id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
listlengths
0
5.42k
GHSA-g273-wppx-82w4
Pimcore Customer Data Framework Improper Access Control allows unprivileged user to access GDPR extracts
SummaryAn authenticated and unauthorized user can access the GDPR data extraction feature and query over the information returned, leading to customer data exposure.DetailsPermissions do not seem to be enforced when reaching the `/admin/customermanagementframework/gdpr-data/search-data-objects` endpoint allowing an authenticated user without the permissions to access the endpoint and query the data available there. It seems that the access control is not enforced in this place : <https://github.com/pimcore/customer-data-framework/blob/b4af625ef327c58d05ef7cdf145fa749d2d4195e/src/Controller/Admin/GDPRDataController.php#L38>PoCIn order to reproduce the issue, the following steps can be followed:As an administrator : a. Create a role without any permission through Settings → User & Roles → Roles in the administration panel b. Create an user through Settings → User & Roles → Users and assign it the unprivileged role previously createdLog out the current administrator and log in with this new userAccess to the following endpoint `https://pimcore_instance/admin/customermanagementframework/gdpr-data/search-data-objects?id=&firstname=&lastname=&email=&page=1&start=0&limit=50` and the results will be returned to this unauthorized user.ImpactAn unauthorized user can access PII data from customers without being authorized to.
[]
GHSA-v9pp-qqfq-3qvw
Cross-Site Request Forgery vulnerability in Socomec Net Vision, version 7.20. This vulnerability could allow an attacker to trick registered users into performing critical actions, such as adding and updating accounts, due to lack of proper sanitisation of the ‘set_param.cgi’ file.
[]
GHSA-c6fq-wjrx-2vv7
In multiple functions of btm_ble_gap.cc, there is a possible out of bounds write due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
[]
CVE-2021-35440
Smashing 1.3.4 is vulnerable to Cross Site Scripting (XSS). A URL for a widget can be crafted and used to execute JavaScript on the victim's computer. The JavaScript code can then steal data available in the session/cookies depending on the user environment (e.g. if re-using internal URL's for deploying, or cookies that are very permissive) private information may be retrieved by the attacker.
[ "cpe:2.3:a:smashing_project:smashing:1.3.4:*:*:*:*:*:*:*" ]
GHSA-vvxh-m5f8-9r2g
An elevation of privilege vulnerability exists in rpcss.dll when the RPC service Activation Kernel improperly handles an RPC request. To exploit this vulnerability, a low level authenticated attacker could run a specially crafted application. The security update addresses this vulnerability by correcting how rpcss.dll handles these requests., aka 'Windows RPCSS Elevation of Privilege Vulnerability'.
[]
GHSA-4m2v-48rc-7rp4
A stack-based buffer overflow in the genptk_text component in genptk.c of fig2dev 3.2.7b allows attackers to cause a denial of service (DOS) via converting a xfig file into ptk format.
[]
CVE-2016-5177
Use-after-free vulnerability in V8 in Google Chrome before 53.0.2785.143 allows remote attackers to cause a denial of service (crash) or possibly have unspecified other impact via unknown vectors.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*" ]
GHSA-hp3p-7892-f222
In Emacs before 29.4, org-link-expand-abbrev in lisp/ol.el expands a %(...) link abbrev even when it specifies an unsafe function, such as shell-command-to-string. This affects Org Mode before 9.7.5.
[]
GHSA-w4r6-2p3v-r8w8
In keyInstall, there is a possible escalation of privilege due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08358566; Issue ID: ALPS08358566.
[]
GHSA-mpv4-p366-wr6p
Barangay Management System v1.0 was discovered to contain a remote code execution (RCE) vulnerability via the module editing function at /pages/activity/activity.php.
[]
CVE-2018-2746
Vulnerability in the Oracle Banking Corporate Lending component of Oracle Financial Services Applications (subcomponent: Core module). Supported versions that are affected are 12.3.0, 12.4.0, 12.5.0 and 14.0.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Corporate Lending. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Banking Corporate Lending accessible data as well as unauthorized update, insert or delete access to some of Oracle Banking Corporate Lending accessible data. CVSS 3.0 Base Score 7.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N).
[ "cpe:2.3:a:oracle:banking_corporate_lending:12.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_corporate_lending:12.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_corporate_lending:12.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_corporate_lending:14.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_payments:12.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_payments:12.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_payments:12.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:banking_payments:14.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_enterprise_limits_and_collateral_management:12.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_enterprise_limits_and_collateral_management:14.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_investor_servicing:12.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_investor_servicing:12.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_investor_servicing:12.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_investor_servicing:12.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_universal_banking:11.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_universal_banking:11.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_universal_banking:12.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_universal_banking:12.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_universal_banking:12.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_universal_banking:12.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_universal_banking:12.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_universal_banking:12.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_universal_banking:12.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_universal_banking:14.0.0:*:*:*:*:*:*:*" ]
GHSA-qp79-9v76-98gj
SQL injection vulnerability in bluegate_seo.inc.php in the Direct URL module for xt:Commerce, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the coID parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
GHSA-qwp9-8pwv-6hg4
An issue was discovered in the Linux kernel through 5.11.3. Certain iSCSI data structures do not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message.
[]
GHSA-c82q-qc5x-q5c3
The Olive Tree FTP Server (aka com.theolivetree.ftpserver) application through 1.32 for Android allows remote attackers to cause a denial of service via a client that makes many connection attempts and drops certain packets.
[]
GHSA-4mgv-m5cm-f9h7
Vault GitHub Action did not correctly mask multi-line secrets in output
HashiCorp vault-action (aka Vault GitHub Action) before 2.2.0 allows attackers to obtain sensitive information from log files because a multi-line secret was not correctly registered with GitHub Actions for log masking.The vault-action implementation did not correctly handle the marking of multi-line variables. As a result, multi-line secrets were not correctly masked in vault-action output.Remediation: Customers using vault-action should evaluate the risk associated with this issue, and consider upgrading to vault-action 2.2.0 or newer. Please refer to https://github.com/marketplace/actions/hashicorp-vault for more information.
[]
GHSA-gpc7-cph4-jx4r
In Cerberus FTP Server 8.0.10.1, a crafted HTTP request causes the Windows service to crash. The attack methodology involves a long Host header and an invalid Content-Length header.
[]
GHSA-gqrr-v4v6-3qxx
Adobe Animate versions 22.0.9 (and earlier) and 23.0.1 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
GHSA-v2r3-58v8-7v46
Adobe Dimension versions 3.4.7 (and earlier) is affected by an Access of Uninitialized Pointer vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
CVE-2025-30801
WordPress TWB Woocommerce Reviews plugin <= 1.7.7 - Cross Site Request Forgery (CSRF) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Abu Bakar TWB Woocommerce Reviews allows Cross Site Request Forgery. This issue affects TWB Woocommerce Reviews: from n/a through 1.7.7.
[]
GHSA-rjqg-x84m-7844
Remote attackers can execute arbitrary code in the context of the vulnerable service process.
[]
CVE-2024-28870
Suricata uses excessive resource use in malformed ssh traffic parsing
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community. When parsing an overly long SSH banner, Suricata can use excessive CPU resources, as well as cause excessive logging volume in alert records. This issue has been patched in versions 6.0.17 and 7.0.4.
[ "cpe:2.3:a:oisf:suricata:*:*:*:*:*:*:*:*" ]
CVE-2005-0752
The Plugin Finder Service (PFS) in Firefox before 1.0.3 allows remote attackers to execute arbitrary code via a javascript: URL in the PLUGINSPAGE attribute of an EMBED tag.
[ "cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9:rc:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*" ]
GHSA-vx62-r535-jwqf
Improper Privilege Management vulnerability in ESKOM Computer e-municipality module allows Collect Data as Provided by Users.This issue affects e-municipality module: before v.105.
[]
CVE-2024-28048
OS command injection vulnerability exists in ffBull ver.4.11, which may allow a remote unauthenticated attacker to execute an arbitrary OS command with the privilege of the running web server. Note that the developer was unreachable, therefore, users should consider stop using ffBull ver.4.11.
[ "cpe:2.3:a:fortunefield:ffbull:4.11:*:*:*:*:*:*:*" ]
GHSA-f82r-h725-g32c
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Marco Milesi ANAC XML Bandi di Gara plugin <= 7.5 versions.
[]
CVE-2018-14820
Advantech WebAccess 8.3.1 and earlier has a .dll component that is susceptible to external control of file name or path vulnerability, which may allow an arbitrary file deletion when processing.
[ "cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*" ]
GHSA-p9wg-9276-53fv
Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 21 through 6 Update 23 allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
[]
GHSA-8qgh-2x39-7mw4
A vulnerability in the CLI of Cisco FXOS Software could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation of commands supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input to the affected command. A successful exploit could allow the attacker to execute commands on the underlying operating system with root privileges.
[]
CVE-2025-23532
WordPress MyAnime Widget plugin <= 1.0 - CSRF to Privilege Escalation vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in Regios MyAnime Widget allows Privilege Escalation.This issue affects MyAnime Widget: from n/a through 1.0.
[]
CVE-2019-0151
Insufficient memory protection in Intel(R) TXT for certain Intel(R) Core Processors and Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
[ "cpe:2.3:o:intel:xeon_e-2276m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2286m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-9500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-9500:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-9600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-9600:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-9600t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-9600t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-9500t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-9500t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-9900t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-9900t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-9700t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-9700t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-9900_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-9900:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-9700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-9700:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-9850h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-9880h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-9880h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-9400h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-9400h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-8365u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-8665u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-9600k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-9600k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-9700k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-9900k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-8700t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-8600t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-8400h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2176m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2186m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-8600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-8500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-8850h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-8500t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-8700k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-8600k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-8700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-8650u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-8350u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-7600u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-7300u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7300u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-7y57_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-7y57:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-7y75_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-6660u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6660u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-6700te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6700te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_m7-6y75_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m7-6y75:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-6300u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6300u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-6700t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6700t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-6600u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6600u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-6500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6500:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-6700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6700:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_m5-6y57_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m5-6y57:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-6820hq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6820hq:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-6920hq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6920hq:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-6440hq_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6440hq:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-6360u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-6360u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-6650u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-6650u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-5300u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-5300u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-5600u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-5600u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-5350u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-5350u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-5650u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-5650u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_m-5y71_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m-5y71:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_m-5y70_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m-5y70:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1290_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1290_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1280_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1280_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1275_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1275_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1270_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1270_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1265l_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1265l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1245_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1245_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1240_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1240_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1230_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1230_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1225_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1225_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1220_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1220_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1220l_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1220l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1125c_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1125c_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1105c_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1105c_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1286l_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1286l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1286_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1286_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1285l_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1285l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1285_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1285_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1281_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1281_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1280_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1280_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1276_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1276_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1275l_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1275l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1270_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1270_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1268l_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1268l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1271_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1271_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1275_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1275_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1265l_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1265l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1246_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1246_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1245_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1245_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1241_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1241_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1240l_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1240l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1240_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1240_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1231_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1231_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1230l_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1230l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1230_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1230_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1226_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1226_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1225_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1225_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1220l_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1220l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1220_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1220_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1285l_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1285l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1285_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1285_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1278l_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1278l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1265l_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1265l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1258l_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1258l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1585_v5_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1585_v5:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1585l_v5_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1585l_v5:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1578l_v5_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1578l_v5:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1575m_v5_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1575m_v5:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1565l_v5_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1565l_v5:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1558l_v5_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1558l_v5:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1545m_v5_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1545m_v5:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1535m_v5_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1535m_v5:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1515m_v5_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1515m_v5:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1505m_v5_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1505m_v5:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1505l_v5_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1505l_v5:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1280_v5_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1280_v5:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1275_v5_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1275_v5:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1270_v5_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1270_v5:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1268l_v5_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1268l_v5:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1260l_v5_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1260l_v5:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1245_v5_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1245_v5:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1240l_v5_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1240l_v5:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1240_v5_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1240_v5:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1235l_v5_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1235l_v5:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1230_v5_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1230_v5:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1225_v5_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1225_v5:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1220_v5_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1220_v5:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1535m_v6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1535m_v6:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1505m_v6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1505m_v6:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1505l_v6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1505l_v6:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1501l_v6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1501l_v6:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1501m_v6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1501m_v6:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1285_v6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1285_v6:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1280_v6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1280_v6:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1275_v6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1275_v6:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1270_v6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1270_v6:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1245_v6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1245_v6:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1240_v6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1240_v6:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1230_v6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1230_v6:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1225_v6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1225_v6:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e3-1220_v6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3-1220_v6:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4603_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4603_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2603_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2603_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2403_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2403_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-1620_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1620_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4607_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4607_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-1428l_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1428l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2609_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2609_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2407_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2407_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4610_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4610_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-1650_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1650_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2418l_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2418l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2618l_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2618l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4620_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4620_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2620_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2620_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-1660_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1660_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2420_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2420_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4624l_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4624l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2428l_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2428l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2628l_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2628l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4627_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4627_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2630_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2630_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2430_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2430_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4640_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4640_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2630l_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2630l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2430l_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2430l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2637_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2637_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4650_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4650_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2440_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2440_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2448l_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2448l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4657l_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4657l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2640_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2640_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2643_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2643_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2450_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2450_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2450l_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2450l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2648l_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2648l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2650_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2650_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2470_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2470_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2650l_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2650l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2658_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2658_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2660_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2660_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2667_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2667_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2670_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2670_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2680_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2680_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2687w_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2687w_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2690_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2690_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2695_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2695_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2697_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2697_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2699_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2699_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4669_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4669_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2438l_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2438l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-1428l_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1428l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4667_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4667_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2428l_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2428l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-1620_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1620_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4660_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4660_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2418l_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2418l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-1630_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1630_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2698_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2698_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4655_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4655_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2408l_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2408l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2697_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2697_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-1650_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1650_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4650_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4650_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-1660_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1660_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4648_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4648_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-1680_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1680_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2695_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2695_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4640_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4640_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2690_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2690_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4627_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4627_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2687w_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2687w_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4620_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4620_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4610_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4610_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2683_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2683_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2680_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2680_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2670_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2670_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2667_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2667_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2660_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2660_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2658a_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2658a_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2658_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2658_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2650l_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2650l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2650_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2650_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2648l_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2648l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2643_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2643_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2640_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2640_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2637_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2637_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2630l_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2630l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2630_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2630_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2628l_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2628l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2623_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2623_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2620_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2620_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2618l_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2618l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2609_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2609_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2608l_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2608l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2603_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2603_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4669_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4669_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4667_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4667_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4660_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4660_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4655_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4655_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4650_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4650_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4640_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4640_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4628l_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4628l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4627_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4627_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4620_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4620_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-4610_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-4610_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2699a_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2699a_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2699r_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2699r_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2699_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2699_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2698_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2698_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2697_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2697_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2697a_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2697a_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2695_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2695_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2690_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2690_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2687w_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2687w_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2683_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2683_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2680_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2680_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2667_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2667_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2660_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2660_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2658_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2658_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2650_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2650_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2650l_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2650l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2648l_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2648l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2643_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2643_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2640_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2640_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2637_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2637_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2630_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2630_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2630l_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2630l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2628l_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2628l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2623_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2623_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2620_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2620_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2618l_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2618l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2609_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2609_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2608l_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2608l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-2603_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-2603_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-1680_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1680_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-1660_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1660_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-1650_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1650_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-1630_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1630_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e5-1620_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5-1620_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8850_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8850_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8857_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8857_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8870_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8870_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8880_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8880_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8880l_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8880l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8890_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8890_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8891_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8891_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8893_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8893_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-4890_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-4890_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-4880_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-4880_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-4870_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-4870_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-4860_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-4860_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-4850_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-4850_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-4830_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-4830_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-4820_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-4820_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-4809_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-4809_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-2890_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-2890_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-2880_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-2880_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-2870_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-2870_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-2850_v2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-2850_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8893_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8893_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8891_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8891_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8890_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8890_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8880l_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8880l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8880_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8880_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8870_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8870_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8867_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8867_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8860_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8860_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-4850_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-4850_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-4830_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-4830_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-4820_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-4820_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-4809_v3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-4809_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8894_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8894_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8893_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8893_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8891_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8891_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8890_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8890_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8880_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8880_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8870_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8870_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8867_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8867_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-8860_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-8860_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-4850_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-4850_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-4830_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-4830_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-4820_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-4820_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e7-4809_v4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7-4809_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8180_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8180:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8176f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8176f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8176_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8176:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8170_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8170:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8168_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8168:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8164_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8164:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8160t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8160t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8160f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8160f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8160_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8160:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8158_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8158:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8156_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8156:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_platinum_8153_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum_8153:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6154_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6154:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6152_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6152:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6150:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6148f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6148f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6148_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6148:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6146_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6146:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6144_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6144:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6142f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6142f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6142_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6142:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6140_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6140:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6138t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6138t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6138p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6138p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6138f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6138f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6138_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6138:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6136_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6136:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6134_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6134:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6132_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6132:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6130t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6130t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6130f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6130f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6130_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6130:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6128_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6128:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6126t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6126t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6126f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6126f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_6126_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_6126:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5122_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5122:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5120t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5120t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5120_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5120:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5119t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5119t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5118_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5118:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_gold_5115_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold_5115:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4116t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4116t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4116_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4116:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4114t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4114t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4114_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4114:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4112_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4112:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4110_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4110:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4109t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4109t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_silver_4108_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver_4108:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_bronze_3106_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_bronze_3104_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2187nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2183it_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2177nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2173it_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2166nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2163it_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2161i_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2146nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2145nt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2143it_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2142it_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2141i_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-2123it_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1577_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1577:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1571_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1571:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1567_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1567:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1559_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1559:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1557_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1557:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1553n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1553n:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1548_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1548:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1543n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1543n:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1541_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1541:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1540_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1540:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1539_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1539:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1537_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1537:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1533n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1533n:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1531_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1531:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1529_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1529:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1528_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1528:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1527_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1527:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1523n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1523n:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1521_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1521:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1520_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1520:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1518_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1518:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_d-1513n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_d-1513n:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2288g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2286g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2278gel_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2278ge_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2278g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2276ml_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2276ml:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2276me_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2276me:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2276g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2274g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2254ml_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2254ml:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2254me_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2254me:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2246g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2244g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2236_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2234_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2226ge_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2226g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2224_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2224g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2186g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2176g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2174g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2146g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2144g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2136_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2134_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2126g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2124_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_e-2124g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-3175x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3175x:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2195_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2195:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2175_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2175:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2155_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2155:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2145_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2145:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2135_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2135:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2133_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2133:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2125_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2125:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2123_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2123:-:*:*:*:*:*:*:*" ]
CVE-2024-26978
serial: max310x: fix NULL pointer dereference in I2C instantiation
In the Linux kernel, the following vulnerability has been resolved: serial: max310x: fix NULL pointer dereference in I2C instantiation When trying to instantiate a max14830 device from userspace: echo max14830 0x60 > /sys/bus/i2c/devices/i2c-2/new_device we get the following error: Unable to handle kernel NULL pointer dereference at virtual address... ... Call trace: max310x_i2c_probe+0x48/0x170 [max310x] i2c_device_probe+0x150/0x2a0 ... Add check for validity of devtype to prevent the error, and abort probe with a meaningful error message.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
GHSA-r8x7-7863-5f5j
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13089.
[]
GHSA-7p2q-j7qw-jq24
The server in IBM SPSS Collaboration and Deployment Services 4.x before 4.2.1.3 IF3, 5.x before 5.0 FP3, and 6.x before 6.0 IF1 allows remote attackers to read arbitrary files via an unspecified HTTP request.
[]
CVE-2023-24626
socket.c in GNU Screen through 4.9.0, when installed setuid or setgid (the default on platforms such as Arch Linux and FreeBSD), allows local users to send a privileged SIGHUP signal to any PID, causing a denial of service or disruption of the target process.
[ "cpe:2.3:a:gnu:screen:*:*:*:*:*:*:*:*" ]
GHSA-fm3p-w9c3-9p34
kcleanup.cpp in KDirStat 2.7.3 does not properly quote strings when deleting a directory, which allows remote attackers to execute arbitrary commands via a ' (single quote) character in the directory name, a different vulnerability than CVE-2014-2527.
[]
CVE-2021-3197
An issue was discovered in SaltStack Salt before 3002.5. The salt-api's ssh client is vulnerable to a shell injection by including ProxyCommand in an argument, or via ssh_options provided in an API request.
[ "cpe:2.3:a:saltstack:salt:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*" ]
CVE-1999-1459
BMC PATROL Agent before 3.2.07 allows local users to gain root privileges via a symlink attack on a temporary file.
[ "cpe:2.3:a:bmc:patrol_agent:3.2:*:*:*:*:*:*:*", "cpe:2.3:a:bmc:patrol_agent:3.2.3:*:*:*:*:*:*:*" ]
GHSA-x7mm-6r2x-9w7p
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D7000v2 before 1.0.0.53, R6220 before 1.1.0.80, R6260 before 1.1.0.64, R6700 before 1.0.2.6, R6700v2 before 1.2.0.36, R6800 before 1.2.0.36, R6900 before 1.0.2.4, R6900P before 1.3.1.64, R6900v2 before 1.2.0.36, R7000 before 1.0.9.60, R7000P before 1.3.1.64, R7800 before 1.0.2.60, R7900 before 1.0.3.8, R7900P before 1.4.1.30, R8000 before 1.0.4.46, R8000P before 1.4.1.30, R8300 before 1.0.2.128, R8500 before 1.0.2.128, R8900 before 1.0.4.12, R9000 before 1.0.4.12, and XR500 before 2.3.2.32.
[]
GHSA-hg2r-xqh5-vvfr
IBM Resilient OnPrem 38.2 could allow a privileged user to inject malicious commands through Python3 scripting. IBM X-Force ID: 185503.
[]
GHSA-3wfx-mj93-vf8v
Type Confusion in V8 in Google Chrome prior to 130.0.6723.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
[]
CVE-2025-22602
Stored DOM-based XSS (without CSP) via video placeholders in Discourse
Discourse is an open source platform for community discussion. In affected versions an attacker can execute arbitrary JavaScript on users' browsers by posting a malicious video placeholder html element. This issue only affects sites with CSP disabled. This problem has been patched in the latest version of Discourse. Users are advised to upgrade. Users unable to upgrade should enable CSP.
[]
CVE-2024-7937
itsourcecode Project Expense Monitoring System printtransfer.php sql injection
A vulnerability classified as critical was found in itsourcecode Project Expense Monitoring System 1.0. This vulnerability affects unknown code of the file printtransfer.php. The manipulation of the argument transfer_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:itsourcecode:project_expense_monitoring_system:*:*:*:*:*:*:*:*", "cpe:2.3:a:project_expense_monitoring_system_project:project_expense_monitoring_system:1.0:*:*:*:*:*:*:*" ]
CVE-2022-22259
There is an improper authentication vulnerability in FLMG-10 10.0.1.0(H100SP22C00). Successful exploitation of this vulnerability may lead to a control of the victim device.
[ "cpe:2.3:o:huawei:flmg-10_firmware:10.0.1.0\\(h100sp22c00\\):*:*:*:*:*:*:*", "cpe:2.3:h:huawei:flmg-10:-:*:*:*:*:*:*:*" ]
GHSA-82xf-qv3c-486v
The Symantec Messaging Gateway product prior to 10.6.6 may be susceptible to a XML external entity (XXE) exploit, which is a type of issue where XML input containing a reference to an external entity is processed by a weakly configured XML parser. The attack uses file URI schemes or relative paths in the system identifier to access files that should not normally be accessible.
[]
GHSA-qx7w-fr92-fcqm
An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. macOS before 10.12.6 is affected. tvOS before 10.2.2 is affected. watchOS before 3.2.3 is affected. The issue involves the "Kernel" component. It allows attackers to bypass intended memory-read restrictions via a crafted app.
[]
CVE-2014-4653
sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not ensure possession of a read/write lock, which allows local users to cause a denial of service (use-after-free) and obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*" ]
GHSA-j99f-3mvg-4m4r
A logic issue was addressed with improved state management. This issue is fixed in iTunes 12.12.4 for Windows. An application may be able to delete files for which it does not have permission.
[]
GHSA-v683-5725-54rp
The MSI-X MMIO support in hw/pci/msix.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) by leveraging failure to define the .write method.
[]
CVE-2016-0312
IBM TRIRIGA Application Platform before 3.3.2 allows remote attackers to obtain sensitive information via vectors related to granting unauthenticated access to Document Manager. IBM X-Force ID: 111486.
[ "cpe:2.3:a:ibm:tririga_application_platform:*:*:*:*:*:*:*:*" ]
GHSA-746g-3gfp-hfhw
Devise Gem for Ruby Unauthorized Access Using "Remember Me" Cookie
Devise version before 3.5.4 uses cookies to implement a "Remember me" functionality. However, it generates the same cookie for all devices. If an attacker manages to steal a remember me cookie and the user does not change the password frequently, the cookie can be used to gain access to the application indefinitely.
[]
CVE-2009-4084
SQL injection vulnerability in the search feature in e107 0.7.16 and earlier allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
[ "cpe:2.3:a:e107:e107:*:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.6_10:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.6_11:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.6_12:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.6_13:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.6_14:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.6_15:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.6_15a:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.6:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.7:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.8:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.9:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.10:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.11:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.12:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.13:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.14:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.7.15:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.545:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.547_beta:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.548_beta:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.549_beta:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.551_beta:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.552_beta:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.553_beta:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.554:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.554_beta:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.555_beta:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.600:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.601:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.602:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.603:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.604:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.605:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.606:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.607:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.608:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.609:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.610:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.611:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.612:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.613:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.614:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.615:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.615a:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.616:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.617:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.6171:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.6172:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.6173:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.6174:*:*:*:*:*:*:*", "cpe:2.3:a:e107:e107:0.6175:*:*:*:*:*:*:*" ]
CVE-2024-25132
Openshift-dedicated: hive: hibernation controller denial of service
A flaw was found in the Hive hibernation controller component of OpenShift Dedicated. The ClusterDeployment.hive.openshift.io/v1 resource can be created with the spec.installed field set to true, regardless of the installation status, and a positive timespan for the spec.hibernateAfter value. If a ClusterSync.hiveinternal.openshift.io/v1alpha1 resource is also created, the hive hibernation controller will enter the reconciliation loop leading to a panic when accessing a non-existing field in the ClusterDeployment’s status section, resulting in a denial of service.
[]
GHSA-w4gg-8728-ghw9
emacs/notmuch-mua.el in Notmuch before 0.11.1, when using the Emacs interface, allows user-assisted remote attackers to read arbitrary files via crafted MML tags, which are not properly quoted in an email reply cna cause the files to be attached to the message.
[]
GHSA-5w62-43c9-wr5m
JFrog JFrog Artifactory version Prior to version 6.0.3, since version 4.0.0 contains a Directory Traversal vulnerability in The "Import Repository from Zip" feature, available through the Admin menu -> Import & Export -> Repositories, triggers a vulnerable UI REST endpoint (/ui/artifactimport/upload) that can result in Directory traversal / file overwrite and remote code execution. This attack appear to be exploitable via An attacker with Admin privileges may use the aforementioned UI endpoint and exploit the publicly known "Zip Slip" vulnerability, to add/overwrite files outside the target directory. This vulnerability appears to have been fixed in 6.0.3.
[]
GHSA-pwv8-p7qg-23hg
OpenBlog 1.2.1 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by system/scaffolding/views/view.php and certain other files.
[]
GHSA-pq49-99m6-6f97
In BIG-IP Versions 16.1.x before 16.1.3, 15.1.x before 15.1.5.1, 14.1.x before 14.1.5, and all versions of 13.1.x, when running in Appliance mode, an authenticated user assigned the Administrator role may be able to bypass Appliance mode restrictions, using an undisclosed iControl REST endpoint. A successful exploit can allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
[]
CVE-2019-14464
XMFile::read in XMFile.cpp in milkyplay in MilkyTracker 1.02.00 has a heap-based buffer overflow.
[ "cpe:2.3:a:milkytracker_project:milkytracker:1.02.00:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*" ]
CVE-2023-32611
G_variant_byteswap() can take a long time with some non-normal inputs
A flaw was found in GLib. GVariant deserialization is vulnerable to a slowdown issue where a crafted GVariant can cause excessive processing, leading to denial of service.
[ "cpe:2.3:a:gnome:glib:*:*:*:*:*:*:*:*", "cpe:/o:redhat:enterprise_linux:6", "cpe:/o:redhat:enterprise_linux:7", "cpe:/o:redhat:enterprise_linux:8", "cpe:/o:redhat:enterprise_linux:9" ]
GHSA-355v-2rjx-fpx7
Inefficient Regular Expression Complexity in langflow
A vulnerability classified as problematic was found in Langflow up to 1.0.18. Affected by this vulnerability is an unknown functionality of the file \src\backend\base\langflow\interface\utils.py of the component HTTP POST Request Handler. The manipulation of the argument remaining_text leads to inefficient regular expression complexity. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
CVE-2009-0388
Multiple integer signedness errors in (1) UltraVNC 1.0.2 and 1.0.5 and (2) TightVnc 1.3.9 allow remote VNC servers to cause a denial of service (heap corruption and application crash) or possibly execute arbitrary code via a large length value in a message, related to the (a) ClientConnection::CheckBufferSize and (b) ClientConnection::CheckFileZipBufferSize functions in ClientConnection.cpp.
[ "cpe:2.3:a:tightvnc:tightvnc:1.3.9:*:*:*:*:*:*:*", "cpe:2.3:a:ultravnc:ultravnc:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ultravnc:ultravnc:1.0.5:*:*:*:*:*:*:*" ]
CVE-2018-20675
D-Link DIR-822 C1 before v3.11B01Beta, DIR-822-US C1 before v3.11B01Beta, DIR-850L A* before v1.21B08Beta, DIR-850L B* before v2.22B03Beta, and DIR-880L A* before v1.20B02Beta devices allow authentication bypass.
[ "cpe:2.3:o:dlink:dir-822_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-822:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-822-us_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-822-us:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-850l_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-850l:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-850l_firmware:2.22b02:beta:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-880l_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-880l_firmware:1.20b01:beta:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-880l:-:*:*:*:*:*:*:*" ]
CVE-2022-40990
Several stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This buffer overflow is in the function that manages the 'no bandwidth WORD dlrate <1-9999> dlceil <1-9999> ulrate <1-9999> ulceil <1-9999> priority (highest|high|normal|low|lowest)' command template.
[ "cpe:2.3:o:siretta:quartz-gold_firmware:g5.0.1.5-210720-141020:*:*:*:*:*:*:*", "cpe:2.3:h:siretta:quartz-gold:-:*:*:*:*:*:*:*" ]
CVE-2022-29183
Reflected XSS in GoCD
GoCD is a continuous delivery server. GoCD versions 20.2.0 until 21.4.0 are vulnerable to reflected cross-site scripting via abuse of the pipeline comparison function's error handling to render arbitrary HTML into the returned page. This could allow an attacker to trick a victim into executing code which would allow the attacker to operate on, or gain control over the same resources as the victim had access to. This issue is fixed in GoCD 21.4.0. As a workaround, block access to `/go/compare/.*` prior to GoCD Server via a reverse proxy, web application firewall or equivalent, which would prevent use of the pipeline comparison function.
[ "cpe:2.3:a:thoughtworks:gocd:*:*:*:*:*:*:*:*" ]
CVE-2024-6346
Post Grid, Form Maker, Popup Maker, WooCommerce Blocks, Post Blocks, Post Carousel – Combo Blocks <= 2.2.85a - Authenticated (Contributor+) Stored Cross-Site Scripting via redirectURL Parameter of Date Countdown Widget
The Gutenberg Blocks, Page Builder – ComboBlocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the redirectURL parameter of the Date Countdown widget, in all versions up to, and including, 2.2.85a due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
GHSA-h6c2-23rv-4mwc
In the Linux kernel, the following vulnerability has been resolved:wifi: iwlwifi: don't warn when if there is a FW erroriwl_trans_reclaim is warning if it is called when the FW is not alive. But if it is called when there is a pending restart, i.e. after a FW error, there is no need to warn, instead - return silently.
[]
GHSA-rr34-7g73-5ccm
In SurfaceFlinger::createLayer of SurfaceFlinger.cpp, there is a possible arbitrary code execution due to improper casting. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9Android ID: A-137284057
[]
CVE-2023-43766
Certain WithSecure products allow Local privilege escalation via the lhz archive unpack handler. This affects WithSecure Client Security 15, WithSecure Server Security 15, WithSecure Email and Server Security 15, WithSecure Elements Endpoint Protection 17 and later, WithSecure Client Security for Mac 15, WithSecure Elements Endpoint Protection for Mac 17 and later, Linux Security 64 12.0 , Linux Protection 12.0, and WithSecure Atlant (formerly F-Secure Atlant) 1.0.35-1.
[ "cpe:2.3:a:f-secure:linux_protection:12.0:*:*:*:*:*:*:*", "cpe:2.3:a:f-secure:linux_security_64:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:a:f-secure:atlant:1.0.35-1:*:*:*:*:*:*:*", "cpe:2.3:a:f-secure:client_security:15.00:*:*:*:*:*:*:*", "cpe:2.3:a:f-secure:elements_endpoint_protection:*:*:*:*:*:*:*:*", "cpe:2.3:a:f-secure:email_and_server_security:15.00:*:*:*:*:*:*:*", "cpe:2.3:a:f-secure:server_security:15.00:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*" ]
GHSA-q45m-2998-2qff
Multiple PHP remote file inclusion vulnerabilities in php(Reactor) 1.2.7 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the pathtohomedir parameter to (1) view.inc.php, (2) users.inc.php, (3) updatecms.inc.php, and (4) polls.inc.php in inc/; and other unspecified files, different vectors than CVE-2006-3983.
[]
CVE-2015-7740
Huawei P7 before P7-L00C17B851, P7-L05C00B851, and P7-L09C92B851 and P8 ALE-UL00 before ALE-UL00B211 allows local users to cause a denial of service (OS crash) via vectors involving an application that passes crafted input to the GPU driver.
[ "cpe:2.3:o:huawei:p7_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:p7:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:p8_ale-ul00_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:p8_ale-ul00:-:*:*:*:*:*:*:*" ]
GHSA-xm42-x3fj-82gw
PSKMAD.sys in Panda Free Antivirus 18.0 allows local users to cause a denial of service (BSoD) via a crafted DeviceIoControl request to \\.\PSMEMDriver.
[]
GHSA-6c2p-9hhc-8hc8
A spoofing vulnerability exists when an Office Web Apps server does not properly sanitize a specially crafted request, aka 'Office Web Apps XSS Vulnerability'.
[]
GHSA-q2c4-3vph-r3ph
Adobe Shockwave Player before 12.0.4.144 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-3359.
[]
CVE-2021-21983
Arbitrary file write vulnerability in vRealize Operations Manager API (CVE-2021-21983) prior to 8.4 may allow an authenticated malicious actor with network access to the vRealize Operations Manager API can write files to arbitrary locations on the underlying photon operating system.
[ "cpe:2.3:a:vmware:cloud_foundation:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:cloud_foundation:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:cloud_foundation:3.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:cloud_foundation:3.5:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:cloud_foundation:3.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:cloud_foundation:3.7:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:cloud_foundation:3.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:cloud_foundation:3.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:cloud_foundation:3.8:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:cloud_foundation:3.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:cloud_foundation:3.9:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:cloud_foundation:3.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:cloud_foundation:3.10:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:cloud_foundation:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:cloud_foundation:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:vrealize_operations_manager:7.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:vrealize_operations_manager:7.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:vrealize_operations_manager:8.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:vrealize_operations_manager:8.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:vrealize_operations_manager:8.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:vrealize_operations_manager:8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:vrealize_operations_manager:8.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:vrealize_operations_manager:8.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:vrealize_suite_lifecycle_manager:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:vrealize_suite_lifecycle_manager:8.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:vrealize_suite_lifecycle_manager:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:vmware:vrealize_suite_lifecycle_manager:8.2:*:*:*:*:*:*:*" ]
GHSA-5g2v-h242-hcm5
The kernel in Apple iOS before 9.3.2 and OS X before 10.11.5 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
[]
CVE-2018-19665
The Bluetooth subsystem in QEMU mishandles negative values for length variables, leading to memory corruption.
[ "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*", "cpe:2.3:a:qemu:qemu:3.1.0:rc0:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*" ]
GHSA-vp4v-w4h8-vhf3
The ping functionality in cgi-bin/diagnostic.cgi on Seowon Intech SWC-9100 routers allows remote attackers to execute arbitrary commands via shell metacharacters in the ping_ipaddr parameter.
[]
GHSA-jxmw-3gxf-fprh
Improper masking of credentials Jenkins in Git Plugin
Jenkins Git Plugin 4.11.4 and earlier does not properly mask (i.e., replace with asterisks) credentials in the build log provided by the Git Username and Password (`gitUsernamePassword`) credentials binding.
[]
CVE-2025-23098
An issue was discovered in Samsung Mobile Processor Exynos 980, 990, 1080, 2100, 1280, 2200, 1380. A Use-After-Free in the mobile processor leads to privilege escalation.
[]
GHSA-c9xv-wmrf-xrjc
Cross-site request forgery (CSRF) vulnerability in the Stream Video Player plugin 1.4.0 for WordPress allows remote attackers to hijack the authentication of administrators for requests that change plugin settings via unspecified vectors.
[]
CVE-2020-3451
Cisco Small Business RV340 Series Routers Command Injection and Remote Code Execution Vulnerabilities
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV340 Series Routers could allow an authenticated, remote attacker with administrative credentials to execute arbitrary commands on the underlying operating system (OS) as a restricted user. For more information about these vulnerabilities, see the Details section of this advisory.
[ "cpe:2.3:o:cisco:rv340w_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv340w:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv340_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv340:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv345_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv345:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv345p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv345p:-:*:*:*:*:*:*:*" ]
GHSA-rw82-83m8-mfj2
The Foxit Cloud Update Service (FoxitCloudUpdateService) in Foxit Reader 6.1 through 6.2.x and 7.x before 7.2.2, when an update to the Cloud plugin is available, allows local users to gain privileges by writing crafted data to a shared memory region, which triggers memory corruption.
[]
CVE-2020-4016
The /plugins/servlet/jira-blockers/ resource in the crucible-jira-ril plugin in Atlassian Fisheye and Crucible before version 4.8.1 allows remote attackers to get the ID of configured Jira application links via an information disclosure vulnerability.
[ "cpe:2.3:a:atlassian:crucible:*:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:fisheye:*:*:*:*:*:*:*:*" ]
CVE-2005-1090
Directory traversal vulnerability in the readFile and writeFile API for Maxthon 1.2.0 and 1.2.1 allows remote attackers to read or write arbitrary files.
[ "cpe:2.3:a:maxthon:maxthon:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:maxthon:maxthon:1.2.1:*:*:*:*:*:*:*" ]
GHSA-r33h-6mqf-5rp3
WinProxy 2.0 and 2.0.1 allows remote attackers to cause a denial of service by sending an HTTP GET request without listing an HTTP version number.
[]
CVE-2018-5680
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader before 9.1 and PhantomPDF before 9.1. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of specially crafted pdf files with embedded u3d images. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process, a different vulnerability than CVE-2018-5677 and CVE-2018-5679.
[ "cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*", "cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*" ]
GHSA-fc76-hxx9-92hh
BigFix Web Reports authorized users may see SMTP credentials in clear text.
[]
GHSA-x9rv-22wp-hr83
A vulnerability was found in code-projects Job Recruitment 1.0 and classified as critical. Affected by this issue is the function add_xp of the file /_parse/_all_edits.php. The manipulation of the argument job_company leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
[]
GHSA-35m9-g697-gr77
Lack of buffer length check before copying in WLAN function while processing FIPS event, can lead to a buffer overflow in Snapdragon Mobile in version SD 845.
[]
GHSA-49r4-q83q-h2wr
A vulnerability has been identified in SCALANCE LPE9403 (All versions < V2.1). The `i2c` mutex file is created with the permissions bits of `-rw-rw-rw-`. This file is used as a mutex for multiple applications interacting with i2c. This could allow an authenticated attacker with access to the SSH interface on the affected device to interfere with the integrity of the mutex and the data it protects.
[]
CVE-2014-5724
The Gambling Insider Magazine (aka com.triactivemedia.gambling) application @7F0801AA for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:pocketmags:gambling_insider_magazine:\\@7f0801aa:*:*:*:*:android:*:*" ]
CVE-2024-3668
PowerPack Pro for Elementor <= 2.10.17 - Authenticated (Contributor+) Privilege Escalation
The PowerPack Pro for Elementor plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 2.10.17. This is due to the plugin not restricting low privileged users from setting a default role for a registration form. This makes it possible for authenticated attackers, with contributor-level access and above, to create a registration form with administrator set as the default role and then register as an administrator.
[ "cpe:2.3:a:ideabox:powerpack_addons_for_elementor:*:*:*:*:*:wordpress:*:*" ]
CVE-2024-54102
Race condition vulnerability in the DDR module Impact: Successful exploitation of this vulnerability may affect service confidentiality.
[]
GHSA-2m6v-mggf-5f9g
Microsoft Jet Red Database Engine and Access Connectivity Engine Remote Code Execution Vulnerability
[]
GHSA-xmxp-x783-v5rx
Online Tours & Travels Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /tour/admin/update_tax.php.
[]
GHSA-cc5c-g4xf-q5cw
Cross-site scripting (XSS) vulnerability in contact_us.php in osCommerce 2.2-MS2 allows remote attackers to inject arbitrary web script or HTML via the enquiry parameter.
[]
GHSA-4v4f-rw7f-997r
Error messages generated by gdm with the VerboseAuth setting allows an attacker to identify valid users on a system.
[]
CVE-2023-32012
Windows Container Manager Service Elevation of Privilege Vulnerability
Windows Container Manager Service Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*" ]
CVE-2023-3967
DoS Vulnerability in Hitachi Ops Center Common Services
Allocation of Resources Without Limits or Throttling vulnerability in Hitachi Ops Center Common Services on Linux allows DoS.This issue affects Hitachi Ops Center Common Services: before 10.9.3-00.
[ "cpe:2.3:a:hitachi:ops_center_common_services:-:*:*:*:*:*:*:*", "cpe:2.3:a:hitachi:ops_center_common_services:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" ]
CVE-2002-1455
Multiple cross-site scripting (XSS) vulnerabilities in OmniHTTPd allow remote attackers to insert script or HTML into web pages via (1) test.php, (2) test.shtml, or (3) redir.exe.
[ "cpe:2.3:a:omnicron:omnihttpd:*:*:*:*:*:*:*:*" ]
GHSA-5r78-9672-gcjc
AFP File Server in Apple OS X before 10.10 allows remote attackers to discover the network addresses of all interfaces via an unspecified command to one interface.
[]