id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2015-2553 | The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 mishandles junctions during mountpoint creation, which makes it easier for local users to gain privileges by leveraging certain sandbox access, aka "Windows Mount Point Elevation of Privilege Vulnerability." | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-2019-9387 | In Bluetooth, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-117569833 | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2025-5213 | projectworlds Responsive E-Learning System delete_file.php sql injection | A vulnerability was found in projectworlds Responsive E-Learning System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/delete_file.php. The manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | [] | 6.9 | 7.3 | 7.3 | 7.5 |
GHSA-4mpv-9j83-cm3q | Osprey Pump Controller version 1.01 inputs passed to a GET parameter are not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML/JS code in a user's browser session in context of an affected site. | [] | null | 6.1 | null | null |
|
CVE-2007-1325 | The PMA_ArrayWalkRecursive function in libraries/common.lib.php in phpMyAdmin before 2.10.0.2 does not limit recursion on arrays provided by users, which allows context-dependent attackers to cause a denial of service (web server crash) via an array with many dimensions. NOTE: it could be argued that this vulnerability is caused by a problem in PHP (CVE-2006-1549) and the proper fix should be in PHP; if so, then this should not be treated as a vulnerability in phpMyAdmin. | [
"cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*"
] | null | null | null | 7.1 |
|
CVE-2009-0871 | The SIP channel driver in Asterisk Open Source 1.4.22, 1.4.23, and 1.4.23.1; 1.6.0 before 1.6.0.6; 1.6.1 before 1.6.1.0-rc2; and Asterisk Business Edition C.2.3, with the pedantic option enabled, allows remote authenticated users to cause a denial of service (crash) via a SIP INVITE request without any headers, which triggers a NULL pointer dereference in the (1) sip_uri_headers_cmp and (2) sip_uri_params_cmp functions. | [
"cpe:2.3:a:digium:asterisk:1.4.22:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.23:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.4.23.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.0:beta7:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.0:beta7.1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.0:beta8:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.0:beta9:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.0:rc6:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.0.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.0.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.1:beta1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.1:beta2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.1:beta3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.1:beta4:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.6.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:c.2.3:-:business:*:*:*:*:*"
] | null | null | null | 3.5 |
|
CVE-2008-3163 | Directory traversal vulnerability in dodosmail.php in DodosMail 2.5 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the dodosmail_header_file parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:regretless:dodos_mail:2.5:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2022-31060 | Banner topic data is exposed on login-required Discourse sites | Discourse is an open-source discussion platform. Prior to version 2.8.4 in the `stable` branch and version `2.9.0.beta5` in the `beta` and `tests-passed` branches, banner topic data is exposed on login-required sites. This issue is patched in version 2.8.4 in the `stable` branch and version `2.9.0.beta5` in the `beta` and `tests-passed` branches of Discourse. As a workaround, one may disable banners. | [
"cpe:2.3:a:discourse:discourse:*:*:*:*:*:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta4:*:*:*:*:*:*"
] | null | 5.3 | null | null |
CVE-2021-41345 | Storage Spaces Controller Elevation of Privilege Vulnerability | Storage Spaces Controller Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2237:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2237:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2237:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2237:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1854:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1854:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1854:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1288:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1288:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1288:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.288:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1288:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1288:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1288:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1288:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.1288:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.258:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.258:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19086:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19086:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4704:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4704:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4704:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20144:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20144:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20144:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23490:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012_r2:6.3.9600.20144:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:-:*:-:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-v352-rg37-5q5m | Apache Linkis vulnerable to privilege escalation | In Apache Linkis <= 1.5.0, Privilege Escalation in Basic management services where the attacking user is a trusted account allows access to Linkis's Token information. Users are advised to upgrade to version 1.6.0, which fixes this issue. | [] | 7.1 | 5.3 | null | null |
CVE-2019-5368 | A remote code execution vulnerability was identified in HPE Intelligent Management Center (IMC) PLAT earlier than version 7.3 E0506P09. | [
"cpe:2.3:a:hp:intelligent_management_center:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:-:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0503:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p02:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p04:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p03:*:*:*:*:*:*",
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p07:*:*:*:*:*:*"
] | null | null | 8.8 | 9 |
|
CVE-2024-47347 | WordPress Chartify plugin <= 2.7.6 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Chart Builder Team Chartify allows Reflected XSS.This issue affects Chartify: from n/a through 2.7.6. | [] | null | 7.1 | null | null |
CVE-2015-4196 | Platform Software before 4.4.5 in Cisco Unified Communications Domain Manager (CDM) 8.x has a hardcoded password for a privileged account, which allows remote attackers to obtain root access by leveraging knowledge of this password and entering it in an SSH session, aka Bug ID CSCuq45546. | [
"cpe:2.3:a:cisco:unified_communications_domain_manager:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_domain_manager:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_domain_manager:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_communications_domain_manager:4.4.4:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
RHEA-2023:7327 | Red Hat Enhancement Advisory: Red Hat 3scale API Management 2.13.7 Release - Container Images | golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:3scale:2.13::el7",
"cpe:/a:redhat:3scale:2.13::el8"
] | null | 7.5 | null | null |
GHSA-fwv9-7f7h-g7mm | Multiple cross-site scripting (XSS) vulnerabilities in pafiledb.php in paFileDB 3.1 allow remote attackers to inject arbitrary web script or HTML via the (1) sortby or (2) filelist parameters to the category action (category.php), or (3) pages parameter in the viewall action (viewall.php). | [] | null | null | null | null |
|
CVE-2007-1109 | Multiple cross-site scripting (XSS) vulnerabilities in Phpwebgallery 1.4.1 allow remote attackers to inject arbitrary web script or HTML via the (1) login or (2) mail_address field in Register.php, or the (3) search_author, (4) mode, (5) start_year, (6) end_year, or (7) date_type field in Search.php, a different vulnerability than CVE-2006-1674. NOTE: 1.6.2 and other versions might also be affected. | [
"cpe:2.3:a:phpwebgallery:phpwebgallery:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2021-34668 | WordPress Real Media Library <= 4.14.1 Author-only Stored Cross-Site Scripting | The WordPress Real Media Library WordPress plugin is vulnerable to Stored Cross-Site Scripting via the name parameter in the ~/inc/overrides/lite/rest/Folder.php file which allows author-level attackers to inject arbitrary web scripts in folder names, in versions up to and including 4.14.1. | [
"cpe:2.3:a:devowl:wordpress_real_media_library:*:*:*:*:*:wordpress:*:*"
] | null | 6.4 | null | null |
CVE-2020-9460 | Octech Oempro 4.7 through 4.11 allow XSS by an authenticated user. The parameter CampaignName in Campaign.Create is vulnerable. | [
"cpe:2.3:a:octech:oempro:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 |
|
CVE-2020-1196 | An elevation of privilege vulnerability exists in the way that the printconfig.dll handles objects in memory, aka 'Windows Print Configuration Elevation of Privilege Vulnerability'. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 |
|
GHSA-7xp8-p4r3-6rv8 | A vulnerability was discovered in the firmware builds up to 10.10.2.2 in Poly Clariti Manager devices. The flaw does not properly neutralize input during a web page generation. | [] | null | 5.4 | null | null |
|
GHSA-c655-qv2v-73rm | In FFmpeg version n6.1.1, specifically within the avcodec/speexdec.c module, a potential security vulnerability exists due to insufficient validation of certain parameters when parsing Speex codec extradata. This vulnerability could lead to integer overflow conditions, potentially resulting in undefined behavior or crashes during the decoding process. | [] | null | 5.5 | null | null |
|
RHSA-2018:2552 | Red Hat Security Advisory: Red Hat OpenShift Application Runtimes Node.js 8.11.4 security update | openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang nodejs: Out of bounds (OOB) write via UCS-2 encoding | [
"cpe:/a:redhat:openshift_application_runtimes:1.0::el7"
] | null | null | 8.1 | null |
CVE-2006-0590 | MyTopix 1.2.3 allows remote attackers to obtain the installation path via an invalid hl parameter to index.php, which leads to path disclosure, possibly related to invalid SQL syntax. | [
"cpe:2.3:a:jaia_interactive:mytopix:1.2.3:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2021-33755 | Windows Hyper-V Denial of Service Vulnerability | Windows Hyper-V Denial of Service Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2061:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2061:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1679:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1110:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1110:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1110:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.1110:*:*:*:*:*:*:*"
] | null | 6.3 | null | null |
GHSA-qjw3-35px-c96q | A memory corruption vulnerability was found in the kernel function kern_getfsstat in MidnightBSD before 1.2.7 and 1.3 through 2020-08-19, and FreeBSD through 11.4, that allows an attacker to trigger an invalid free and crash the system via a crafted size value in conjunction with an invalid mode. | [] | null | null | null | null |
|
GHSA-frm5-362q-rgg4 | A vulnerability was found in Tenda AC23 16.03.07.45_cn. It has been declared as critical. This vulnerability affects unknown code of the file /bin/ate of the component Service Port 7329. The manipulation of the argument v2 leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-228778 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] | null | null | 7.2 | null |
|
CVE-2020-16213 | Advantech WebAccess HMI Designer, Versions 2.1.9.31 and prior. Processing specially crafted project files lacking proper validation of user supplied data may cause the system to write outside the intended buffer area, which may allow remote code execution, disclosure/modification of information, or cause the application to crash. | [
"cpe:2.3:a:advantech:webaccess\\/hmi_designer:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
CVE-2010-2146 | PHP remote file inclusion vulnerability in banned.php in Visitor Logger allows remote attackers to execute arbitrary PHP code via a URL in the VL_include_path parameter. | [
"cpe:2.3:a:graviton-mediatech:visitor_logger:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-6jcx-jf58-7hch | Out-of-Bounds Write vulnerability in Jungo WinDriver before 12.1.0 allows local attackers to cause a Windows blue screen error and Denial of Service (DoS). | [] | null | 5.5 | null | null |
|
CVE-2023-26014 | WordPress Minify HTML Plugin <= 2.1.7 is vulnerable to Cross Site Request Forgery (CSRF) | Cross-Site Request Forgery (CSRF) vulnerability in Tim Eckel Minify HTML plugin <= 2.1.7 vulnerability. | [
"cpe:2.3:a:dogblocker:minify_html:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null |
CVE-2010-0480 | Multiple stack-based buffer overflows in the MPEG Layer-3 audio codecs in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allow remote attackers to execute arbitrary code via a crafted AVI file, aka "MPEG Layer-3 Audio Decoder Stack Overflow Vulnerability." | [
"cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-h7hj-mf8m-2h22 | Race condition in ESET NOD32 Antivirus before 2.2289 allows remote attackers to execute arbitrary code via a crafted CAB file, which triggers heap corruption. | [] | null | null | null | null |
|
CVE-2015-7766 | PGSQL:SubmitQuery.do in ZOHO ManageEngine OpManager 11.6, 11.5, and earlier allows remote administrators to bypass SQL query restrictions via a comment in the query to api/json/admin/SubmitQuery, as demonstrated by "INSERT/**/INTO." | [
"cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:11.6:*:*:*:*:*:*:*"
] | null | null | null | 9 |
|
GHSA-x2r5-97q9-ch4c | Adobe Reader and Acrobat 8.x before 8.3.1, 9.x before 9.4.6, and 10.x before 10.1.1 allow attackers to execute arbitrary code via unspecified vectors, related to a "memory leakage condition vulnerability." | [] | null | null | null | null |
|
GHSA-m2cw-vw6v-jp5c | Buffer overflow in the IGDstartelt function in igd_desc_parse.c in the MiniUPnP client (aka MiniUPnPc) before 1.9.20150917 allows remote UPNP servers to cause a denial of service (application crash) and possibly execute arbitrary code via an "oversized" XML element name. | [] | null | null | null | null |
|
GHSA-89cv-84hg-jg67 | dtc 0.29.6 allows local users to overwrite arbitrary files via a symlink attack on (a) /tmp/awstats.log, (b) /tmp/spam.log.#####, and (c) /tmp/spam_err.log temporary files, related to the (1) accesslog.php and (2) sa-wrapper scripts. | [] | null | null | null | null |
|
RHSA-2021:3160 | Red Hat Security Advisory: thunderbird security update | Mozilla: Uninitialized memory in a canvas object could have led to memory corruption Mozilla: Incorrect instruction reordering during JIT optimization Mozilla: Use-after-free media channels Mozilla: Race condition when resolving DNS names could have led to memory corruption Mozilla: Memory corruption as a result of incorrect style treatment Mozilla: Memory safety bugs fixed in Thunderbird 78.13 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | 7.5 | null |
CVE-2023-21725 | Windows Malicious Software Removal Tool Elevation of Privilege Vulnerability | Windows Malicious Software Removal Tool Elevation of Privilege Vulnerability | [
"cpe:2.3:a:microsoft:windows_malicious_software_removal_tool:*:*:*:*:*:*:*:*"
] | null | 6.3 | null | null |
CVE-2025-1701 | Local Privilege Escalation in MIM Admin Service | CVE-2025-1701 is a high-severity vulnerability in the MIM Admin service. An attacker could exploit this vulnerability by sending a specially crafted request over the RMI interface to execute arbitrary code with the privileges of the MIM Admin service. The RMI interface is only accessible locally (listening on 127.0.0.1), limiting the attack vector to the local machine. This means that in a properly configured hospital environment, an attacker must have already compromised the network and additionally compromised the system where the MIM Admin service is running. From there, attackers with sufficient knowledge of MIM's implementation, library usage, and functionality with access to extend the MIM RMI library could force the MIM Admin service to run commands on the local machine with its privileges.
Users of MIM Software products exposed via RDP or multi-user application virtualization system should take note that the system being exposed is the environment hosting the virtualized MIM client.
This issue affects MIM Admin Service: before 7.2.13, 7.3.8, 7.4.3 | [] | 8.9 | null | null | null |
GHSA-hh2c-85xj-jphm | Unknown vulnerability in the regex_replace modifier (modifier.regex_replace.php) in Smarty before 2.6.8 allows attackers to execute arbitrary PHP code. | [] | null | null | null | null |
|
GHSA-p5q8-553c-rh75 | A vulnerability in the command line interface (cli) management interface of Cisco SD-WAN vManage could allow an authenticated, local attacker to bypass authorization and allow the attacker to roll back the configuration on vManage controllers and edge router device.This vulnerability is due to improper access control in the cli-management interface of an affected system. An attacker with low-privilege (read only) access to the cli could exploit this vulnerability by sending a request to roll back the configuration on for other controller and devices managed by an affected system. A successful exploit could allow the attacker to to roll back the configuration on for other controller and devices managed by an affected system. | [] | null | 7.1 | null | null |
|
RHSA-2018:2462 | Red Hat Security Advisory: qemu-kvm security and bug fix update | QEMU: i386: multiboot OOB access while loading kernel image QEMU: slirp: heap buffer overflow while reassembling fragmented datagrams | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 5.1 | null |
RHSA-2012:1604 | Red Hat Security Advisory: Fuse ESB Enterprise 7.1.0 update | jetty: hash table collisions CPU usage DoS (oCERT-2011-003) jruby: Murmur hash function collisions (oCERT-2012-001) | [
"cpe:/a:redhat:fuse_esb_enterprise:7.1.0"
] | null | null | null | null |
CVE-2022-32799 | An out-of-bounds read issue was addressed with improved bounds checking. This issue is fixed in Security Update 2022-005 Catalina, macOS Monterey 12.5. A user in a privileged network position may be able to leak sensitive information. | [
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-008:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:10.15.7:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:10.15.7:security_update_2022-004:*:*:*:*:*:*"
] | null | 5.9 | null | null |
|
GHSA-9hv6-pv7m-2p8w | PHP remote file inclusion vulnerability in includes/class_template.php in Categories hierarchy (aka CH or mod-CH) 2.1.2 in ptirhiikmods allows remote attackers to execute arbitrary PHP code via a URL in the phpbb_root_path parameter. | [] | null | null | null | null |
|
cisco-sa-wsa-prv-esc-nPzWZrQj | Cisco Secure Web Appliance Privilege Escalation Vulnerability | A vulnerability in the log subscription subsystem of Cisco AsyncOS for the Cisco Secure Web Appliance (formerly Web Security Appliance) could allow an authenticated, local attacker to perform command injection and elevate privileges to root.
This vulnerability is due to insufficient validation of user-supplied input for the web interface and CLI. An attacker could exploit this vulnerability by authenticating to the affected device and injecting scripting commands in the scope of the log subscription subsystem. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
| [] | null | null | 5.3 | null |
CVE-2023-33136 | Azure DevOps Server Remote Code Execution Vulnerability | Azure DevOps Server Remote Code Execution Vulnerability | [
"cpe:2.3:o:microsoft:azure_devops_server:2019.0.1:-:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:azure_devops_server:2019.1.2:-:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:azure_devops_server:2020.0.2:-:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:azure_devops_server:2020.1.2:-:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:azure_devops_server:2022.0.1:-:*:*:*:*:*:*"
] | null | 8.8 | null | null |
GHSA-cr8r-7g9p-hcx6 | Long pressing on a download link could potentially allow Javascript commands to be executed within the browser This vulnerability affects Firefox for iOS < 129. | [] | null | 9.8 | null | null |
|
CVE-2020-15966 | Insufficient policy enforcement in extensions in Google Chrome prior to 85.0.4183.121 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information via a crafted Chrome Extension. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:opensuse:backports_sle:15.0:sp2:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*"
] | null | 4.3 | null | 4.3 |
|
GHSA-8635-3hm7-3j8p | InvoicePlane version 1.4.10 is vulnerable to a Stored Cross Site Scripting resulting in allowing an authenticated user to inject malicious client side script which will be executed in the browser of users if they visit the manipulated site. | [] | null | null | 5.4 | null |
|
GHSA-v9mp-rrg9-4gxj | SQL injection vulnerability found in Online Travel Agency System v.1.0 allows a remote attacker to execute arbitrary code via the emp_id parameter at employee_detail.php. | [] | null | 7.2 | null | null |
|
GHSA-rhh5-9m4r-jmx3 | In ppmp_validate_wsm of drm_fw.c, there is a possible EoP due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-238720411References: N/A | [] | null | 7.8 | null | null |
|
GHSA-x6hg-f949-cqff | The Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Accordion widget in all versions up to, and including, 5.9.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 5.4 | null | null |
|
CVE-2020-9063 | NCR SelfServ ATMs running APTRA XFS 05.01.00 or earlier do not authenticate or protect the integrity of USB HID communications between the currency dispenser and the host computer, permitting an attacker with physical access to internal ATM components the ability to inject a malicious payload and execute arbitrary code with SYSTEM privileges on the host computer by causing a buffer overflow on the host. | [
"cpe:2.3:o:ncr:aptra_xfs:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ncr:selfserv_atm:-:*:*:*:*:*:*:*"
] | null | 7.6 | null | 7.2 |
|
GHSA-jwfx-xhgw-72r8 | The Horoscope And Tarot plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'divine_horoscope' shortcode in all versions up to, and including, 1.3.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
|
GHSA-g26h-2qw9-qc67 | Directory traversal vulnerability in body.php in phpSpamManager (phpSM) 0.53 beta allows remote attackers to read arbitrary local files via a .. (dot dot) in the filename parameter. | [] | null | null | null | null |
|
CVE-2020-14608 | Vulnerability in the Oracle Fusion Middleware MapViewer product of Oracle Fusion Middleware (component: Tile Server). The supported version that is affected is 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Fusion Middleware MapViewer. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Fusion Middleware MapViewer accessible data as well as unauthorized read access to a subset of Oracle Fusion Middleware MapViewer accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N). | [
"cpe:2.3:a:oracle:fusion_middleware_mapviewer:12.2.1.3.0:*:*:*:*:*:*:*"
] | null | 8.2 | null | null |
|
CVE-2010-5081 | Stack-based buffer overflow in Mini-Stream RM-MP3 Converter 3.1.2.1 allows remote attackers to execute arbitrary code via a long URL in a .pls file. | [
"cpe:2.3:a:mini-stream:rm-mp3_converter:3.1.2.1:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-643h-952w-33f5 | In the Linux kernel, the following vulnerability has been resolved:x86/bugs: Use code segment selector for VERW operandRobert Gill reported below #GP in 32-bit mode when dosemu software was
executing vm86() system call:general protection fault: 0000 [#1] PREEMPT SMP
CPU: 4 PID: 4610 Comm: dosemu.bin Not tainted 6.6.21-gentoo-x86 #1
Hardware name: Dell Inc. PowerEdge 1950/0H723K, BIOS 2.7.0 10/30/2010
EIP: restore_all_switch_stack+0xbe/0xcf
EAX: 00000000 EBX: 00000000 ECX: 00000000 EDX: 00000000
ESI: 00000000 EDI: 00000000 EBP: 00000000 ESP: ff8affdc
DS: 0000 ES: 0000 FS: 0000 GS: 0033 SS: 0068 EFLAGS: 00010046
CR0: 80050033 CR2: 00c2101c CR3: 04b6d000 CR4: 000406d0
Call Trace:
show_regs+0x70/0x78
die_addr+0x29/0x70
exc_general_protection+0x13c/0x348
exc_bounds+0x98/0x98
handle_exception+0x14d/0x14d
exc_bounds+0x98/0x98
restore_all_switch_stack+0xbe/0xcf
exc_bounds+0x98/0x98
restore_all_switch_stack+0xbe/0xcfThis only happens in 32-bit mode when VERW based mitigations like MDS/RFDS
are enabled. This is because segment registers with an arbitrary user value
can result in #GP when executing VERW. Intel SDM vol. 2C documents the
following behavior for VERW instruction:#GP(0) - If a memory operand effective address is outside the CS, DS, ES,
FS, or GS segment limit.CLEAR_CPU_BUFFERS macro executes VERW instruction before returning to user
space. Use %cs selector to reference VERW operand. This ensures VERW will
not #GP for an arbitrary user %ds.[ mingo: Fixed the SOB chain. ] | [] | null | 5.5 | null | null |
|
GHSA-jwvq-qvwv-pjcm | A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, local attacker to inject a command to the underlying operating system that will execute with root privileges upon the next reboot of the device. The authenticated user must have privileged EXEC permissions on the device. The vulnerability is due to insufficient protection of values passed to a script that executes during device startup. An attacker could exploit this vulnerability by writing values to a specific file. A successful exploit could allow the attacker to execute commands with root privileges each time the affected device is restarted. | [] | null | 7.8 | null | null |
|
GHSA-6j2f-925p-c58v | A vulnerability has been identified in SIMATIC PCS 7 V8.0 and earlier (All versions), SIMATIC PCS 7 V8.1 and newer (All versions), SIMATIC WinCC V7.2 and earlier (All versions), SIMATIC WinCC V7.3 and newer (All versions). An attacker with network access to affected installations, which are configured without "Encrypted Communication", can execute arbitrary code. The security vulnerability could be exploited by an unauthenticated attacker with network access to the affected installation. No user interaction is required to exploit this security vulnerability. The vulnerability impacts confidentiality, integrity, and availability of the device. At the time of advisory publication no public exploitation of this security vulnerability was known. | [] | null | null | null | null |
|
CVE-2019-12155 | interface_release_resource in hw/display/qxl.c in QEMU 3.1.x through 4.0.0 has a NULL pointer dereference. | [
"cpe:2.3:a:qemu:qemu:4.0.0:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-8375-fmxf-g8pv | Improper access control in the installer for Intel(R) SSD DCT versions before 3.0.23 may allow a privileged user to potentially enable escalation of privilege via local access. | [] | null | null | null | null |
|
GHSA-pqh4-m6j8-9g8m | The Animal Kaiser Zangetsu (aka com.wAnimalKaiserZangetsu) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] | null | null | null | null |
|
CVE-2023-44834 | D-Link DIR-823G A1V1.0.2B05 was discovered to contain a buffer overflow via the StartTime parameter in the SetParentsControlInfo function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. | [
"cpe:2.3:o:dlink:dir-823g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-823g_firmware:1.0.2b05:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-823g:a1:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
CVE-2024-30868 | netentsec NS-ASG 6.3 is vulnerable to SQL Injection via /admin/add_getlogin.php. | [
"cpe:2.3:o:netentsec:ns-asg_firmware:6.3:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2022-48590 | A SQL injection vulnerability exists in the “admin dynamic app mib errors” feature of the ScienceLogic SL1 that takes unsanitized user‐controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database. | [
"cpe:2.3:a:sciencelogic:sl1:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
GHSA-8w8g-mrpm-gm4f | Race condition in the Symantec Enterprise Security Manager (ESM) 6.5.3 managers and agents on Windows before 20070524 allows remote attackers to cause a denial of service (CPU consumption and application hang) via certain network scans to ESM ports. | [] | null | null | null | null |
|
GHSA-8h28-pjqh-fhj2 | Dell Repository Manager, 3.4.3 and prior, contains an Improper Access Control vulnerability in its installation module. A local low-privileged attacker could potentially exploit this vulnerability, leading to gaining escalated privileges. | [] | null | 6.7 | null | null |
|
CVE-2022-0518 | Heap-based Buffer Overflow in radareorg/radare2 | Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.2. | [
"cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*"
] | null | null | 6.3 | null |
GHSA-xrhc-fgm3-x2h4 | In the Linux kernel, the following vulnerability has been resolved:scsi: lpfc: Fix use-after-free in lpfc_unreg_rpi() routineAn error is detected with the following report when unloading the driver:
"KASAN: use-after-free in lpfc_unreg_rpi+0x1b1b"The NLP_REG_LOGIN_SEND nlp_flag is set in lpfc_reg_fab_ctrl_node(), but the
flag is not cleared upon completion of the login.This allows a second call to lpfc_unreg_rpi() to proceed with nlp_rpi set
to LPFC_RPI_ALLOW_ERROR. This results in a use after free access when used
as an rpi_ids array index.Fix by clearing the NLP_REG_LOGIN_SEND nlp_flag in
lpfc_mbx_cmpl_fc_reg_login(). | [] | null | 7.8 | null | null |
|
GHSA-x853-pp6c-h684 | The WP-Members Membership Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 3.4.9.5. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | [] | null | 6.1 | null | null |
|
CVE-2021-25429 | Improper privilege management vulnerability in Bluetooth application prior to SMR July-2021 Release 1 allows untrusted application to access the Bluetooth information in Bluetooth application. | [
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] | null | 4.3 | null | 3.3 |
|
CVE-2024-43697 | Liteos_a has an Improper Input Validation vulnerability | in OpenHarmony v4.1.0 and prior versions allow a local attacker cause DOS through improper input. | [
"cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*"
] | null | 3.3 | null | null |
CVE-2022-38476 | A data race could occur in the <code>PK11_ChangePW</code> function, potentially leading to a use-after-free vulnerability. In Firefox, this lock protected the data when a user changed their master password. This vulnerability affects Firefox ESR < 102.2 and Thunderbird < 102.2. | [
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-3h96-5r7w-m7vq | Ruckus Networks Solo APs firmware releases R110.x or before and Ruckus Networks SZ managed APs firmware releases R5.x or before contain authenticated Root Command Injection in the web-GUI that could allow authenticated valid users to execute privileged commands on the respective systems. | [] | null | null | 8.8 | null |
|
GHSA-hf39-c8p3-whjw | AirDroid 1.0.4 beta uses the MD5 algorithm for values in the checklogin key parameter and 7bb cookie, which makes it easier for remote attackers to obtain cleartext data by sniffing the local wireless network and then conducting a (1) brute-force attack or (2) rainbow-table attack. | [] | null | null | null | null |
|
RHSA-2019:2483 | Red Hat Security Advisory: Red Hat Single Sign-On 7.3.3 security update | keycloak: CSRF check missing in My Resources functionality in the Account Console keycloak: SAML broker does not check existence of signature on document allowing any user impersonation | [
"cpe:/a:redhat:jboss_single_sign_on:7.3"
] | null | null | 8.1 | null |
GHSA-hqvp-wjr7-fp87 | Possible buffer out of bound read can occur due to improper validation of TBTT count and length while parsing the beacon response in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking | [] | null | null | null | null |
|
CVE-2024-41810 | HTML injection in HTTP redirect body | Twisted is an event-based framework for internet applications, supporting Python 3.6+. The `twisted.web.util.redirectTo` function contains an HTML injection vulnerability. If application code allows an attacker to control the redirect URL this vulnerability may result in Reflected Cross-Site Scripting (XSS) in the redirect response HTML body. This vulnerability is fixed in 24.7.0rc1. | [
"cpe:2.3:a:twistedmatrix:twisted:*:*:*:*:*:*:*:*",
"cpe:2.3:a:twisted:twisted:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
CVE-2022-30704 | Improper initialization in the Intel(R) TXT SINIT ACM for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:o:intel:core_i7-11850he_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11850he:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-11600h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11600h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-11390h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11390h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1195g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-11800h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-11850h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-11700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-11700f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-11700k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-11700kf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-11700t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-11370h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-11375h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1180g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1185g7e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1185gre_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1160g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1165g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1185g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-11900h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-11900h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-11950h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-11950h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-11980hk_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-11980hk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-11900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-11900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-11900f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-11900f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-11900k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-11900k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-11900kf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-11900kf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-11900t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-11900t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-11500he_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11500he:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-11320h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11320h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1155g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1155g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-11260h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11260h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-11400h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11400h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-11500h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11500h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-11400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-11400f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11400f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-11400t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11400t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-11500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-11500t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11500t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-11600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-11600k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11600k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-11600kf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11600kf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-11600t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11600t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-11300h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11300h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1140g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1140g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1145g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1145g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1145g7e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1145g7e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1145gre_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1145gre:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1130g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1135g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-11100he_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-11100he:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-1115g4e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1115g4e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-1115gre_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1115gre:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-1120g4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-1125g4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-1110g4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-1115g4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-12900hx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-12900hx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-12950hx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-12950hx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-12900ks_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-12900ks:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-12900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-12900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-12900e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-12900e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-12900f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-12900f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-12900h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-12900h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-12900hk_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-12900hk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-12900t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-12900t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-12900te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-12900te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-12900k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-12900k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-12900kf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-12900kf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1255ul_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1255ul:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1265ul_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1265ul:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-12700hl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-12700hl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-12800hl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-12800hl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-12650hx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-12650hx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-12800hx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-12800hx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-12850hx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-12850hx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1265ue_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1265ue:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1270pe_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1270pe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1250u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1250u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1255u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1255u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1260p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1260p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1260u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1260u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1265u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1265u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1270p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1270p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1280p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1280p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-12650h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-12650h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-12700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-12700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-12700e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-12700e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-12700f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-12700f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-12700h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-12700h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-12700t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-12700t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-12700te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-12700te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-12800h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-12800h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-12800he_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-12800he:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-12700k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-12700k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-12700kf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-12700kf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1235ul_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1235ul:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1245ul_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1245ul:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-12500hl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12500hl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-12600hl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12600hl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-12450hx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12450hx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-12600hx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12600hx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1245ue_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1245ue:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1250pe_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1250pe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1230u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1230u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1235u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1235u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1240p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1240p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1240u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1240u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1245u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1245u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1250p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1250p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-12400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-12400f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12400f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-12400t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12400t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-12450h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12450h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-12500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-12500e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12500e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-12500h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12500h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-12500t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12500t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-12500te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12500te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-12600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-12600h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12600h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-12600he_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12600he:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-12600t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12600t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-12600k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12600k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-12600kf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12600kf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-1215ul_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1215ul:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-12300hl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-12300hl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-1215ue_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1215ue:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-1220pe_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1220pe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-1210u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1210u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-1215u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1215u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-1220p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1220p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-12100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-12100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-12100e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-12100e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-12100f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-12100f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-12100t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-12100t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-12100te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-12100te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-12300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-12300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-12300he_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-12300he:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-12300t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-12300t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10850k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10885h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10900e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10900f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10900k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10900kf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10900t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10900te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10980hk_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10870h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10610u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10810u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1068ng7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10700e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10700f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10700k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10700kf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10700t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10700te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10750h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10850h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10875h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10510u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10510y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10710u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1060g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1065g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10505_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10500h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10200h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10310u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1038ng7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10400f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10400t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10500e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10500t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10500te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10600k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10600kf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10600t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10300h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10400h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10210u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10210y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10310y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1030g4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1030g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1035g1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1035g4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1035g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10105_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10105f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10105t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10305_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10305t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10325_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10100y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10100f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10100e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10100t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10100te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10300t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10320_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10110u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10110y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-1000g1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-1000g4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-1005g1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_8500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_8500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_8505_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_8505:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_g7400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g7400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_g7400e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g7400e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_g7400t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g7400t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_g7400te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g7400te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_g6405_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_g6405t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_g6505_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_g6505t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_g6605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_6500y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_6500y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_7505_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_g6400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_g6400e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g6400e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_g6400t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_g6400te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g6400te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_g6500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_g6500t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_g6600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_6405u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_g5420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_g5420t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_g5600t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_g5620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_5405u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_4417u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_4425y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_g5400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_g5400t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_g5500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_g5500t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_g5600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_4415y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_4410y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_4415u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g6900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g6900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g6900e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g6900e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g6900t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g6900t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g6900te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g6900te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g5905_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g5905:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g5905t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g5905t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g5925_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g5925:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g5900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g5900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g5900e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g5900e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g5900t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g5900t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g5900te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g5900te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g5920_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g5920:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g4930e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g4930e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g4932e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g4932e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g4930_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g4930:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g4930t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g4930t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g4950_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g4950:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g4900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g4900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g4900t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g4900t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g4920_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g4920:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g3930e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g3930e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g3930te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g3930te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g3930_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g3930:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g3930t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g3930t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g3950_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g3950:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g3900e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g3900e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g3902e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g3902e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g3900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g3900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g3900t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g3900t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g3900te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g3900te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g3920_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g3920:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g1840_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g1840:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g1840t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g1840t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g1850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g1850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g1820te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g1820te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g1820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g1820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g1820t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g1820t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g1830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g1830:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g1620t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g1620t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g1630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g1630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g1610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g1610:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g1610t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g1610t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g1620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g1620:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_j6412_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j6412:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_j6413_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j6413:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_j4025_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j4025:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_j4125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j4125:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_j3355e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j3355e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_j3455e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j3455e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_j4005_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j4005:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_j4105_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j4105:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_j3355_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j3355:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_j3455_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j3455:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_j3060_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j3060:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_j3160_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j3160:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_j1800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j1800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_j1900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j1900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_j1750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j1750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_j1850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j1850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n6210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n6210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n4500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n4500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n4505_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n4505:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n5100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n5100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n5105_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n5105:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n6211_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n6211:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n4020_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n4120_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n3350e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n4000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n4100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n3350_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n3350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n3450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n3450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n3010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n3010:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n3060_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n3060:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n3160_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n3160:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n3000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n3000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n3050_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n3050:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n3150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n3150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n2808_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n2808:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n2840_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n2840:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n2940_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n2940:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n2807_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n2807:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n2830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n2830:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n2930_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n2930:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n2806_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n2806:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n2815_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n2815:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n2820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n2820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n2920_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n2920:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n2805_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n2805:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n2810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n2810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n2910_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n2910:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_7305l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_7305l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_7305e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_7305e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_7300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_7300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_7305_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_7305:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_6600he_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_6600he:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_6305_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_6305:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_6305e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_6305e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_5305u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_5305u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_5205u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_5205u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_4305ue_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_4305ue:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_4305u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_4305u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_4205u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_4205u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_3867u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_3867u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_3965y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_3965y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_3865u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_3865u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_3965u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_3965u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_3855u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_3855u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_3955u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_3955u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_3215u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_3215u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_3765u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_3765u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_3205u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_3205u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_3755u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_3755u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_2970m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_2970m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_2000e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_2000e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_2002e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_2002e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_2957u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_2957u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_2961y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_2961y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_2981u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_2981u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_2950m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_2950m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_2955u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_2955u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_2980u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_2980u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_1005m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_1005m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_1017u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_1017u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_1019y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_1019y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_1000m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_1000m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_1007u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_1007u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_1020e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_1020e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_1020m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_1020m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_1037u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_1037u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_1047ue_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_1047ue:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2314_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2314:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2324g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2324g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2334_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2334:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2336_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2336:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2356g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2356g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2374g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2374g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2378_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2378:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2378g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2378g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2386g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2386g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2388g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2388g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w3-2423_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w3-2423:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w3-2425_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w3-2425:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w3-2435_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w3-2435:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w5-2445_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w5-2445:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w5-2455x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w5-2455x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w5-2465x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w5-2465x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w5-3425_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w5-3425:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w5-3435x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w5-3435x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w7-2475x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w7-2475x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w7-2495x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w7-2495x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w7-3445_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w7-3445:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w7-3455_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w7-3455:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w7-3465x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w7-3465x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w9-3475x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w9-3475x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w9-3495x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w9-3495x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-11155mle_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-11155mle:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-11155mre_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-11155mre:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-11555mle_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-11555mle:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-11555mre_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-11555mre:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-11865mle_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-11865mle:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-11865mre_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-11865mre:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3323_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3323:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3335_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3335:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3345_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3345:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3365_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3365:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3375:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-11855m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-11855m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-11955m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-11955m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1350_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1350p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1350p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1370_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1370p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1370p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1390:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1390p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1390p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1390t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1390t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-10855m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-10885m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1250e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1250e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1250p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1250te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1250te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1270_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1270e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1270e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1270p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1270p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1270te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1270te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1290e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1290e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1290p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1290t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1290te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1290te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2223_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2223:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2225_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2225:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2235_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2235:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2245_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2245:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2255_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2255:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2265_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2265:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2275_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2275:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2295_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2295:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3223_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3225_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3235_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3235:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3245_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3245m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3265_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3265m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3275_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3275m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3175x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3175x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2123_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2123:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2125:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2133_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2133:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2135_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2135:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2145_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2145:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2155_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2155:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2175_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2175:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2195_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2195:-:*:*:*:*:*:*:*"
] | null | 7.2 | null | null |
|
GHSA-f43w-mfrf-mv66 | TeamViewer Desktop for Windows before 15.8.3 does not properly quote its custom URI handlers. A malicious website could launch TeamViewer with arbitrary parameters, as demonstrated by a teamviewer10: --play URL. An attacker could force a victim to send an NTLM authentication request and either relay the request or capture the hash for offline password cracking. This affects teamviewer10, teamviewer8, teamviewerapi, tvchat1, tvcontrol1, tvfiletransfer1, tvjoinv8, tvpresent1, tvsendfile1, tvsqcustomer1, tvsqsupport1, tvvideocall1, and tvvpn1. The issue is fixed in 8.0.258861, 9.0.258860, 10.0.258873, 11.0.258870, 12.0.258869, 13.2.36220, 14.2.56676, 14.7.48350, and 15.8.3. | [] | null | null | null | null |
|
CVE-2010-0807 | Microsoft Internet Explorer 7 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, leading to memory corruption, aka "HTML Rendering Memory Corruption Vulnerability." | [
"cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-gjfh-x4fj-rg67 | Use of Out-of-range Pointer Offset vulnerability in Cesanta Mongoose Web Server v7.14 allows an attacker to send an unexpected TLS packet and produce a segmentation fault on the application. | [] | null | 8.2 | null | null |
|
CVE-2000-0358 | ORBit and gnome-session in Red Hat Linux 6.1 allows remote attackers to crash a program. | [
"cpe:2.3:o:redhat:linux:6.1:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-5w76-2v5j-77r4 | Inductive Automation Ignition ParameterVersionJavaSerializationCodec Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Inductive Automation Ignition. Authentication is not required to exploit this vulnerability.The specific flaw exists within the ParameterVersionJavaSerializationCodec class. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-20290. | [] | null | null | 9.8 | null |
|
GHSA-7496-f8r6-4592 | Microsoft Edge (Chromium-based) Update Elevation of Privilege Vulnerability. | [] | null | 6.6 | null | null |
|
CVE-2025-21515 | Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC). Supported versions that are affected are Prior to 9.2.9.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks of this vulnerability can result in takeover of JD Edwards EnterpriseOne Tools. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). | [
"cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:prior_to_9.2.9.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
|
CVE-2014-2355 | The (1) CimView and (2) CimEdit components in GE Proficy HMI/SCADA-CIMPLICITY 8.2 and earlier allow remote attackers to gain privileges via a crafted CIMPLICITY screen (aka .CIM) file. | [
"cpe:2.3:a:ge:intelligent_platforms_proficy_hmi\\/scada_cimplicity:*:*:*:*:*:*:*:*"
] | null | null | null | 6.9 |
|
RHSA-2024:0577 | Red Hat Security Advisory: linux-firmware security update | hw: intel: Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi | [
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 8.2 | null | null |
RHSA-2023:0856 | Red Hat Security Advisory: kernel security update | kernel: memory corruption in AX88179_178A based USB ethernet device. kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c kernel: stack overflow in do_proc_dointvec and proc_skip_spaces | [
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 7.8 | null | null |
GHSA-xqrw-f62h-4ff2 | Reflected cross-site scripting (XSS) vulnerabilities in WithSecure through 2022-08-10) exists within the F-Secure Policy Manager due to an unvalidated parameter in the endpoint, which allows remote attackers to provide a malicious input. | [] | null | 6.1 | null | null |
|
CVE-2003-0818 | Multiple integer overflows in Microsoft ASN.1 library (MSASN1.DLL), as used in LSASS.EXE, CRYPT32.DLL, and other Microsoft executables and libraries on Windows NT 4.0, 2000, and XP, allow remote attackers to execute arbitrary code via ASN.1 BER encodings with (1) very large length fields that cause arbitrary heap data to be overwritten, or (2) modified bit strings. | [
"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:enterprise:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:r2:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:standard:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:*:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:*:terminal_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:*:workstation:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:terminal_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:workstation:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:terminal_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:workstation:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp3:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp3:terminal_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp3:workstation:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp4:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp4:terminal_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp4:workstation:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp5:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp5:terminal_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp5:workstation:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp6:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp6:terminal_server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp6:workstation:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:server:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:workstation:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp1:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-pppx-wxx4-46j2 | GE CIMPICITY versions 2022 and prior is vulnerable when data from a faulting address controls code flow starting at gmmiObj!CGmmiRootOptionTable, which could allow an attacker to execute arbitrary code. | [] | null | 7.8 | null | null |
|
CVE-2024-39934 | Robotmk before 2.0.1 allows a local user to escalate privileges (e.g., to SYSTEM) if automated Python environment setup is enabled, because the "shared holotree usage" feature allows any user to edit any Python environment. | [
"cpe:2.3:a:robotmk:robotmk:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
GHSA-958m-4rv5-24cm | An attacker can craft a specific IdaPro *.i64 file that will cause the BinDiff plugin to load an invalid memory offset. This can allow the attacker to control the instruction pointer and execute arbitrary code. It is recommended to upgrade BinDiff 7 | [] | null | null | null | null |
|
RHSA-2018:2692 | Red Hat Security Advisory: firefox security update | Mozilla: Proxy bypass using automount and autofs Mozilla: Memory safety bugs fixed in Firefox 62 and Firefox ESR 60.2 Mozilla: Use-after-free in driver timers Mozilla: Use-after-free in IndexedDB Mozilla: Out-of-bounds write with malicious MAR file Mozilla: Same-origin policy violation using meta refresh and performance.getEntries to steal cross-origin URLs | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.5 | null |
CVE-2016-3246 | Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Microsoft Edge Memory Corruption Vulnerability." | [
"cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.6 |
|
CVE-2007-5145 | Multiple buffer overflows in system DLL files in Microsoft Windows XP, as used by Microsoft Windows Explorer (explorer.exe) 6.00.2900.2180, Don Ho Notepad++, unspecified Adobe Macromedia applications, and other programs, allow user-assisted remote attackers to cause a denial of service (application crash) via long strings in the (1) author, (2) title, (3) subject, and (4) comment Properties fields of a file, possibly involving improper handling of extended file attributes by the (a) NtQueryInformationFile, (b) NtQueryDirectoryFile, (c) NtSetInformationFile, (d) FileAllInformation, (e) FileNameInformation, and other FILE_INFORMATION_CLASS functions in ntdll.dll and the (f) GetFileAttributesExW and (g) GetFileAttributesW functions in kernel32.dll, a related issue to CVE-2007-1347. | [
"cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2015-0133 | IBM WebSphere Commerce 7.0 Feature Pack 4 through 8 allows remote attackers to read arbitrary files and possibly obtain administrative privileges via an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. | [
"cpe:2.3:a:ibm:websphere_commerce:7.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.