id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
listlengths
0
5.42k
CVE-2022-23198
Adobe Illustrator NULL Pointer Dereference Application denial-of-service
Adobe Illustrator versions 25.4.3 (and earlier) and 26.0.2 (and earlier) are affected by a Null pointer dereference vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
CVE-2007-6181
Heap-based buffer overflow in cygwin1.dll in Cygwin 1.5.7 and earlier allows context-dependent attackers to execute arbitrary code via a filename with a certain length, as demonstrated by a remote authenticated user who uses the SCP protocol to send a file to the Cygwin machine, and thereby causes scp.exe on this machine to execute, and then overwrite heap memory with characters from the filename. NOTE: it is also reported that a related issue might exist in 1.5.7 through 1.5.19.
[ "cpe:2.3:a:redhat:cygwin:*:*:*:*:*:*:*:*" ]
CVE-2024-32405
Cross Site Scripting vulnerability in inducer relate before v.2024.1 allows a remote attacker to escalate privileges via a crafted payload to the Answer field of InlineMultiQuestion parameter on Exam function.
[ "cpe:2.3:a:inducer:relate:2024.1:*:*:*:*:*:*:*" ]
CVE-2025-22703
WordPress Forge – Front-End Page Builder plugin <= 1.4.6 - CSRF to Stored Cross Site Scripting (XSS) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in manuelvicedo Forge – Front-End Page Builder allows Stored XSS. This issue affects Forge – Front-End Page Builder: from n/a through 1.4.6.
[]
GHSA-48vf-pq83-g67j
The SolarWinds Access Rights Manager was found to contain a hard-coded credential authentication bypass vulnerability. If exploited, this vulnerability allows access to the RabbitMQ management console.We thank Trend Micro Zero Day Initiative (ZDI) for its ongoing partnership in coordinating with SolarWinds on responsible disclosure of this and other potential vulnerabilities.
[]
GHSA-fq7j-84fx-gr99
A vulnerability was found in code-projects/anirbandutta9 Content Management System and News-Buzz 1.0. It has been classified as critical. Affected is an unknown function of the file /publicposts.php. The manipulation of the argument post leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[]
CVE-2017-3456
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily "exploitable" vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[ "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" ]
CVE-2010-2055
Ghostscript 8.71 and earlier reads initialization files from the current working directory, which allows local users to execute arbitrary PostScript commands via a Trojan horse file, related to improper support for the -P- option to the gs program, as demonstrated using gs_init.ps, a different vulnerability than CVE-2010-4820.
[ "cpe:2.3:a:artifex:afpl_ghostscript:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:afpl_ghostscript:6.01:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:afpl_ghostscript:6.50:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:afpl_ghostscript:7.00:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:afpl_ghostscript:7.03:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:afpl_ghostscript:7.04:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:afpl_ghostscript:8.00:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:afpl_ghostscript:8.11:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:afpl_ghostscript:8.12:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:afpl_ghostscript:8.13:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:afpl_ghostscript:8.14:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:afpl_ghostscript:8.50:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:afpl_ghostscript:8.51:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:afpl_ghostscript:8.52:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:afpl_ghostscript:8.53:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:afpl_ghostscript:8.54:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:ghostscript_fonts:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:ghostscript_fonts:8.11:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:gpl_ghostscript:*:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:gpl_ghostscript:8.01:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:gpl_ghostscript:8.15:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:gpl_ghostscript:8.50:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:gpl_ghostscript:8.51:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:gpl_ghostscript:8.54:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:gpl_ghostscript:8.56:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:gpl_ghostscript:8.57:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:gpl_ghostscript:8.60:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:gpl_ghostscript:8.61:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:gpl_ghostscript:8.62:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:gpl_ghostscript:8.63:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:gpl_ghostscript:8.64:*:*:*:*:*:*:*", "cpe:2.3:a:artifex:gpl_ghostscript:8.70:*:*:*:*:*:*:*" ]
GHSA-58qq-6frr-hh6q
Microsoft TCP/IP Printing Services, aka Print Services for Unix, allows an attacker to cause a denial of service via a malformed TCP/IP print request.
[]
GHSA-phcp-9c77-57q2
D-Link DIR816L_FW206b01 was discovered to contain a remote code execution (RCE) vulnerability via the value parameter at shareport.php.
[]
CVE-2021-2103
Vulnerability in the Oracle Complex Maintenance, Repair, and Overhaul product of Oracle Supply Chain (component: Dialog Box). Supported versions that are affected are 11.5.10, 12.1 and 12.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Complex Maintenance, Repair, and Overhaul. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Complex Maintenance, Repair, and Overhaul, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Complex Maintenance, Repair, and Overhaul accessible data as well as unauthorized update, insert or delete access to some of Oracle Complex Maintenance, Repair, and Overhaul accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
[ "cpe:2.3:a:oracle:complex_maintenance\\,_repair\\,_and_overhaul:12.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:complex_maintenance\\,_repair\\,_and_overhaul:12.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:complex_maintenance_repair_and_overhaul:11.5.10:*:*:*:*:*:*:*" ]
GHSA-p2hq-x27f-8mx5
Signiant Manager+Agents before 15.1 allows XML External Entity (XXE) attacks.
[]
GHSA-5r74-p252-mh8w
Functions/EWD_UFAQ_Import.php in the ultimate-faqs plugin through 1.8.24 for WordPress allows HTML content injection.
[]
GHSA-jj93-39pf-7mcf
bsock uses weak hashing algorithms
An issue was discovered in the bsock component of bcoin-org bcoin that allows remote attackers to obtain sensitive information via weak hashing algorithms in the component `\vendor\faye-websocket.js`.
[]
GHSA-r3pw-cm89-hq37
Buffer overflow in the zi_short function in zipinfo.c in Info-Zip UnZip 6.0 allows remote attackers to cause a denial of service (crash) via a large compression method value in the central directory file header.
[]
CVE-2017-7040
An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari before 10.1.2 is affected. iCloud before 6.2.2 on Windows is affected. iTunes before 12.6.2 on Windows is affected. tvOS before 10.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
[ "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" ]
CVE-2024-49391
Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Files (Windows) before build 9.0.0x24.
[ "cpe:2.3:a:acronis:cyber_files:*:*:*:*:*:*:*:*", "cpe:2.3:a:acronis:cyber_files:*:*:*:*:*:windows:*:*" ]
CVE-2019-13346
In MyT 1.5.1, the User[username] parameter has XSS.
[ "cpe:2.3:a:myt_project:myt:1.5.1:*:*:*:*:*:*:*" ]
CVE-2022-30965
Jenkins Promoted Builds (Simple) Plugin 1.9 and earlier does not escape the name and description of Promotion Level parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
[ "cpe:2.3:a:jenkins:promoted_builds:*:*:*:*:*:jenkins:*:*" ]
GHSA-cj47-qj6g-x7r4
vLLM allows Remote Code Execution by Pickle Deserialization via AsyncEngineRPCServer() RPC server entrypoints
vllm-project vllm version 0.6.0 contains a vulnerability in the AsyncEngineRPCServer() RPC server entrypoints. The core functionality run_server_loop() calls the function _make_handler_coro(), which directly uses cloudpickle.loads() on received messages without any sanitization. This can result in remote code execution by deserializing malicious pickle data.
[]
CVE-2024-50086
ksmbd: fix user-after-free from session log off
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix user-after-free from session log off There is racy issue between smb2 session log off and smb2 session setup. It will cause user-after-free from session log off. This add session_lock when setting SMB2_SESSION_EXPIRED and referece count to session struct not to free session while it is being used.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*" ]
CVE-2018-3571
In the KGSL driver in all Android releases from CAF (Android for MSM, Firefox OS for MSM, QRD Android) using the Linux Kernel, a Use After Free condition can occur when printing information about sparse memory allocations
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
GHSA-89ch-hqf9-rgp3
Using JS libraries with known security vulnerabilities
An insecure component vulnerability exists in Magento 2.1 prior to 2.1.19, Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3. Magento 2 codebase leveraged outdated versions of JS libraries (Bootstrap, jquery, Knockout) with known security vulnerabilities.
[]
GHSA-9rfp-vf6g-gxv7
NETGEAR R7800 devices before 1.0.2.30 are affected by incorrect configuration of security settings.
[]
CVE-2019-12967
Stephan Mooltipass Moolticute through 0.42.1 (and possibly earlier versions) has Incorrect Access Control.
[ "cpe:2.3:a:themooltipass:moolticute:*:*:*:*:*:*:*:*" ]
CVE-2016-3168
The System module in Drupal 6.x before 6.38 and 7.x before 7.43 might allow remote attackers to hijack the authentication of site administrators for requests that download and run files with arbitrary JSON-encoded content, aka a "reflected file download vulnerability."
[ "cpe:2.3:a:drupal:drupal:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.0:dev:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.2:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.3:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.4:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.5:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.6:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.7:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.8:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.9:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.10:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.11:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.12:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.13:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.14:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.15:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.16:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.17:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.18:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.19:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.20:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.21:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.22:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.23:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.24:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.25:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.26:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.27:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.28:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.29:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.30:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.31:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.32:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.33:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.34:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.35:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.36:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.37:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:alpha1:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:alpha2:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:alpha3:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:alpha4:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:alpha5:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:alpha6:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:alpha7:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:dev:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.2:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.3:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.4:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.5:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.6:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.7:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.8:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.9:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.10:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.11:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.12:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.13:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.14:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.15:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.16:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.17:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.18:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.19:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.20:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.21:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.22:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.23:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.24:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.25:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.26:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.27:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.28:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.29:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.30:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.31:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.32:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.33:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.34:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.35:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.36:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.37:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.38:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.40:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.41:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.42:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:7.x-dev:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ]
CVE-2024-37014
Langflow through 0.6.19 allows remote code execution if untrusted users are able to reach the "POST /api/v1/custom_component" endpoint and provide a Python script.
[ "cpe:2.3:a:langflow:langflow:0.6.19:*:*:*:*:*:*:*", "cpe:2.3:a:langflow:langflow:*:*:*:*:*:*:*:*" ]
GHSA-8753-xfxj-9r3f
The installation of Sun ONE Application Server 7.0 for Windows 2000/XP creates a statefile with world-readable permissions, which allows local users to gain privileges by reading a plaintext password in the statefile.
[]
GHSA-3jh2-wmv7-m932
LibreNMS stored Cross-site Scripting via Schedule Maintenance `Title` parameter
LibreNMS versions 22.8.0 and prior allow attackers to execute arbitrary JavaScript code via the Schedule Maintenance `Title` parameter. A patch is available and anticipated to be part of version 22.9.0.
[]
GHSA-2mg4-7347-xp3j
** DISPUTED ** 3Com TippingPoint IPS allows remote attackers to cause a denial of service (device hang) via a flood of packets on TCP port 80 with sequentially increasing source ports, related to a "badly written loop." NOTE: the vendor disputes this issue, stating that the product has "performed as expected with no DoS emerging."
[]
GHSA-hm2q-8f77-qrwh
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mat Bao Corp WP Helper Premium allows Reflected XSS.This issue affects WP Helper Premium: from n/a before 4.6.0.
[]
CVE-2021-20654
Wekan, open source kanban board system, between version 3.12 and 4.11, is vulnerable to multiple stored cross-site scripting. This is named 'Fieldbleed' in the vendor's site.
[ "cpe:2.3:a:wekan_project:wekan:*:*:*:*:*:*:*:*" ]
GHSA-9x38-4g8c-26wp
fs/namei.c in the Linux kernel before 5.5 has a may_create_in_sticky use-after-free, which allows local users to cause a denial of service (OOPS) or possibly obtain sensitive information from kernel memory, aka CID-d0cb50185ae9. One attack vector may be an open system call for a UNIX domain socket, if the socket is being moved to a new parent directory and its old parent directory is being removed.
[]
GHSA-2qrc-6h62-cx95
Use-after-free vulnerability in Microsoft Common Controls in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows user-assisted remote attackers to execute arbitrary code via a crafted web site that is accessed with the F12 Developer Tools feature of Internet Explorer, aka "Microsoft Common Control Use After Free Vulnerability."
[]
GHSA-rm3r-668f-r32m
SAP BusinessObjects Business Intelligence Platform allows an attacker to inject JavaScript code in Web Intelligence reports. This code is then executed in the victim's browser each time the vulnerable page is visited by the victim. On successful exploitation, an attacker could cause limited impact on confidentiality and integrity within the scope of victim�s browser. There is no impact on availability. This vulnerability occurs only when script/html execution is enabled by the administrator in Central Management Console.
[]
CVE-2023-21876
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[ "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*" ]
CVE-2002-0641
Buffer overflow in bulk insert procedure of Microsoft SQL Server 2000, including Microsoft SQL Server Desktop Engine (MSDE) 2000, allows attackers with database administration privileges to execute arbitrary code via a long filename in the BULK INSERT query.
[ "cpe:2.3:a:microsoft:msde:2000:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:2000:*:*:*:*:*:*:*" ]
GHSA-9hvj-g625-9gj6
The Triangle Microworks IEC 61850 Library (Any client or server using the C language library with a version number of 11.2.0 or earlier and any client or server using the C++, C#, or Java language library with a version number of 5.0.1 or earlier) and 60870-6 (ICCP/TASE.2) Library (Any client or server using a C++ language library with a version number of 4.4.3 or earlier) are vulnerable to access given to a small number of uninitialized pointers within their code. This could allow an attacker to target any client or server using the affected libraries to cause a denial-of-service condition.
[]
CVE-2013-4339
WordPress before 3.6.1 does not properly validate URLs before use in an HTTP redirect, which allows remote attackers to bypass intended redirection restrictions via a crafted string.
[ "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*" ]
GHSA-3hpx-jj37-q8qv
Cross-Site Request Forgery (CSRF) leading to Stored Cross-Site Scripting (XSS) in Mufeng's Hermit ????? plugin <= 3.1.6 on WordPress via &title parameter.
[]
CVE-2016-10737
Serendipity 2.0.4 has XSS via the serendipity_admin.php serendipity[body] parameter.
[ "cpe:2.3:a:s9y:serendipity:2.0.4:*:*:*:*:*:*:*" ]
GHSA-wm44-p65f-f77f
gdrae in gdrae 0.1 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/gdrae/palabra temporary file.
[]
GHSA-c2jg-hw38-jrqq
Inconsistent Interpretation of HTTP Requests in twisted.web
The Twisted Web HTTP 1.1 server, located in the `twisted.web.http` module, parsed several HTTP request constructs more leniently than permitted by RFC 7230:The Content-Length header value could have a `+` or `-` prefix.Illegal characters were permitted in chunked extensions, such as the LF (`\n`) character.Chunk lengths, which are expressed in hexadecimal format, could have a prefix of `0x`.HTTP headers were stripped of all leading and trailing ASCII whitespace, rather than only space and HTAB (`\t`).This non-conformant parsing can lead to desync if requests pass through multiple HTTP parsers, potentially resulting in HTTP request smuggling.ImpactYou may be affected if:You use Twisted Web's HTTP 1.1 server and/or proxyYou also pass requests through a different HTTP server and/or proxyThe specifics of the other HTTP parser matter. The original report notes that some versions of Apache Traffic Server and HAProxy have been vulnerable in the past. HTTP request smuggling may be a serious concern if you use a proxy to perform request validation or access control.The Twisted Web client is not affected. The HTTP 2.0 server uses a different parser, so it is not affected.PatchesThe issue has been addressed in Twisted 22.4.0rc1 and later.WorkaroundsOther than upgrading Twisted, you could:Ensure any vulnerabilities in upstream proxies have been addressed, such as by upgrading themFilter malformed requests by other means, such as configuration of an upstream proxyCreditsThis issue was initially reported by [Zhang Zeyu](https://github.com/zeyu2001).
[]
GHSA-rf37-96c2-34pf
Cross-site scripting (XSS) vulnerability in Syndication (Safari RSS) in Mac OS X 10.4 through 10.4.5 allows remote attackers to execute arbitrary JavaScript via unspecified vectors involving RSS feeds.
[]
GHSA-cxvg-72p4-7x8f
Auth. (subscriber+) Stored Cross-Site Scripting (XSS) in Muffingroup Betheme theme <= 26.6.1 on WordPress.
[]
GHSA-c5v8-2q4r-5w9v
XWiki Platform Mentions UI vulnerable to Cross-site Scripting
ImpactIt's possible to store Javascript or groovy scripts in an mention macro anchor or reference field. The stored code is executed by anyone visiting the page with the mention.For example, the example below will create a file at `/tmp/exploit.txt`:PatchesThis issue has been patched on XWiki 14.4 and 13.10.6.WorkaroundsIt's possible to fix the vulnerability by updating `XWiki.Mentions.MentionsMacro` and edit the `Macro code` field of the `XWiki.WikiMacroClass` XObject.Must be replaced bySee the patches:14.4: https://github.com/xwiki/xwiki-platform/commit/4f290d87a8355e967378a1ed6aee23a06ba162eb13.10.6: https://github.com/xwiki/xwiki-platform/commit/4032dc896857597efd169966dc9e2752a9fdd459#diff-4fe22885f772e47d3561a05348f73921669ec12d4413b220383b73c7ae484bc4R608-R610Referenceshttps://jira.xwiki.org/browse/XWIKI-19752For more informationIf you have any questions or comments about this advisory:Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)Email us at [Security Mailing List](mailto:security@xwiki.org)
[]
GHSA-x85h-x3fh-9fpv
An information disclosure vulnerability in the /Letter/PrintQr/ endpoint of Solvait v24.4.2 allows attackers to access sensitive data via a crafted request.
[]
CVE-2008-1197
The Marvell driver for the Netgear WN802T Wi-Fi access point with firmware 1.3.16 on the Marvell 88W8361P-BEM1 chipset does not properly parse the SSID information element in an association request, which allows remote authenticated users to cause a denial of service (device reboot or hang) or possibly execute arbitrary code via a "Null SSID."
[ "cpe:2.3:h:marvell:88w8361w-bem1:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wn802t:1.3.16:*:*:*:*:*:*:*" ]
CVE-2015-9073
In all Qualcomm products with Android releases from CAF using the Linux kernel, an untrusted pointer dereference can occur in a TrustZone syscall.
[ "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
GHSA-qwj9-vhrx-584j
The Bike Race Free - Top Free Game (aka com.topfreegames.bikeracefreeworld) application 4.3 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
GHSA-xp9g-ff98-2ffp
A NULL pointer dereference in XFAForm::scanFields in XFAForm.cc in xpdf 4.00 allows attackers to launch denial of service via a specific pdf file, as demonstrated by pdftohtml.
[]
CVE-2014-1955
Cross-site scripting (XSS) vulnerability in FortiGuard FortiWeb before 5.0.3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*" ]
GHSA-gjpv-7qjf-vj7x
The xp_peekqueue function in Microsoft SQL Server 2000 and SQL Server Desktop Engine (MSDE) does not properly restrict the length of a buffer before calling the srv_paraminfo function in the SQL Server API for Extended Stored Procedures (XP), which allows an attacker to cause a denial of service or execute arbitrary commands, aka the "Extended Stored Procedure Parameter Parsing" vulnerability.
[]
CVE-2016-2420
rootdir/init.rc in Android 4.x before 4.4.4 does not ensure that the /data/tombstones directory exists for the Debuggerd component, which allows attackers to gain privileges via a crafted application, aka internal bug 26403620.
[ "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*" ]
GHSA-x9q3-xj96-chmv
The default configuration of the proxy for Cisco Cache Engine and Content Engine allows remote attackers to use HTTPS to make TCP connections to allowed IP addresses while hiding the actual source IP.
[]
CVE-2024-27020
netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get()
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() nft_unregister_expr() can concurrent with __nft_expr_type_get(), and there is not any protection when iterate over nf_tables_expressions list in __nft_expr_type_get(). Therefore, there is potential data-race of nf_tables_expressions list entry. Use list_for_each_entry_rcu() to iterate over nf_tables_expressions list in __nft_expr_type_get(), and use rcu_read_lock() in the caller nft_expr_type_get() to protect the entire type query process.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*" ]
CVE-2024-11590
1000 Projects Bookstore Management System forget_password_process.php sql injection
A vulnerability, which was classified as critical, has been found in 1000 Projects Bookstore Management System 1.0. Affected by this issue is some unknown functionality of the file /forget_password_process.php. The manipulation of the argument unm leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:1000projects:bookstore_management_system:*:*:*:*:*:*:*:*", "cpe:2.3:a:1000projects:bookstore_management_system:1.0:*:*:*:*:*:*:*" ]
CVE-2024-0141
NVIDIA Hopper HGX for 8-GPU contains a vulnerability in the GPU vBIOS that may allow a malicious actor with tenant level GPU access to write to an unsupported registry causing a bad state. A successful exploit of this vulnerability may lead to denial of service.
[]
CVE-2021-35973
NETGEAR WAC104 devices before 1.0.4.15 are affected by an authentication bypass vulnerability in /usr/sbin/mini_httpd, allowing an unauthenticated attacker to invoke any action by adding the &currentsetting.htm substring to the HTTP query, a related issue to CVE-2020-27866. This directly allows the attacker to change the web UI password, and eventually to enable debug mode (telnetd) and gain a shell on the device as the admin limited-user account (however, escalation to root is simple because of weak permissions on the /etc/ directory).
[ "cpe:2.3:o:netgear:wac104_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wac104:-:*:*:*:*:*:*:*" ]
CVE-2024-5420
Stored Cross-Site Scripting in SEH Computertechnik utnserver Pro
Missing input validation in the SEH Computertechnik utnserver Pro, SEH Computertechnik utnserver ProMAX, SEH Computertechnik INU-100 web-interface allows stored Cross-Site Scripting (XSS)..This issue affects utnserver Pro, utnserver ProMAX, INU-100 version 20.1.22 and below.
[ "cpe:2.3:a:seh:utnserver_pro:-:*:*:*:*:*:*:*", "cpe:2.3:a:seh:utnserver_promax:-:*:*:*:*:*:*:*", "cpe:2.3:a:seh:inu-100:-:*:*:*:*:*:*:*" ]
CVE-2000-0550
Kerberos 4 KDC program improperly frees memory twice (aka "double-free"), which allows remote attackers to cause a denial of service.
[ "cpe:2.3:a:cygnus:cygnus_network_security:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:cygnus:kerbnet:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:mit:kerberos:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:mit:kerberos_5:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mit:kerberos_5:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mit:kerberos_5:1.1.1:*:*:*:*:*:*:*" ]
CVE-2018-1000217
Dave Gamble cJSON version 1.7.3 and earlier contains a CWE-416: Use After Free vulnerability in cJSON library that can result in Possible crash, corruption of data or even RCE. This attack appear to be exploitable via Depends on how application uses cJSON library. If application provides network interface then can be exploited over a network, otherwise just local.. This vulnerability appears to have been fixed in 1.7.4.
[ "cpe:2.3:a:cjson_project:cjson:*:*:*:*:*:*:*:*" ]
GHSA-mgg5-84cv-fc3c
An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 prior to 16.1.6, 16.2 prior to 16.2.9, 16.3 prior to 16.3.7, 16.4 prior to 16.4.5, 16.5 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which user account password reset emails could be delivered to an unverified email address.
[]
GHSA-f2pm-wfcp-596f
Cross-site scripting (XSS) vulnerability in the toStaticHTML API, as used in Microsoft Office InfoPath 2003 SP3, 2007 SP1, and 2007 SP2; Office SharePoint Server 2007 SP1 and SP2; SharePoint Services 3.0 SP1 and SP2; and Internet Explorer 8 allows remote attackers to inject arbitrary web script or HTML via vectors related to sanitization.
[]
CVE-2023-3144
SourceCodester Online Discussion Forum Site manage_post.php cross site scripting
A vulnerability classified as problematic was found in SourceCodester Online Discussion Forum Site 1.0. Affected by this vulnerability is an unknown functionality of the file admin\posts\manage_post.php. The manipulation of the argument title leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-231013 was assigned to this vulnerability.
[ "cpe:2.3:a:online_discussion_forum_site_project:online_discussion_forum_site:1.0:*:*:*:*:*:*:*" ]
GHSA-gjvh-qmfg-6668
The OLE Automation mechanism and VBScript scripting engine in Microsoft Internet Explorer 9 through 11, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold, 1511, and 1607 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability."
[]
CVE-2023-1320
Cross-site Scripting (XSS) - Stored in osticket/osticket
Cross-site Scripting (XSS) - Stored in GitHub repository osticket/osticket prior to v1.16.6.
[ "cpe:2.3:a:enhancesoft:osticket:*:*:*:*:*:*:*:*" ]
GHSA-2wm6-w8f9-5vf4
An issue was discovered in GitLab Community and Enterprise Edition before 11.5.8, 11.6.x before 11.6.6, and 11.7.x before 11.7.1. It allows Information Disclosure (issue 4 of 6). In some cases, users without project permissions will receive emails after a project move. For private projects, this will disclose the new project namespace to an unauthorized user.
[]
GHSA-g3wm-r5mv-8jh3
Information disclosure in Netwave IP camera at //etc/RT2870STA.dat (via HTTP on port 8000) allows an unauthenticated attacker to exfiltrate sensitive information about the network configuration like the network SSID and password.
[]
GHSA-8j6x-82xf-x3v2
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of 3DS files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-15389.
[]
CVE-2022-32473
An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. DMA attacks on the HddPassword shared buffer used by SMM and non-SMM code could cause TOCTOU race-condition issues that could lead to corruption of SMRAM and escalation of privileges. This attack can be mitigated using IOMMU protection for the ACPI runtime memory used for the command buffer. This attack can be mitigated by copying the firmware block services data to SMRAM before checking it.
[ "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*" ]
CVE-2022-26237
The default privileges for the running service Normand Viewer Service in Beckman Coulter Remisol Advance v2.0.12.1 and prior allows non-privileged users to overwrite and manipulate executables and libraries. This allows attackers to access sensitive data.
[ "cpe:2.3:a:beckmancoulter:remisol_advance:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
CVE-2023-32391
The issue was addressed with improved checks. This issue is fixed in iOS 15.7.6 and iPadOS 15.7.6, watchOS 9.5, iOS 16.5 and iPadOS 16.5, macOS Ventura 13.4. A shortcut may be able to use sensitive data with certain actions without prompting the user.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
GHSA-6mvp-gh77-7vwh
Mattermost Server allows user to get private channel names
Mattermost versions 9.5.x <= 9.5.9 fail to properly filter the channel data when ElasticSearch is enabled which allows a user to get private channel names by using cmd+K/ctrl+K.
[]
GHSA-rmvq-vf32-r4h4
Lack of access control in Nakivo Backup & Replication Transporter version 9.4.0.r43656 allows remote users to access unencrypted backup repositories and the Nakivo Controller configuration via a network accessible transporter service. It is also possible to create or delete backup repositories.
[]
CVE-2025-42602
Improper Authentication Vulnerability in Meon KYC solutions
This vulnerability exists in Meon KYC solutions due to improper handling of access and refresh tokens in certain API endpoints of authentication process. A remote attacker could exploit this vulnerability by intercepting and manipulating the responses through API request body leading to unauthorized access of other user accounts.
[]
GHSA-3cfc-hrv3-xpx5
An issue in Luxe Beauty Clinic mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
[]
GHSA-rxc7-54rm-27rr
AVG Anti-Virus does not properly interact with the processing of hcp:// URLs by the Microsoft Help and Support Center, which makes it easier for remote attackers to execute arbitrary code via malware that is correctly detected by this product, but with a detection approach that occurs too late to stop the code execution.
[]
GHSA-88rj-8pxh-m882
Microsoft Excel Remote Code Execution Vulnerability
[]
CVE-2014-4197
Multiple SQL injection vulnerabilities in Bank Soft Systems (BSS) RBS BS-Client 3.17.9 allow remote attackers to execute arbitrary SQL commands via the (1) CARDS or (2) XACTION parameter.
[ "cpe:2.3:a:bssys:rbs_bs-client:3.17.9:*:*:*:*:*:*:*" ]
GHSA-27pr-43qm-8hmf
The LoadText method in the spreadsheet component in Microsoft Office Web Components (OWC) 2000 and 2002 allows remote attackers to read arbitrary files through Internet Explorer via a URL that redirects to the target file.
[]
CVE-2020-4318
IBM Intelligent Operations Center for Emergency Management, Intelligent Operations Center (IOC), and IBM Water Operations for Waternamics are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 177356.
[ "cpe:2.3:a:ibm:intelligent_operations_center:5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:intelligent_operations_center:5.1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:intelligent_operations_center:5.1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:intelligent_operations_center:5.1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:intelligent_operations_center:5.1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:intelligent_operations_center:5.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:intelligent_operations_center:5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:intelligent_operations_center_for_emergency_management:5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:intelligent_operations_center_for_emergency_management:5.1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:intelligent_operations_center_for_emergency_management:5.1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:intelligent_operations_center_for_emergency_management:5.1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:intelligent_operations_center_for_emergency_management:5.1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:water_operations_for_waternamics:5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:water_operations_for_waternamics:5.1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:water_operations_for_waternamics:5.1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:water_operations_for_waternamics:5.1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:water_operations_for_waternamics:5.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:water_operations_for_waternamics:5.2.1:*:*:*:*:*:*:*" ]
CVE-2017-13729
There is an illegal address access in the _nc_save_str function in alloc_entry.c in ncurses 6.0. It will lead to a remote denial of service attack.
[ "cpe:2.3:a:gnu:ncurses:6.0:*:*:*:*:*:*:*" ]
CVE-2021-35687
Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component: Unified Metadata Manager). Supported versions that are affected are 8.0.7-8.1.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Financial Services Analytical Applications Infrastructure. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Financial Services Analytical Applications Infrastructure accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
[ "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:*" ]
CVE-2025-26656
Missing Authorization check in S/4HANA (Manage Purchasing Info Records)
OData Service in Manage Purchasing Info Records does not perform necessary authorization checks for an authenticated user, allowing an attacker to escalate privileges. This has low impact on integrity of the application.
[]
GHSA-4f2p-w3qr-8m77
sharenfs 0.6.4, when built with commits bcdd594 and 7d08880 from the zfs repository, provides world readable access to the shared zfs file system, which might allow remote authenticated users to obtain sensitive information by reading shared files.
[]
CVE-2019-11184
A race condition in specific microprocessors using Intel (R) DDIO cache allocation and RDMA may allow an authenticated user to potentially enable partial information disclosure via adjacent access.
[ "cpe:2.3:o:intel:6138_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:6138:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:6130t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:6130t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:6130_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:6130:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:6126t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:6126t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:6126_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:6126:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:5120t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:5120t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:5119t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:5119t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:5118_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:5118:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:4116t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:4116t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:4116_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:4116:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:4114t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:4114t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:4110_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:4110:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:4109t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:4109t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:3106_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:3106:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-1428l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1428l:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2403_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2403:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2407_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2407:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2418l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2418l:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2420_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2420:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2428l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2428l:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2430_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2430:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2430l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2430l:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2440_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2440:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2448l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2448l:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2450_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2450:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2450l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2450l:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2470_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2470:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4603_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4603:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4607_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4607:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4610_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4610:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4617_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4617:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4620_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4620:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4640_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4640:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4650:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4650l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4650l:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-1620_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1620:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-1650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1650:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-1660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1660:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2603_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2603:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2609_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2609:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2620_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2620:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2630_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2630:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2630l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2630l:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2637_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2637:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2640_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2640:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2643_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2643:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2648l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2648l:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2650:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2650l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2650l:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2658_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2658:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2660_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2660:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2665_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2665:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2667_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2667:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2670_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2670:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2680_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2680:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2687w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2687w:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2690_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2690:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4603_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4603_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4607_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4607_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4610_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4610_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4620_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4620_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4624l_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4624l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4627_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4627_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4640_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4640_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4650_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4650_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4657l_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4657l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-1428l_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1428l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2403_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2403_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2407_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2407_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2418l_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2418l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2420_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2420_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2428l_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2428l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2430_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2430_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2430l_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2430l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2440_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2440_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2448l_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2448l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2450_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2450_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2450l_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2450l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2470_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2470_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-1620_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1620_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-1650_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1650_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-1660_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1660_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2603_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2603_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2609_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2609_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2618l_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2618l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2620_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2620_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2628l_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2628l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2630_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2630_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2630l_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2630l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2637_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2637_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2640_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2640_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2643_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2643_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2648l_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2648l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2650_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2650_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2650l_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2650l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2658_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2658_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2660_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2660_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2667_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2667_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2670_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2670_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2680_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2680_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2687w_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2687w_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2690_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2690_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2695_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2695_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2697_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2697_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4610_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4610_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4620_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4620_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4627_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4627_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4640_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4640_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4648_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4648_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4650_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4650_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4655_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4655_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4660_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4660_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4667_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4667_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4669_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4669_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2658a_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2658a_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-1428l_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1428l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2408l_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2408l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2418l_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2418l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2428l_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2428l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2438l_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2438l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-1620_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1620_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-1630_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1630_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-1650_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1650_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-1660_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1660_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-1680_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1680_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2603_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2603_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2608l_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2608l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2609_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2609_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2618l_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2618l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2620_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2620_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2623_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2623_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2628l_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2628l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2630_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2630_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2630l_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2630l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2637_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2637_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2640_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2640_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2643_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2643_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2648l_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2648l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2650_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2650_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2650l_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2650l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2658_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2658_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2660_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2660_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2667_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2667_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2670_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2670_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2680_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2680_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2683_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2683_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2687w_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2687w_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2690_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2690_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2695_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2695_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2697_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2697_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2698_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2698_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2699_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2699_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2699a_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2699a_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2699r_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2699r_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4610_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4610_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4620_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4620_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4627_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4627_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4628l_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4628l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4640_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4640_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4650_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4650_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4655_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4655_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4660_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4660_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4667_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4667_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4669_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4669_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-1620_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1620_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-1630_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1630_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-1650_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1650_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-1660_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1660_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-1680_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1680_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2603_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2603_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2608l_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2608l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2609_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2609_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2618l_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2618l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2620_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2620_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2623_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2623_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2628l_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2628l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2630_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2630_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2630l_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2630l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2637_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2637_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2640_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2640_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2643_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2643_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2648l_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2648l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2650_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2650_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2650l_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2650l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2658_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2658_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2660_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2660_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2667_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2667_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2680_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2680_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2683_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2683_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2687w_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2687w_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2690_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2690_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2695_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2695_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2697_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2697_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2697a_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2697a_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2698_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2698_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2699_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2699_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-2850_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-2850_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-2870_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-2870_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-2880_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-2880_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-2890_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-2890_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-4809_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-4809_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-4820_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-4820_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-4830_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-4830_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-4850_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-4850_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-4860_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-4860_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-4870_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-4870_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-4880_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-4880_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-4890_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-4890_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8850_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8850_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8857_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8857_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8870_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8870_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8880_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8880_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8880l_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8880l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8890_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8890_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8891_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8891_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8893_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8893_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-4809_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-4809_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-4820_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-4820_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-4830_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-4830_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-4850_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-4850_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8860_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8860_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8867_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8867_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8870_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8870_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8880_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8880_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8880l_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8880l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8890_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8890_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8891_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8891_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8893_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8893_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8894_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8894_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-4809_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-4809_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-4820_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-4820_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-4830_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-4830_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-4850_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-4850_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8860_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8860_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8867_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8867_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8870_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8870_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8880_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8880_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8890_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8890_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8891_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8891_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8893_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8893_v4:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*" ]
GHSA-59v7-vqq8-7jqw
Missing Authorization vulnerability in Bowo Debug Log Manager.This issue affects Debug Log Manager: from n/a through 2.3.1.
[]
CVE-2022-46178
Path Traversal In MeterSpere allows file upload to any path
MeterSphere is a one-stop open source continuous testing platform, covering test management, interface testing, UI testing and performance testing. Versions prior to 2.5.1 allow users to upload a file, but do not validate the file name, which may lead to upload file to any path. The vulnerability has been fixed in v2.5.1. There are no workarounds.
[ "cpe:2.3:a:metersphere:metersphere:*:*:*:*:*:*:*:*" ]
GHSA-4h2j-p4rj-jr68
Coredump binaries in Toshiba printers have incorrect permissions. A local attacker can steal confidential information. As for the affected products/models/versions, see the reference URL.
[]
CVE-2024-30473
Dell ECS, versions prior to 3.8.1, contain a privilege elevation vulnerability in user management. A remote high privileged attacker could potentially exploit this vulnerability, gaining access to unauthorized end points.
[]
GHSA-6g8r-23r5-62g2
A vulnerability was found in Campcodes Online Examination System 1.0. It has been classified as critical. This affects an unknown part of the file updateQuestion.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-264453 was assigned to this vulnerability.
[]
CVE-2020-2186
A cross-site request forgery vulnerability in Jenkins Amazon EC2 Plugin 1.50.1 and earlier allows attackers to provision instances.
[ "cpe:2.3:a:jenkins:amazon_ec2:*:*:*:*:*:jenkins:*:*" ]
GHSA-8j32-3cqp-g7rx
The API service on Google Home and Chromecast devices before mid-July 2018 does not prevent DNS rebinding attacks from reading the scan_results JSON data, which allows remote attackers to determine the physical location of most web browsers by leveraging the presence of one of these devices on its local network, extracting the scan_results bssid fields, and sending these fields in a geolocation/v1/geolocate Google Maps Geolocation API request.
[]
CVE-2019-9463
In Platform, there is a possible bypass of user interaction requirements due to background app interception. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-113584607
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*" ]
GHSA-58p5-3cgm-hvjh
The Telnet proxy of 602Pro LAN SUITE 2002 does not restrict the number of outstanding connections to the local host, which allows remote attackers to create a denial of service (memory consumption) via a large number of connections.
[]
CVE-2024-3976
Missing Authorization in GitLab
An issue has been discovered in GitLab CE/EE affecting all versions starting from 14.0 prior to 16.9.7, starting from 16.10 prior to 16.10.5, and starting from 16.11 prior to 16.11.2. It was possible to disclose via the UI the confidential issues title and description from a public project to unauthorised instance users.
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*" ]
CVE-2024-1366
The Happy Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘archive_title_tag’ attribute of the Archive Title widget in all versions up to, and including, 3.10.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[ "cpe:2.3:a:leevio:happy_addons_for_elementor:*:*:*:*:free:wordpress:*:*" ]
CVE-2020-19038
File Deletion vulnerability in Halo 0.4.3 via delBackup.
[ "cpe:2.3:a:halo:halo:0.4.3:*:*:*:*:*:*:*" ]
GHSA-hcj3-374q-57xq
The nsExternalAppHandler::SetUpTempFile function in Mozilla Firefox 1.5.0.9 creates temporary files with predictable filenames based on creation time, which allows remote attackers to execute arbitrary web script or HTML via a crafted XMLHttpRequest.
[]