticated, local attacker to elevate privileges to root on the underlying operating system. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by providing crafted options to a specific command. A successful exploit could allow the attacker to gain root privileges.
|
[
"cpe:2.3:a:cisco:sd-wan:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
CVE-2022-2200
|
If an object prototype was corrupted by an attacker, they would have been able to set undesired attributes on a JavaScript object, leading to privileged code execution. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
CVE-2022-45643
|
Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the deviceId parameter in the addWifiMacFilter function.
|
[
"cpe:2.3:o:tendacn:ac6_firmware:15.03.05.19:*:*:*:*:*:*:*",
"cpe:2.3:h:tendacn:ac6:1.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
RHSA-2017:0817
|
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
|
kernel: race condition in the TLB flush logic kernel: double-free in usb-audio triggered by invalid USB descriptor kernel: scsi: aacraid: double fetch in ioctl_send_fib() kernel: Stack corruption while reading /proc/keys when gcc stack protector is enabled kernel: Setting a POSIX ACL via setxattr doesn't clear the setgid bit kernel: net: Out of bounds stack read in memcpy_fromiovec kernel: Use after free in SCSI generic device interface kernel: Use after free in SCSI generic device interface (CVE-2016-9576 regression) kernel - IPV6 fragmentation flaw kernel: S_ISGD is not cleared when setting posix ACLs in tmpfs (CVE-2016-7097 incomplete fix)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 4.4 | null | null |
GHSA-mghh-jfj9-v2hx
|
Cross-site scripting (XSS) vulnerability in WebExpert allows remote attackers to inject arbitrary web script or HTML via a crafted User-Agent HTTP header.
|
[] | null | null | null | null | null |
|
GHSA-5hgw-jxhc-8xwc
|
A vulnerability classified as problematic was found in Axiomatic Bento4. This vulnerability affects unknown code of the component mp4decrypt. The manipulation leads to memory leak. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-212680.
|
[] | null | 6.5 | null | null | null |
|
ICSA-19-050-04
|
Rockwell Automation Allen-Bradley PowerMonitor 1000 (Update A)
|
A remote attacker could inject arbitrary code into a targeted user 's web browser to gain access to the affected device.CVE-2018-19615 has been assigned to this vulnerability. A CVSS v3 base score of 6.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). A remote attacker may be able to use a proxy to enable functionality that is typically available to those with administrative rights for the web application, allowing the attacker to bypass authentication. Once bypassed, the attacker could disrupt user settings and device configuration.CVE-2018-19616 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
|
[] | null | null | 9.8 | null | null |
CVE-2018-16949
|
An issue was discovered in OpenAFS before 1.6.23 and 1.8.x before 1.8.2. Several data types used as RPC input variables were implemented as unbounded array types, limited only by the inherent 32-bit length field to 4 GB. An unauthenticated attacker could send, or claim to send, large input values and consume server resources waiting for those inputs, denying service to other valid connections.
|
[
"cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-jv3g-6pg3-v9j8
|
nscd: Null pointer crashes after notfound responseIf the Name Service Cache Daemon's (nscd) cache fails to add a not-found
netgroup response to the cache, the client request can result in a null
pointer dereference. This flaw was introduced in glibc 2.15 when the
cache was added to nscd.This vulnerability is only present in the nscd binary.
|
[] | null | 5.9 | null | null | null |
|
GHSA-vm88-xwrf-p2q7
|
Stack-based buffer overflow in the ClientConnection::NegotiateProtocolVersion function in vncviewer/ClientConnection.cpp in vncviewer for UltraVNC 1.0.2 and 1.0.4 before 01252008, when in LISTENING mode or when using the DSM plugin, allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a modified size value.
|
[] | null | null | null | null | null |
|
GHSA-4x69-m5qq-6fv9
|
An exploitable denial-of-service vulnerability exists in the helper service of Clean My Mac X, version 4.04, due to improper input validation. A user with local access can use this vulnerability to terminate a privileged helper application. An attacker would need local access to the machine for a successful exploit.
|
[] | null | null | 5.5 | null | null |
|
GHSA-v64w-85xj-x3mf
|
Rejected reason: Not used
|
[] | null | null | null | null | null |
|
CVE-2023-20232
|
A vulnerability in the Tomcat implementation for Cisco Unified Contact Center Express (Unified CCX) could allow an unauthenticated, remote attacker to cause a web cache poisoning attack on an affected device.
This vulnerability is due to improper input validation of HTTP requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to a specific API endpoint on the Unified CCX Finesse Portal. A successful exploit could allow the attacker to cause the internal WebProxy to redirect users to an attacker-controlled host.
|
[
"cpe:2.3:a:cisco:unified_contact_center_express:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
|
GHSA-r94f-3fx8-fr52
|
The WSEE runtime (WS-Security runtime) in BEA WebLogic Server 9.0 and 9.1 does not verify credentials when decrypting client messages, which allows remote attackers to bypass application security.
|
[] | null | null | null | null | null |
|
CVE-2017-9067
|
In MODX Revolution before 2.5.7, when PHP 5.3.3 is used, an attacker is able to include and execute arbitrary files on the web server due to insufficient validation of the action parameter to setup/index.php, aka directory traversal.
|
[
"cpe:2.3:a:modx:modx_revolution:2.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.3:*:*:*:*:*:*:*"
] | null | null | 7 | 4.4 | null |
|
CVE-2022-22646
|
This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Monterey 12.2. A malicious application may be able to modify protected parts of the file system.
|
[
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
|
CVE-2011-1821
|
IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-IF0010 on Windows allows remote authenticated users to cause a denial of service (daemon hang) via a cn=changelog search.
|
[
"cpe:2.3:a:ibm:tivoli_directory_server:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_directory_server:5.2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] | null | null | null | 4 | null |
|
GHSA-w43j-xjf7-hmp3
|
Insufficient Verification of Data Authenticity vulnerability in Hewlett Packard Enterprise HPE Nimble Storage Hybrid Flash Arrays and Nimble Storage Secondary Flash Arrays.
|
[] | null | 6.5 | null | null | null |
|
GHSA-6hm7-pc42-3xrj
|
The SIP implementation on the Cisco PGW 2200 Softswitch with software 9.7(3)S before 9.7(3)S9 and 9.7(3)P before 9.7(3)P9 allows remote attackers to cause a denial of service (device crash) via a malformed Contact header, aka Bug ID CSCsj98521.
|
[] | null | null | null | null | null |
|
CVE-2005-1184
|
The TCP/IP stack in multiple operating systems allows remote attackers to cause a denial of service (CPU consumption) via a TCP packet with the correct sequence number but the wrong Acknowledgement number, which generates a large number of "keep alive" packets. NOTE: some followups indicate that this issue could not be replicated.
|
[
"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:datacenter_64-bit:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:enterprise:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:enterprise:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:r2:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:standard:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:standard:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:standard_64-bit:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:web:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_98se:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:*:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:*:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:*:terminal_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:*:workstation:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:terminal_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:workstation:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:terminal_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:workstation:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp3:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp3:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp3:terminal_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp3:workstation:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp4:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp4:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp4:terminal_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp4:workstation:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp5:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp5:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp5:terminal_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp5:workstation:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp6:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp6:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp6:terminal_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp6:workstation:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:terminal_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:workstation:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:home:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-g7m4-3q73-25h6
|
When ImageMagick 7.0.6-1 processes a crafted file in convert, it can lead to a heap-based buffer over-read in the WriteUILImage() function in coders/uil.c.
|
[] | null | null | 6.5 | null | null |
|
GHSA-277x-wqvr-c5w3
|
PHP remote file inclusion vulnerability in include/user.php in the NoBoard BETA module for MKPortal allows remote attackers to execute arbitrary PHP code via a URL in the MK_PATH parameter.
|
[] | null | null | null | null | null |
|
CVE-2020-0588
|
Improper conditions check in BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
|
[
"cpe:2.3:o:intel:bios:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_bronze_3206r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5218r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5220r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6208u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6226r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6230n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6230r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6230t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6234:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6238r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6240r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6242r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6246r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6248r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6250:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6250l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6256:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6258r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_9221:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_9222:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4210r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4210t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4214r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4215r:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*"
] | null | 6.7 | null | 4.6 | null |
|
CVE-2024-7624
|
Zephyr Project Manager <= 3.3.101 - Authenticated (Subscriber+) Limited Privilege Escalation
|
The Zephyr Project Manager plugin for WordPress is vulnerable to limited privilege escalation in all versions up to, and including, 3.3.101. This is due to the plugin not properly checking a users capabilities before allowing them to enable access to the plugin's settings through the update_user_access() function. This makes it possible for authenticated attackers, with subscriber-level access and above, to grant themselves full access to the plugin's settings.
|
[
"cpe:2.3:a:zephyr-one:zephyr_project_manager:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | null | null |
CVE-2015-7508
|
Heap-based buffer overflow in the bmp_decode_rle function in libnsbmp.c in Libnsbmp 0.1.2 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via the last row of RLE data in a crafted BMP file.
|
[
"cpe:2.3:a:netsurf-browser:libnsbmp:0.1.2:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 | null |
|
GHSA-pcgp-8cx2-wv9f
|
Unspecified vulnerability in the Oracle Secure Global Desktop component in Oracle Virtualization 5.0 and 5.1 allows remote attackers to affect availability via vectors related to SGD Proxy Server (ttaauxserv), a different vulnerability than CVE-2014-2472, CVE-2014-2474, and CVE-2014-6459.
|
[] | null | null | null | null | null |
|
GHSA-64wv-8vwp-xgw2
|
Use of Uninitialized Resource in ash.
|
An issue was discovered in the ash crate before 0.33.1 for Rust. util::read_spv may read from uninitialized memory locations.
|
[] | null | 9.8 | null | null | null |
GHSA-f2q3-rwf5-xwwq
|
There are some web interfaces without authentication requirements on D-Link DIR-412 A1-1.14WW routers. An attacker can clear the router's log file via act=clear&logtype=sysact to log_clear.php, which could be used to erase attack traces.
|
[] | null | null | null | null | null |
|
GHSA-jfx9-rv29-g4qf
|
Fiserv Accurate Reconciliation 2.19.0 allows XSS via the logout.jsp timeOut parameter.
|
[] | null | null | null | null | null |
|
CVE-2019-11771
|
AIX builds of Eclipse OpenJ9 before 0.15.0 contain unused RPATHs which may facilitate code injection and privilege elevation by local users.
|
[
"cpe:2.3:a:eclipse:openj9:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 | null |
|
CVE-2019-8792
|
An injection issue was addressed with improved validation. This issue is fixed in Shazam Android App Version 9.25.0, Shazam iOS App Version 12.11.0. Processing a maliciously crafted URL may lead to arbitrary javascript code execution.
|
[
"cpe:2.3:a:apple:shazam:9.25.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:shazam:12.11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 | null |
|
GHSA-2hwf-hm8p-fc5c
|
A Cross-Site Request Forgery (CSRF) in Codeigniter 3.1.13 allows attackers to arbitrarily change the Administrator password and escalate privileges.
|
[] | null | 7.5 | null | null | null |
|
CVE-2011-2199
|
Buffer overflow in tftp-hpa before 5.1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via the utimeout option.
|
[
"cpe:2.3:a:h_peter_anvin:tftp-hpa:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2025-21772
|
partitions: mac: fix handling of bogus partition table
|
In the Linux kernel, the following vulnerability has been resolved:
partitions: mac: fix handling of bogus partition table
Fix several issues in partition probing:
- The bailout for a bad partoffset must use put_dev_sector(), since the
preceding read_part_sector() succeeded.
- If the partition table claims a silly sector size like 0xfff bytes
(which results in partition table entries straddling sector boundaries),
bail out instead of accessing out-of-bounds memory.
- We must not assume that the partition table contains proper NUL
termination - use strnlen() and strncmp() instead of strlen() and
strcmp().
|
[] | null | null | null | null | null |
GHSA-cg3c-pj78-hrh5
|
PGP Corporate Desktop before 7.1, Personal Security before 7.0.3, Freeware before 7.0.3, and E-Business Server before 7.1 does not properly display when invalid userID's are used to sign a message, which could allow an attacker to make the user believe that the document has been signed by a trusted third party by adding a second, invalid user ID to a key which has already been signed by the third party, aka the "PGPsdk Key Validity Vulnerability."
|
[] | null | null | null | null | null |
|
GHSA-r77p-2f23-mhhj
|
This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_ftp_manager.php. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9746.
|
[] | null | 9.8 | null | null | null |
|
RHSA-2019:1948
|
Red Hat Security Advisory: ruby security update
|
ruby: OpenSSL::X509:: Name equality check does not work correctly
|
[
"cpe:/o:redhat:rhel_eus:7.4::computenode",
"cpe:/o:redhat:rhel_eus:7.4::server"
] | null | null | 7.5 | null | null |
GHSA-37wj-v394-2xvc
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Facets allows Cross-Site Scripting (XSS).This issue affects Facets: from 0.0.0 before 2.0.9.
|
[] | null | 6.1 | null | null | null |
|
CVE-2020-25021
|
An issue was discovered in Noise-Java through 2020-08-27. ChaChaPolyCipherState.encryptWithAd() allows out-of-bounds access.
|
[
"cpe:2.3:a:noise-java_project:noise-java:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-frcg-g67q-7w43
|
Dell Multifunction Printer E525w Driver and Software Suite, versions prior to 1.047.2022, A05, contain a local privilege escalation vulnerability that could be exploited by malicious users to compromise the affected system
|
[] | null | 7.8 | null | null | null |
|
ICSA-22-123-01
|
Yokogawa CENTUM and ProSafe-RS
|
A local attacker could tamper with files generated by the graphic builder, which may allow arbitrary programs to be executed on a computer that has installed standard operation and monitoring function (HIS).CVE-2022-27188 has been assigned to this vulnerability. A CVSS v3 base score of 6.1 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H). Improper authentication of the communication protocol provided by the Automation Design (AD) server allows an attacker to use the functions provided by the AD server. This may lead to leakage or tampering of data managed by the AD server.CVE-2022-26034 has been assigned to this vulnerability. A CVSS v3 base score of 6.4 has been calculated; the CVSS vector string is (AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L). The AD suite version management function is subjected to malformed packets, which the functions provided by the AD server may stop.CVE-2019-0203 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). The AD suite version management function is subjected to malformed packets, which the functions provided by the AD server may stop.CVE-2018-11782 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). The AD suite version management function is subjected to malformed packets, which the functions provided by the AD server may stop.CVE-2015-0248 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
|
[] | null | null | 5.3 | null | null |
GHSA-r7xj-75mx-fcrr
|
Private Tunnel installer for macOS version 3.0.1 and older versions may corrupt system critical files it should not have access via symlinks in /tmp.
|
[] | null | null | null | null | null |
|
CVE-2023-27025
|
An arbitrary file download vulnerability in the background management module of RuoYi v4.7.6 and below allows attackers to download arbitrary files in the server.
|
[
"cpe:2.3:a:ruoyi:ruoyi:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
CVE-2022-32917
|
The issue was addressed with improved bounds checks. This issue is fixed in macOS Monterey 12.6, iOS 15.7 and iPadOS 15.7, iOS 16, macOS Big Sur 11.7. An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited..
|
[
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
GHSA-xm3f-7w29-9q8h
|
The msn_slp_sip_recv function in libpurple/protocols/msn/slp.c in the MSN protocol plugin in libpurple in Pidgin before 2.6.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an SLP invite message that lacks certain required fields, as demonstrated by a malformed message from a KMess client.
|
[] | null | null | null | null | null |
|
GHSA-2mff-8r7p-g487
|
Multiple integer overflows in tiff2pdf in libtiff before 4.0.2 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.
|
[] | null | null | null | null | null |
|
GHSA-xr8m-fvm3-765w
|
rutil/dns/DnsStub.cxx in ReSIProcate 1.3.2, as used by repro, allows remote attackers to cause a denial of service (daemon crash) via a SIP (1) INVITE or (2) OPTIONS message with a long domain name in a request URI, which triggers an assert error.
|
[] | null | null | null | null | null |
|
GHSA-75jr-ff4h-qp4g
|
SQL injection vulnerability in login.asp in ASPjar Guestbook allows remote attackers to execute arbitrary SQL commands via the password field.
|
[] | null | null | null | null | null |
|
CVE-2011-3347
|
A certain Red Hat patch to the be2net implementation in the kernel package before 2.6.32-218.el6 on Red Hat Enterprise Linux (RHEL) 6, when promiscuous mode is enabled, allows remote attackers to cause a denial of service (system crash) via non-member VLAN packets.
|
[
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"
] | null | null | null | 4.6 | null |
|
GHSA-46vw-42gh-2hf4
|
A vulnerability has been identified in POWER METER SICAM Q100 (7KG9501-0AA01-0AA1) (All versions >= V2.60 < V2.62), POWER METER SICAM Q100 (7KG9501-0AA01-2AA1) (All versions >= V2.60 < V2.62), POWER METER SICAM Q100 (7KG9501-0AA31-0AA1) (All versions >= V2.60 < V2.62), POWER METER SICAM Q100 (7KG9501-0AA31-2AA1) (All versions >= V2.60 < V2.62), POWER METER SICAM Q200 family (All versions >= V2.70 < V2.80). Affected devices store the password for the SMTP account as plain text. This could allow an authenticated local attacker to extract it and use the configured SMTP service for arbitrary purposes.
|
[] | 6.8 | 6.2 | null | null | null |
|
GHSA-v3rx-h663-g7gx
|
Unrestricted file upload vulnerability in the (1) myAccount, (2) projects, (3) tasks, (4) tickets, (5) discussions, (6) reports, and (7) scheduler pages in qdPM 8.3 allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in uploads/attachments/ or uploads/users/.
|
[] | null | null | 9.8 | null | null |
|
GHSA-339v-pgj2-77h7
|
Drawings SDK (All versions prior to 2022.4) are vulnerable to an out-of-bounds read due to parsing of DWG files resulting from the lack of proper validation of user-supplied data. This can result in a read past the end of an allocated buffer and allows attackers to cause a denial-of service condition or read sensitive information from memory.
|
[] | null | 7.1 | null | null | null |
|
CVE-2008-4483
|
Directory traversal vulnerability in index.php in Crux Gallery 1.32 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the theme parameter.
|
[
"cpe:2.3:a:crux_software:gallery:*:php5:*:*:*:*:*:*",
"cpe:2.3:a:crux_software:gallery:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:crux_software:gallery:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:crux_software:gallery:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:crux_software:gallery:1.30:*:*:*:*:*:*:*",
"cpe:2.3:a:crux_software:gallery:1.31:*:*:*:*:*:*:*",
"cpe:2.3:a:crux_software:gallery:1.32:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-hr3h-x6gq-rqcp
|
Cross site scripting via HTML attributes in the back end
|
ImpactIt is possible for untrusted users to inject malicious code into HTML attributes in the back end, which will be executed both in the element preview (back end) and on the website (front end).Installations are only affected if there are untrusted back end users who have the rights to modify HTML fields (e.g. TinyMCE).PatchesUpdate to Contao 4.4.56, 4.9.18 or 4.11.7WorkaroundsDisable all fields that allow HTML for untrusted back end users or disable the login for these users.Referenceshttps://contao.org/en/security-advisories/cross-site-scripting-via-html-attributes-in-the-back-endFor more informationIf you have any questions or comments about this advisory, open an issue in [contao/contao](https://github.com/contao/contao/issues/new/choose).CreditsThanks to Mikhail Khramenkov and Moritz Vondano for reporting this security issue.
|
[] | null | 5.9 | null | null | null |
CVE-2021-36299
|
Dell iDRAC9 versions 4.40.00.00 and later, but prior to 4.40.29.00 and 5.00.00.00 contain an SQL injection vulnerability. A remote authenticated malicious user with low privileges may potentially exploit this vulnerability to cause information disclosure or denial of service by supplying specially crafted input data to the affected application.
|
[
"cpe:2.3:o:dell:emc_idrac9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:emc_idrac9_firmware:5.00.00.00:*:*:*:*:*:*:*"
] | null | 7.1 | null | null | null |
|
CVE-2023-22062
|
Vulnerability in the Oracle Hyperion Financial Reporting product of Oracle Hyperion (component: Repository). The supported version that is affected is 11.2.13.0.000. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hyperion Financial Reporting. While the vulnerability is in Oracle Hyperion Financial Reporting, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hyperion Financial Reporting accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Hyperion Financial Reporting. CVSS 3.1 Base Score 8.5 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L).
|
[
"cpe:2.3:a:oracle:hyperion:11.2.13.0.000:*:*:*:*:*:*:*"
] | null | 8.5 | null | null | null |
|
RHBA-2020:5306
|
Red Hat Bug Fix Advisory: openvswitch2.13 bug fix and enhancement update
|
lldpd: buffer overflow in the lldp_decode function in daemon/protocols/lldp.c
|
[
"cpe:/o:redhat:enterprise_linux:7::fastdatapath"
] | null | 9.8 | null | null | null |
GHSA-gw8v-x559-3hvm
|
In pickStartSeq of AAVCAssembler.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12L Android-13Android ID: A-231986464
|
[] | null | 7.5 | null | null | null |
|
CVE-2016-3346
|
Microsoft Windows 10 Gold, 1511, and 1607 does not properly enforce permissions, which allows local users to obtain Administrator access via a crafted DLL, aka "Windows Permissions Enforcement Elevation of Privilege Vulnerability."
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 | null |
|
CVE-2021-2194
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
[
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"
] | null | 4.9 | null | null | null |
|
GHSA-gxpf-25mm-vm27
|
Buffer Overflow vulnerability in FFMpeg 4.2.3 in dnn_execute_layer_pad in libavfilter/dnn/dnn_backend_native_layer_pad.c due to a call to memcpy without length checks, which could let a remote malicious user execute arbitrary code.
|
[] | null | null | null | null | null |
|
CVE-2010-2596
|
The OJPEGPostDecode function in tif_ojpeg.c in LibTIFF 3.9.0 and 3.9.2, as used in tiff2ps, allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted TIFF image, related to "downsampled OJPEG input."
|
[
"cpe:2.3:a:libtiff:libtiff:3.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:libtiff:libtiff:3.9.2:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-77pr-jpcv-9w4v
|
Crash in libmysqlclient.so in Oracle MySQL before 5.6.21 and 5.7.x before 5.7.5 and MariaDB through 5.5.54, 10.0.x through 10.0.29, 10.1.x through 10.1.21, and 10.2.x through 10.2.3.
|
[] | null | null | 7.5 | null | null |
|
CVE-2019-3465
|
Rob Richards XmlSecLibs, all versions prior to v3.0.3, as used for example by SimpleSAMLphp, performed incorrect validation of cryptographic signatures in XML messages, allowing an authenticated attacker to impersonate others or elevate privileges by creating a crafted XML message.
|
[
"cpe:2.3:a:xmlseclibs_project:xmlseclibs:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:simplesamlphp:simplesamlphp:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 | null |
|
GHSA-rr2m-cc23-5mr3
|
FluxBox 0.9.10 and earlier versions allows local users to cause a denial of service (application crash) by calling Xman with a long -title value, possibly triggering a buffer overflow.
|
[] | null | null | null | null | null |
|
GHSA-p659-9v4v-6hr6
|
** DISPUTED ** An issue was discovered in the Ola Money (aka com.olacabs.olamoney) application 1.9.0 for Android. If an attacker controls an application with accessibility permissions, then the attacker can read certain Ola Money data such as a credit card number, expiration date, bank account number, and transaction history. NOTE: the vendor does not agree that this is a security issue requiring a fix.
|
[] | null | null | 5.9 | null | null |
|
GHSA-89vx-x763-hhwj
|
Couchbase Server 7.6.x before 7.6.2, 7.2.x before 7.2.6, and all earlier versions allows HTTP Host header injection.
|
[] | null | 6.1 | null | null | null |
|
GHSA-cgp9-mfw2-2hh5
|
Information leakage vulnerability in the /mc login page in ManageEngine ServiceDesk Plus 9.3 software allows authenticated users to enumerate active users. Due to a flaw within the way the authentication is handled, an attacker is able to login and verify any active account.
|
[] | null | null | 4.3 | null | null |
|
CVE-2016-3615
|
Unspecified vulnerability in Oracle MySQL 5.5.49 and earlier, 5.6.30 and earlier, and 5.7.12 and earlier and MariaDB before 5.5.50, 10.0.x before 10.0.26, and 10.1.x before 10.1.15 allows remote authenticated users to affect availability via vectors related to Server: DML.
|
[
"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
] | null | null | 5.3 | 4.3 | null |
|
GHSA-738m-rm9h-8qh7
|
The sec_asn1d_parse_leaf function in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, improperly restricts access to an unspecified data structure, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OCTET STRING data, related to a "use-after-poison" issue.
|
[] | null | null | null | null | null |
|
CVE-2013-3779
|
Unspecified vulnerability in the Secure Global Desktop component in Oracle Virtualization All 4.6 releases including 4.63 and 4.7 prior to 4.71 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Web UI.
|
[
"cpe:2.3:a:oracle:virtualization:4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:virtualization:4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:virtualization:4.61:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:virtualization:4.62:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:virtualization:4.63:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:4.61:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:4.62:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:vm_virtualbox:4.63:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.