id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
38
232
CVE-2024-11477
7-Zip Zstandard Decompression Integer Underflow Remote Code Execution Vulnerability
7-Zip Zstandard Decompression Integer Underflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of 7-Zip. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the implementation of Zstandard decompression. The issue results from the lack of proper validation of user-supplied data, which can result in an integer underflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24346.
[ "cpe:2.3:a:7-zip:7zip:*:*:*:*:*:*:*:*", "cpe:2.3:a:7-zip:7-zip:*:*:*:*:*:*:*:*" ]
null
null
7.8
null
null
CVE-2025-20079
Uncontrolled search path for some Intel(R) Advisor software may allow an authenticated user to potentially enable escalation of privilege via local access.
[]
5.4
6.7
null
null
null
CVE-2016-5360
HAproxy 1.6.x before 1.6.6, when a deny comes from a reqdeny rule, allows remote attackers to cause a denial of service (uninitialized memory access and crash) or possibly have unspecified other impact via unknown vectors.
[ "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:a:haproxy:haproxy:1.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:haproxy:haproxy:1.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:haproxy:haproxy:1.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:haproxy:haproxy:1.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:haproxy:haproxy:1.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:haproxy:haproxy:1.6.5:*:*:*:*:*:*:*" ]
null
null
7.5
5
null
CVE-2023-7231
illi Link Party! <= 1.0 - Unauthenticated Arbitrary Link Deletion
The illi Link Party! WordPress plugin through 1.0 lacks proper access controls, allowing unauthenticated visitors to delete links.
[]
null
7.3
null
null
null
CVE-2021-32516
QSAN Storage Manager - Path Traversal
Path traversal vulnerability in share_link in QSAN Storage Manager allows remote attackers to download arbitrary files. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3.
[ "cpe:2.3:a:qsan:storage_manager:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
CVE-2005-2914
ezconfig.asp in Linksys WRT54G router 3.01.03, 3.03.6, non-default configurations of 2.04.4, and possibly other versions, does not use an authentication initialization function, which allows remote attackers to obtain encrypted configuration information and, if the key is known, modify the configuration.
[ "cpe:2.3:h:linksys:wrt54g:2.04.4:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:wrt54g:3.01.3:*:*:*:*:*:*:*", "cpe:2.3:h:linksys:wrt54g:3.03.6:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
RHSA-2024:7436
Red Hat Security Advisory: Red Hat OpenShift for Windows Containers 10.17.0 product release
The components for Red Hat OpenShift for Windows Containers 10.17.0 are now available. This product release includes bug fixes and security updates for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[ "cpe:/a:redhat:openshift:4.17::el9" ]
null
null
null
null
null
CVE-2020-5421
RFD Protection Bypass via jsessionid
In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.28, and older unsupported versions, the protections against RFD attacks from CVE-2015-5211 may be bypassed depending on the browser used through the use of a jsessionid path parameter.
[ "cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:commerce_guided_search:11.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_brm:11.3.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_brm:12.0.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_design_studio:7.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_design_studio:7.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_design_studio:7.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:endeca_information_discovery_integrator:3.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:enterprise_data_quality:12.2.1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:enterprise_data_quality:12.2.1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_private_banking:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_private_banking:12.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:12.2.1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:12.2.1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:goldengate_application_adapters:19.1.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:healthcare_master_person_index:4.0.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.1.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:insurance_policy_administration:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:insurance_policy_administration:10.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:insurance_policy_administration:10.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:insurance_policy_administration:11.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:insurance_rules_palette:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:insurance_rules_palette:10.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:insurance_rules_palette:10.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:insurance_rules_palette:11.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql_enterprise_monitor:8.0.23:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_assortment_planning:16.0.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_bulk_data_integration:16.0.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_customer_engagement:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_customer_management_and_segmentation_foundation:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_financial_integration:14.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_financial_integration:15.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_financial_integration:16.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_integration_bus:14.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_integration_bus:15.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_integration_bus:16.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_invoice_matching:14.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_invoice_matching:14.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_merchandising_system:16.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_order_broker:15.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_order_broker:16.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_predictive_application_server:14.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_returns_management:14.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_service_backbone:14.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_service_backbone:15.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_service_backbone:16.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_xstore_point_of_service:15.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_xstore_point_of_service:16.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_xstore_point_of_service:17.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_xstore_point_of_service:18.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_xstore_point_of_service:19.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:storagetek_acsls:8.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:storagetek_tape_analytics_sw_tool:2.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:snap_creator_framework:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*" ]
null
null
8.7
null
null
GHSA-mhv9-5hxr-j9mw
Cross Site Scripting vulnerability in Petrol Pump Mangement Software v.1.0 allows an attacker to execute arbitrary code via a crafted payload to the image parameter in the profile.php component.
[]
null
6.1
null
null
null
CVE-2023-39062
Cross Site Scripting vulnerability in Spipu HTML2PDF before v.5.2.8 allows a remote attacker to execute arbitrary code via a crafted script to the forms.php.
[ "cpe:2.3:a:html2pdf_project:html2pdf:*:*:*:*:*:*:*:*" ]
null
6.1
null
null
null
GHSA-mv32-9mh3-q74p
A vulnerability related to registry permissions in the Intercept X for Windows updater prior to version 2024.3.2 can lead to a local user gaining SYSTEM level privileges during a product upgrade.
[]
null
8.8
null
null
null
CVE-2005-2025
Cisco VPN 3000 Concentrator before 4.1.7.F allows remote attackers to determine valid groupnames by sending an IKE Aggressive Mode packet with the groupname in the ID field, which generates a response if the groupname is valid, but does not generate a response for an invalid groupname.
[ "cpe:2.3:h:cisco:vpn_3000_concentrator:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:vpn_3015_concentrator:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:vpn_3020_concentrator:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:vpn_3030_concentator:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:vpn_3060_concentrator:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:vpn_3080_concentrator:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.c:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.d:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.f:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.0.3.a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.0.3.b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.1\\(rel\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.5\\(rel\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.5.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.5.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.5.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.5.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.5.5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.5:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.7:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.7.a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.7.b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.7.c:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.7.d:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.7.f:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.7d:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.0.5.b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.1.5.b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.1.7.a:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.1.7.b:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:vpn_3005_concentrator_software:4.0.1:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2009-0288
Directory traversal vulnerability in k23productions TFTPUtil GUI 1.2.0 and 1.3.0 allows remote attackers to read arbitrary files outside the TFTP root directory via directory traversal sequences in a GET request.
[ "cpe:2.3:a:windows_tftp_utility:tftputil:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:windows_tftp_utility:tftputil:1.3.0:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2020-26641
A Cross Site Request Forgery (CSRF) vulnerability was discovered in iCMS 7.0.16 which can allow an attacker to execute arbitrary web scripts.
[ "cpe:2.3:a:idreamsoft:icms:7.0.16:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
null
GHSA-q46h-4c8m-gg49
Multiple heap-based buffer overflows in the imlib BMP image handler allow remote attackers to execute arbitrary code via a crafted BMP file.
[]
null
null
null
null
null
cisco-sa-ncs4k-tl1-GNnLwC6
Cisco Network Convergence System 4000 Series TL1 Denial of Service Vulnerability
A vulnerability in the TL1 function of Cisco Network Convergence System (NCS) 4000 Series could allow an authenticated, local attacker to cause a memory leak in the TL1 process. This vulnerability is due to TL1 not freeing memory under some conditions. An attacker could exploit this vulnerability by connecting to the device and issuing TL1 commands after being authenticated. A successful exploit could allow the attacker to cause the TL1 process to consume large amounts of memory. When the memory reaches a threshold, the Resource Monitor (Resmon) process will begin to restart or shutdown the top five consumers of memory, resulting in a denial of service (DoS). Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is part of the September 2022 release of the Cisco IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: September 2022 Semiannual Cisco IOS XR Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74840"].
[]
null
6
null
null
null
GHSA-pm6q-ff9r-9f8w
The pkgmgr system service in Tizen allows an unprivileged process to perform package management actions, due to improper D-Bus security policy configurations. Such actions include installing, decrypting, and killing other packages. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
[]
null
null
null
null
null
GHSA-xpj8-p66v-3v8x
plugins/box/users/users.plugin.php in Monstra CMS 3.0.4 allows Login Rate Limiting Bypass via manipulation of the login_attempts cookie.
[]
null
null
9.8
null
null
GHSA-8j98-cjfr-qx3h
github.com/ecies/go vulnerable to possible private key restoration
ImpactIf functions `Encapsulate()`, `Decapsulate()` and `ECDH()` could be called by an attacker, he could recover any private key that he interacts with.PatchesPatched in v2.0.8WorkaroundsYou could manually check public key by calling `IsOnCurve()` function from secp256k1 libraries.Referenceshttps://github.com/ashutosh1206/Crypton/blob/master/Diffie-Hellman-Key-Exchange/Attack-Invalid-Curve-Point/README.md
[]
null
8.1
null
null
null
CVE-2024-6507
Deep Lake Kaggle command injection
Command injection when ingesting a remote Kaggle dataset due to a lack of input sanitization in the ingest_kaggle() API
[ "cpe:2.3:a:deeplake:deeplake:3.9.10:*:*:*:*:*:*:*" ]
null
8.1
null
null
https://github.com/activeloopai/deeplake/pull/2876
CVE-2023-36912
Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
[ "cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
RHSA-2024:0452
Red Hat Security Advisory: curl security update
curl: information disclosure by exploiting a mixed case flaw
[ "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/o:redhat:rhel_eus:9.2::baseos" ]
null
5.3
null
null
null
GHSA-f9hp-mwxx-5mjg
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Busters Passwordless WP – Login with your glance or fingerprint allows Reflected XSS. This issue affects Passwordless WP – Login with your glance or fingerprint: from n/a through 1.1.6.
[]
null
7.1
null
null
null
CVE-2025-21882
net/mlx5: Fix vport QoS cleanup on error
In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Fix vport QoS cleanup on error When enabling vport QoS fails, the scheduling node was never freed, causing a leak. Add the missing free and reset the vport scheduling node pointer to NULL.
[]
null
null
null
null
null
CVE-2010-0194
Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allow attackers to cause a denial of service (memory corruption) or execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-0197, CVE-2010-0201, and CVE-2010-0204.
[ "cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:8.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:8.2.1:*:*:*:*:*:*:*" ]
null
null
null
9.3
null
GHSA-jffx-25jv-j63f
Kaspersky Anti-Hacker 1.0, when configured to automatically block attacks, allows remote attackers to block IP addresses and cause a denial of service via spoofed packets.
[]
null
null
null
null
null
GHSA-9672-786w-jwpr
Tenda FH451 v1.0.0.9 has a stack overflow vulnerability located in the RouteStatic function.
[]
null
6.5
null
null
null
CVE-2017-1002026
Vulnerability in wordpress plugin Event Expresso Free v3.1.37.11.L, The function edit_event_category does not sanitize user-supplied input via the $id parameter before passing it into an SQL statement.
[ "cpe:2.3:a:eventespresso:event_espresso:3.1.37.11.l:*:*:*:free:wordpress:*:*" ]
null
null
8.8
6.5
null
GHSA-c65j-wcvh-77gc
PRTG Network Monitor through 22.2.77.2204 does not prevent custom input for a device’s icon, which can be modified to insert arbitrary content into the style tag for that device. When the device page loads, the arbitrary Cascading Style Sheets (CSS) data is inserted into the style tag, loading malicious content. Due to PRTG Network Monitor preventing “characters, and from modern browsers disabling JavaScript support in style tags, this vulnerability could not be escalated into a Cross-Site Scripting vulnerability.
[]
null
5.3
null
null
null
CVE-2023-34410
An issue was discovered in Qt before 5.15.15, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.2. Certificate validation for TLS does not always consider whether the root of a chain is a configured CA certificate.
[ "cpe:2.3:a:qt:qt:*:*:*:*:*:*:*:*" ]
null
5.3
null
null
null
CVE-2019-0386
Order processing in SAP ERP Sales (corrected in SAP_APPL 6.0, 6.02, 6.03, 6.04, 6.05, 6.06, 6.16, 6.17, 6.18) and S4HANA Sales (corrected in S4CORE 1.0, 1.01, 1.02, 1.03, 1.04) does not execute the required authorization checks for an authenticated user, which can result in an escalation of privileges.
[ "cpe:2.3:a:sap:erp_sales:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:sap:erp_sales:6.02:*:*:*:*:*:*:*", "cpe:2.3:a:sap:erp_sales:6.03:*:*:*:*:*:*:*", "cpe:2.3:a:sap:erp_sales:6.04:*:*:*:*:*:*:*", "cpe:2.3:a:sap:erp_sales:6.05:*:*:*:*:*:*:*", "cpe:2.3:a:sap:erp_sales:6.06:*:*:*:*:*:*:*", "cpe:2.3:a:sap:erp_sales:6.16:*:*:*:*:*:*:*", "cpe:2.3:a:sap:erp_sales:6.17:*:*:*:*:*:*:*", "cpe:2.3:a:sap:erp_sales:6.18:*:*:*:*:*:*:*", "cpe:2.3:a:sap:s4hana_sales:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:sap:s4hana_sales:1.01:*:*:*:*:*:*:*", "cpe:2.3:a:sap:s4hana_sales:1.02:*:*:*:*:*:*:*", "cpe:2.3:a:sap:s4hana_sales:1.03:*:*:*:*:*:*:*", "cpe:2.3:a:sap:s4hana_sales:1.04:*:*:*:*:*:*:*" ]
null
6.3
null
6.5
null
GHSA-29v3-r4gm-9j2f
An issue was discovered on LG mobile devices with Android OS 8.0, 8.1, 9, and 10 software. The network_management service does not properly restrict configuration changes. The LG ID is LVE-SMP-200012 (July 2020).
[]
null
null
null
null
null
GHSA-r2w2-2r2x-fpcx
TYPO3 SQL Injection vulnerability
SQL injection vulnerability in the list module in TYPO3 4.2.x before 4.2.16, 4.3.x before 4.3.9, and 4.4.x before 4.4.5 allows remote authenticated users with certain permissions to execute arbitrary SQL commands via unspecified vectors.
[]
null
null
null
null
null
CVE-2022-31513
The BolunHan/Krypton repository through 2021-06-03 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.
[ "cpe:2.3:a:krypton_project:krypton:*:*:*:*:*:*:*:*" ]
null
9.3
null
6.4
null
cisco-sa-capwap-dos-TPdNTdyq
Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family CAPWAP Denial of Service Vulnerabilities
Multiple vulnerabilities in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol processing of Cisco IOS XE Software for Cisco Catalyst 9800 Series Wireless Controllers could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition of an affected device. These vulnerabilities are due to insufficient validation of CAPWAP packets. An attacker could exploit these vulnerabilities by sending a malformed CAPWAP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to crash and reload, resulting in a DoS condition on the affected device. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is part of the September 24, 2020, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes 25 Cisco Security Advisories that describe 34 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: September 2020 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74268"].
[]
null
null
7.4
null
null
CVE-2022-30233
A CWE-20: Improper Input Validation vulnerability exists that could allow the product to be maliciously manipulated when the user is tricked into performing certain actions on a webpage. Affected Products: Wiser Smart, EER21000 & EER21001 (V4.5 and prior)
[ "cpe:2.3:o:schneider-electric:wiser_smart_eer21000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:wiser_smart_eer21000:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:wiser_smart_eer21001_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:wiser_smart_eer21001:-:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
CVE-2019-1093
An information disclosure vulnerability exists when DirectWrite improperly discloses the contents of its memory, aka 'DirectWrite Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1097.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
null
5.5
2.1
null
GHSA-j8gj-hp37-8qx9
Multiple cross-site scripting (XSS) vulnerabilities in Layton HelpBox 3.7.1 allow remote authenticated users to inject arbitrary web script or HTML via the (1) Forename, (2) Surname, (3) Telephone, and (4) Fax fields to writeenduserenduser.asp; the (5) Filter field to statsrequestypereport.asp; and the (6) sys_request_id parameter to requestattach.asp; and allow remote authenticated users to inject arbitrary web script or HTML via the (7) Asset, (8) Location, and (9) Problem fields to editrequestenduser.asp; the (10) Asset, (11) Asset Location, (12) Problem Desc, and (13) Solution Desc fields to editrequestuser.asp; and the (14) End User and (15) Description fields to usersearchrequests.asp. NOTE: vectors 5 and 6 do not require authentication to exploit.
[]
null
null
null
null
null
CVE-2022-25396
Cosmetics and Beauty Product Online Store v1.0 was discovered to contain a SQL injection vulnerability via the search parameter.
[ "cpe:2.3:a:cosmetics_and_beauty_product_online_store_project:cosmetics_and_beauty_product_online_store:1.0:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
CVE-2009-1211
Blue Coat ProxySG, when transparent interception mode is enabled, uses the HTTP Host header to determine the remote endpoint, which allows remote attackers to bypass access controls for Flash, Java, Silverlight, and probably other technologies, and possibly communicate with restricted intranet sites, via a crafted web page that causes a client to send HTTP requests with a modified Host header.
[ "cpe:2.3:a:bluecoat:proxysg_va-10:*:*:*:*:*:*:*:*", "cpe:2.3:a:bluecoat:proxysg_va-15:*:*:*:*:*:*:*:*", "cpe:2.3:a:bluecoat:proxysg_va-20:*:*:*:*:*:*:*:*", "cpe:2.3:a:bluecoat:proxysg_va-5:*:*:*:*:*:*:*:*", "cpe:2.3:h:bluecoat:proxysg:*:*:*:*:*:*:*:*", "cpe:2.3:h:bluecoat:proxysg_sg210-10:-:-:acceleration:*:*:*:*:*", "cpe:2.3:h:bluecoat:proxysg_sg210-10:-:-:full_proxy:*:*:*:*:*", "cpe:2.3:h:bluecoat:proxysg_sg210-25:-:-:acceleration:*:*:*:*:*", "cpe:2.3:h:bluecoat:proxysg_sg210-25:-:-:full_proxy:*:*:*:*:*", "cpe:2.3:h:bluecoat:proxysg_sg210-5:-:-:acceleration:*:*:*:*:*", "cpe:2.3:h:bluecoat:proxysg_sg210-5:-:-:full_proxy:*:*:*:*:*", "cpe:2.3:h:bluecoat:proxysg_sg510-10:-:-:acceleration:*:*:*:*:*", "cpe:2.3:h:bluecoat:proxysg_sg510-10:-:-:full_proxy:*:*:*:*:*", "cpe:2.3:h:bluecoat:proxysg_sg510-20:-:-:acceleration:*:*:*:*:*", "cpe:2.3:h:bluecoat:proxysg_sg510-20:-:-:full_proxy:*:*:*:*:*", "cpe:2.3:h:bluecoat:proxysg_sg510-25:-:-:acceleration:*:*:*:*:*", "cpe:2.3:h:bluecoat:proxysg_sg510-25:-:-:full_proxy:*:*:*:*:*", "cpe:2.3:h:bluecoat:proxysg_sg510-5:-:-:full_proxy:*:*:*:*:*", "cpe:2.3:h:bluecoat:proxysg_sg810-10:-:-:acceleration:*:*:*:*:*", "cpe:2.3:h:bluecoat:proxysg_sg810-10:-:-:full_proxy:*:*:*:*:*", "cpe:2.3:h:bluecoat:proxysg_sg810-20:-:-:acceleration:*:*:*:*:*", "cpe:2.3:h:bluecoat:proxysg_sg810-20:-:-:full_proxy:*:*:*:*:*", "cpe:2.3:h:bluecoat:proxysg_sg810-25:-:-:acceleration:*:*:*:*:*", "cpe:2.3:h:bluecoat:proxysg_sg810-25:-:-:full_proxy:*:*:*:*:*", "cpe:2.3:h:bluecoat:proxysg_sg810-5:-:-:full_proxy:*:*:*:*:*", "cpe:2.3:h:bluecoat:proxysg_sg9000-10:-:-:acceleration:*:*:*:*:*", "cpe:2.3:h:bluecoat:proxysg_sg9000-10:-:-:full_proxy:*:*:*:*:*", "cpe:2.3:h:bluecoat:proxysg_sg9000-20:-:-:acceleration:*:*:*:*:*", "cpe:2.3:h:bluecoat:proxysg_sg9000-20:-:-:full_proxy:*:*:*:*:*", "cpe:2.3:h:bluecoat:proxysg_sg9000-5:-:-:acceleration:*:*:*:*:*", "cpe:2.3:h:bluecoat:proxysg_sg9000-5:-:-:full_proxy:*:*:*:*:*" ]
null
null
null
5.8
null
GHSA-q46x-3r3x-cfj4
Multiple cross-site request forgery (CSRF) vulnerabilities in the Search API module 7.x-1.x before 7.x-1.3 for Drupal allow remote attackers to hijack the authentication of administrators for requests that (1) enable a server via a server action or (2) enable a search index via an enable index action.
[]
null
null
null
null
null
CVE-2008-4722
Unspecified vulnerability in Sun Integrated Lights-Out Manager (ILOM) 2.0.1.5 through 2.0.4.26 allows remote authenticated users to (1) access the service processor (SP) and cause a denial of service (shutdown or reboot), or (2) access the host operating system and have an unspecified impact, via unknown vectors.
[ "cpe:2.3:a:sun:integrated_lights-out_manager:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:blade_6000_modular_system_with_chassis:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:blade_6048_modular_system_with_chassis:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:blade_8000_modular_system:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:blade_8000p_modular_system:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:blade_t6320_server_module:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:blade_x6220_with_server_module_software:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:blade_x6250_with_server_module_software:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:blade_x6450_with_server_module_software:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:blade_x8400:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:blade_x8420:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:blade_x8440:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:blade_x8450:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:fire_x2250_server:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:fire_x4100_server:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:fire_x4100m2_server:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:fire_x4140_server:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:fire_x4150_server:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:fire_x4200_server:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:fire_x4200m2_server:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:fire_x4240_server:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:fire_x4250_server:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:fire_x4440_server:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:fire_x4450_server:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:fire_x4500_server:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:fire_x4540_server:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:fire_x4600_server:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:fire_x4600m2_server:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:netra:*:7.1.6:*:*:*:*:*:*", "cpe:2.3:h:sun:netra:*:7.1.4a:*:*:*:*:*:*", "cpe:2.3:h:sun:netra_x4200m2_server:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:netra_x4250_server:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:netra_x4450:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:sparc_enterprise_server_t5120:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:sparc_enterprise_server_t5140:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:sparc_enterprise_server_t5220:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:sparc_enterprise_server_t5240:*:*:*:*:*:*:*:*", "cpe:2.3:h:sun:sparc_enterprise_server_t5440:*:*:*:*:*:*:*:*" ]
null
null
null
9
null
CVE-2018-4086
An issue was discovered in certain Apple products. iOS before 11.2.5 is affected. macOS before 10.13.3 is affected. tvOS before 11.2.5 is affected. watchOS before 4.2.2 is affected. The issue involves the "Security" component. It allows remote attackers to spoof certificate validation via crafted name constraints.
[ "cpe:2.3:a:apple:apple_tv:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
null
null
5.9
4.3
null
CVE-2024-3030
The Announce from the Dashboard plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.5.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
[]
null
4.4
null
null
null
GHSA-mp36-gw43-323p
In ContentService, there is a possible way to check if an account exists on the device due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-201416182
[]
null
5.5
null
null
null
GHSA-68x9-rcmx-ph7w
Unspecified vulnerability in the edge process in Adobe Flash Media Server (FMS) 3.0.x before 3.0.7, 3.5.x before 3.5.5, and 4.0.x before 4.0.1 allows attackers to cause a denial of service via unknown vectors.
[]
null
null
null
null
null
GHSA-277v-gwfr-hmpj
Missing Authentication for Critical Function in LibreNMS
An issue was discovered in LibreNMS through 1.47. A number of scripts import the Authentication libraries, but do not enforce an actual authentication check. Several of these scripts disclose information or expose functions that are of a sensitive nature and are not expected to be publicly accessible.
[]
null
9.1
null
null
null
CVE-2020-7825
A vulnerability exists that could allow the execution of operating system commands on systems running MiPlatform 2019.05.16 and earlier. An attacker could execute arbitrary remote command by sending parameters to WinExec function in ExtCommandApi.dll module of MiPlatform.
[ "cpe:2.3:a:tobesoft:miplatform:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
null
GHSA-vqgx-gpv3-58p3
The WooCommerce Customers Manager WordPress plugin before 30.2 does not have authorisation and CSRF in various AJAX actions, allowing any authenticated users, such as subscriber, to call them and update/delete/create customer metadata, also leading to Stored Cross-Site Scripting due to the lack of escaping of said metadata values.
[]
null
6.5
null
null
null
GHSA-q42m-mp58-hxv5
In JetBrains Ktor before 2.3.5 default configuration of ContentNegotiation with XML format was vulnerable to XXE
[]
null
8.6
null
null
null
CVE-2006-5955
SQL injection vulnerability in listings.asp in 20/20 DataShed (aka Real Estate Listing System) allows remote attackers to execute arbitrary SQL commands via the itemID parameter. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:20_20_applications:20_20_datashed:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
GHSA-4jrj-gxg8-2frj
Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.
[]
null
9.8
null
null
null
CVE-2018-18399
SQL injection vulnerability in the "ContentPlaceHolder1_uxTitle" component in ArchiveNews.aspx in jco.ir KARMA 6.0.0 allows a remote attacker to execute arbitrary SQL commands via the "id" parameter.
[ "cpe:2.3:a:jco:karma:6.0.0:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
null
GHSA-j288-6xgr-g898
Lack of validation of origin in federation API in Conduit, allowing any remote server to impersonate any user from any server in most EDUs
[]
null
5.3
null
null
null
GHSA-c666-m54v-25m4
Acrobat Reader versions 20.005.30574, 24.002.20736 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
7.8
null
null
null
GHSA-8459-gg55-8qjj
Certain DNSSEC aspects of the DNS protocol (in RFC 4035 and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses when there is a zone with many DNSKEY and RRSIG records, aka the "KeyTrap" issue. The protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records.
[]
null
7.5
null
null
null
CVE-2007-0436
Barron McCann X-Kryptor Driver BMS1446HRR (Xgntr BMS1351 Install BMS1472) in X-Kryptor Secure Client does not drop privileges when launching an Explorer window in response to a help command, which allows local users to gain LocalSystem privileges via interactive use of Explorer.
[ "cpe:2.3:a:barron_mccann:install:bms1472:*:*:*:*:*:*:*", "cpe:2.3:a:barron_mccann:x-kryptor_driver:bms1446hrr:*:*:*:*:*:*:*", "cpe:2.3:a:barron_mccann:x-kryptor_secure_client:*:*:*:*:*:*:*:*", "cpe:2.3:a:barron_mccann:xgntr:bms1351:*:*:*:*:*:*:*" ]
null
null
null
4.6
null
GHSA-f3jx-26gh-ppcx
The /etc/profile.d/60alias.sh script in the Mandriva bash package for Bash 2.05b, 3.0, 3.2, 3.2.48, and 4.0 enables the --show-control-chars option in LS_OPTIONS, which allows local users to send escape sequences to terminal emulators, or hide the existence of a file, via a crafted filename.
[]
null
null
null
null
null
CVE-2025-1938
Memory safety bugs present in Firefox 135, Thunderbird 135, Firefox ESR 128.7, and Thunderbird 128.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 136, Firefox ESR < 128.8, Thunderbird < 136, and Thunderbird < 128.8.
[]
null
6.5
null
null
null
CVE-2024-9097
IDOR
ManageEngine Endpoint Central versions before 11.3.2440.09 are vulnerable to IDOR vulnerability which allows the attacker to change the username in the chat.
[]
null
3.5
null
null
null
CVE-2020-17092
Windows Network Connections Service Elevation of Privilege Vulnerability
Windows Network Connections Service Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012_r2:*:*:*:*:*:*:x64:*" ]
null
7.8
null
null
null
CVE-2012-2702
The Ubercart Product Keys module 6.x-1.x before 6.x-1.1 for Drupal does not properly check access for product keys, which allows remote attackers to read all unassigned product keys via certain conditions related to the uid.
[ "cpe:2.3:a:tony_freixas:ubercart_product_keys:6.x-1.0:*:*:*:*:*:*:*", "cpe:2.3:a:tony_freixas:ubercart_product_keys:6.x-1.0:alpha1:*:*:*:*:*:*", "cpe:2.3:a:tony_freixas:ubercart_product_keys:6.x-1.0:alpha2:*:*:*:*:*:*", "cpe:2.3:a:tony_freixas:ubercart_product_keys:6.x-1.0:alpha3:*:*:*:*:*:*", "cpe:2.3:a:tony_freixas:ubercart_product_keys:6.x-1.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:tony_freixas:ubercart_product_keys:6.x-1.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:tony_freixas:ubercart_product_keys:6.x-1.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*" ]
null
null
null
5
null
CVE-2024-53952
InDesign Desktop | NULL Pointer Dereference (CWE-476)
InDesign Desktop versions ID19.5, ID18.5.4 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service. An attacker could exploit this vulnerability to crash the application, leading to a denial of service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
5.5
null
null
null
CVE-2016-5194
Unspecified vulnerabilities in Google Chrome before 54.0.2840.59.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
null
9.8
null
10
null
CVE-2007-3201
Visual truncation vulnerability in Windows Privacy Tray (WinPT) 1.2.0 allows user-assisted remote attackers to install a key listed under the wrong user ID, and possibly cause the user to encrypt a victim's correspondence with this attacker-supplied key, via a key ID composed of the attacker's user ID, space characters, an invalid WinPT message, additional space characters, and the victim's user ID.
[ "cpe:2.3:a:winpt:winpt:1.2.0:*:*:*:*:*:*:*" ]
null
null
null
7.1
null
cisco-sa-asaftd-mgcp-SUqB8VKH
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Media Gateway Control Protocol Denial of Service Vulnerabilities
Multiple vulnerabilities in the Media Gateway Control Protocol (MGCP) inspection feature of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerabilities are due to inefficient memory management. An attacker could exploit these vulnerabilities by sending crafted MGCP packets through an affected device. An exploit could allow the attacker to cause memory exhaustion resulting in a restart of an affected device, causing a DoS condition for traffic traversing the device. Cisco has released software updates that address the vulnerabilities described in this advisory. There are no workarounds that address these vulnerabilities. This advisory is part of the May 2020 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication, which includes 12 Cisco Security Advisories that describe 12 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: May 2020 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-73830"].
[]
null
null
8.6
null
null
CVE-2010-3026
Cross-site request forgery (CSRF) vulnerability in application/modules/admin/controllers/users.php in Tomaz Muraus Open Blog 1.2.1, and possibly earlier, allows remote attackers to hijack the authentication of administrators for requests to admin/users/edit that grant administrative privileges.
[ "cpe:2.3:a:tomaz-muraus:open_blog:1.2.1:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-wrg5-fhgm-vwvq
The IP-HTTPS server in Windows Server 2008 R2 and R2 SP1 and Server 2012 does not properly validate certificates, which allows remote attackers to bypass intended access restrictions via a revoked certificate, aka "Revoked Certificate Bypass Vulnerability."
[]
null
null
null
null
null
GHSA-wxr5-p2xp-m24f
On BIG-IP AAM 13.0.0 or 12.1.0-12.1.3.7, the dcdb_convert utility used by BIG-IP AAM fails to drop group permissions when executing helper scripts, which could be used to leverage attacks against the BIG-IP system.
[]
null
null
7.8
null
null
CVE-2008-5151
test_parser.py in mayavi 1.5 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/err.log temporary file.
[ "cpe:2.3:a:abottoms:mayavi:1.5:*:*:*:*:*:*:*" ]
null
null
null
6.9
null
CVE-2022-37203
JFinal CMS 5.1.0 is vulnerable to SQL Injection. These interfaces do not use the same component, nor do they have filters, but each uses its own SQL concatenation method, resulting in SQL injection.
[ "cpe:2.3:a:jflyfox:jfinal_cms:5.1.0:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
CVE-2021-22227
A reflected cross-site script vulnerability in GitLab before versions 13.11.6, 13.12.6 and 14.0.2 allowed an attacker to send a malicious link to a victim and trigger actions on their behalf if they clicked it
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:-:*:*:*" ]
null
6.1
null
null
null
GHSA-jcch-9vxr-f9mg
WebKitGTK and WPE WebKit prior to version 2.24.1 failed to properly apply configured HTTP proxy settings when downloading livestream video (HLS, DASH, or Smooth Streaming), an error resulting in deanonymization. This issue was corrected by changing the way livestreams are downloaded.
[]
null
null
5.3
null
null
CVE-2002-0727
The Host function in Microsoft Office Web Components (OWC) 2000 and 2002 is exposed in components that are marked as safe for scripting, which allows remote attackers to execute arbitrary commands via the setTimeout method.
[ "cpe:2.3:a:microsoft:office_web_components:2000:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_web_components:2002:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:project:2002:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2010-1473
Directory traversal vulnerability in the Advertising (com_advertising) component 0.25 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.
[ "cpe:2.3:a:johnmccollum:com_advertising:0.25:*:*:*:*:*:*:*", "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
GHSA-g632-928g-4c3h
The PrinterLogic Print Management software, versions up to and including 18.3.1.96, does not sanitize special characters allowing for remote unauthorized changes to configuration files. An unauthenticated attacker may be able to remotely execute arbitrary code with SYSTEM privileges.
[]
null
null
null
null
null
GHSA-v3qq-w6xc-rjmw
A plaintext recovery of encrypted messages or a Man-in-the-middle (MiTM) attack on RSA PKCS #1 v1.5 encryption may be possible without knowledge of the server's private key. Fortinet FortiOS 5.4.6 to 5.4.9, 6.0.0 and 6.0.1 are vulnerable by such attack under SSL Deep Inspection feature when CPx being used.
[]
null
null
5.9
null
null
CVE-2022-21128
Insufficient control flow management in the Intel(R) Advisor software before version 7.6.0.37 may allow an authenticated user to potentially enable escalation of privilege via local access.
[ "cpe:2.3:a:intel:advisor:*:*:*:*:*:*:*:*" ]
null
7.8
null
4.6
null
CVE-2025-20688
In wlan AP driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00418047; Issue ID: MSV-3480.
[]
null
5.5
null
null
null
CVE-2022-34171
In Jenkins 2.321 through 2.355 (both inclusive) and LTS 2.332.1 through LTS 2.332.3 (both inclusive) the HTML output generated for new symbol-based SVG icons includes the 'title' attribute of 'l:ionicon' (until Jenkins 2.334) and 'alt' attribute of 'l:icon' (since Jenkins 2.335) without further escaping, resulting in a cross-site scripting (XSS) vulnerability.
[ "cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*", "cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*" ]
null
5.4
null
4.3
null
GHSA-7922-2gj2-vj5c
SQL injection vulnerability in rss.php in MyBB (aka MyBulletinBoard) 1.1.1 allows remote attackers to execute arbitrary SQL commands via the comma parameter. NOTE: it is not clear from the original report how this attack can succeed, since the demonstration URL uses a variable that is overwritten with static data in the extracted source code.
[]
null
null
null
null
null
GHSA-jc7p-5r39-9477
Improper Input Validation in Apache Tomcat
The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.
[]
null
null
7.1
null
null
CVE-2022-21198
Time-of-check time-of-use race condition in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
[ "cpe:2.3:o:intel:celeron_1000m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_1000m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_1005m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_1005m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_1007u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_1007u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_1017u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_1017u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_1019y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_1019y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_1020e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_1020e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_1020m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_1020m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_1037u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_1037u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_1047ue_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_1047ue:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_2955u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_2955u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_2957u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_2957u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_2970m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_2970m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_2980u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_2980u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_2981u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_2981u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_3755u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_3755u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_3765u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_3765u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_3855u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_3855u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_3865u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_3865u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_3867u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_3867u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_3955u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_3955u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_3965u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_3965u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_3965y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_3965y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_4205u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_4205u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_4305u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_4305u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_4305ue_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_4305ue:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_5205u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_5205u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_5305u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_5305u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_6305_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_6305:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_6305e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_6305e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_6600he_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_6600he:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_725c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_725c:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_7300_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_7300:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_7305_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_7305:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_787_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_787:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_797_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_797:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_807_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_807:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_807ue_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_807ue:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_827e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_827e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_847_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_847:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_847e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_847e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_857_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_857:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_867_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_867:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_877_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_877:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_887_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_887:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_927ue_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_927ue:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_b710_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_b710:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_b720_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_b720:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_b800_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_b800:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_b810_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_b810:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_b810e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_b810e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_b815_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_b815:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_b820_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_b820:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_b830_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_b830:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_b840_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_b840:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g1610_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g1610:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g1610t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g1610t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g1620_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g1620:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g1620t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g1620t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g1630_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g1630:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g1820_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g1820:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g1820t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g1820t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g1820te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g1820te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g1830_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g1830:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g1840_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g1840:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g1840t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g1840t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g1850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g1850:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g3900_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g3900:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g3900e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g3900e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g3900t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g3900t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g3900te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g3900te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g3902e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g3902e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g3920_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g3920:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g3920t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g3920t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g3930_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g3930:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g3930e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g3930e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g3930t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g3930t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g3930te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g3930te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g3940_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g3940:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g3950_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g3950:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g440_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g440:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g460_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g460:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g465_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g465:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g470_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g470:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g4900_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g4900:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g4900t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g4900t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g4920_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g4920:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g4930_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g4930:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g4930e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g4930e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g4930t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g4930t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g4932e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g4932e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g4950_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g4950:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g5205u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g5205u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g530_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g530:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g5305u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g5305u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g530t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g530t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g540_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g540:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g540t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g540t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g550_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g550:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g550t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g550t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g555_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g555:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g5900_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g5900:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g5900t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g5900t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g5905_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g5905:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g5905t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g5905t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g5920_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g5920:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g5925_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g5925:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g6900_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g6900:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_g6900t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_g6900t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_j1750_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j1750:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_j1800_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j1800:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_j1850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j1850:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_j1900_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j1900:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_j3060_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j3060:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_j3160_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j3160:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_j3355_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j3355:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_j3355e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j3355e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_j3455_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j3455:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_j3455e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j3455e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_j4005_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j4005:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_j4025_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j4025:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_j4105_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j4105:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_j4115_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j4115:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_j4125_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j4125:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_j6412_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j6412:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_j6413_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j6413:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n2805_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n2805:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n2806_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n2806:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n2807_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n2807:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n2808_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n2808:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n2810_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n2810:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n2815_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n2815:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n2820_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n2820:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n2830_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n2830:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n2840_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n2840:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n2910_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n2910:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n2920_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n2920:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n2930_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n2930:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n2940_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n2940:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n3000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n3000:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n3010_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n3010:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n3050_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n3050:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n3060_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n3060:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n3150_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n3150:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n3160_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n3160:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n3350_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n3350:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n3350e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n3450_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n3450:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n3520_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n3520:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n3700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n3700:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n4000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n4000c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n4000c:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n4020_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n4020c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n4020c:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n4100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n4120_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n4500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n4500:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n4504_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n4504:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n4505_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n4505:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n5095_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n5095:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n5100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n5100:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n5105_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n5105:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n6210_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n6210:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:celeron_n6211_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n6211:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1000g1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1000g4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1005g1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10100e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10100f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10100t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10100te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10100y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10105_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10105f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10105t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10110u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10110y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10300_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10300t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10305_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10305t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10320_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-10325_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-11100he_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-11100he:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1110g4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1115g4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1115g4e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1115g4e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1115gre_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1115gre:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1120g4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1125g4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-12100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-12100:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-12100e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-12100e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-12100f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-12100f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-12100t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-12100t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-12100te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-12100te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1210u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1210u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1215u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1215u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1215ue_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1215ue:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1215ul_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1215ul:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1220p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1220p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-1220pe_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-1220pe:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-12300_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-12300:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-12300he_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-12300he:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-12300hl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-12300hl:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i3-12300t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3-12300t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10200h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10210u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10210y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10300h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1030g4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1030g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10310u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10310y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1035g1_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1035g4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1035g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1038ng7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10400f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10400h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10400t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10500e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10500h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10500t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10500te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10505_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10600k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10600kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-10600t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11260h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11260h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11300h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11300h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1130g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11320h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11320h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1135g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11400:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11400f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11400f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11400h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11400h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11400t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11400t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1140g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1140g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1145g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1145g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1145g7e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1145g7e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1145gre_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1145gre:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11500:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11500h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11500h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11500he_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11500he:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11500t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11500t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1155g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1155g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11600:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11600k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11600k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11600kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11600kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-11600t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-11600t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1230u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1230u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1235u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1235u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1235ul_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1235ul:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12400:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12400f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12400f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12400t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12400t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1240p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1240p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1240u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1240u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12450h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12450h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12450hx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12450hx:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1245u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1245u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1245ue_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1245ue:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1245ul_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1245ul:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12500:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12500e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12500e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12500h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12500h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12500hl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12500hl:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12500t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12500t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12500te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12500te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1250p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1250p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-1250pe_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-1250pe:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12600:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12600h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12600h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12600he_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12600he:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12600hl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12600hl:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12600hx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12600hx:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12600k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12600k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12600kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12600kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i5-12600t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5-12600t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10510u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10510y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1060g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10610u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1065g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1068ng7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10700e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10700f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10700k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10700kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10700t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10700te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10710u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10750h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10810u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10850h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10870h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-10875h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11370h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11375h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11390h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11390h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11600h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11600h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1160g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1165g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11700f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11700k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11700kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11700t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11800h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1180g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11850h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-11850he_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-11850he:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1185g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1185g7e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1185gre_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1195g7_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1250u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1250u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1255u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1255u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1255ul_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1255ul:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1260p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1260p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1260u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1260u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-12650h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-12650h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-12650hx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-12650hx:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1265u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1265u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1265ue_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1265ue:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1265ul_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1265ul:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-12700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-12700:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-12700e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-12700e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-12700f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-12700f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-12700h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-12700h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-12700hl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-12700hl:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-12700k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-12700k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-12700kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-12700kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-12700t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-12700t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-12700te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-12700te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1270p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1270p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1270pe_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1270pe:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-12800h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-12800h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-12800he_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-12800he:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-12800hl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-12800hl:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-12800hx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-12800hx:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-1280p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-1280p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i7-12850hx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7-12850hx:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10850k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10885h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10900_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10900e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10900f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10900k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10900kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10900t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10900te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-10980hk_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-11900_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11900:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-11900f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11900f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-11900h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11900h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-11900k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11900k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-11900kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11900kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-11900t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11900t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-11950h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11950h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-11980hk_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-11980hk:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-12900_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-12900:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-12900e_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-12900e:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-12900f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-12900f:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-12900h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-12900h:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-12900hk_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-12900hk:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-12900hx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-12900hx:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-12900k_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-12900k:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-12900kf_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-12900kf:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-12900ks_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-12900ks:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-12900t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-12900t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-12900te_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-12900te:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:core_i9-12950hx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i9-12950hx:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_4410y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_4415u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_4415y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_4417u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_4425y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_5405u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_6405u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_6500y_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_6500y:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_7505_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_8500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_8500:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_8505_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_8505:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g5400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g5400t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g5420_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g5420t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g5500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g5500t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g5600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g5600t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g5620_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g6400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g6400t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g6405_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g6405t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g6500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g6500t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g6505_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g6505t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g6600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g6605_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g7400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g7400:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_gold_g7400t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_gold_g7400t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_silver_n6000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_silver_n6000:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:pentium_silver_n6005_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_silver_n6005:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1250_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1250p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1270_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1270p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1270p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1290_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1290p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1290t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1350_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1350:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1350p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1350p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1370_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1370:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1370p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1370p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1390_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1390:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1390p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1390p:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-1390t_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-1390t:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2223_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2223:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2225_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2225:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2235_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2235:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2245_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2245:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2255_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2255:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2265_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2265:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2275_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2275:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-2295_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-2295:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-3223_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-3225_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-3235_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3235:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-3245_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-3245m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-3265_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-3265m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-3275_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-3275m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-3323_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3323:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-3335_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3335:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-3345_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3345:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-3365_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3365:-:*:*:*:*:*:*:*", "cpe:2.3:o:intel:xeon_w-3375_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_w-3375:-:*:*:*:*:*:*:*" ]
null
7.9
null
null
null
CVE-2025-5724
SourceCodester Student Result Management System Subjects Page subjects cross site scripting
A vulnerability was found in SourceCodester Student Result Management System 1.0. It has been classified as problematic. Affected is an unknown function of the file /script/academic/subjects of the component Subjects Page. The manipulation of the argument Subject leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[]
4.8
2.4
2.4
3.3
null
GHSA-f8jf-qrr8-r4w4
In libxaac, there is a possible out of bounds read due to a missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-114746174
[]
null
6.5
null
null
null
GHSA-fchf-8pfc-crr5
AuthInfo.java in LineContol Java Client (jlc) before 0.8.1 stores sensitive information such as user passwords in log files.
[]
null
null
null
null
null
GHSA-47jj-pq3c-8pjm
Cross-site scripting (XSS) vulnerability in the GroupSpace application in BEA WebLogic Portal 9.2 GA allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors related to the rich text editor.
[]
null
null
null
null
null
RHSA-2013:0561
Red Hat Security Advisory: Red Hat Enterprise MRG Messaging 2.3 security update
qpid-cpp: qpid authentication bypass qpid-cpp: long arrays of zero-width types cause a denial of service qpid-cpp: crash due to qpid::framing::Buffer::checkAvailable() wraparound
[ "cpe:/a:redhat:enterprise_mrg:2::el5" ]
null
null
null
null
null
CVE-2022-41339
In Zoho ManageEngine Mobile Device Manager Plus before 10.1.2207.5, the User Administration module allows privilege escalation.
[ "cpe:2.3:a:zohocorp:manageengine_mobile_device_manager_plus:10.1.2207.4:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
CVE-2014-5926
The DCU Mobile Banking (aka com.Vertifi.Mobile.P211391825) application 2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:dcu:dcu_mobile_banking:2:*:*:*:*:android:*:*" ]
null
null
null
5.4
null
CVE-2017-10284
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Stored Procedure). Supported versions that are affected are 5.7.18 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[ "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*" ]
null
null
4.9
4
null
GHSA-vh68-cv68-mvfr
Dell PowerScale OneFS 9.0.0.x-9.4.0.x contains an Incorrect User Management vulnerability. A low privileged network attacker could potentially exploit this vulnerability, leading to escalation of privileges, and information disclosure.
[]
null
8.8
null
null
null
CVE-2017-17891
Readymade Video Sharing Script has CSRF via user-profile-edit.php.
[ "cpe:2.3:a:readymade_video_sharing_script_project:readymade_video_sharing_script:3.2:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
null
CVE-2012-3347
AutoFORM PDM Archive before 7.0 implements user accounts in a way that allows for JMX Console authentication, which allows remote authenticated users to bypass intended access restrictions via the /jmx-console URI, and then upload and execute arbitrary JSP code via a JBoss remote-deployment mechanism, a different vulnerability than CVE-2012-1828.
[ "cpe:2.3:a:efstechnology:autoform_pdm_archive:*:*:*:*:*:*:*:*", "cpe:2.3:a:efstechnology:autoform_pdm_archive:6.9:*:*:*:*:*:*:*" ]
null
null
null
6
null
GHSA-j5mc-p7q3-p89m
Dell ECS versions prior to 3.8.1.5/ ObjectScale version 4.0.0.0 contains an Insertion of Sensitive Information into Log File vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Information disclosure.
[]
null
5.5
null
null
null
CVE-2011-4350
Yaws 1.91 has a directory traversal vulnerability in the way certain URLs are processed. A remote authenticated user could use this flaw to obtain content of arbitrary local files via specially-crafted URL request.
[ "cpe:2.3:a:yaws:yaws:1.91:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
6.5
null
4
null
CVE-2025-0589
In affected versions of Octopus Deploy where customers are using Active Directory for authentication it was possible for an unauthenticated user to make an API request against two endpoints which would retrieve some data from the associated Active Directory. The requests when crafted correctly would return specific information from user profiles (Email address/UPN and Display name) from one endpoint and group information ( Group ID and Display name) from the other. This vulnerability does not expose data within the Octopus Server product itself.
[]
6.9
null
null
null
null
RHSA-2024:10841
Red Hat Security Advisory: OpenShift Container Platform 4.15.41 security update
runc: file descriptor leak
[ "cpe:/a:redhat:openshift:4.15::el9" ]
null
8.6
null
null
null
GHSA-j6w8-85rp-mrwv
ISPConfig 3.0.4.3: the "Add new Webdav user" can chmod and chown entire server from client interface.
[]
null
9.8
null
null
null
PYSEC-2021-124
null
A flaw was found in ansible. Credentials, such as secrets, are being disclosed in console log by default and not protected by no_log feature when using those modules. An attacker can take advantage of this information to steal those credentials. The highest threat from this vulnerability is to data confidentiality. Versions before ansible 2.9.18 are affected.
[]
null
null
null
null
null