id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
listlengths
0
5.42k
CVE-2024-12877
GiveWP – Donation Plugin and Fundraising Platform <= 3.19.2 - Unauthenticated PHP Object Injection
The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.19.2 via deserialization of untrusted input from the donation form like 'firstName'. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to delete arbitrary files on the server that makes remote code execution possible. Please note this was only partially patched in 3.19.3, a fully sufficient patch was not released until 3.19.4. However, another CVE was assigned by another CNA for version 3.19.3 so we will leave this as affecting 3.19.2 and before. We have recommended the vendor use JSON encoding to prevent any further deserialization vulnerabilities from being present.
[]
GHSA-wfjh-r5w7-m7m6
git-daemon in git 1.4.4.5 through 1.6.3 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a request containing extra unrecognized arguments.
[]
GHSA-82q2-xf4j-jj8g
Directory traversal vulnerability in image.php in Clear Content 1.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the url parameter. NOTE: the researcher also suggests an analogous PHP remote file inclusion vulnerability, but this may be incorrect.
[]
GHSA-2qc3-c6vw-rhw6
ypbind in Compaq Tru64 4.0F, 4.0G, 5.0A, 5.1 and 5.1A allows remote attackers to cause the process to core dump via certain network packets generated by nmap.
[]
GHSA-xgmj-5fg9-4g8f
IBM ApplinX 11.1 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
[]
GHSA-fh66-q9w2-q7pm
QuickTime in Apple OS X before 10.11.6 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted image.
[]
GHSA-pjxp-46hf-q784
The SysAdminWebTool servlets in SAP Mobile Platform allow remote attackers to bypass authentication and obtain sensitive information, gain privileges, or have unspecified other impact via unknown vectors, aka SAP Security Note 2227855.
[]
GHSA-v7xh-h48c-xw5f
CSRF vulnerability and in Jenkins OWASP Dependency-Track Plugin allow capturing credentials
Jenkins OWASP Dependency-Track Plugin 3.1.0 and earlier does not perform permission checks in several HTTP endpoints.This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing \"Secret text\" credentials stored in Jenkins. If no credentials ID is specified, the globally configured credential is used, if set up, and can likewise be captured.Additionally, these HTTP endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.Jenkins OWASP Dependency-Track Plugin 3.1.1 requires POST requests and appropriate permissions for the affected HTTP endpoints.
[]
GHSA-mhp5-2jm9-qw86
A vulnerability classified as critical has been found in Cardo Systems Scala Rider Q3. Affected is the file /cardo/api of the Cardo-Updater. Unauthenticated remote code execution with root permissions is possible. Firewalling or disabling the service is recommended.
[]
CVE-2022-31053
Signature forgery in Biscuit
Biscuit is an authentication and authorization token for microservices architectures. The Biscuit specification version 1 contains a vulnerable algorithm that allows malicious actors to forge valid Γ-signatures. Such an attack would allow an attacker to create a token with any access level. The version 2 of the specification mandates a different algorithm than gamma signatures and as such is not affected by this vulnerability. The Biscuit implementations in Rust, Haskell, Go, Java and Javascript all have published versions following the v2 specification. There are no known workarounds for this issue.
[ "cpe:2.3:a:biscuitsec:biscuit-auth:*:*:*:*:*:rust:*:*", "cpe:2.3:a:biscuitsec:biscuit-go:*:*:*:*:*:*:*:*", "cpe:2.3:a:biscuitsec:biscuit-haskell:0.1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:clever-cloud:biscuit-java:*:*:*:*:*:*:*:*" ]
CVE-2002-2163
KvPoll 1.1 allows remote authenticated users to vote more than once by setting the "already_voted" cookie by various methods, including a direct call to clear_cookies.php.
[ "cpe:2.3:a:killervault:kvpoll:1.1:*:*:*:*:*:*:*" ]
CVE-2019-9802
If a Sandbox content process is compromised, it can initiate an FTP download which will then use a child process to render the downloaded data. The downloaded data can then be passed to the Chrome process with an arbitrary file length supplied by an attacker, bypassing sandbox protections and allow for a potential memory read of adjacent data from the privileged Chrome process, which may include sensitive data. This vulnerability affects Firefox < 66.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" ]
GHSA-p57w-9q28-j6v7
phpMyFAQ CSRF
phpMyFAQ before 2.9.11 allows CSRF.
[]
GHSA-h5cj-8pph-fhj9
Directory traversal vulnerability in SZEWO PhpCommander 3.0 and earlier allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the Directory parameter, as demonstrated by parameter values naming Apache HTTP Server log files that apparently contain PHP code.
[]
CVE-2024-35696
WordPress WP Docs plugin <= 2.1.3 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Fahad Mahmood WP Docs allows Reflected XSS.This issue affects WP Docs: from n/a through 2.1.3.
[ "cpe:2.3:a:androidbubble:wp_docs:*:*:*:*:*:wordpress:*:*" ]
GHSA-r2j5-33x7-643h
PDF-XChange Editor EMF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of EMF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-22133.
[]
GHSA-23pf-68h2-4x9r
Foxit PDF Editor Polygon Annotation Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14366.
[]
GHSA-phjj-9p2g-26h9
The researcher is showing that due to the way the SNMP trap log is parsed, an attacker can craft an SNMP trap with additional lines of information and have forged data show in the Zabbix UI. This attack requires SNMP auth to be off and/or the attacker to know the community/auth details. The attack requires an SNMP item to be configured as text on the target host.
[]
CVE-2018-12922
Emerson Liebert IntelliSlot Web Card devices allow remote attackers to reconfigure access control via the config/configUser.htm or config/configTelnet.htm URI.
[ "cpe:2.3:o:vertiv:liebert_intellislot_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:vertiv:liebert_intellislot:-:*:*:*:*:*:*:*" ]
GHSA-wgg2-9vvc-4wxr
DLL injection vulnerability in software installer for Intel Data Center Migration Center Software v3.1 and before may allow an authenticated user to potentially execute code using default directory permissions via local access.
[]
GHSA-jfgx-mmm9-m5v9
Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability.
[]
CVE-2025-7357
Plaintext Storage of a Password in LITEON IC48A and IC80A EV Chargers
LITEON IC48A firmware versions prior to 01.00.19r and LITEON IC80A firmware versions prior to 01.01.12e store FTP-server-access-credentials in cleartext in their system logs.
[]
GHSA-fx2m-qwmj-5p23
A vulnerability, which was classified as problematic, has been found in boyiddha Automated-Mess-Management-System 1.0. Affected by this issue is some unknown functionality of the file /member/member_edit.php. The manipulation of the argument name leads to cross site scripting. The attack may be launched remotely. The identifier of this vulnerability is VDB-256052. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[]
CVE-2018-4927
Adobe InDesign versions 13.0 and below have an exploitable Untrusted Search Path vulnerability. Successful exploitation could lead to local privilege escalation.
[ "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
GHSA-pv45-3557-fx76
A cross-site scripting (XSS) vulnerability in the WSC plugin through 5.5.7.5 for CKEditor 4 allows remote attackers to run arbitrary web script inside an IFRAME element by injecting a crafted HTML element into the editor.
[]
CVE-2023-3977
Several plugins for WordPress by Inisev are vulnerable to Cross-Site Request Forgery to unauthorized installation of plugins due to a missing nonce check on the handle_installation function that is called via the inisev_installation AJAX aciton in various versions. This makes it possible for unauthenticated attackers to install plugins from the limited list via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[ "cpe:2.3:a:backupbliss:backup_migration:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:backupbliss:clone:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:copy-delete-posts:duplicate_post:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:inisev:redirection:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:inisev:rss_redirect_\\&_feedburner_alternative:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:inisev:ssl_mixed_content_fix:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:mypopups:pop-up:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:themecheck:enhanced_text_widget:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:themecheck:ultimate_posts_widget:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:ultimatelysocial:social_media_share_buttons_\\&_social_sharing_icons:*:*:*:*:*:wordpress:*:*" ]
GHSA-gpx4-x6pm-ch4q
Talkd, when given corrupt DNS information, can be used to execute arbitrary commands with root privileges.
[]
CVE-2006-1223
Cross-site scripting (XSS) vulnerability in Jupiter Content Manager 1.1.5 and earlier allows remote attackers to inject arbitrary web script or HTML via a Javascript URI in the image BBcode tag.
[ "cpe:2.3:a:jupiter_cms:jupiter_cms:*:*:*:*:*:*:*:*", "cpe:2.3:a:jupiter_cms:jupiter_cms:1.1.4:*:*:*:*:*:*:*" ]
GHSA-w9pr-cvj2-cxfc
Stored Cross-Site Scripting (XSS) vulnerability discovered in JATOS v3.9.3. The vulnerability exists in the description component of the study section, where an attacker can inject JavaScript into the description field. This allows for the execution of malicious scripts when an admin views the description, potentially leading to account takeover and unauthorized actions.
[]
GHSA-rg45-pxx7-cqf5
Microsoft OLE DB Provider for SQL Server Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-34733, CVE-2022-35834, CVE-2022-35835, CVE-2022-35836, CVE-2022-35840.
[]
CVE-2021-37517
An Access Control vulnerability exists in Dolibarr ERP/CRM 13.0.2, fixed version is 14.0.0,in the forgot-password function becuase the application allows email addresses as usernames, which can cause a Denial of Service.
[ "cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:13.0.2:*:*:*:*:*:*:*" ]
GHSA-4mwg-m642-8w52
The Qualcomm Wi-Fi driver in Android before 2016-06-01 on Nexus 7 (2013) devices allows attackers to gain privileges via a crafted application, aka internal bug 27776888.
[]
GHSA-mg6v-4575-j2gc
Vulnerability in the Oracle Applications Framework product of Oracle E-Business Suite (component: Attachments, File Upload). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Applications Framework. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Applications Framework, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Applications Framework accessible data as well as unauthorized read access to a subset of Oracle Applications Framework accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).
[]
GHSA-hc7f-gvfc-9wwx
The PAM implementation in /bin/login of the util-linux package before 2.11 causes a password entry to be rewritten across multiple PAM calls, which could provide the credentials of one user to a different user, when used in certain PAM modules such as pam_limits.
[]
GHSA-p76f-wr22-4rv6
CakePHP vulnerable to Remote File Inclusion through View template name manipulation
CakePHP 2.x prior to 2.0.99, 2.1.99, 2.2.99, 2.3.99, 2.4.99, 2.5.99, 2.6.12, and 2.7.6 and 3.x prior to 3.0.15 and 3.1.4 is vulnerable to Remote File Inclusion through View template name manipulation.
[]
CVE-2022-1032
Insecure deserialization of not validated module file in crater-invoice/crater
Insecure deserialization of not validated module file in GitHub repository crater-invoice/crater prior to 6.0.6.
[ "cpe:2.3:a:craterapp:crater:*:*:*:*:*:*:*:*" ]
CVE-2013-7095
The XML parser (crm_flex_data) in SAP Customer Relationship Management (CRM) 7.02 EHP 2 has unknown impact and attack vectors related to an XML External Entity (XXE) issue.
[ "cpe:2.3:a:sap:customer_relationship_management:7.02:ehp2:*:*:*:*:*:*" ]
CVE-2024-25390
A heap buffer overflow occurs in finsh/msh_file.c and finsh/msh.c in RT-Thread through 5.0.2.
[ "cpe:2.3:a:rt-thread:rt-thread:*:*:*:*:*:*:*:*" ]
CVE-2018-1465
IBM SAN Volume Controller, IBM Storwize, IBM Spectrum Virtualize and IBM FlashSystem products ( 6.1, 6.2, 6.3, 6.4, 7.1, 7.2, 7.3, 7.4, 7.5, 7.6, 7.6.1, 7.7, 7.7.1, 7.8, 7.8.1, 8.1, and 8.1.1) could allow an authenticated user to obtain the private key which could make intercepting GUI communications possible. IBM X-Force ID: 140396.
[ "cpe:2.3:o:ibm:storwize_v7000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:storwize_v7000:-:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:storwize_v5000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:storwize_v5000:-:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:storwize_v3700_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:storwize_v3700:-:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:storwize_v3500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:storwize_v3500:-:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:storwize_v9000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:storwize_v9000:-:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:san_volume_controller_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ibm:san_volume_controller:-:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:spectrum_virtualize:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:spectrum_virtualize_for_public_cloud:*:*:*:*:*:*:*:*" ]
CVE-2020-1624
Junos OS Evolved: objmon logs may leak sensitive information
A local, authenticated user with shell can obtain the hashed values of login passwords and shared secrets via raw objmon configuration files. This issue affects all versions of Junos OS Evolved prior to 19.1R1.
[ "cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*" ]
GHSA-fv82-r8qv-ch4v
pomerium_signature is not verified in middleware in github.com/pomerium/pomerium
ImpactSome API endpoints under /.pomerium/ do not verify parameters with pomerium_signature. This could allow modifying parameters intended to be trusted to Pomerium.The issue mainly affects routes responsible for sign in/out, but does not introduce an authentication bypass.Specific Go Packages Affectedgithub.com/pomerium/pomerium/authenticatePatchesPatched in v0.13.4For more informationIf you have any questions or comments about this advisoryOpen an issue in [pomerium](http://github.com/pomerium/pomerium)Email us at [[email protected]](mailto:[email protected])
[]
GHSA-fmvr-jxcg-m87c
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile and Snapdragon Wear MDM9206, MDM9607, MDM9635M, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 615/16/SD 415, SD 617, SD 800, SD 808, and SD 810, in HHO scenarios, during the ACQ procedure, there are possible instances where the search database is incorrectly updated resulting in memory corruption due to buffer overflow.
[]
CVE-2025-21519
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
[ "cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*" ]
CVE-2017-14933
read_formatted_entries in dwarf2.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (infinite loop) via a crafted ELF file.
[ "cpe:2.3:a:gnu:binutils:2.29:*:*:*:*:*:*:*" ]
GHSA-vq6x-89qw-7665
oFono CUSD Stack-based Buffer Overflow Code Execution Vulnerability. This vulnerability allows local attackers to execute arbitrary code on affected installations of oFono. An attacker must first obtain the ability to execute code on the target modem in order to exploit this vulnerability.The specific flaw exists within the parsing of responses from AT+CUSD commands. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-23195.
[]
CVE-2023-37539
HCL Domino Catalog template is susceptible to a Stored Cross-Site Scripting (XSS) vulnerability
The Domino Catalog template is susceptible to a Stored Cross-Site Scripting (XSS) vulnerability. An attacker with the ability to edit documents in the catalog application/database created from this template can embed a cross site scripting attack. The attack would be activated by an end user clicking it.
[ "cpe:2.3:a:hcltech:domino:11.0:*:*:*:*:*:*:*", "cpe:2.3:a:hcltech:domino:12.0:*:*:*:*:*:*:*", "cpe:2.3:a:hcltech:domino:14.0:*:*:*:*:*:*:*" ]
GHSA-g2cf-r83x-vvf5
The Gutenberg plugin through 13.7.3 for WordPress allows stored XSS by the Contributor role via an SVG document to the "Insert from URL" feature. NOTE: the XSS payload does not execute in the context of the WordPress instance's domain; however, analogous attempts by low-privileged users to reference SVG documents are blocked by some similar products, and this behavioral difference might have security relevance to some WordPress site administrators.
[]
GHSA-q69m-6hqq-2968
A vulnerability in the REST API interface of Cisco Vision Dynamic Signage Director could allow an unauthenticated, remote attacker to bypass authentication on an affected system. The vulnerability is due to insufficient validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected system. A successful exploit could allow the attacker to execute arbitrary actions through the REST API with administrative privileges on the affected system. The REST API is enabled by default and cannot be disabled.
[]
GHSA-xg3m-8gjx-5q73
SQL injection vulnerability in browse.asp in A+ Store E-Commerce allows remote attackers to execute arbitrary SQL commands via the ParentID parameter.
[]
GHSA-525m-xhw8-m6pr
SQL injection vulnerability in index.php in WebSPELL 4.01.01 and earlier allows remote attackers to execute arbitrary SQL commands via the getsquad parameter, a different vector than CVE-2006-4783.
[]
CVE-2025-1083
Mindskip xzs-mysql 学之思开源考试系统 CORS cross-domain policy
A vulnerability classified as problematic was found in Mindskip xzs-mysql 学之思开源考试系统 3.9.0. Affected by this vulnerability is an unknown functionality of the component CORS Handler. The manipulation leads to permissive cross-domain policy with untrusted domains. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
CVE-2023-28636
GLPI vulnerable to stored Cross-site Scripting in external links
GLPI is a free asset and IT management software package. Starting in version 0.60 and prior to versions 9.5.13 and 10.0.7, a vulnerability allows an administrator to create a malicious external link. This issue is fixed in versions 9.5.13 and 10.0.7.
[ "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*" ]
CVE-2020-5797
UNIX Symbolic Link (Symlink) Following in TP-Link Archer C9(US)_V1_180125 firmware allows an unauthenticated actor, with physical access and network access, to read sensitive files and write to a limited set of files after plugging a crafted USB drive into the router.
[ "cpe:2.3:o:tp-link:archer_c9_firmware:180125:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:archer_c9:v1:*:*:*:*:*:*:*" ]
CVE-2023-47189
WordPress Defender Security plugin <= 4.2.0 - Masked Login Area View Bypass vulnerability
Improper Authentication vulnerability in WPMU DEV Defender Security allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Defender Security: from n/a through 4.2.0.
[ "cpe:2.3:a:wpmudev:defender_security:*:*:*:*:*:wordpress:*:*" ]
CVE-2024-42318
landlock: Don't lose track of restrictions on cred_transfer
In the Linux kernel, the following vulnerability has been resolved: landlock: Don't lose track of restrictions on cred_transfer When a process' cred struct is replaced, this _almost_ always invokes the cred_prepare LSM hook; but in one special case (when KEYCTL_SESSION_TO_PARENT updates the parent's credentials), the cred_transfer LSM hook is used instead. Landlock only implements the cred_prepare hook, not cred_transfer, so KEYCTL_SESSION_TO_PARENT causes all information on Landlock restrictions to be lost. This basically means that a process with the ability to use the fork() and keyctl() syscalls can get rid of all Landlock restrictions on itself. Fix it by adding a cred_transfer hook that does the same thing as the existing cred_prepare hook. (Implemented by having hook_cred_prepare() call hook_cred_transfer() so that the two functions are less likely to accidentally diverge in the future.)
[]
CVE-2004-0960
FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (core dump) via malformed USR vendor-specific attributes (VSA) that cause a memcpy operation with a -1 argument.
[ "cpe:2.3:a:freeradius:freeradius:0.2:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:0.3:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:0.4:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:0.5:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:0.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:0.9:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:0.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:0.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:0.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:freeradius:freeradius:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*" ]
CVE-2023-4607
An authenticated XCC user can change permissions for any user through a crafted API command.
[ "cpe:2.3:o:lenovo:thinkagile_hx5530_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx5530:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx7530_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx7530:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx3331_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx3331:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx1331_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx1331:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx2330_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx2330:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx2331_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx2331:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx3330_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx3330:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx3331_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx3331:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx3375_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx3375:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx3376_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx3376:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx5531_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx5531:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx7531_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx7531:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx3330-f_all-flash_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx3330-f_all-flash:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx3330-h_hybrid_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx3330-h_hybrid:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx3331-f_all-flash_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx3331-f_all-flash:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx3331-h_hybrid_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx3331-h_hybrid:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx3530_f_all_flash_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx3530_f_all_flash:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx3530-h_hybrid_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx3530-h_hybrid:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx3531_h_hybrid_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx3531_h_hybrid:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx3531-f_all-flash_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx3531-f_all-flash:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx2330_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx2330:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx3330_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx3330:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx3530-g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx3530-g:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx5530_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx5530:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx7330_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx7330:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx7530_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx7530:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx7531_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx7531:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sd630_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sd630_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sd650_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sd650_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sd650_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sd650-n_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sd650-n_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sd665_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sn550_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sn550_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr250_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr250_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr258_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr258_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr630_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr630_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr630_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr635_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr645_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr645:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr645_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr645_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr650_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr650_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr650_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr655_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr665_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr665:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr665_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr670_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr670:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr670_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr670_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr675_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr850_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr850_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr850_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr860_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr860_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr860_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_st250_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_st250_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_st258_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_st258_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_st650_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_st650_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_st650_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_st658_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_st658_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_st658_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx_enclosure_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx_enclosure:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx1021_edg_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx1021_edg:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx1320_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx1320:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx1321_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx1321:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx1520-r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx1520-r:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx1521-r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx1521-r:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx2320-e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx2320-e:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx2321_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx2321:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx2720-e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx2720-e:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx3320_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx3320:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx3321_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx3321:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx3520-g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx3520-g:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx3521-g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx3521-g:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx3720_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx3720:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx3721_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx3721:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx5520_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx5520:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx5520-c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx5520-c:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx5521_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx5521:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx5521-c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx5521-c:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx7520_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx7520:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx7521_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx7521:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx7820_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx7820:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_hx7821_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_hx7821:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx_edge-_mx1020__firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx_edge-_mx1020_:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx630_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx630_v3_intergrated_system_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx650_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx650_v3_intergrated_system_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_mx1021_on_se350_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_mx1021_on_se350:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx_1se_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx_1se:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx_2u4n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx_2u4n:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx_4u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx_4u:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx1320_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx1320:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx2320_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx2320:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx3320_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx3320:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx3520-g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx3520-g:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx3720_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx3720:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx5520_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx5520:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx7320_n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx7320_n:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx7520_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx7520:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx7520_n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx7520_n:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkagile_vx7820_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkagile_vx7820:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkedge_se450__firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkedge_se450:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sd530_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sd530:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sd650_dwc_dual_node_tray_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sd650_dwc_dual_node_tray:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sd650_dual_node_tray_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sd650_dual_node_tray:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_se350_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_se350:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sn550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sn550:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sn850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sn850:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr150:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr158_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr158:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr250:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr258_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr258:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr530_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr530:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr550:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr570_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr570:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr590_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkserver_sr590:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr630_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr630:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr650:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr850:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr850p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr850p:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr860_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr860:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_sr950_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_sr950:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_st250_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_st250:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_st258_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_st258:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinksystem_st550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinksystem_st550:-:*:*:*:*:*:*:*" ]
CVE-2019-1789
ClamAV Denial of Service Vulnerability
ClamAV versions prior to 0.101.2 are susceptible to a denial of service (DoS) vulnerability. An out-of-bounds heap read condition may occur when scanning PE files. An example is Windows EXE and DLL files that have been packed using Aspack as a result of inadequate bound-checking.
[ "cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*" ]
GHSA-p9r9-hfgf-p769
Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[]
GHSA-wccp-g34r-cx74
An improper access control issue in GitLab CE/EE affecting all versions starting from 15.2 before 15.2.4, all versions from 15.3 before 15.3.2 allows disclosure of confidential information via the Incident timeline events.
[]
CVE-2014-2467
Unspecified vulnerability in the Oracle Agile PLM Framework component in Oracle Supply Chain Products Suite 9.3.3 allows remote authenticated users to affect integrity via unknown vectors related to Security, a different vulnerability than CVE-2014-2445.
[ "cpe:2.3:a:oracle:supply_chain_products_suite:9.3.3:*:*:*:*:*:*:*" ]
GHSA-g8r8-g7qx-p4c7
A SQL Injection vulnerability exists in the `u` parameter of the progress-body-weight.php endpoint of Dietiqa App v1.0.20.
[]
GHSA-gvgr-6rhc-c764
A local file inclusion vulnerability was discovered in the captcha function in Monstra 3.0.4 which allows remote attackers to execute arbitrary PHP code.
[]
GHSA-jj2v-p4vp-x632
imagemagick 6.8.9.6 has remote DOS via infinite loop
[]
CVE-2007-2830
The ath_beacon_config function in if_ath.c in MadWifi before 0.9.3.1 allows remote attackers to cause a denial of service (system crash) via crafted beacon interval information when scanning for access points, which triggers a divide-by-zero error.
[ "cpe:2.3:a:madwifi:madwifi:*:*:*:*:*:*:*:*", "cpe:2.3:a:madwifi:madwifi:0.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:madwifi:madwifi:0.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:madwifi:madwifi:0.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:madwifi:madwifi:0.9.2.1:*:*:*:*:*:*:*" ]
CVE-2006-6103
Integer overflow in the ProcDbeSwapBuffers function in the DBE extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of unspecified data structures.
[ "cpe:2.3:a:x.org:x.org:6.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:x.org:x.org:6.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:x.org:x.org:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:x.org:x.org:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:xfree86_project:xfree86:*:*:*:*:*:*:*:*" ]
CVE-2011-4903
Cross-site Scripting (XSS) in TYPO3 before 4.3.12, 4.4.x before 4.4.9, and 4.5.x before 4.5.4 allows remote attackers to inject arbitrary web script or HTML via the RemoveXSS function.
[ "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*" ]
GHSA-9xvq-h57c-67hq
SQL injection vulnerability in index.php in X7 Chat 2.0.5 and possibly earlier allows remote attackers to execute arbitrary SQL commands via the day parameter in a sm_window action.
[]
GHSA-rh8m-jh32-vpcr
Cross-site Scripting (XSS) - Stored in GitHub repository alfio-event/alf.io prior to Alf.io 2.0-M4-2301.
[]
CVE-2025-7089
Belkin F9K1122 webs formWanTcpipSetup stack-based overflow
A vulnerability was found in Belkin F9K1122 1.00.33 and classified as critical. This issue affects the function formWanTcpipSetup of the file /goform/formWanTcpipSetup of the component webs. The manipulation of the argument pppUserName leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
CVE-2025-21440
Out-of-bounds Read in Windows WLAN Host
Memory corruption when IOCTL call is invoked from user-space to write board data to WLAN driver.
[]
CVE-2015-4544
EMC Documentum Content Server before 7.1P20 and 7.2.x before 7.2P04 does not properly verify authorization for dm_job object access, which allows remote authenticated users to obtain superuser privileges via crafted object operations. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-4626.
[ "cpe:2.3:a:emc:documentum_content_server:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:emc:documentum_content_server:7.2:*:*:*:*:*:*:*" ]
GHSA-2rp8-hff9-c5wr
PaddlePaddle Path Traversal vulnerability
Arbitrary File Overwrite Via Path Traversal in paddlepaddle/paddle before 2.6
[]
CVE-2021-3837
Improper Authorization in openwhyd/openwhyd
openwhyd is vulnerable to Improper Authorization
[ "cpe:2.3:a:openwhyd:openwhyd:*:*:*:*:*:*:*:*" ]
CVE-2024-36339
A DLL hijacking vulnerability in the AMD Optimizing CPU Libraries could allow an attacker to achieve privilege escalation, potentially resulting in arbitrary code execution.
[]
CVE-2019-2163
In libxaac there is a possible out of bounds read due to a missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-118138797
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*" ]
CVE-2022-44188
Netgear R7000P V1.3.0.8 is vulnerable to Buffer Overflow in /usr/sbin/httpd via parameter enable_band_steering.
[ "cpe:2.3:o:netgear:r7000p_firmware:1.3.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*" ]
GHSA-pgw9-5whm-4494
SQL injection vulnerability in webCal3_detail.asp in WebCal 3.04 allows remote attackers to execute arbitrary SQL commands via the event_id parameter.
[]
CVE-2024-1549
If a website set a large custom cursor, portions of the cursor could have overlapped with the permission dialog, potentially resulting in user confusion and unexpected granted permissions. This vulnerability affects Firefox < 123, Firefox ESR < 115.8, and Thunderbird < 115.8.
[]
GHSA-r8jw-rfx3-cj99
RITLabs The Bat! before 3.0.0.15 displays certain important headers from encapsulated data in message/partial MIME messages, instead of the real headers, which is in violation of RFC2046 header merging rules and allows remote attackers to spoof the origin of e-mail by sending a fragmented message, as demonstrated using spoofed Received: and Message-ID: headers.
[]
GHSA-322f-7555-6qf5
A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14.4. An app may be able to access a user's Photos Library.
[]
GHSA-3x69-95v2-m4qp
Cross-site scripting (XSS) vulnerability in WoltLab Community Framework (WCF) 1.0.6 in WoltLab Burning Board 3.0.5 allows remote attackers to inject arbitrary web script or HTML via the (1) page and (2) form parameters, which are not properly handled when they are reflected back in an error message.
[]
GHSA-chfx-pv5j-438m
Stack-based buffer overflow in the btFiles::BuildFromMI function (trunk/btfiles.cpp) in Enhanced CTorrent (aka dTorrent) 3.3.2 and probably earlier, and CTorrent 1.3.4, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Torrent file containing a long path.
[]
GHSA-2546-5j9r-qggh
The NTLM authentication feature in curl and libcurl before 7.57.0 on 32-bit platforms allows attackers to cause a denial of service (integer overflow and resultant buffer overflow, and application crash) or possibly have unspecified other impact via vectors involving long user and password fields.
[]
GHSA-p788-rj37-357w
Insecure Defaults Leads to Potential MITM in ezseed-transmission
Affected versions of `ezseed-transmission` download and run a script over an HTTP connection.An attacker in a privileged network position could launch a Man-in-the-Middle attack and intercept the script, replacing it with malicious code, completely compromising the system running `ezseed-transmission`.RecommendationUpdate to version 0.0.15 or later.
[]
GHSA-gq7h-9qq6-mccc
A flaw was found in the Xorg-x11-server. An out-of-bounds access issue can occur in the ProcXkbSetGeometry function due to improper validation of the request length.
[]
GHSA-2wcj-p2hm-6ff7
Stack-based buffer overflow in the server in IBM Tivoli Storage Manager FastBack 6.1 before 6.1.12.1 allows remote attackers to execute arbitrary code via a crafted packet, a different vulnerability than CVE-2015-4931, CVE-2015-4933, CVE-2015-4934, and CVE-2015-4935.
[]
CVE-2014-3474
Cross-site scripting (XSS) vulnerability in horizon/static/horizon/js/horizon.instances.js in the Launch Instance menu in OpenStack Dashboard (Horizon) before 2013.2.4, 2014.1 before 2014.1.2, and Juno before Juno-2 allows remote authenticated users to inject arbitrary web script or HTML via a network name.
[ "cpe:2.3:a:openstack:horizon:*:*:*:*:*:*:*:*", "cpe:2.3:a:openstack:horizon:juno-1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" ]
CVE-2024-7534
Heap buffer overflow in Layout in Google Chrome prior to 127.0.6533.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
CVE-2012-0588
Cross-site scripting (XSS) vulnerability in WebKit, as used in Apple iOS before 5.1, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2012-0586, CVE-2012-0587, and CVE-2012-0589.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" ]
CVE-2020-13596
An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. Query parameters generated by the Django admin ForeignKeyRawIdWidget were not properly URL encoded, leading to a possibility of an XSS attack.
[ "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "cpe:2.3:a:netapp:sra_plugin:-:*:*:*:*:linux:*:*", "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*" ]
GHSA-gh3f-64h2-9gjh
A vulnerability, which was classified as critical, has been found in code-projects Simple Admin Panel 1.0. This issue affects some unknown processing of the file catDeleteController.php. The manipulation of the argument record leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
CVE-2022-22828
An insecure direct object reference for the file-download URL in Synametrics SynaMan before 5.0 allows a remote attacker to access unshared files via a modified base64-encoded filename string.
[ "cpe:2.3:a:synametrics:synaman:*:*:*:*:*:*:*:*" ]
CVE-2023-5435
The Up down image slideshow gallery plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 12.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with subscriber-level and above permissions to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
[ "cpe:2.3:a:gopiplus:up_down_image_slideshow_gallery:*:*:*:*:*:wordpress:*:*" ]
CVE-2024-13372
WP Job Portal <= 2.2.6 - Insecure Direct Object Reference to Unauthenticated Arbitrary Resume Download
The WP Job Portal – A Complete Recruitment System for Company or Job Board website plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.2.6 via the getresumefiledownloadbyid() and getallresumefiles() functions due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to download users resumes without the appropriate authorization to do so.
[]
CVE-2024-53760
WordPress Capitalize My Title WordPress plugin <= 0.5.3 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Capitalize My Title allows Stored XSS.This issue affects Capitalize My Title: from n/a through 0.5.3.
[]
GHSA-3wjq-jhph-jc7q
A vulnerability, which was classified as problematic, was found in Trimble SPS851 488.01. This affects an unknown part of the component Ethernet Configuration Menu. The manipulation of the argument Hostname leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
CVE-2021-39355
Indeed Job Importer <= 1.0.5 Authenticated Stored Cross-Site Scripting
The Indeed Job Importer WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and sanitization via several parameters found in the ~/indeed-job-importer/trunk/indeed-job-importer.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 1.0.5. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.
[ "cpe:2.3:a:indeed-job-importer_project:indeed-job-importer:*:*:*:*:*:wordpress:*:*" ]
GHSA-h5v2-6q4x-m7v7
The default IPSec ifup script in Red Hat Enterprise Linux 3 through 5 configures racoon to use aggressive IKE mode instead of main IKE mode, which makes it easier for remote attackers to conduct brute force attacks by sniffing an unencrypted preshared key (PSK) hash.
[]
CVE-2020-0588
Improper conditions check in BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
[ "cpe:2.3:o:intel:bios:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_bronze_3206r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5218r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5220r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6208u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6226r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6230n:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6230r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6230t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6234:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6238r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6240r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6242r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6246r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6248r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6250:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6250l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6256:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6258r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_9221:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_9222:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4210r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4210t:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4214r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4215r:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*" ]