Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
sequencelengths
0
5.42k
CVE-2005-3211
Multiple interpretation error in unspecified versions of BitDefender Antivirus allows remote attackers to bypass virus detection via a malicious executable in a specially crafted RAR file with malformed central and local headers, which can still be opened by products such as Winrar and PowerZip, even though they are rejected as corrupted by Winzip and BitZipper.
[ "cpe:2.3:a:softwin:bitdefender_antivirus:*:*:*:*:*:*:*:*" ]
CVE-2000-0723
Helix GNOME Updater helix-update 0.5 and earlier does not properly create /tmp directories, which allows local users to create empty system configuration files such as /etc/config.d/bashrc, /etc/config.d/csh.cshrc, and /etc/rc.config.
[ "cpe:2.3:a:helix_code:gnome_installer:0.2:*:*:*:*:*:*:*" ]
CVE-2023-6811
The Language Translate Widget for WordPress – ConveyThis plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'api_key’ parameter in all versions up to, and including, 223 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[ "cpe:2.3:a:conveythis:language_translate_widget_for_word_press_conveythis:223:*:*:*:*:*:*:*" ]
CVE-2021-43324
LibreNMS through 21.10.2 allows XSS via a widget title.
[ "cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:*" ]
GHSA-v5qm-7cqg-grj3
In ImageMagick 7.0.6-10, there is a heap-based buffer overflow in the TracePoint() function in MagickCore/draw.c.
[]
CVE-2023-28489
A vulnerability has been identified in CP-8031 MASTER MODULE (All versions < CPCI85 V05), CP-8050 MASTER MODULE (All versions < CPCI85 V05). Affected devices are vulnerable to command injection via the web server port 443/tcp, if the parameter “Remote Operation” is enabled. The parameter is disabled by default. The vulnerability could allow an unauthenticated remote attacker to perform arbitrary code execution on the device.
[ "cpe:2.3:o:siemens:cp-8031_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:cp-8031:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:cp-8050_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:cp-8050:-:*:*:*:*:*:*:*" ]
GHSA-h9cc-4rm6-chr3
The Windows kernel-mode drivers in win32k.sys in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista SP1 and SP2, Server 2008 Gold and SP2, Windows 7, and Server 2008 R2 "do not properly validate all callback parameters when creating a new window," which allows local users to execute arbitrary code, aka "Win32k Window Creation Vulnerability."
[]
CVE-2024-31366
WordPress Post Type Builder (PTB) plugin <= 2.0.8 - Auth. Arbitrary Post/Page Creation vulnerability
Missing Authorization vulnerability in Themify Post Type Builder (PTB).This issue affects Post Type Builder (PTB): from n/a through 2.0.8.
[]
CVE-2021-32486
In modem 2G RRM, there is a possible system crash due to a heap buffer overflow. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00500621; Issue ID: ALPS04964928.
[ "cpe:2.3:o:mediatek:modem:lr12a:*:*:*:*:*:*:*", "cpe:2.3:o:mediatek:modem:lr13:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6762d:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6762m:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6765t:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6767:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6769t:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6769z:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6783:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6785t:-:*:*:*:*:*:*:*" ]
GHSA-fv55-wvf8-g56x
Microsoft Publisher 2002 SP3, 2003 SP3, and 2010 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Publisher file, aka "Microsoft Publisher Memory Corruption Vulnerability."
[]
CVE-2007-3079
listmembers.php in EQdkp 1.3.2c and earlier allows remote attackers to obtain sensitive information via an invalid compare parameter, which reveals the path.
[ "cpe:2.3:a:eqdkp:eqdkp:*:*:*:*:*:*:*:*" ]
GHSA-r9j6-hccx-7qh3
Buffer overflow in hanterm 3.3.1 and earlier allows local users to execute arbitrary code via a long string in the (1) -fn, (2) -hfb, or (3) -hfn argument.
[]
GHSA-prx9-98cr-w8j7
A remote denial of service vulnerability in HPE Systems Insight Manager in all versions prior to 7.6 was found.
[]
CVE-2009-1751
SQL injection vulnerability in list_list.php in Realty Webware Technologies Web-Base 1.0 allows remote attackers to execute arbitrary SQL commands via the id parameter.
[ "cpe:2.3:a:realtywebware:realty_web-base:1.0:*:*:*:*:*:*:*" ]
GHSA-8hm3-4p5h-mv6g
lib-mail/message-header-parser.c in Dovecot 1.2.x before 1.2.17 and 2.0.x before 2.0.13 does not properly handle '\0' characters in header names, which allows remote attackers to cause a denial of service (daemon crash or mailbox corruption) via a crafted e-mail message.
[]
GHSA-mch6-54rg-c2wq
A vulnerability has been found in SourceCodester Product Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /supplier.php. The manipulation of the argument supplier_name/supplier_contact leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-253012.
[]
CVE-2006-1579
SQL injection vulnerability in topics.php in Dynamic Bulletin Board System (DbbS) 2.0-alpha and earlier allows remote attackers to execute arbitrary SQL commands via the limite parameter.
[ "cpe:2.3:a:dbbs:dbbs:*:*:*:*:*:*:*:*" ]
GHSA-5g88-9rgx-mvq2
SQL injection vulnerability in status/service/acknowledge in Opsview before 4.4.1 allows remote attackers to execute arbitrary SQL commands via the service_selection parameter.
[]
GHSA-9fwp-25vr-3wqm
Adobe Character Animator version 4.4 (and earlier) is affected by an Access of Memory Location After End of Buffer vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
CVE-2011-2315
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.49, 8.50, and 8.51 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Security.
[ "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.49:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.50:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.51:*:*:*:*:*:*:*" ]
GHSA-422c-v5pr-46mh
GroupWise 5.5 and 6 running in live remote or smart caching mode allows remote attackers to read arbitrary users' mailboxes by extracting usernames and passwords from sniffed network traffic, as addressed by the "Padlock" fix.
[]
CVE-2003-0098
Unknown vulnerability in apcupsd before 3.8.6, and 3.10.x before 3.10.5, allows remote attackers to gain root privileges, possibly via format strings in a request to a slave server.
[ "cpe:2.3:a:apcupsd:apcupsd:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:2.2:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*" ]
GHSA-qw7g-rph5-vw92
Inappropriate implementation in Autofill in Google Chrome prior to 90.0.4430.72 allowed a remote attacker to spoof security UI via a crafted HTML page.
[]
GHSA-qr2v-3fjr-52fc
Missing Authorization vulnerability in Arni Cinco WPCargo Track & Trace allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WPCargo Track & Trace: from n/a through 7.0.6.
[]
CVE-2024-50072
x86/bugs: Use code segment selector for VERW operand
In the Linux kernel, the following vulnerability has been resolved: x86/bugs: Use code segment selector for VERW operand Robert Gill reported below #GP in 32-bit mode when dosemu software was executing vm86() system call: general protection fault: 0000 [#1] PREEMPT SMP CPU: 4 PID: 4610 Comm: dosemu.bin Not tainted 6.6.21-gentoo-x86 #1 Hardware name: Dell Inc. PowerEdge 1950/0H723K, BIOS 2.7.0 10/30/2010 EIP: restore_all_switch_stack+0xbe/0xcf EAX: 00000000 EBX: 00000000 ECX: 00000000 EDX: 00000000 ESI: 00000000 EDI: 00000000 EBP: 00000000 ESP: ff8affdc DS: 0000 ES: 0000 FS: 0000 GS: 0033 SS: 0068 EFLAGS: 00010046 CR0: 80050033 CR2: 00c2101c CR3: 04b6d000 CR4: 000406d0 Call Trace: show_regs+0x70/0x78 die_addr+0x29/0x70 exc_general_protection+0x13c/0x348 exc_bounds+0x98/0x98 handle_exception+0x14d/0x14d exc_bounds+0x98/0x98 restore_all_switch_stack+0xbe/0xcf exc_bounds+0x98/0x98 restore_all_switch_stack+0xbe/0xcf This only happens in 32-bit mode when VERW based mitigations like MDS/RFDS are enabled. This is because segment registers with an arbitrary user value can result in #GP when executing VERW. Intel SDM vol. 2C documents the following behavior for VERW instruction: #GP(0) - If a memory operand effective address is outside the CS, DS, ES, FS, or GS segment limit. CLEAR_CPU_BUFFERS macro executes VERW instruction before returning to user space. Use %cs selector to reference VERW operand. This ensures VERW will not #GP for an arbitrary user %ds. [ mingo: Fixed the SOB chain. ]
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*" ]
CVE-2023-34010
WordPress Media Library Assistant Plugin <= 3.0.7 is vulnerable to Cross Site Scripting (XSS)
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in submodule of David Lingren Media Library Assistant plugin  <= 3.0.7 versions.
[ "cpe:2.3:a:davidlingren:media_library_assistant:*:*:*:*:*:wordpress:*:*" ]
CVE-2023-5321
Missing Authorization in hamza417/inure
Missing Authorization in GitHub repository hamza417/inure prior to build94.
[ "cpe:2.3:a:hamza417:inure:build44:*:*:*:*:android:*:*", "cpe:2.3:a:hamza417:inure:build45:*:*:*:*:android:*:*", "cpe:2.3:a:hamza417:inure:build46:*:*:*:*:android:*:*", "cpe:2.3:a:hamza417:inure:build47:*:*:*:*:android:*:*", "cpe:2.3:a:hamza417:inure:build48:*:*:*:*:android:*:*", "cpe:2.3:a:hamza417:inure:build49:*:*:*:*:android:*:*", "cpe:2.3:a:hamza417:inure:build51:*:*:*:*:android:*:*", "cpe:2.3:a:hamza417:inure:build52:*:*:*:*:android:*:*", "cpe:2.3:a:hamza417:inure:build53:*:*:*:*:android:*:*", "cpe:2.3:a:hamza417:inure:build55:*:*:*:*:android:*:*", "cpe:2.3:a:hamza417:inure:build56:*:*:*:*:android:*:*", "cpe:2.3:a:hamza417:inure:build57:*:*:*:*:android:*:*", "cpe:2.3:a:hamza417:inure:build58:*:*:*:*:android:*:*", "cpe:2.3:a:hamza417:inure:build59:*:*:*:*:android:*:*", "cpe:2.3:a:hamza417:inure:build60:*:*:*:*:android:*:*", "cpe:2.3:a:hamza417:inure:build61:*:*:*:*:android:*:*", "cpe:2.3:a:hamza417:inure:build62:*:*:*:*:android:*:*", "cpe:2.3:a:hamza417:inure:build63:*:*:*:*:android:*:*", "cpe:2.3:a:hamza417:inure:build64:*:*:*:*:android:*:*", "cpe:2.3:a:hamza417:inure:build65:*:*:*:*:android:*:*", "cpe:2.3:a:hamza417:inure:build66:*:*:*:*:android:*:*", "cpe:2.3:a:hamza417:inure:build67:*:*:*:*:android:*:*", "cpe:2.3:a:hamza417:inure:build68:*:*:*:*:android:*:*", "cpe:2.3:a:hamza417:inure:build69:*:*:*:*:android:*:*", "cpe:2.3:a:hamza417:inure:build70:*:*:*:*:android:*:*", "cpe:2.3:a:hamza417:inure:build71:*:*:*:*:android:*:*", "cpe:2.3:a:hamza417:inure:build72:*:*:*:*:android:*:*", "cpe:2.3:a:hamza417:inure:build73:*:*:*:*:android:*:*", "cpe:2.3:a:hamza417:inure:build74:*:*:*:*:android:*:*", "cpe:2.3:a:hamza417:inure:build75:*:*:*:*:android:*:*", "cpe:2.3:a:hamza417:inure:build76:*:*:*:*:android:*:*", "cpe:2.3:a:hamza417:inure:build77:*:*:*:*:android:*:*", "cpe:2.3:a:hamza417:inure:build78:*:*:*:*:android:*:*", "cpe:2.3:a:hamza417:inure:build79:*:*:*:*:android:*:*", "cpe:2.3:a:hamza417:inure:build80:*:*:*:*:android:*:*", "cpe:2.3:a:hamza417:inure:build83:*:*:*:*:android:*:*", "cpe:2.3:a:hamza417:inure:build85:*:*:*:*:android:*:*", "cpe:2.3:a:hamza417:inure:build86:*:*:*:*:android:*:*", "cpe:2.3:a:hamza417:inure:build87:*:*:*:*:android:*:*", "cpe:2.3:a:hamza417:inure:build88:*:*:*:*:android:*:*", "cpe:2.3:a:hamza417:inure:build89:*:*:*:*:android:*:*", "cpe:2.3:a:hamza417:inure:build92:*:*:*:*:android:*:*", "cpe:2.3:a:hamza417:inure:build93:*:*:*:*:android:*:*" ]
CVE-2012-3360
Directory traversal vulnerability in virt/disk/api.py in OpenStack Compute (Nova) Folsom (2012.2) and Essex (2012.1), when used over libvirt-based hypervisors, allows remote authenticated users to write arbitrary files to the disk image via a .. (dot dot) in the path attribute of a file element.
[ "cpe:2.3:a:openstack:essex:2012.1:*:*:*:*:*:*:*", "cpe:2.3:a:openstack:folsom:2012.2:*:*:*:*:*:*:*" ]
CVE-2019-2920
Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/ODBC). Supported versions that are affected are 5.3.13 and prior and 8.0.17 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Connectors. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
[ "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*" ]
GHSA-692h-cj57-w2g9
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in Security Update 2022-005 Catalina, macOS Big Sur 11.6.8, macOS Monterey 12.5. Processing a maliciously crafted Postscript file may result in unexpected app termination or disclosure of process memory.
[]
CVE-2016-4470
The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.
[ "cpe:2.3:o:oracle:vm_server:3.3:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:12.0:sp1:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_real_time:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*" ]
CVE-2011-0112
WebKit, as used in Apple iTunes before 10.2 on Windows, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.
[ "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.6:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.7:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:6.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:6.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:6.0.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:6.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.6:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.7:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:8.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:8.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:8.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:8.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:8.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:9.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:9.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:9.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:9.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:9.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:9.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:10.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:10.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:10.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*" ]
GHSA-fx2c-96vj-985v
HAProxyMessageDecoder Stack Exhaustion DoS
ImpactA StackOverflowError can be raised when parsing a malformed crafted message due to an infinite recursion.PatchesUsers should upgrade to 4.1.86.Final.WorkaroundsThere is no workaround, except using a custom HaProxyMessageDecoder.ReferencesWhen parsing a TLV with type = PP2_TYPE_SSL, the value can be again a TLV with type = PP2_TYPE_SSL and so on. The only limitation of the recursion is that the TLV length cannot be bigger than 0xffff because it is encoded in an unsigned short type. Providing a TLV with a nesting level that is large enough will lead to raising of a StackOverflowError. The StackOverflowError will be caught if HAProxyMessageDecoder is used as part of Netty’s ChannelPipeline, but using it directly without the ChannelPipeline will lead to a thrown exception / crash.For more informationIf you have any questions or comments about this advisory:Open an issue in [netty](https://github.com/netty/netty)
[]
GHSA-4r7h-v53j-c9qw
Improper access control vulnerability in TelephonyUI prior to SMR Jul-2022 Release 1 allows attackers to change preferred network type by unprotected binder call.
[]
GHSA-69fm-h692-4f7v
Cross-site Request Forgery (CSRF) in Checkmk < 2.2.0p15, < 2.1.0p37, <= 2.0.0p39 allow an authenticated attacker to delete user-messages for individual users.
[]
CVE-2024-28038
The web interface of the affected devices processes a cookie value improperly, leading to a stack buffer overflow. More precisely, giving too long character string to MFPSESSIONID parameter results in a stack buffer overflow. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].
[]
CVE-2024-36404
GeoTools Remote Code Execution (RCE) vulnerability in evaluating XPath expressions
GeoTools is an open source Java library that provides tools for geospatial data. Prior to versions 31.2, 30.4, and 29.6, Remote Code Execution (RCE) is possible if an application uses certain GeoTools functionality to evaluate XPath expressions supplied by user input. Versions 31.2, 30.4, and 29.6 contain a fix for this issue. As a workaround, GeoTools can operate with reduced functionality by removing the `gt-complex` jar from one's application. As an example of the impact, application schema `datastore` would not function without the ability to use XPath expressions to query complex content. Alternatively, one may utilize a drop-in replacement GeoTools jar from SourceForge for versions 31.1, 30.3, 30.2, 29.2, 28.2, 27.5, 27.4, 26.7, 26.4, 25.2, and 24.0. These jars are for download only and are not available from maven central, intended to quickly provide a fix to affected applications.
[ "cpe:2.3:a:geotools:geotools:*:*:*:*:*:*:*:*", "cpe:2.3:a:geotools:geotools:30.0:-:*:*:*:*:*:*", "cpe:2.3:a:geotools:geotools:31.0:-:*:*:*:*:*:*" ]
CVE-2023-0441
Gallery Blocks with Lightbox < 3.0.8 - Subscriber+ Arbitrary Options Update
The Gallery Blocks with Lightbox WordPress plugin before 3.0.8 has an AJAX endpoint that can be accessed by any authenticated users, such as subscriber. The callback function allows numerous actions, the most serious one being reading and updating the WordPress options which could be used to enable registration with a default administrator user role.
[ "cpe:2.3:a:simplygallery:simply_gallery_blocks_with_lightbox:*:*:*:*:*:wordpress:*:*" ]
CVE-2004-1920
X-Micro WLAN 11b Broadband Router 1.2.2, 1.2.2.3, 1.2.2.4, and 1.6.0.0 has a hardcoded "super" username and password, which could allow remote attackers to gain access.
[ "cpe:2.3:h:x-micro:wlan_11b_broadband_router_firmware:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:h:x-micro:wlan_11b_broadband_router_firmware:1.2.2.3:*:*:*:*:*:*:*", "cpe:2.3:h:x-micro:wlan_11b_broadband_router_firmware:1.2.2.4:*:*:*:*:*:*:*", "cpe:2.3:h:x-micro:wlan_11b_broadband_router_firmware:1.6.0:*:*:*:*:*:*:*", "cpe:2.3:h:x-micro:wlan_11b_broadband_router_firmware:1.6.0.1:*:*:*:*:*:*:*" ]
CVE-2018-6360
mpv through 0.28.0 allows remote attackers to execute arbitrary code via a crafted web site, because it reads HTML documents containing VIDEO elements, and accepts arbitrary URLs in a src attribute without a protocol whitelist in player/lua/ytdl_hook.lua. For example, an av://lavfi:ladspa=file= URL signifies that the product should call dlopen on a shared object file located at an arbitrary local pathname. The issue exists because the product does not consider that youtube-dl can provide a potentially unsafe URL.
[ "cpe:2.3:a:mpv:mpv:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
GHSA-pp7x-qr4j-fm9r
An issue was discovered on Vera VeraEdge 1.7.19 and Veralite 1.7.481 devices. The device provides a web user interface that allows a user to manage the device. As a part of the functionality the device firmware file contains a file known as relay.sh which allows the device to create relay ports and connect the device to Vera servers. This is primarily used as a method of communication between the device and Vera servers so the devices can be communicated with even when the user is not at home. One of the parameters retrieved by this specific script is "remote_host". This parameter is not sanitized by the script correctly and is passed in a call to "eval" to execute another script where remote_host is concatenated to be passed a parameter to the second script. This allows an attacker to escape from the executed command and then execute any commands of his/her choice.
[]
GHSA-cg88-8hv4-jpxm
TVS Motor Company Limited TVS Connect Android v4.6.0 and IOS v5.0.0 was discovered to insecurely handle the RSA key pair, allowing attackers to possibly access sensitive information via decryption.
[]
CVE-2020-7166
A operatorgrouptreeselectcontent expression language injection remote code execution vulnerability was discovered in HPE Intelligent Management Center (iMC) version(s): Prior to iMC PLAT 7.3 (E0705P07).
[ "cpe:2.3:a:hp:intelligent_management_center:*:*:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:-:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0501:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0503:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0503p02:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0504:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p02:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p04:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p2:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0504p4:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0506:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p02:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p03:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p07:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0506p09:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0605:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0605h02:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0605h05:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0605p04:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0605p06:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0705:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0705p02:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0705p04:*:*:*:*:*:*", "cpe:2.3:a:hp:intelligent_management_center:7.3:e0705p06:*:*:*:*:*:*" ]
GHSA-9mj7-f2wr-hjrv
On BIG-IP versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all version of 13.1.x, when a DNS profile with the Rapid Response Mode setting enabled is configured on a virtual server with hardware SYN cookies enabled, undisclosed requests cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
[]
CVE-2012-5529
TraceManager in Firebird 2.5.0 and 2.5.1, when trace is enabled, allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) by preparing an empty dynamic SQL query.
[ "cpe:2.3:a:firebirdsql:firebird:2.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:firebirdsql:firebird:2.5.1:*:*:*:*:*:*:*" ]
CVE-2007-6475
Multiple directory traversal vulnerabilities in GF-3XPLORER 2.4 allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang_sel parameter to (1) updater.php and (2) thumber.php.
[ "cpe:2.3:a:gf_3xplorer:gf_3xplorer:2.4:*:*:*:*:*:*:*" ]
CVE-2024-26032
Adobe Experience Manager | Cross-site Scripting (DOM-based XSS) (CWE-79)
Adobe Experience Manager versions 6.5.19 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable web pages. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable script. This could result in arbitrary code execution in the context of the victim's browser. Exploitation of this issue requires user interaction.
[ "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*" ]
GHSA-vvjv-97j8-94xh
vantage6 vulnerable to Improper Preservation of Permissions
ImpactAssigning existing users to a different organization is currently possible. It may lead to unintended access: if a user from organization A is accidentally assigned to organization B, they will retain their permissions and therefore might be able to access stuff they should not be allowed to access.PatchesUpdate to 3.8.0WorkaroundsNoneReferencesNoneFor more informationIf you have any questions or comments about this advisory:Email us at [[email protected]](mailto:[email protected])
[]
CVE-2018-17475
Incorrect handling of history on iOS in Navigation in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
CVE-2011-3569
Unspecified vulnerability in the Oracle Web Services Manager component in Oracle Fusion Middleware 11.1.1.3, 11.1.1.4, and 11.1.1.5 allows remote attackers to affect confidentiality via unknown vectors related to Web Services Security.
[ "cpe:2.3:a:oracle:fusion_middleware:11.1.1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:11.1.1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:11.1.1.5.0:*:*:*:*:*:*:*" ]
CVE-2023-25738
Members of the <code>DEVMODEW</code> struct set by the printer device driver weren't being validated and could have resulted in invalid values which in turn would cause the browser to attempt out of bounds access to related variables.<br>*This bug only affects Firefox on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
CVE-2018-8413
A remote code execution vulnerability exists when "Windows Theme API" does not properly decompress files, aka "Windows Theme API Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
CVE-2023-22574
Dell PowerScale OneFS 9.0.0.x - 9.4.0.x contain an insertion of sensitive information into log file vulnerability in platform API of IPMI module. A low-privileged user with permission to read logs on the cluster could potentially exploit this vulnerability, leading to Information disclosure and denial of service.
[ "cpe:2.3:o:dell:emc_powerscale_onefs:*:*:*:*:*:*:*:*" ]
GHSA-7r26-7f6r-gjq2
A vulnerability exists in the HTTP request parser in Schneider Electric's Modicon M340, Modicon Premium, Modicon Quantum PLC, BMXNOR0200 which could allow arbitrary code execution.
[]
GHSA-c6x6-8wx3-q682
Directory traversal vulnerability in system.php in ReloadCMS 1.2.7 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the module parameter to index.php.
[]
GHSA-4qp4-ccmr-483g
Out of bounds write in JavaScript in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
[]
GHSA-g9x8-7jhm-2hvm
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RAX200 before 1.0.4.120, RAX75 before 1.0.4.120, RAX80 before 1.0.4.120, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12.
[]
GHSA-v8hr-9qpr-jrwc
vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share.
[]
CVE-2019-2050
In tearDownClientInterface of WificondControl.java, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.0 Android-8.1 Android-9 Android ID: A-121327323
[ "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*" ]
CVE-2003-0731
CiscoWorks Common Management Foundation (CMF) 2.1 and earlier allows the guest user to gain administrative privileges via a certain POST request to com.cisco.nm.cmf.servlet.CsAuthServlet, possibly involving the "cmd" parameter with a modifyUser value and a modified "priviledges" parameter.
[ "cpe:2.3:a:cisco:resource_manager:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:resource_manager:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:resource_manager_essentials:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:resource_manager_essentials:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:resource_manager_essentials:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ciscoworks_common_management_foundation:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:ciscoworks_common_management_foundation:2.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ciscoworks_cd1:1st:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ciscoworks_cd1:2nd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ciscoworks_cd1:3rd:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ciscoworks_cd1:4th:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ciscoworks_cd1:5th:*:*:*:*:*:*:*" ]
GHSA-34p3-c86q-c8j4
Stack-based buffer overflow in OmniInet.exe in the Backup Client Service in HP OpenView Storage Data Protector 6.00, 6.10, and 6.11 allows remote attackers to execute arbitrary code via a malformed EXEC_SCRIPT message.
[]
GHSA-h522-79gf-rp4c
An exploitable command injection vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted HTTP POST can cause a privilege escalation resulting in root shell. An attacker can inject OS commands into the remoteNetmask0= parameter in the "/goform/net\_Web\_get_value" uri to trigger this vulnerability.
[]
CVE-2009-4377
The (1) SMB and (2) SMB2 dissectors in Wireshark 0.9.0 through 1.2.4 allow remote attackers to cause a denial of service (crash) via a crafted packet that triggers a NULL pointer dereference, as demonstrated by fuzz-2009-12-07-11141.pcap.
[ "cpe:2.3:a:wireshark:wireshark:0.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.9.5:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.9.6:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.9.7:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.9.8:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.9.10:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.9.14:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.99:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.99.0:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.99.1:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.99.2:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.99.3:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.99.4:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.99.5:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.99.6:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.99.6a:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.99.7:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.99.8:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:0.99.9:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:1.2.4:*:*:*:*:*:*:*" ]
CVE-2025-23558
WordPress Geotagged Media plugin <= 0.3.0 - CSRF to Stored XSS vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in digfish Geotagged Media allows Stored XSS.This issue affects Geotagged Media: from n/a through 0.3.0.
[]
GHSA-9cjh-hf52-rgh4
Microsoft Internet Explorer 5.01, 6, and 7 accesses uninitialized memory, which allows remote attackers to cause a denial of service (crash) and execute arbitrary code via unknown vectors, a different vulnerability than CVE-2008-2254, aka "HTML Object Memory Corruption Vulnerability."
[]
CVE-2003-0144
Buffer overflow in the lprm command in the lprold lpr package on SuSE 7.1 through 7.3, OpenBSD 3.2 and earlier, and possibly other operating systems, allows local users to gain root privileges via long command line arguments such as (1) request ID or (2) user name.
[ "cpe:2.3:a:lprold:lprold:3.0.48:*:*:*:*:*:*:*", "cpe:2.3:o:bsd:lpr:0.48:*:*:*:*:*:*:*", "cpe:2.3:o:bsd:lpr:2000-05-07:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:2.2:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:2.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:2.2.4:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:2.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:2.2.6:*:*:*:*:*:*:*", "cpe:2.3:o:openbsd:openbsd:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:openbsd:openbsd:2.1:*:*:*:*:*:*:*", "cpe:2.3:o:openbsd:openbsd:2.2:*:*:*:*:*:*:*", "cpe:2.3:o:openbsd:openbsd:2.3:*:*:*:*:*:*:*", "cpe:2.3:o:openbsd:openbsd:2.4:*:*:*:*:*:*:*", "cpe:2.3:o:openbsd:openbsd:2.5:*:*:*:*:*:*:*", "cpe:2.3:o:openbsd:openbsd:2.6:*:*:*:*:*:*:*", "cpe:2.3:o:openbsd:openbsd:2.7:*:*:*:*:*:*:*", "cpe:2.3:o:openbsd:openbsd:2.8:*:*:*:*:*:*:*", "cpe:2.3:o:openbsd:openbsd:2.9:*:*:*:*:*:*:*", "cpe:2.3:o:openbsd:openbsd:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:*", "cpe:2.3:o:openbsd:openbsd:3.2:*:*:*:*:*:*:*" ]
CVE-2021-0119
Improper initialization in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via physical access.
[ "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:fas\\/aff_bios:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_bronze_3206r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_bronze_3206r:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5218r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5218r:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5220r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5220r:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6208u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6208u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6226r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6226r:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6230r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6230r:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6238r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6238r:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6240r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6240r:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6242r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6242r:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6246r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6246r:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6248r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6248r:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6250_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6250:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6250l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6250l:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6256_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6256:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6258r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6258r:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4210r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4210r:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4210t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4210t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4214r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4214r:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4215r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4215r:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_9221_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_9221:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_9222_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_9222:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_bronze_3204_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5215_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5215l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5217_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5218_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5218b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5218n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5218t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5220_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5220s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5220t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5222_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6209u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6210u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6212u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6222v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6226_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6230_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6230n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6230n:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6230t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6230t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6234_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6234:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6238_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6238l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6238t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6240_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6240l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6240y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6242_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6244_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6246_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6248_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6252_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6252n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6254_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6262v_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8253_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8256_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8260_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8260l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8260y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8268_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8270_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8276_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8276l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8280_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8280l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_9242_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_9282_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4208_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4209t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4210_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4214_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4214y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4215_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4216_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6138p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6138p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_bronze_3104_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_bronze_3106_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5115_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5115:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5118_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5118:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5119t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5119t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5120_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5120:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5120t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5120t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5122_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5122:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6126_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6126:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6126f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6126f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6126t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6126t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6128_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6128:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6130_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6130:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6130f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6130f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6130t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6130t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6132_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6132:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6134_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6134:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6136_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6136:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6138_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6138:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6138f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6138f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6138t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6138t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6140_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6140:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6142_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6142:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6142f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6142f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6144_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6144:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6146_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6146:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6148_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6148:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6148f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6148f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6150:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6152_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6152:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6154_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6154:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8153_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8153:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8156_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8156:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8158_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8158:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8160_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8160:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8160f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8160f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8160t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8160t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8164_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8164:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8168_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8168:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8170_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8170:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8176_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8176:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8176f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8176f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8180_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8180:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4108_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4108:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4109t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4109t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4110_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4110:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4112_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4112:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4114_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4114:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4114t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4114t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4116_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4116:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4116t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4116t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-11155mle_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-11155mle:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-11155mre_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-11155mre:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-11555mle_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-11555mle:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-11555mre_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-11555mre:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-11865mle_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-11865mle:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-11865mre_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-11865mre:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-3323_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3323:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-3335_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3335:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-3345_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3345:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-3365_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3365:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-3375_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3375:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-11855m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-11855m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-11955m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-11955m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1350_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1350:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1350p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1350p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1370_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1370:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1370p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1370p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1390_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1390:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1390p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1390p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1390t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1390t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-10855m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-10885m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1250_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1250e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1250e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1250p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1250te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1250te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1270_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1270e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1270e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1270p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1270p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1270te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1270te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1290_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1290e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1290e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1290p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1290t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1290te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1290te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2223_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2223:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2225_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2225:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2235_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2235:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2245_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2245:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2255_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2255:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2265_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2265:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2275_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2275:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2295_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2295:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-3223_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-3225_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-3235_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3235:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-3245_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-3245m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-3265_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-3265m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-3275_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-3275m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-3175x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3175x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2123_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2123:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2125_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2125:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2133_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2133:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2135_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2135:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2145_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2145:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2155_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2155:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2175_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2175:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2195_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2195:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2314_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2314:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2324g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2324g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2334_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2334:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2336_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2336:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2356g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2356g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2374g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2374g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2378_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2378:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2378g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2378g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2386g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2386g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2388g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2388g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2226ge_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2254me_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2254me:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2254ml_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2254ml:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2276me_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2276me:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2276ml_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2276ml:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2278ge_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2278gel_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2224_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2224g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2226g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2234_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2236_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2244g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2246g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2274g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2276g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2276m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2278g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2286g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2286m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2288g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2124_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2124g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2126g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2134_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2136_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2144g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2146g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2174g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2176g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2186g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2176m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2186m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1602_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1602:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1622_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1622:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1623n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1623n:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1627_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1627:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1633n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1633n:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1637_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1637:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1649n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1649n:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1653n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1653n:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2123it_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2141i_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2142it_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2143it_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2145nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2146nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2161i_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2163it_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2166nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2173it_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2177nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2183it_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2187nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1513n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1513n:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1523n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1523n:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1533n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1533n:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1543n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1543n:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1553n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1553n:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1529_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1529:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1539_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1539:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1559_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1559:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1557_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1557:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1567_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1567:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1571_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1571:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1577_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1577:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1518_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1518:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1521_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1521:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1527_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1527:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1528_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1528:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1531_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1531:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1537_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1537:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1541_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1541:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1548_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1548:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1520_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1520:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1540_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1540:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-11900h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11900h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-11950h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11950h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-11980hk_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11980hk:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-11900_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11900:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-11900f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11900f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-11900k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11900k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-11900kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11900kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-11900t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11900t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11850he_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11850he:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11600h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11600h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11390h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11390h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1195g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11800h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11850h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11700f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11700k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11700kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11700t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11370h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11375h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1180g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1185g7e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1185gre_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1160g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1165g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1185g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11500he_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11500he:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11320h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11320h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1155g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1155g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11260h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11260h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11400h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11400h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11500h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11500h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11400:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11400f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11400f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11400t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11400t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11500:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11500t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11500t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11600:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11600k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11600k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11600kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11600kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11600t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11600t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11300h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11300h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1140g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1140g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1145g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1145g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1145g7e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1145g7e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1145gre_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1145gre:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1130g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1135g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-11100he_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-11100he:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1115g4e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1115g4e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1115gre_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1115gre:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1120g4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1125g4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1110g4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1115g4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10850k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10885h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10900_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10900e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10900f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10900k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10900kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10900t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10900te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10980hk_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10870h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10610u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10810u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1068ng7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10700e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10700f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10700k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10700kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10700t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10700te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10750h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10850h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10875h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10510u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10510y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10710u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1060g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1065g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10505_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10500h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10200h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10310u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1038ng7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10400f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10400t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10500e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10500t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10500te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10600k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10600kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10600t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10300h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10400h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10210u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10210y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10310y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1030g4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1030g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1035g1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1035g4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1035g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10105_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10105f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10105t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10305_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10305t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10325_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10100y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10100f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10100e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10100t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10100te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10300_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10300t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10320_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10110u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10110y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1000g1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1000g4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1005g1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-9900ks_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-9900ks:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-9880h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-9880h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-9900_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-9900:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-9900t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-9900t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-9980hk_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-9980hk:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-9900kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-9900kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-9900k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-9700e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-9700e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-9700te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-9700te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-9850he_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-9850he:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-9850hl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-9850hl:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-9700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-9700:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-9700f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-9700f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-9700t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-9700t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-9750h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-9750h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-9750hf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-9750hf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-9850h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-9700kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-9700kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-9700k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-9500e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-9500e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-9500te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-9500te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-9300h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-9300h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-9400h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-9400h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-9400t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-9400t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-9500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-9500:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-9500f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-9500f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-9500t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-9500t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-9600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-9600:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-9600t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-9600t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-9300hf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-9300hf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-9400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-9400:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-9400f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-9400f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-9600kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-9600kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-9600k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-9600k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-9100e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-9100e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-9100hl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-9100hl:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-9100te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-9100te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-9100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-9100:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-9100f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-9100f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-9100t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-9100t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-9300_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-9300:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-9300t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-9300t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-9320_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-9320:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-9350k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-9350k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-9350kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-9350kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-8950hk_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-8557u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-8665ue_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-8569u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-8665u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-8500y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-8565u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-8706g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-8086k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-8559u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-8700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-8700b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-8700t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-8750h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-8850h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-8705g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-8709g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-8809g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7\\+8700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7\\+8700:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-8700k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-8550u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-8650u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-8260u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8260u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-8257u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8257u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-8365ue_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8365ue:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-8279u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8279u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-8365u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-8310y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-8210y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-8200y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-8265u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-8305g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-8259u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-8269u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-8300h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-8400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-8400b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-8400h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-8400t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-8500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-8500b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-8500t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-8600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-8600t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-8600k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-8250u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-8350u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-8140u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8140u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-8145ue_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-8100b_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-8145u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-8100h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-8100t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-8109u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-8300_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-8300t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-8130u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-8100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-8350k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_m3-8100y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-7560u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-7567u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-7600u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-7660u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-7700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-7700hq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-7700k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-7700t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-7820eq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-7820hk_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-7820hq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-7920hq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-7500u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-7y75_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-7260u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7260u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-7267u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7267u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-7287u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7287u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-7300hq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7300hq:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-7300u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7300u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-7360u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7360u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-7400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7400:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-7400t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7400t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-7440eq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7440eq:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-7440hq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7440hq:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-7442eq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7442eq:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-7500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7500:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-7500t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7500t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-7600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7600:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-7600k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7600k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-7600t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7600t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-7y57_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7y57:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-7200u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7200u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-7y54_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7y54:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-7020u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-7020u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-7130u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-7130u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-7100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-7100:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-7100e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-7100e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-7100h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-7100h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-7100t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-7100t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-7101e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-7101e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-7101te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-7101te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-7102e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-7102e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-7167u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-7167u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-7300_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-7300:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-7300t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-7300t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-7320_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-7320:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-7350k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-7350k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-7100u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-7100u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_m3-7y32_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m3-7y32:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_m3-7y30_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m3-7y30:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-6785r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6785r:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-6660u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6660u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-6770hq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6770hq:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-6870hq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6870hq:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-6970hq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6970hq:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-6700te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6700te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-6820eq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6820eq:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-6822eq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6822eq:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-6500u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6500u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-6560u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6560u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-6600u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6600u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-6650u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6650u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-6700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6700:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-6700hq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6700hq:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-6700t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6700t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-6820hk_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6820hk:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-6820hq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6820hq:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-6920hq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6920hq:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-6700k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6700k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-6567u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6567u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-6585r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6585r:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-6685r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6685r:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-6350hq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6350hq:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-6402p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6402p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-6440eq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6440eq:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-6442eq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6442eq:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-6500te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6500te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-6200u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6200u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-6260u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6260u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-6267u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6267u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-6287u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6287u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-6300hq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6300hq:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-6300u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6300u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-6360u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6360u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-6400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6400:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-6400t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6400t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-6440hq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6440hq:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-6500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6500:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-6500t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6500t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-6600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6600:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-6600t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6600t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-6600k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6600k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-6006u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-6006u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-6157u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-6157u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-6098p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-6098p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-6100e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-6100e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-6100te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-6100te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-6102e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-6102e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-6100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-6100:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-6100h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-6100h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-6100t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-6100t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-6100u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-6100u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-6167u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-6167u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-6300_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-6300:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-6300t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-6300t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-6320_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-6320:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_m3-6y30_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m3-6y30:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_m5-6y54_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m5-6y54:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_m5-6y57_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m5-6y57:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_m7-6y75_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m7-6y75:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10900x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10900x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10920x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10920x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10940x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10940x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10980xe_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10980xe:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-9800x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-9800x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-9820x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-9820x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-9900x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-9900x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-9920x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-9920x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-9940x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-9940x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-9960x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-9960x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-9980xe_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-9980xe:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-7940x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-7940x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-7960x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-7960x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-7980xe_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-7980xe:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-7920x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-7920x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-7640x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7640x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-7740x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7740x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-7800x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7800x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-7820x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7820x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-7900x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-7900x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-6800k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6800k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-6850k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6850k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-6900k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6900k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-6950x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6950x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-5820k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-5820k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-5930k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-5930k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-5960x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-5960x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-4940mx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4940mx:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-4820k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4820k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-4930k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4930k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-4960x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4960x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-4930mx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-4930mx:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-3970x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3970x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-3940xm_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3940xm:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-3920xm_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3920xm:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-3820_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3820:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-3930k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3930k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-3960x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-3960x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3338r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3338r:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3436l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3436l:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3558r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3558r:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3758r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3758r:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3336_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3336:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3308_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3308:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3508_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3508:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3538_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3538:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3558_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3558:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3708_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3708:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3750_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3750:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3758_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3758:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3808_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3808:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3830_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3830:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3850:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3858_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3858:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3950_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3950:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3955_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3955:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3958_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3958:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:atom_c3338_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c3338:-:*:*:*:*:*:*:*" ]
CVE-2024-6681
witmy my-springsecurity-plus dept sql injection
A vulnerability, which was classified as critical, has been found in witmy my-springsecurity-plus up to 2024-07-04. Affected by this issue is some unknown functionality of the file /api/dept. The manipulation of the argument params.dataScope leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-271154 is the identifier assigned to this vulnerability.
[ "cpe:2.3:a:witmy:my-springsecurity-plus:*:*:*:*:*:*:*:*" ]
GHSA-x8v9-c427-8x6q
A vulnerability in task group assignment for a specific CLI command in Cisco IOS XR Software could allow an authenticated, local CLI shell user to elevate privileges and gain full administrative control of the device. The vulnerability is due to incorrect mapping of a command to task groups within the source code. An attacker could exploit this vulnerability by first authenticating to the local CLI shell on the device and using the CLI command to bypass the task group&ndash;based checks. A successful exploit could allow the attacker to elevate privileges and perform actions on the device without authorization checks.
[]
GHSA-769c-mxg2-6mp2
Use After Free (UAF) vulnerability in the Vdecoderservice service. Successful exploitation of this vulnerability may cause the image decoding feature to perform abnormally.
[]
GHSA-j2r3-mq93-52w3
Format string vulnerability in the WriteText function in agl_text.cpp in Milan Mimica Sparklet 0.9.4 and earlier allows remote attackers to execute arbitrary code via format string specifiers in a player nickname.
[]
GHSA-wwr2-w2jp-vx63
Carel pCOWeb HVAC BACnet Gateway 2.1.0, Firmware: A2.1.0 - B2.1.0, Application Software: 2.15.4A Software v16 13020200 suffers from an unauthenticated arbitrary file disclosure vulnerability. Input passed through the 'file' GET parameter through the 'logdownload.cgi' Bash script is not properly verified before being used to download log files. This can be exploited to disclose the contents of arbitrary and sensitive files via directory traversal attacks.
[]
GHSA-gcgj-rj3h-jxpp
SeaCMS 6.64 and 7.2 allows remote attackers to delete arbitrary files via the filedir parameter.
[]
CVE-2024-32761
BIG-IP TMM tenants on VELOS and rSeries vulnerability
Under certain conditions, a potential data leak may occur in the Traffic Management Microkernels (TMMs) of BIG-IP tenants running on VELOS and rSeries platforms. However, this issue cannot be exploited by an attacker because it is not consistently reproducible and is beyond an attacker's control.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
[ "cpe:2.3:a:f5:big-ip:15.1.0:*:*:*:*:*:*:*" ]
GHSA-mfpx-cx7p-6jc6
HashiCorp Vault Enterprise 0.9.2 through 1.6.2 allowed the read of license metadata from DR secondaries without authentication. Fixed in 1.6.3.
[]
GHSA-73qj-jvv4-77jq
The Alcatel Lucent I-240W-Q GPON ONT using firmware version 3FE54567BOZJ19 allows a remote, unauthenticated attacker to enable telnetd on the router via a crafted HTTP request.
[]
CVE-2017-11048
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, in a display driver function, a Use After Free condition can occur.
[ "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*" ]
CVE-2014-3397
The network stack in Cisco TelePresence MCU Software before 4.3(2.30) allows remote attackers to cause a denial of service (memory consumption) via crafted TCP packets, aka Bug ID CSCtz35468.
[ "cpe:2.3:a:cisco:telepresence_mcu_software:*:*:*:*:*:*:*:*" ]
CVE-2005-1665
The __VIEWSTATE functionality in Microsoft ASP.NET 1.x, when not cryptographically signed, allows remote attackers to cause a denial of service (CPU consumption) via deeply nested markup.
[ "cpe:2.3:a:microsoft:asp.net:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:asp.net:1.1:*:*:*:*:*:*:*" ]
CVE-2017-1421
IBM iNotes is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
[ "cpe:2.3:a:ibm:inotes:8.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.8:*:*:*:*:*:*:*" ]
CVE-2022-34179
Jenkins Embeddable Build Status Plugin 2.0.3 and earlier allows specifying a `style` query parameter that is used to choose a different SVG image style without restricting possible values, resulting in a relative path traversal vulnerability that allows attackers without Overall/Read permission to specify paths to other SVG images on the Jenkins controller file system.
[ "cpe:2.3:a:jenkins:embeddable_build_status:*:*:*:*:*:jenkins:*:*" ]
CVE-2020-4888
IBM QRadar SIEM 7.4.0 to 7.4.2 Patch 1 and 7.3.0 to 7.3.3 Patch 7 could allow a remote attacker to execute arbitrary commands on the system, caused by insecure deserialization of user-supplied content by the Java deserialization function. By sending a malicious serialized Java object, an attacker could exploit this vulnerability to execute arbitrary commands on the system. IBM X-Force ID: 190912.
[ "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.0:-:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.1:-:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.1:p3:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.1:p4:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.1:p5:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.1:p6:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.2:-:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.2:interim_fix_01:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.2:interim_fix_02:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.2:p1:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.2:p2:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.2:p3:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.2:p4:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:-:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:p1:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:p2:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:p3:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:p4:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.3.3:p5:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.4.0:-:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.4.0:p1:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.4.0:p2:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.4.1:-:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.4.1:patch1:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.4.2:-:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.4.2:p1:*:*:*:*:*:*" ]
GHSA-7wqj-39p4-cqvr
The onesignal-free-web-push-notifications plugin before 1.17.8 for WordPress has XSS via the subdomain parameter.
[]
CVE-2019-13515
OSIsoft PI Web API 2018 and prior may allow disclosure of sensitive information.
[ "cpe:2.3:a:osisoft:pi_web_api:*:*:*:*:*:*:*:*" ]
GHSA-vhq4-v6r5-87qq
The qtm_decompress function in libclamav/mspack.c in ClamAV before 0.96 allows remote attackers to cause a denial of service (memory corruption and application crash) via a crafted CAB archive that uses the Quantum (aka .Q) compression format. NOTE: some of these details are obtained from third party information.
[]
CVE-2024-39417
An unauthorized user can export the Shipping Report
Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and disclose minor information. Exploitation of this issue does not require user interaction.
[ "cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*", "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", "cpe:2.3:a:adobe:magento:*:*:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.7:b2:*:*:open_source:*:*:*", "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*" ]
GHSA-7q5r-4p6j-qj2h
SeaCMS 6.64 allows arbitrary directory listing via upload/admin/admin_template.php?path=../templets/../../ requests.
[]
CVE-2017-17987
PHP Scripts Mall Muslim Matrimonial Script allows arbitrary file upload via admin/mydetails_edit.php.
[ "cpe:2.3:a:muslim_matrimonial_script_project:muslim_matrimonial_script:3.0.3:*:*:*:*:*:*:*" ]
CVE-2002-0744
namerslv in AIX 4.3.3 core dumps when called with a very long argument, possibly as a result of a buffer overflow.
[ "cpe:2.3:o:ibm:aix:4.3.3:*:*:*:*:*:*:*" ]
GHSA-q3gh-94rx-mxp8
A vulnerability has been discovered in the ceva_emu.cvd module that results from a lack of proper validation of user-supplied data, which can result in a pointer that is fetched from uninitialized memory. This can lead to denial-of-service. This issue affects: Bitdefender Engines version 7.84897 and prior versions.
[]
CVE-2015-5813
WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.
[ "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" ]
CVE-1999-0045
List of arbitrary files on Web host via nph-test-cgi script.
[ "cpe:2.3:a:apache:http_server:0.8.11:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:0.8.14:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:netscape:commerce_server:1.12:*:*:*:*:*:*:*", "cpe:2.3:a:netscape:communications_server:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:netscape:communications_server:1.12:*:*:*:*:*:*:*", "cpe:2.3:a:netscape:enterprise_server:2.0a:*:*:*:*:*:*:*" ]
GHSA-9wr3-3xxw-mvrx
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in webvitaly iframe allows Stored XSS.This issue affects iframe: from n/a through 4.8.
[]
GHSA-6p48-g5gf-wmwx
SQL injection vulnerability in the Simple Random Objects (mw_random_objects) extension 1.0.3 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
[]
CVE-2016-5964
IBM Security Privileged Identity Manager Virtual Appliance version 2.0.2 uses an inadequate account lockout setting that could allow a remote attacker to brute force account credentials.
[ "cpe:2.3:a:ibm:security_privileged_identity_manager:2.0.2:*:*:*:*:*:*:*" ]
GHSA-xx3g-v5fx-v7w6
launchAnyWhere vulnerability in the ActivityManagerService module. Successful exploitation of this vulnerability will affect availability.
[]
CVE-2023-23059
An issue was discovered in GeoVision GV-Edge Recording Manager 2.2.3.0 for windows, which contains improper permissions within the default installation and allows attackers to execute arbitrary code and gain escalated privileges.
[ "cpe:2.3:a:geovision:gv-edge_recording_manager:2.2.3.0:*:*:*:*:windows:*:*" ]
CVE-2020-3935
TAIWAN SECOM CO., LTD. – Sensitivity Information Exposure
TAIWAN SECOM CO., LTD., a Door Access Control and Personnel Attendance Management system, stores users’ information by cleartext in the cookie, which divulges password to attackers.
[ "cpe:2.3:a:secom:dr.id_access_control:3.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:secom:dr.id_attendance_system:*:*:*:*:*:*:*:*" ]
GHSA-3m48-2pc8-qvj4
An insecure deserialization vulnerability has been identified in ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code and obtain sensitive information via crafted input to the Data Serialization and Deserialization Components, Inter-Process Communication Mechanisms, and Network Communication Interfaces.
[]
CVE-2003-1231
Cross-site scripting (XSS) vulnerability in index.php in ECW-Shop 5.5 allows remote attackers to inject arbitrary web script or HTML via the cat parameter.
[ "cpe:2.3:a:ecw-shop:ecw-shop:5.01:*:*:*:*:*:*:*", "cpe:2.3:a:ecw-shop:ecw-shop:5.5:*:*:*:*:*:*:*" ]