id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
CVE-2021-44008
A vulnerability has been identified in JT2Go (All versions < V13.2.0.5), Teamcenter Visualization (All versions < V13.2.0.5). The Tiff_Loader.dll is vulnerable to an out of bounds read past the end of an allocated buffer when parsing TIFF files. An attacker could leverage this vulnerability to leak information in the context of the current process.
[ "cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*" ]
null
5.5
null
4.3
null
RHSA-2014:0371
Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.0.1 update
RESTEasy: XML eXternal Entity (XXE) flaw RESTEasy: XML eXternal Entity (XXE) flaw bouncycastle: TLS CBC padding timing attack Drools: Remote Java Code Execution in MVEL XStream: remote code execution due to insecure XML deserialization Camel: XML eXternal Entity (XXE) flaw in XSLT component Camel: remote code execution via XSL
[ "cpe:/a:redhat:jboss_bpms:6.0" ]
null
null
null
null
null
CVE-2006-3599
SQL injection vulnerability in the Nuke Advanced Classifieds module for PHP-Nuke allows remote attackers to execute arbitrary SQL commands via the id_ads parameter in an EditAds op.
[ "cpe:2.3:a:php-nuke:advanced_classified_module:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2023-5677
Brandon Rothel from QED Secure Solutions and Sam Hanson of Dragos have found that the VAPIX API tcptest.cgi did not have a sufficient input validation allowing for a possible remote code execution. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. The impact of exploiting this vulnerability is lower with operator-privileges compared to administrator-privileges service accounts. Please refer to the Axis security advisory for more information and solution.
[ "cpe:2.3:o:axis:m3024-lve_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:axis:m3024-lve:-:*:*:*:*:*:*:*", "cpe:2.3:o:axis:m3025-ve_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:axis:m3025-ve:-:*:*:*:*:*:*:*", "cpe:2.3:o:axis:m7014_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:axis:m7014:-:*:*:*:*:*:*:*", "cpe:2.3:o:axis:m7016_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:axis:m7016:-:*:*:*:*:*:*:*", "cpe:2.3:o:axis:p1214-e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:axis:p1214-e:-:*:*:*:*:*:*:*", "cpe:2.3:o:axis:p7214_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:axis:p7214:-:*:*:*:*:*:*:*", "cpe:2.3:o:axis:p7216_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:axis:p7216:-:*:*:*:*:*:*:*", "cpe:2.3:o:axis:q7401_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:axis:q7401:-:*:*:*:*:*:*:*", "cpe:2.3:o:axis:q7404_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:axis:q7404:-:*:*:*:*:*:*:*", "cpe:2.3:o:axis:q7414_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:axis:q7414:-:*:*:*:*:*:*:*", "cpe:2.3:o:axis:q7424-r_mk_ii_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:axis:q7424-r_mk_ii:-:*:*:*:*:*:*:*" ]
null
6.3
null
null
null
CVE-2023-39967
Full read and controlled SSRF through URL parameter when testing a request inside wiremock-studio
WireMock is a tool for mocking HTTP services. When certain request URLs like “@127.0.0.1:1234" are used in WireMock Studio configuration fields, the request might be forwarded to an arbitrary service reachable from WireMock’s instance. There are 3 identified potential attack vectors: via “TestRequester” functionality, webhooks and the proxy mode. As we can control HTTP Method, HTTP Headers, HTTP Data, it allows sending requests with the default level of credentials for the WireMock instance. The vendor has discontinued the affected Wiremock studio product and there will be no fix. Users are advised to find alternatives.
[ "cpe:2.3:a:wiremock:wiremock:*:*:*:*:*:*:*:*", "cpe:2.3:a:wiremock:studio:*:*:*:*:*:*:*:*" ]
null
10
null
null
null
CVE-2025-4086
A specially crafted filename containing a large number of encoded newline characters could obscure the file's extension when displayed in the download dialog. *This bug only affects Thunderbird for Android. Other versions of Thunderbird are unaffected.* This vulnerability affects Firefox < 138 and Thunderbird < 138.
[]
null
6.5
null
null
null
CVE-2024-45862
Cleartext Storage of Sensitive Information in Kastle Systems Access Control System
Kastle Systems firmware prior to May 1, 2024, stored machine credentials in cleartext, which may allow an attacker to access sensitive information.
[ "cpe:2.3:o:kastlesystems:access_control_system_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:kastle:access_control_system_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:kastle:access_control_system:-:*:*:*:*:*:*:*" ]
8.7
null
null
null
null
GHSA-c7mg-73jx-7c7x
** DISPUTED ** Typesetter CMS 5.x through 5.1 allows admins to upload and execute arbitrary PHP code via a .php file inside a ZIP archive. NOTE: the vendor disputes the significance of this report because "admins are considered trustworthy"; however, the behavior "contradicts our security policy" and is being fixed for 5.2.
[]
null
7.2
null
null
null
CVE-2007-6420
Cross-site request forgery (CSRF) vulnerability in the balancer-manager in mod_proxy_balancer for Apache HTTP Server 2.2.x allows remote attackers to gain privileges via unspecified vectors.
[ "cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-2g3v-5cpr-rx7q
A potential vulnerability in LenovoVariable SMI Handler due to insufficient validation in some Lenovo Notebook models BIOS may allow an attacker with local access and elevated privileges to execute arbitrary code.
[]
null
6.7
null
null
null
GHSA-c32h-wf3h-rvfw
DeluxeBB 1.07 and earlier allows remote attackers to bypass SQL injection protection mechanisms via the login variable and certain other variables, by using lowercase "union select" or possibly other statements that do not match the uppercase "UNION SELECT."
[]
null
null
null
null
null
CVE-2013-3688
The TP-Link IP Cameras TL-SC3171, TL-SC3130, TL-SC3130G, TL-SC3171G, and possibly other models before beta firmware LM.1.6.18P12_sign6, does not properly restrict access to certain administrative functions, which allows remote attackers to (1) cause a denial of service (device reboot) via a request to cgi-bin/reboot or (2) cause a denial of service (reboot and reset to factory defaults) via a request to cgi-bin/hardfactorydefault.
[ "cpe:2.3:h:tp-link:tl-sc3130:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:tl-sc3130g:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:tl-sc3171:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:tl-sc3171g:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:lm_firmware:*:*:*:*:*:*:*:*" ]
null
null
null
7.1
null
GHSA-4j42-4g6h-g8rv
Windows 95 and Windows 98 systems, when configured with multiple TCP/IP stacks bound to the same MAC address, allow remote attackers to cause a denial of service (traffic amplification) via a certain ICMP echo (ping) packet, which causes all stacks to send a ping response, aka TCP Chorusing.
[]
null
null
null
null
null
GHSA-6f4f-mvfg-v7fq
Cross-site scripting (XSS) vulnerability in vpnum/userslist.php in Endian Firewall 2.1.2 allows remote attackers to inject arbitrary web script or HTML via the psearch parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
null
null
null
null
null
GHSA-qj84-6p43-2fhw
Microsoft Internet Explorer 6 through 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
[]
null
null
null
null
null
CVE-2003-0717
The Messenger Service for Windows NT through Server 2003 does not properly verify the length of the message, which allows remote attackers to execute arbitrary code via a buffer overflow attack.
[ "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:enterprise:*:64-bit:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:r2:*:64-bit:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:standard:*:64-bit:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_me:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:*:enterprise_server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:*:server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:*:terminal_server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:*:workstation:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:enterprise_server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:terminal_server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp1:workstation:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:enterprise_server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:terminal_server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp2:workstation:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:enterprise_server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:terminal_server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp3:workstation:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:enterprise_server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:terminal_server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp4:workstation:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:enterprise_server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:terminal_server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp5:workstation:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:enterprise_server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:terminal_server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp6:workstation:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:enterprise_server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:server:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:workstation:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp1:64-bit:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-9j85-mfj4-p8xm
Tenda AC1206 V15.03.06.23 and AC10 V15.03.06.47 were discovered to contain a stack overflow in the deviceId parameter in the saveParentControlInfo function.
[]
null
9.8
null
null
null
CVE-2020-26106
cPanel before 88.0.3 has weak permissions (world readable) for the proxy subdomains log file (SEC-558).
[ "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
CVE-2024-23816
A vulnerability has been identified in Location Intelligence Perpetual Large (9DE5110-8CA13-1AX0) (All versions < V4.3), Location Intelligence Perpetual Medium (9DE5110-8CA12-1AX0) (All versions < V4.3), Location Intelligence Perpetual Non-Prod (9DE5110-8CA10-1AX0) (All versions < V4.3), Location Intelligence Perpetual Small (9DE5110-8CA11-1AX0) (All versions < V4.3), Location Intelligence SUS Large (9DE5110-8CA13-1BX0) (All versions < V4.3), Location Intelligence SUS Medium (9DE5110-8CA12-1BX0) (All versions < V4.3), Location Intelligence SUS Non-Prod (9DE5110-8CA10-1BX0) (All versions < V4.3), Location Intelligence SUS Small (9DE5110-8CA11-1BX0) (All versions < V4.3). Affected products use a hard-coded secret value for the computation of a Keyed-Hash Message Authentication Code. This could allow an unauthenticated remote attacker to gain full administrative access to the application.
[ "cpe:2.3:a:siemens:location_intelligence:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
CVE-2025-31280
A memory corruption issue was addressed with improved validation. This issue is fixed in macOS Sequoia 15.6. Processing a maliciously crafted file may lead to heap corruption.
[]
null
7.8
null
null
null
CVE-2020-0550
Improper data forwarding in some data cache for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. The list of affected products is provided in intel-sa-00330: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00330.html
[ "cpe:2.3:h:intel:celeron_1000m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_1005m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_1007u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_1017u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_1019y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_1020e:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_1020m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_1037u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_1047ue:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_2955u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_2957u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_2970m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_2980u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_2981u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_3765u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_725c:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_787:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_797:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_807:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_807ue:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_827e:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_847:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_847e:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_857:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_867:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_877:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_887:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_927ue:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_b710:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_b720:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_b800:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_b810:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_b810e:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_b815:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_b820:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_b830:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_b840:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g1610:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g1610t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g1620:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g1620t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g1630:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g1820:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g1820t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g1830:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g1840:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g1840t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g1850:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g440:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g460:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g465:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g470:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g530:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g530t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g540:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g540t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g550:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g550t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g555:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_3930k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-2100:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-2100t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-2102:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-2105:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-2115c:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-2120:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-2120t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-2125:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-2130:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-2310e:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-2310m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-2312m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-2328m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-2330e:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-2330m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-2332m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-2340ue:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-2348m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-2350m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-2357m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-2365m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-2367m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-2370m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-2375m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-2377m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-3110m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-3115c:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-3120m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-3120me:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-3130m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-3210:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-3217u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-3217ue:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-3220:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-3220t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-3225:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-3227u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-3229y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-3240:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-3240t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-3245:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-3250:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-3250t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4005u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4010u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4010y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4012y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4020y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4025u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4030u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4030y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4100m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4100u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4110m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4120u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4130:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4130t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4150:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4150t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4158u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4160:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4160t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4170:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4170t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4330:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4330t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4340:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4350:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4350t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4360:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4360t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4370:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-4370t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-5005u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-5006u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-5010u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-5015u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-5020u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-5157u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-2300:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-2310:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-2320:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-2380p:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-2390t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-2400:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-2400s:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-2405s:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-2410m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-2430m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-2435m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-2450m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-2450p:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-2467m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-2500:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-2500k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-2500s:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-2500t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-2510e:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-2515e:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-2520m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-2537m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-2540m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-2550k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-2557m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3210m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3230m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3317u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3320m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3330:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3330s:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3337u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3339y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3340:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3340m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3340s:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3350p:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3360m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3380m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3427u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3437u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3439y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3450:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3450s:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3470:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3470s:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3470t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3475s:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3550:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3550s:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3570:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3570k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3570s:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3570t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-3610me:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4200u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4200y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4202y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4210h:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4210u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4210y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4220y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4250u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4258u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4260u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4278u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4288u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4300u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4300y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4302y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4308u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4350u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4402ec:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4430:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4430s:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4440:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4440s:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4460:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4460s:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4460t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4570:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4570r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4570s:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4570t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4590:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4590s:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4590t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4670:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4670k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4670r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4670s:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4670t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4690:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4690s:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-4690t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-5200u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-5250u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-5257u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-5287u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-5300u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-5350:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-5350u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-5575r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-5675c:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-5675r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-2600:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-2600k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-2600s:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-2610ue:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-2617m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-2620m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-2629m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-2630qm:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-2635qm:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-2637m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-2640m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-2649m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-2655le:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-2657m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-2670qm:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-2675qm:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-2677m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-2700k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-2710qe:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-2715qe:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-2720qm:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-2760qm:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-2820qm:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-2860qm:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-2920xm:-:*:*:*:extreme:*:*:*", "cpe:2.3:h:intel:core_i7-2960xm:-:*:*:*:extreme:*:*:*", "cpe:2.3:h:intel:core_i7-3517u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3517ue:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3520m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3537u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3540m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3555le:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3610qe:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3610qm:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3612qe:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3612qm:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3615qe:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3615qm:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3630qm:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3632qm:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3635qm:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3667u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3687u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3689y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3720qm:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3740qm:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3770:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3770k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3770s:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3770t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3820:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3820qm:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3840qm:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3920xm:-:*:*:*:extreme:*:*:*", "cpe:2.3:h:intel:core_i7-3940xm:-:*:*:*:extreme:*:*:*", "cpe:2.3:h:intel:core_i7-3960x:-:*:*:*:extreme:*:*:*", "cpe:2.3:h:intel:core_i7-3970x:-:*:*:*:extreme:*:*:*", "cpe:2.3:h:intel:core_i7-4500u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4510u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4550u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4558u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4578u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4600u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4610y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4650u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4700ec:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4700eq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4700hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4700mq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4702ec:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4702hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4702mq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4710hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4710mq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4712hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4712mq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4720hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4722hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4750hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4760hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4765t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4770:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4770hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4770k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4770r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4770s:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4770t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4771:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4785t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4790:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4790s:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4790t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4800mq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4810mq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4820k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4850hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4860hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4870hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4900mq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4910mq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4930k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4950hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4960hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4960x:-:*:*:*:extreme:*:*:*", "cpe:2.3:h:intel:core_i7-4980hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-5500u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-5550u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-5557u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-5600u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-5650u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-5700eq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-5700hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-5750hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-5775c:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-5775r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-5820k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-5850eq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-5850hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-5930k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-5950hq:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-5960x:-:*:*:*:extreme:*:*:*", "cpe:2.3:h:intel:core_i7-6800k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6850:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6900k:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6950k:-:*:*:*:extreme:*:*:*", "cpe:2.3:h:intel:core_m-5y10:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m-5y10a:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m-5y10c:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m-5y3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m-5y51:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m-5y70:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m-5y71:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_1405:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_1405_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_2020m_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_2030m_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_2117u_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_2127u_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_2129y_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_3205u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_3215u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_3556u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_3558u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_3560m:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_3560y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_3561y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_3665u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_3755u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_3765u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_3805u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_3825u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_957:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_967:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_977:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_987:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_997:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_a1018_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_b915c:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_b925c:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_b940:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_b950:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_b960:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_b970:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_b980:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_d1507:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_d1508:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_d1509:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_d1517:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_d1519:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g2010_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g2020_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g2020t_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g2030_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g2030t_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g2100t_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g2120_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g2120t_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g2130_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g2140_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g3220:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g3220t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g3240:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g3240t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g3250:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g3250t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g3258:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g3260:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g3260t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g3420:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g3420t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g3430:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g3440:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g3440t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g3450:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g3450t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g3460:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g3460t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g3470:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g620:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g620t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g622:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g630:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g630t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g632:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g640:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g640t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g645:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g645t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g840:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g850:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g860:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g860t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_g870:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_2870_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_2880_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_2890_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_4809_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_4820_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_4830_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_4850_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_4860_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_4870_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_4880_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_4890_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_8850_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_8857_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_8870_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_8880_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_8880l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_8890_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_8891_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_8893_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1513n:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1518:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1519:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1520:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1521:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1523n:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1527:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1528:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1529:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1531:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1533:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1533n:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1537:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1539:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1540:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1541:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1543n:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1548:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1557:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1559:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1567:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1571:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1577:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1581:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1587:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1602:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1622:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1623n:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1627:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1633n:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1637:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1649n:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1653n:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d1553n:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1105c:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1105c_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1120:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1120l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1125c:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1125c_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1220_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1220_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1220l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1220l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1221_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1225:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1225_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1225_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1226_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1230:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1230_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1230_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1230l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1231_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1235:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1235_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1240:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1240_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1240_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1240l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1241_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1245:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1245_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1245_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1246_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1258l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1260l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1265l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1265l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1265l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1265l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1268l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1270:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1270_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1270_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1271_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1275:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1275_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1275_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1275l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1276_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1278l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1280:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1280_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1280_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1281_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1285:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1285_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1285_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1285l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1286_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1286l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1290:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1290_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1428l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1428l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1620:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1620_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1620_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1630_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1650:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1650_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1650_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1660:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1660_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1660_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1680_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2403:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2403_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2407:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2407_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2418l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2418l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2420:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2420_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2428l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2428l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2430:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2430_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2430l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2430l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2440:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2440_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2448l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2448l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2450:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2450_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2450l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2450l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2470:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2470_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2603:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2603_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2603_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2603_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2608l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2609:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2609_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2609_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2609_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2618l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2618l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2620:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2620_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2620_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2620_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2623_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2623_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2628l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2628l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2630:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2630_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2630_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2630_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2630l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2630l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2630l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2630l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2637:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2637_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2637_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2637_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2640:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2640_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2640_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2640_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2643:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2643_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2643_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2643_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2648l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2648l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2648l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2650:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2650_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2650_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2650_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2650l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2650l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2650l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2650l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2658:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2658_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2658_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2660:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2660_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2660_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2660_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2665:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2667:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2667_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2667_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2667_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2670:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2670_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2670_v3_:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2679_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2680:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2680_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2680_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2680_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2683_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2683_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2687w:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2687w_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2687w_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2690:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2690_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2690_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2690_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2695_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2695_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2695_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2697_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2697_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2697_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2697a_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2698_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2698_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2699_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2699_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2699a_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2699r_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4603:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4603_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4607:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4607_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4610:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4610_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4610_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4617:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4620:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4620_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4620_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4624l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4627_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4627_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4628l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4640:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4640_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4640_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4650:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4650_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4650_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4650l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4655_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4657l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4660_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4667_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4669_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-2850_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-4809_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-4820_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-4820_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-4830_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-4830_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-4850_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-4850_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8855_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8860_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8860_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8867_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8867_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8870_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8870_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8880_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8880_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8880l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8890_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8890_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8891_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8891_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8893_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8893_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8894_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_v4_e7-4809_v4:-:*:*:*:*:*:*:*" ]
null
5.6
null
1.9
null
ICSA-22-034-02
Airspan Networks Mimosa
The affected product does not perform proper authorization and authentication checks on multiple API routes. An attacker may gain access to these API routes and achieve remote code execution, create a denial-of-service condition, and obtain sensitive information.CVE-2022-21196 has been assigned to this vulnerability. A CVSS v3 base score of 10.0 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). The affected product does not perform proper authorization checks on multiple API functions. An attacker may gain access to these functions and achieve remote code execution, create a denial-of-service condition, and obtain sensitive information.CVE-2022-21141 has been assigned to this vulnerability. A CVSS v3 base score of 10.0 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). This vulnerability could allow an attacker to force the server to create and execute a web request granting access to backend APIs that are only accessible to the Mimosa MMP server, or request pages that could perform some actions themselves. The attacker could force the server into accessing routes on those cloud-hosting platforms, accessing secret keys, changing configurations, etc.CVE-2022-21215 has been assigned to this vulnerability. A CVSS v3 base score of 10.0 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). The affected product does not properly sanitize user input, which may allow an attacker to perform a SQL injection and obtain sensitive information.CVE-2022-21176 has been assigned to this vulnerability. A CVSS v3 base score of 8.6 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N). The affected product has a deserialization function that does not validate or check the data, allowing arbitrary classes to be created.CVE-2022-0138 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N). The affected product does not properly sanitize user input on several locations, which may allow an attacker to inject arbitrary commands.CVE-2022-21143 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The affected product uses the MD5 algorithm to hash the passwords before storing them but does not salt the hash. As a result, attackers may be able to crack the hashed passwords.CVE-2022-21800 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
[]
null
null
6.5
null
null
CVE-2024-38757
WordPress Typebot plugin <= 3.6.0 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Typebot allows Stored XSS.This issue affects Typebot: from n/a through 3.6.0.
[]
null
6.5
null
null
null
CVE-2019-12468
An Incorrect Access Control vulnerability was found in Wikimedia MediaWiki 1.27.0 through 1.32.1. Directly POSTing to Special:ChangeEmail would allow for bypassing re-authentication, allowing for potential account takeover.
[ "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
null
CVE-2017-5594
An issue was discovered in Pagekit CMS before 1.0.11. In this vulnerability the remote attacker is able to reset the registered user's password, when the debug toolbar is enabled. The password is successfully recovered using this exploit. The SecureLayer7 ID is SL7_PGKT_01.
[ "cpe:2.3:a:pagekit:pagekit:*:*:*:*:*:*:*:*" ]
null
7.5
null
4.3
null
CVE-2025-7341
HT Contact Form Widget For Elementor Page Builder & Gutenberg Blocks & Form Builder. <= 2.2.1 - Unauthenticated Arbitrary File Deletion
The HT Contact Form Widget For Elementor Page Builder & Gutenberg Blocks & Form Builder. plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the temp_file_delete() function in all versions up to, and including, 2.2.1. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
[]
null
9.1
null
null
null
GHSA-65mh-gj85-793w
CRLF injection vulnerability in process_signup.php in PHP Handicapper allows remote attackers to inject arbitrary HTTP headers via CRLF sequences in the login parameter. NOTE: the vendor has disputed CVE-2005-3497, and it is possible that the dispute was intended to include this issue as well.
[]
null
null
null
null
null
GHSA-w7qw-j374-vmgx
To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used.
[]
null
null
null
null
null
GHSA-pmqj-2jr8-jp59
A vulnerability was detected in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. The affected element is the function ipRangeBlockManageRule of the file /goform/ipRangeBlockManageRule. Performing manipulation of the argument ipRangeBlockRuleName/scheduleIp/ipRangeBlockRuleIpAddr results in stack-based buffer overflow. The attack may be initiated remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
7.4
8.8
null
null
null
CVE-2025-20952
Improper access control in Mdecservice prior to SMR Apr-2025 Release 1 allows local attackers to access arbitrary files with system privilege.
[]
null
5.5
null
null
null
CVE-2022-27848
WordPress Modern Events Calendar Lite plugin <= 6.5.1 - Authenticated Stored Cross-Site Scripting (XSS) vulnerability
Authenticated (admin+ user) Stored Cross-Site Scripting (XSS) in Modern Events Calendar Lite (WordPress plugin) <= 6.5.1
[ "cpe:2.3:a:webnus:modern_events_calendar_lite:*:*:*:*:*:wordpress:*:*" ]
null
3.4
null
null
null
CVE-2019-5156
An exploitable command injection vulnerability exists in the cloud connectivity functionality of WAGO PFC200 versions 03.02.02(14), 03.01.07(13), and 03.00.39(12). An attacker can inject operating system commands into the TimeoutPrepared parameter value contained in the firmware update command.
[ "cpe:2.3:o:wago:pfc200_firmware:03.00.39\\(12\\):*:*:*:*:*:*:*", "cpe:2.3:o:wago:pfc200_firmware:03.01.07\\(13\\):*:*:*:*:*:*:*", "cpe:2.3:o:wago:pfc200_firmware:03.02.02\\(14\\):*:*:*:*:*:*:*", "cpe:2.3:h:wago:pfc200:-:*:*:*:*:*:*:*" ]
null
7.2
null
6.5
null
GHSA-qpgm-wrx9-v53j
The Bonjour functionality in mDNSResponder, iChat 3.1.6, and InstantMessage framework 428 in Apple Mac OS X 10.4.8 does not check for duplicate entries when adding newly discovered available contacts, which allows remote attackers to cause a denial of service (disrupted communication) via a flood of duplicate _presence._tcp mDNS queries.
[]
null
null
null
null
null
CVE-2016-0534
Unspecified vulnerability in the Oracle Project Contracts component in Oracle E-Business Suite 12.1.1, 12.1.2, and 12.1.3 allows remote attackers to affect integrity via unknown vectors related to Printing.
[ "cpe:2.3:a:oracle:project_contracts:12.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:project_contracts:12.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:project_contracts:12.1.3:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
CVE-2022-25604
WordPress Price Table plugin <= 0.2.2 - Authenticated Stored Cross-Site Scripting (XSS) vulnerability
Authenticated (contributor of higher user role) Stored Cross-Site Scripting (XSS) vulnerability discovered in WordPress Price Table plugin (versions <= 0.2.2).
[ "cpe:2.3:a:price_table_project:price_table:*:*:*:*:*:wordpress:*:*" ]
null
4.1
null
null
null
GHSA-7jg7-4vvp-f8cv
Cross-zone scripting vulnerability in the HandleAction method in a certain ActiveX control in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.1.5, and RealPlayer Enterprise 2.1.2 allows remote attackers to inject arbitrary web script or HTML in the Local Zone by specifying a local file in a NavigateToURL action, as demonstrated by a local skin file.
[]
null
null
null
null
null
GHSA-2hp9-3xfr-r9w2
Insufficient token expiration in Serenity
An issue was discovered in Serenity Serene (and StartSharp) before 6.7.0. Password reset links are sent by email. A link contains a token that is used to reset the password. This token remains valid even after the password reset and can be used a second time to change the password of the corresponding user. The token expires only 3 hours after issuance and is sent as a query parameter when resetting. An attacker with access to the browser history can thus use the token again to change the password in order to take over the account.
[]
null
7.8
null
null
null
CVE-2023-1246
Files or Directories Accessible to External Parties in Saysis Starcities
Files or Directories Accessible to External Parties vulnerability in Saysis Starcities allows Collect Data from Common Resource Locations.This issue affects Starcities: through 1.3.
[ "cpe:2.3:a:saysis:starcities:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
GHSA-vp29-6rcm-8jf5
In JFrog Artifactory 5.x and 6.x, insecure FreeMarker template processing leads to remote code execution, e.g., by modifying a .ssh/authorized_keys file. Patches are available for various versions between 5.11.8 and 6.16.0. The issue exists because use of the DefaultObjectWrapper class makes certain Java functions accessible to a template.
[]
null
null
null
null
null
CVE-2015-9441
The bookmarkify plugin 2.9.2 for WordPress has CSRF with resultant XSS via wp-admin/options-general.php?page=bookmarkify.php.
[ "cpe:2.3:a:bookmarkify_project:bookmarkify:2.9.2:*:*:*:*:wordpress:*:*" ]
null
6.5
null
4.3
null
CVE-2021-36037
Magento Commerce Improper Authorization Vulnerability Could Lead To Information Exposure
Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by an improper improper authorization vulnerability. An authenticated attacker could leverage this vulnerability to achieve sensitive information disclosure.
[ "cpe:2.3:a:adobe:adobe_commerce:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:adobe_commerce:2.4.2:p1:*:*:*:*:*:*", "cpe:2.3:a:adobe:magento_open_source:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:magento_open_source:2.4.2:p1:*:*:*:*:*:*" ]
null
6.5
null
null
null
GHSA-5xv3-fm7g-865r
OpenMetadata vulnerable to a SpEL Injection in `GET /api/v1/policies/validation/condition/<expr>` (`GHSL-2023-236`)
SpEL Injection in `GET /api/v1/policies/validation/condition/<expr>` (`GHSL-2023-236`)***Please note, only authenticated users have access to PUT / POST APIS for /api/v1/policies. Non authenticated users will not be able to access these APIs to exploit the vulnerability. A user must exist in OpenMetadata and have authenticated themselves to exploit this vulnerability.***The [`‎CompiledRule::validateExpression`](https://github.com/open-metadata/OpenMetadata/blob/main/openmetadata-service/src/main/java/org/openmetadata/service/security/policyevaluator/CompiledRule.java#L51) method evaluates an SpEL expression using an [`StandardEvaluationContext`](https://github.com/open-metadata/OpenMetadata/blob/main/openmetadata-service/src/main/java/org/openmetadata/service/security/policyevaluator/CompiledRule.java#L57), allowing the expression to reach and interact with Java classes such as `java.lang.Runtime`, leading to Remote Code Execution. The `/api/v1/policies/validation/condition/<expression>` endpoint passes user-controlled data `CompiledRule::validateExpession` allowing authenticated (non-admin) users to execute arbitrary system commands on the underlaying operating system.[Snippet from PolicyResource.java](https://github.com/open-metadata/OpenMetadata/blob/b6b337e09a05101506a5faba4b45d370cc3c9fc8/openmetadata-service/src/main/java/org/openmetadata/service/resources/policies/PolicyResource.java#L448)In addition, there is a missing authorization check since `Authorizer.authorize()` is never called in the affected path and therefore any authenticated non-admin user is able to trigger this endpoint and evaluate arbitrary SpEL expressions leading to arbitrary command execution.This vulnerability was discovered with the help of CodeQL's [Expression language injection (Spring)](https://codeql.github.com/codeql-query-help/java/java-spel-expression-injection/) query.Proof of conceptPrepare the payloadEncode `touch /tmp/pwned` in Base64 => `dG91Y2ggL3RtcC9wd25lZA==`SpEL expression to run system command: `T(java.lang.Runtime).getRuntime().exec(new java.lang.String(T(java.util.Base64).getDecoder().decode("dG91Y2ggL3RtcC9wd25lZA==")))`Encode the payload using URL encoding:Send the payload using a valid JWT token:Verify that a file called `/tmp/pwned` was created in the OpenMetadata serverImpactThis issue may lead to Remote Code Execution by a registered and authenticated user.RemediationUse [`SimpleEvaluationContext`](https://docs.spring.io/spring-framework/docs/current/javadoc-api/org/springframework/expression/spel/support/SimpleEvaluationContext.html) to exclude *references to Java types, constructors, and bean references*.
[]
null
8.8
null
null
null
GHSA-rx5q-753m-6mmq
In SwiftNIO before 1.8.0, a buffer overflow was addressed with improved size validation.
[]
null
null
9.8
null
null
CVE-2007-3724
The process scheduler in the Microsoft Windows XP kernel does not make use of the process statistics kept by the kernel, performs scheduling based on CPU billing gathered from periodic process sampling ticks, and gives preference to "interactive" processes that perform voluntary sleeps, which allows local users to cause a denial of service (CPU consumption), as described in "Secretly Monopolizing the CPU Without Superuser Privileges."
[ "cpe:2.3:o:microsoft:windows_xp:*:gold:*:*:*:*:*:*" ]
null
null
null
2.1
null
GHSA-h7g2-m8qw-9mfj
Cross-Site Request Forgery (CSRF) vulnerability in MailerLite MailerLite – WooCommerce integration.This issue affects MailerLite – WooCommerce integration: from n/a through 2.0.8.
[]
null
5.4
null
null
null
GHSA-gfc5-9fgm-gcmj
A vulnerability classified as critical has been found in TOTOLINK AC1200 T8 4.1.5cu.861_B20230220. This affects the function setWiFiRepeaterCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument password leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
8.7
8.8
null
null
null
RHSA-2015:0707
Red Hat Security Advisory: qpid security and bug fix update
qpid-cpp: 3 qpidd DoS issues in AMQP 0-10 protocol handling qpid-cpp: anonymous access to qpidd cannot be prevented qpid-cpp: AMQP 0-10 protocol sequence-set maximal range DoS (incomplete CVE-2015-0203 fix)
[ "cpe:/a:redhat:enterprise_mrg:3:server:el6" ]
null
null
null
null
null
CVE-2014-6743
The Hearsay: A Social Party Game (aka air.com.lip.per) application 1.7.000 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:lipbrau:hearsay\\:_a_social_party_game:1.7.000:*:*:*:*:android:*:*" ]
null
null
null
5.4
null
GHSA-r52w-77wx-rpqg
addons/import.php in TalkBack 2.3.14 allows remote attackers to execute arbitrary commands via the result parameter.
[]
null
null
null
null
null
RHSA-2017:2799
Red Hat Security Advisory: kernel security update
kernel: load_elf_ binary() does not take account of the need to allocate sufficient space for the entire binary
[ "cpe:/o:redhat:rhel_aus:6.4::server" ]
null
null
7.8
null
null
GHSA-82q5-qcpc-46wr
SQL injection vulnerability in index.asp in DMXReady Site Engine Manager 1.0 allows remote attackers to execute arbitrary SQL commands via the mid parameter.
[]
null
null
null
null
null
CVE-2017-9654
The Philips DoseWise Portal web-based application versions 1.1.7.333 and 2.1.1.3069 stores login credentials in clear text within backend system files. CVSS v3 base score: 6.5, CVSS vector string: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N.
[ "cpe:2.3:a:philips:dosewise:1.1.7.333:*:*:*:*:*:*:*", "cpe:2.3:a:philips:dosewise:2.1.1.3069:*:*:*:*:*:*:*" ]
null
null
8.8
4
null
CVE-2023-31221
WordPress PDQ CSV Plugin <= 1.0.0 is vulnerable to Cross Site Scripting (XSS)
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Ransom Christofferson PDQ CSV plugin <= 1.0.0 versions.
[ "cpe:2.3:a:ransomchristofferson:pdq_csv:*:*:*:*:*:wordpress:*:*" ]
null
5.9
null
null
null
CVE-2022-27313
An arbitrary file deletion vulnerability in Gitea v1.16.3 allows attackers to cause a Denial of Service (DoS) via deleting the configuration file.
[ "cpe:2.3:a:gitea:gitea:1.16.3:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
GHSA-m4f9-7fgw-p5j8
Multiple vulnerabilities in Cisco Jabber for Windows, Jabber for MacOS, and Jabber for mobile platforms could allow an attacker to execute arbitrary programs on the underlying operating system (OS) with elevated privileges or gain access to sensitive information. For more information about these vulnerabilities, see the Details section of this advisory.
[]
null
null
null
null
null
CVE-2024-42475
OAuth library for nim allows insecure generation of state values by generateState - entropy too low and uses regular PRNG instead of CSPRNG
In the OAuth library for nim prior to version 0.11, the `state` values generated by the `generateState` function do not have sufficient entropy. These can be successfully guessed by an attacker allowing them to perform a CSRF vs a user, associating the user's session with the attacker's protected resources. While `state` isn't exactly a cryptographic value, it should be generated in a cryptographically secure way. `generateState` should be using a CSPRNG. Version 0.11 modifies the `generateState` function to generate `state` values of at least 128 bits of entropy while using a CSPRNG.
[]
null
6.5
null
null
null
GHSA-4m82-hw4c-rxfg
Microsoft Edge (Chromium-based) Spoofing Vulnerability
[]
null
5.4
null
null
null
CVE-2025-29070
A heap buffer overflow vulnerability has been identified in thesmooth2() in cmsgamma.c in lcms2-2.16 which allows a remote attacker to cause a denial of service. NOTE: the Supplier disputes this because "this is not exploitable as this function is never called on normal color management, is there only as a helper for low-level programming and investigation."
[]
null
7.5
null
null
null
GHSA-x2vm-m96w-rq2c
A CWE-284:Improper Access Control vulnerability exists in EcoStruxureª and SmartStruxureª Power Monitoring and SCADA Software (see security notification for version information) that could allow for arbitrary code execution on the server when an authorized user access an affected webpage.
[]
null
7.2
null
null
null
RHSA-2013:0763
Red Hat Security Advisory: JBoss Web Framework Kit 2.2.0 update
JDK: XML parsing Denial-Of-Service (6845701) jakarta-commons-httpclient: missing connection hostname check against X.509 certificate name
[ "cpe:/a:redhat:jboss_enterprise_web_framework:2.2.0" ]
null
null
3.7
null
null
GHSA-2xmv-6p85-fvhf
Insecure Permissions vulnerability in Guangzhou Yingshi Electronic Technology Co. Ncast Yingshi high-definition intelligent recording and playback system 2007-2017 allows a remote attacker to execute arbitrary code via the /manage/IPSetup.php backend function
[]
null
9.8
null
null
null
GHSA-q9cg-2gwc-x6xh
In the Settings app, there is an insecure default value. This could lead to local escalation of privilege and tapjacking with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-144507081
[]
null
null
null
null
null
GHSA-c3c7-cxxq-32x3
Adobe Bridge versions 10.0.1 and earlier version have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution .
[]
null
7.8
null
null
null
CVE-2025-52903
File Browser Allows Execution of Shell Commands That Can Spawn Other Commands
File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. In version 2.32.0, the Command Execution feature of File Browser only allows the execution of shell command which have been predefined on a user-specific allowlist. Many tools allow the execution of arbitrary different commands, rendering this limitation void. The concrete impact depends on the commands being granted to the attacker, but the large number of standard commands allowing the execution of subcommands makes it likely that every user having the `Execute commands` permissions can exploit this vulnerability. Everyone who can exploit it will have full code execution rights with the uid of the server process. Until this issue is fixed, the maintainers recommend to completely disable `Execute commands` for all accounts. Since the command execution is an inherently dangerous feature that is not used by all deployments, it should be possible to completely disable it in the application's configuration. As a defense-in-depth measure, organizations not requiring command execution should operate the Filebrowser from a distroless container image. A patch version has been pushed to disable the feature for all existent installations, and making it opt-in. A warning has been added to the documentation and is printed on the console if the feature is enabled. Due to the project being in maintenance-only mode, the bug has not been fixed. The fix is tracked on pull request 5199.
[]
null
8.1
null
null
null
GHSA-x229-w7jm-mfwc
The codebrws.asp sample file in IIS and Site Server allows remote attackers to read arbitrary files.
[]
null
null
null
null
null
GHSA-w23f-22px-mx2g
A vulnerability has been identified in COMOS V10.3 (All versions < V10.3.3.5.8), COMOS V10.4.0 (All versions), COMOS V10.4.1 (All versions), COMOS V10.4.2 (All versions), COMOS V10.4.3 (All versions < V10.4.3.0.47), COMOS V10.4.4 (All versions < V10.4.4.2), COMOS V10.4.4.1 (All versions < V10.4.4.1.21). The PDMS/E3D Engineering Interface improperly handles XML External Entity (XXE) entries when communicating with an external application. This could allow an attacker to extract any file with a known location on the user's system or accessible network folders by injecting malicious data into the communication channel between the two systems.
[]
5.9
5.1
null
null
null
GHSA-hcv9-wjjr-cqq7
Microsoft Excel 2002 SP3 does not properly validate record information, which allows remote attackers to execute arbitrary code via a crafted Excel document, aka "Extra Out of Boundary Record Parsing Vulnerability."
[]
null
null
null
null
null
PYSEC-2021-311
null
TensorFlow is an end-to-end open source platform for machine learning. In affected versions an attacker can craft a TFLite model that would trigger a null pointer dereference, which would result in a crash and denial of service. This is caused by the MLIR optimization of `L2NormalizeReduceAxis` operator. The [implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/compiler/mlir/lite/transforms/optimize.cc#L67-L70) unconditionally dereferences a pointer to an iterator to a vector without checking that the vector has elements. We have patched the issue in GitHub commit d6b57f461b39fd1aa8c1b870f1b974aac3554955. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
[]
null
null
null
null
null
GHSA-wfg8-6fh4-8fp9
An unspecified SQL injection in Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote authenticated attacker with admin privileges to achieve remote code execution.
[]
null
null
9.1
null
null
GHSA-p2rg-m6w6-rqr4
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Creative interactive media 3D FlipBook, PDF Viewer, PDF Embedder – Real 3D FlipBook WordPress Plugin allows Reflected XSS.This issue affects 3D FlipBook, PDF Viewer, PDF Embedder – Real 3D FlipBook WordPress Plugin: from n/a through 3.62.
[]
null
7.1
null
null
null
CVE-2017-2819
An exploitable heap-based buffer overflow exists in the Hangul Word Processor component (version 9.6.1.4350) of Hancom Thinkfree Office NEO 9.6.1.4902. A specially crafted document stream can cause an integer underflow resulting in a buffer overflow which can lead to code execution under the context of the application. An attacker can entice a user to open up a document in order to trigger this vulnerability.
[ "cpe:2.3:a:hancom:hangul_word_processor:9.6.1.4350:*:*:*:*:*:*:*", "cpe:2.3:a:hancom:thinkfree_office_neo:9.6.1.4902:*:*:*:*:*:*:*" ]
null
null
8.8
null
null
GHSA-83wj-67p5-x8jf
A denial of service vulnerability in the Android media framework (libavc). Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-35583675.
[]
null
null
5.5
null
null
CVE-2021-30065
On Schneider Electric ConneXium Tofino Firewall TCSEFEA23F3F22 before 03.23, TCSEFEA23F3F20/21, and Belden Tofino Xenon Security Appliance, crafted ModBus packets can bypass the ModBus enforcer. NOTE: this issue exists because of an incomplete fix of CVE-2017-11401.
[ "cpe:2.3:o:belden:tofino_xenon_security_appliance_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:belden:tofino_xenon_security_appliance:-:*:*:*:*:*:*:*", "cpe:2.3:o:belden:tofino_argon_fa-tsa-220-tx\\/mm_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:belden:tofino_argon_fa-tsa-220-tx\\/mm:-:*:*:*:*:*:*:*", "cpe:2.3:o:belden:tofino_argon_fa-tsa-220-tx\\/tx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:belden:tofino_argon_fa-tsa-220-tx\\/tx:-:*:*:*:*:*:*:*", "cpe:2.3:o:belden:tofino_argon_fa-tsa-220-mm\\/tx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:belden:tofino_argon_fa-tsa-220-mm\\/tx:-:*:*:*:*:*:*:*", "cpe:2.3:o:belden:tofino_argon_fa-tsa-220-mm\\/mm_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:belden:tofino_argon_fa-tsa-220-mm\\/mm:-:*:*:*:*:*:*:*", "cpe:2.3:o:belden:tofino_argon_fa-tsa-100-tx\\/tx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:belden:tofino_argon_fa-tsa-100-tx\\/tx:-:*:*:*:*:*:*:*", "cpe:2.3:o:belden:eagle_20_tofino_943_987-505-mm\\/mm_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:belden:eagle_20_tofino_943_987-505-mm\\/mm:-:*:*:*:*:*:*:*", "cpe:2.3:o:belden:eagle_20_tofino_943_987-504-mm\\/tx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:belden:eagle_20_tofino_943_987-504-mm\\/tx:-:*:*:*:*:*:*:*", "cpe:2.3:o:belden:eagle_20_tofino_943_987-502_-tx\\/mm_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:belden:eagle_20_tofino_943_987-502_-tx\\/mm:-:*:*:*:*:*:*:*", "cpe:2.3:o:belden:eagle_20_tofino_943_987-501-tx\\/tx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:belden:eagle_20_tofino_943_987-501-tx\\/tx:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:tcsefea23f3f20_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:tcsefea23f3f20:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:tcsefea23f3f21_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:tcsefea23f3f21:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:tcsefea23f3f22_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:tcsefea23f3f22:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
GHSA-cp6g-c34h-69q7
An issue was discovered in these Pivotal RabbitMQ versions: all 3.4.x versions, all 3.5.x versions, and 3.6.x versions prior to 3.6.9; and these RabbitMQ for PCF versions: all 1.5.x versions, 1.6.x versions prior to 1.6.18, and 1.7.x versions prior to 1.7.15. RabbitMQ management UI stores signed-in user credentials in a browser's local storage without expiration, making it possible to retrieve them using a chained attack.
[]
null
null
7.8
null
null
GHSA-j8fm-f42x-52jx
The compile_tree function in ef_compiler.c in the Etterfilter utility in Ettercap 0.8.2 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted filter.
[]
null
null
5.5
null
null
CVE-2018-21201
Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D6100 before 1.0.0.57, R6100 before 1.0.1.20, R7800 before 1.0.2.40, R9000 before 1.0.2.52, WNDR3700v4 before 1.0.2.92, WNDR4300 before 1.0.2.94, WNDR4300v2 before 1.0.0.50, WNDR4500v3 before 1.0.0.50, and WNR2000v5 before 1.0.0.62.
[ "cpe:2.3:o:netgear:d6100_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d6100:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6100_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6100:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7800_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7800:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r9000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r9000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wndr3700_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wndr3700:v4:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wndr4300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wndr4300:-:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wndr4300:v2:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wndr4500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wndr4500:v3:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:wnr2000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wnr2000:v5:*:*:*:*:*:*:*" ]
null
null
6.8
null
null
GHSA-wvcq-jpw4-q2r3
An unauthenticated remote attacker can gain access to sensitive information including authentication information when using CODESYS OPC UA Server with the non-default Basic128Rsa15 security policy.
[]
null
7.5
null
null
null
CVE-2011-2946
Unspecified vulnerability in an ActiveX control in RealNetworks RealPlayer 11.0 through 11.1 and 14.0.0 through 14.0.5, RealPlayer SP 1.0 through 1.1.5, and RealPlayer Enterprise 2.0 through 2.1.5 allows remote attackers to execute arbitrary code via unknown vectors.
[ "cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:14.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:14.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:14.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:14.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:14.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:14.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer_sp:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:2.0:*:enterprise:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:2.1.2:*:enterprise:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:2.1.3:*:enterprise:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:2.1.4:*:enterprise:*:*:*:*:*", "cpe:2.3:a:realnetworks:realplayer:2.1.5:*:enterprise:*:*:*:*:*" ]
null
null
null
10
null
GHSA-644x-h855-42xq
The dissect_hip_tlv function in epan/dissectors/packet-hip.c in the HIP dissector in Wireshark 1.12.x before 1.12.1 does not properly handle a NULL tree, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
[]
null
null
null
null
null
RHSA-2016:1429
Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.3.1 security and bug fix update
Dashbuilder: SQL Injection on data set lookup filters
[ "cpe:/a:redhat:jboss_bpms:6.3" ]
null
null
8.8
null
null
RHSA-2019:2937
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.2.4 on RHEL 8 security update
undertow: Information leak in requests for directories without trailing slashes codehaus: incomplete fix for unsafe deserialization in jackson-databind vulnerabilities undertow: DEBUG log for io.undertow.request.security if enabled leaks credentials to log files jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server. jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message. jackson-databind: default typing mishandling leading to remote code execution
[ "cpe:/a:redhat:jboss_enterprise_application_platform:7.2::el8" ]
null
null
9.8
null
null
CVE-2023-25607
An improper neutralization of special elements used in an OS Command ('OS Command Injection') vulnerability [CWE-78 ] in FortiManager 7.2.0 through 7.2.2, 7.0.0 through 7.0.7, 6.4.0 through 6.4.11, 6.2 all versions, 6.0 all versions, FortiAnalyzer 7.2.0 through 7.2.2, 7.0.0 through 7.0.7, 6.4.0 through 6.4.11, 6.2 all versions, 6.0 all versions and FortiADC  7.1.0, 7.0.0 through 7.0.3, 6.2 all versions, 6.1 all versions, 6.0 all versions management interface may allow an authenticated attacker with at least READ permissions on system settings to execute arbitrary commands on the underlying shell due to an unsafe usage of the wordexp function.
[ "cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortiadc:7.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortianalyzer:7.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortianalyzer:7.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimanager:7.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimanager:7.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimanager:7.2.2:*:*:*:*:*:*:*" ]
null
7.4
null
null
null
GHSA-2fpj-qhmc-jpvc
A flaw was found in the 389 Directory Server. This flaw allows an unauthenticated user to cause a systematic server crash while sending a specific extended search request, leading to a denial of service.
[]
null
5.3
null
null
null
CVE-2022-45980
Tenda AX12 V22.03.01.21_CN was discovered to contain a Cross-Site Request Forgery (CSRF) via /goform/SysToolRestoreSet .
[ "cpe:2.3:o:tenda:ax12_firmware:22.03.01.21_cn:*:*:*:*:*:*:*", "cpe:2.3:h:tenda:ax12:-:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
RHSA-2025:3382
Red Hat Security Advisory: freetype security update
freetype: OOB write when attempting to parse font subglyph structures related to TrueType GX and variable font files
[ "cpe:/o:redhat:rhel_aus:8.4::baseos", "cpe:/o:redhat:rhel_e4s:8.4::baseos", "cpe:/o:redhat:rhel_tus:8.4::baseos" ]
null
8.1
null
null
null
GHSA-rjmh-xp82-95p2
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.32 and prior to 6.0.10. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).
[]
null
null
null
null
null
GHSA-868v-vrm3-qcvv
Integer overflow in the kernel in Apple iOS before 8.4.1 and OS X before 10.10.5 allows attackers to execute arbitrary code in a privileged context via a crafted app that makes unspecified IOKit API calls.
[]
null
null
null
null
null
GHSA-qmp2-78hm-526w
Mahara 20.10 is affected by Cross Site Request Forgery (CSRF) that allows a remote attacker to remove inbox-mail on the server. The application fails to validate the CSRF token for a POST request. An attacker can craft a module/multirecipientnotification/inbox.php pieform_delete_all_notifications request, which leads to removing all messages from a mailbox.
[]
null
null
null
null
null
RHSA-2025:3634
Red Hat Security Advisory: python3.11 security update
cpython: python: Uncontrolled CPU resource consumption when in http.cookies module
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ]
null
4.8
null
null
null
CVE-2024-56722
RDMA/hns: Fix cpu stuck caused by printings during reset
In the Linux kernel, the following vulnerability has been resolved: RDMA/hns: Fix cpu stuck caused by printings during reset During reset, cmd to destroy resources such as qp, cq, and mr may fail, and error logs will be printed. When a large number of resources are destroyed, there will be lots of printings, and it may lead to a cpu stuck. Delete some unnecessary printings and replace other printing functions in these paths with the ratelimited version.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
RHSA-2013:0187
Red Hat Security Advisory: JBoss Operations Network 3.1.2 update
GWT: unknown XSS flaw
[ "cpe:/a:redhat:jboss_operations_network:3.1.2" ]
null
null
null
null
null
CVE-2021-28134
Clipper before 1.0.5 allows remote command execution. A remote attacker may send a crafted IPC message to the exposed vulnerable ipcRenderer IPC interface, which invokes the dangerous openExternal API.
[ "cpe:2.3:a:clipper_project:clipper:*:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
CVE-2025-55795
The openml/openml.org web application version v2.0.20241110 uses incremental user IDs and insufficient email ownership verification during email update workflows. An authenticated attacker controlling a user account with a lower user ID can update their email address to that of another user with a higher user ID without proper verification. This results in the victim's email being reassigned to the attacker's account, causing the victim to be locked out immediately and unable to log in. The vulnerability leads to denial of service via account lockout but does not grant the attacker direct access to the victim's private data.
[]
null
3.5
null
null
null
GHSA-3j6m-r2w5-2j6r
The WooCommerce Clover Payment Gateway plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the callback_handler function in all versions up to, and including, 1.3.1. This makes it possible for unauthenticated attackers to mark orders as paid.
[]
null
5.3
null
null
null
CVE-2019-16900
Advantech WebAccess/HMI Designer 2.1.9.31 has a User Mode Write AV starting at MSVCR90!memcpy+0x000000000000015c.
[ "cpe:2.3:a:advantech:webaccess\\/hmi_designer:2.1.9.31:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
CVE-2024-7873
Stored XSS in Veribilim Software's Veribase Order Management
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting'), Improper Encoding or Escaping of Output, CWE - 83 Improper Neutralization of Script in Attributes in a Web Page vulnerability in Veribilim Software Veribase Order allows Stored XSS, Cross-Site Scripting (XSS), Exploit Script-Based APIs, XSS Through HTTP Headers.This issue affects Veribase Order: before v4.010.3.
[ "cpe:2.3:a:veribilim_software:veribase_order_management:*:*:*:*:*:*:*:*" ]
9.4
null
null
null
null
CVE-2021-31965
Microsoft SharePoint Server Information Disclosure Vulnerability
Microsoft SharePoint Server Information Disclosure Vulnerability
[ "cpe:2.3:a:microsoft:sharepoint_foundation:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*" ]
null
5.7
null
null
null
GHSA-mgx5-qmrg-fjwp
Crypto++ through 8.4 contains a timing side channel in ECDSA signature generation. Function FixedSizeAllocatorWithCleanup could write to memory outside of the allocation if the allocated memory was not 16-byte aligned. NOTE: this issue exists because the CVE-2019-14318 fix was intentionally removed for functionality reasons.
[]
null
7.5
null
null
null
CVE-2002-0516
SquirrelMail 1.2.5 and earlier allows authenticated SquirrelMail users to execute arbitrary commands by modifying the THEME variable in a cookie.
[ "cpe:2.3:a:squirrelmail:squirrelmail:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:squirrelmail:squirrelmail:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:squirrelmail:squirrelmail:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:squirrelmail:squirrelmail:1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:squirrelmail:squirrelmail:1.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:squirrelmail:squirrelmail:1.2.5:*:*:*:*:*:*:*" ]
null
null
null
10
null
ICSA-23-075-04
Siemens SCALANCE W1750D Devices
A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection. The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the "name" (e.g. "CERTIFICATE"), any header data and the payload data. If the function succeeds then the "name_out", "header" and "data" arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack. The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected. These functions are also called indirectly by a number of other OpenSSL functions including PEM_X509_INFO_read_bio_ex() and SSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL internal uses of these functions are not vulnerable because the caller does not free the header argument if PEM_read_bio_ex() returns a failure code. These locations include the PEM_read_bio_TYPE() functions as well as the decoders introduced in OpenSSL 3.0. The OpenSSL asn1parse command line application is also impacted by this issue. The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions, for example if a CMS recipient public key is invalid, the new filter BIO is freed and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then goes on to call BIO_pop() on the BIO then a use-after-free will occur. This will most likely result in a crash. This scenario occurs directly in the internal function B64_write_ASN1() which may cause BIO_new_NDEF() to be called and will subsequently call BIO_pop() on the BIO. This internal function is in turn called by the public API functions PEM_write_bio_ASN1_stream, PEM_write_bio_CMS_stream, PEM_write_bio_PKCS7_stream, SMIME_write_ASN1, SMIME_write_CMS and SMIME_write_PKCS7. Other public API functions that may be impacted by this include i2d_ASN1_bio_stream, BIO_new_CMS, BIO_new_PKCS7, i2d_CMS_bio_stream and i2d_PKCS7_bio_stream. The OpenSSL cms and smime command line applications are similarly affected. There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.
[]
null
7.4
null
null
null