id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2024-11477 | 7-Zip Zstandard Decompression Integer Underflow Remote Code Execution Vulnerability | 7-Zip Zstandard Decompression Integer Underflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of 7-Zip. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.
The specific flaw exists within the implementation of Zstandard decompression. The issue results from the lack of proper validation of user-supplied data, which can result in an integer underflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24346. | [
"cpe:2.3:a:7-zip:7zip:*:*:*:*:*:*:*:*",
"cpe:2.3:a:7-zip:7-zip:*:*:*:*:*:*:*:*"
]
| null | null | 7.8 | null | null |
CVE-2025-20079 | Uncontrolled search path for some Intel(R) Advisor software may allow an authenticated user to potentially enable escalation of privilege via local access. | []
| 5.4 | 6.7 | null | null | null |
|
CVE-2016-5360 | HAproxy 1.6.x before 1.6.6, when a deny comes from a reqdeny rule, allows remote attackers to cause a denial of service (uninitialized memory access and crash) or possibly have unspecified other impact via unknown vectors. | [
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:a:haproxy:haproxy:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haproxy:haproxy:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haproxy:haproxy:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:haproxy:haproxy:1.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:haproxy:haproxy:1.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:haproxy:haproxy:1.6.5:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 5 | null |
|
CVE-2023-7231 | illi Link Party! <= 1.0 - Unauthenticated Arbitrary Link Deletion | The illi Link Party! WordPress plugin through 1.0 lacks proper access controls, allowing unauthenticated visitors to delete links. | []
| null | 7.3 | null | null | null |
CVE-2021-32516 | QSAN Storage Manager - Path Traversal | Path traversal vulnerability in share_link in QSAN Storage Manager allows remote attackers to download arbitrary files. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3. | [
"cpe:2.3:a:qsan:storage_manager:*:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null | null |
CVE-2005-2914 | ezconfig.asp in Linksys WRT54G router 3.01.03, 3.03.6, non-default configurations of 2.04.4, and possibly other versions, does not use an authentication initialization function, which allows remote attackers to obtain encrypted configuration information and, if the key is known, modify the configuration. | [
"cpe:2.3:h:linksys:wrt54g:2.04.4:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:wrt54g:3.01.3:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:wrt54g:3.03.6:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 | null |
|
RHSA-2024:7436 | Red Hat Security Advisory: Red Hat OpenShift for Windows Containers 10.17.0 product release | The components for Red Hat OpenShift for Windows Containers 10.17.0 are now available. This product release includes bug fixes and security updates for the
following packages: windows-machine-config-operator and
windows-machine-config-operator-bundle.
Red Hat Product Security has rated this update as having a security impact of
Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives
a detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section. | [
"cpe:/a:redhat:openshift:4.17::el9"
]
| null | null | null | null | null |
CVE-2020-5421 | RFD Protection Bypass via jsessionid | In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.28, and older unsupported versions, the protections against RFD attacks from CVE-2015-5211 may be bypassed depending on the browser used through the use of a jsessionid path parameter. | [
"cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:commerce_guided_search:11.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_brm:11.3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_brm:12.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_design_studio:7.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_design_studio:7.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_design_studio:7.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:endeca_information_discovery_integrator:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_data_quality:12.2.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_data_quality:12.2.1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_private_banking:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_private_banking:12.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:12.2.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:12.2.1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:goldengate_application_adapters:19.1.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:healthcare_master_person_index:4.0.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:insurance_policy_administration:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:insurance_policy_administration:10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:insurance_policy_administration:10.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:insurance_policy_administration:11.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:insurance_rules_palette:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:insurance_rules_palette:10.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:insurance_rules_palette:10.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:insurance_rules_palette:11.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql_enterprise_monitor:8.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_gateway:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_assortment_planning:16.0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_bulk_data_integration:16.0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_customer_engagement:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_customer_management_and_segmentation_foundation:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_financial_integration:14.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_financial_integration:15.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_financial_integration:16.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_integration_bus:14.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_integration_bus:15.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_integration_bus:16.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_invoice_matching:14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_invoice_matching:14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_merchandising_system:16.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_order_broker:15.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_order_broker:16.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_predictive_application_server:14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_returns_management:14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_service_backbone:14.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_service_backbone:15.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_service_backbone:16.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_xstore_point_of_service:15.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_xstore_point_of_service:16.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_xstore_point_of_service:17.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_xstore_point_of_service:18.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_xstore_point_of_service:19.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:storagetek_acsls:8.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:storagetek_tape_analytics_sw_tool:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snap_creator_framework:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
]
| null | null | 8.7 | null | null |
GHSA-mhv9-5hxr-j9mw | Cross Site Scripting vulnerability in Petrol Pump Mangement Software v.1.0 allows an attacker to execute arbitrary code via a crafted payload to the image parameter in the profile.php component. | []
| null | 6.1 | null | null | null |
|
CVE-2023-39062 | Cross Site Scripting vulnerability in Spipu HTML2PDF before v.5.2.8 allows a remote attacker to execute arbitrary code via a crafted script to the forms.php. | [
"cpe:2.3:a:html2pdf_project:html2pdf:*:*:*:*:*:*:*:*"
]
| null | 6.1 | null | null | null |
|
GHSA-mv32-9mh3-q74p | A vulnerability related to registry permissions in the Intercept X for Windows updater prior to version 2024.3.2 can lead to a local user gaining SYSTEM level privileges during a product upgrade. | []
| null | 8.8 | null | null | null |
|
CVE-2005-2025 | Cisco VPN 3000 Concentrator before 4.1.7.F allows remote attackers to determine valid groupnames by sending an IKE Aggressive Mode packet with the groupname in the ID field, which generates a response if the groupname is valid, but does not generate a response for an invalid groupname. | [
"cpe:2.3:h:cisco:vpn_3000_concentrator:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vpn_3015_concentrator:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vpn_3020_concentrator:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vpn_3030_concentator:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vpn_3060_concentrator:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:vpn_3080_concentrator:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.d:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.f:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.0.3.a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.0.3.b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.1\\(rel\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.5\\(rel\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.7.a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.7.b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.7.c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.7.d:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.7.f:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.7d:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.0.5.b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.1.5.b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.1.7.a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.1.7.b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:vpn_3005_concentrator_software:4.0.1:*:*:*:*:*:*:*"
]
| null | null | null | 5 | null |
|
CVE-2009-0288 | Directory traversal vulnerability in k23productions TFTPUtil GUI 1.2.0 and 1.3.0 allows remote attackers to read arbitrary files outside the TFTP root directory via directory traversal sequences in a GET request. | [
"cpe:2.3:a:windows_tftp_utility:tftputil:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:windows_tftp_utility:tftputil:1.3.0:*:*:*:*:*:*:*"
]
| null | null | null | 5 | null |
|
CVE-2020-26641 | A Cross Site Request Forgery (CSRF) vulnerability was discovered in iCMS 7.0.16 which can allow an attacker to execute arbitrary web scripts. | [
"cpe:2.3:a:idreamsoft:icms:7.0.16:*:*:*:*:*:*:*"
]
| null | 8.8 | null | 6.8 | null |
|
GHSA-q46h-4c8m-gg49 | Multiple heap-based buffer overflows in the imlib BMP image handler allow remote attackers to execute arbitrary code via a crafted BMP file. | []
| null | null | null | null | null |
|
cisco-sa-ncs4k-tl1-GNnLwC6 | Cisco Network Convergence System 4000 Series TL1 Denial of Service Vulnerability | A vulnerability in the TL1 function of Cisco Network Convergence System (NCS) 4000 Series could allow an authenticated, local attacker to cause a memory leak in the TL1 process.
This vulnerability is due to TL1 not freeing memory under some conditions. An attacker could exploit this vulnerability by connecting to the device and issuing TL1 commands after being authenticated. A successful exploit could allow the attacker to cause the TL1 process to consume large amounts of memory. When the memory reaches a threshold, the Resource Monitor (Resmon) process will begin to restart or shutdown the top five consumers of memory, resulting in a denial of service (DoS).
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is part of the September 2022 release of the Cisco IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: September 2022 Semiannual Cisco IOS XR Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74840"]. | []
| null | 6 | null | null | null |
GHSA-pm6q-ff9r-9f8w | The pkgmgr system service in Tizen allows an unprivileged process to perform package management actions, due to improper D-Bus security policy configurations. Such actions include installing, decrypting, and killing other packages. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2. | []
| null | null | null | null | null |
|
GHSA-xpj8-p66v-3v8x | plugins/box/users/users.plugin.php in Monstra CMS 3.0.4 allows Login Rate Limiting Bypass via manipulation of the login_attempts cookie. | []
| null | null | 9.8 | null | null |
|
GHSA-8j98-cjfr-qx3h | github.com/ecies/go vulnerable to possible private key restoration | ImpactIf functions `Encapsulate()`, `Decapsulate()` and `ECDH()` could be called by an attacker, he could recover any private key that he interacts with.PatchesPatched in v2.0.8WorkaroundsYou could manually check public key by calling `IsOnCurve()` function from secp256k1 libraries.Referenceshttps://github.com/ashutosh1206/Crypton/blob/master/Diffie-Hellman-Key-Exchange/Attack-Invalid-Curve-Point/README.md | []
| null | 8.1 | null | null | null |
CVE-2024-6507 | Deep Lake Kaggle command injection | Command injection when ingesting a remote Kaggle dataset due to a lack of input sanitization in the ingest_kaggle() API | [
"cpe:2.3:a:deeplake:deeplake:3.9.10:*:*:*:*:*:*:*"
]
| null | 8.1 | null | null | https://github.com/activeloopai/deeplake/pull/2876 |
CVE-2023-36912 | Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability | Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null | null |
RHSA-2024:0452 | Red Hat Security Advisory: curl security update | curl: information disclosure by exploiting a mixed case flaw | [
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/o:redhat:rhel_eus:9.2::baseos"
]
| null | 5.3 | null | null | null |
GHSA-f9hp-mwxx-5mjg | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Busters Passwordless WP – Login with your glance or fingerprint allows Reflected XSS. This issue affects Passwordless WP – Login with your glance or fingerprint: from n/a through 1.1.6. | []
| null | 7.1 | null | null | null |
|
CVE-2025-21882 | net/mlx5: Fix vport QoS cleanup on error | In the Linux kernel, the following vulnerability has been resolved:
net/mlx5: Fix vport QoS cleanup on error
When enabling vport QoS fails, the scheduling node was never freed,
causing a leak.
Add the missing free and reset the vport scheduling node pointer to
NULL. | []
| null | null | null | null | null |
CVE-2010-0194 | Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allow attackers to cause a denial of service (memory corruption) or execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-0197, CVE-2010-0201, and CVE-2010-0204. | [
"cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.2.1:*:*:*:*:*:*:*"
]
| null | null | null | 9.3 | null |
|
GHSA-jffx-25jv-j63f | Kaspersky Anti-Hacker 1.0, when configured to automatically block attacks, allows remote attackers to block IP addresses and cause a denial of service via spoofed packets. | []
| null | null | null | null | null |
|
GHSA-9672-786w-jwpr | Tenda FH451 v1.0.0.9 has a stack overflow vulnerability located in the RouteStatic function. | []
| null | 6.5 | null | null | null |
|
CVE-2017-1002026 | Vulnerability in wordpress plugin Event Expresso Free v3.1.37.11.L, The function edit_event_category does not sanitize user-supplied input via the $id parameter before passing it into an SQL statement. | [
"cpe:2.3:a:eventespresso:event_espresso:3.1.37.11.l:*:*:*:free:wordpress:*:*"
]
| null | null | 8.8 | 6.5 | null |
|
GHSA-c65j-wcvh-77gc | PRTG Network Monitor through 22.2.77.2204 does not prevent custom input for a device’s icon, which can be modified to insert arbitrary content into the style tag for that device. When the device page loads, the arbitrary Cascading Style Sheets (CSS) data is inserted into the style tag, loading malicious content. Due to PRTG Network Monitor preventing “characters, and from modern browsers disabling JavaScript support in style tags, this vulnerability could not be escalated into a Cross-Site Scripting vulnerability. | []
| null | 5.3 | null | null | null |
|
CVE-2023-34410 | An issue was discovered in Qt before 5.15.15, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.2. Certificate validation for TLS does not always consider whether the root of a chain is a configured CA certificate. | [
"cpe:2.3:a:qt:qt:*:*:*:*:*:*:*:*"
]
| null | 5.3 | null | null | null |
|
CVE-2019-0386 | Order processing in SAP ERP Sales (corrected in SAP_APPL 6.0, 6.02, 6.03, 6.04, 6.05, 6.06, 6.16, 6.17, 6.18) and S4HANA Sales (corrected in S4CORE 1.0, 1.01, 1.02, 1.03, 1.04) does not execute the required authorization checks for an authenticated user, which can result in an escalation of privileges. | [
"cpe:2.3:a:sap:erp_sales:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:erp_sales:6.02:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:erp_sales:6.03:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:erp_sales:6.04:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:erp_sales:6.05:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:erp_sales:6.06:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:erp_sales:6.16:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:erp_sales:6.17:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:erp_sales:6.18:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:s4hana_sales:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:s4hana_sales:1.01:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:s4hana_sales:1.02:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:s4hana_sales:1.03:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:s4hana_sales:1.04:*:*:*:*:*:*:*"
]
| null | 6.3 | null | 6.5 | null |
|
GHSA-29v3-r4gm-9j2f | An issue was discovered on LG mobile devices with Android OS 8.0, 8.1, 9, and 10 software. The network_management service does not properly restrict configuration changes. The LG ID is LVE-SMP-200012 (July 2020). | []
| null | null | null | null | null |
|
GHSA-r2w2-2r2x-fpcx | TYPO3 SQL Injection vulnerability | SQL injection vulnerability in the list module in TYPO3 4.2.x before 4.2.16, 4.3.x before 4.3.9, and 4.4.x before 4.4.5 allows remote authenticated users with certain permissions to execute arbitrary SQL commands via unspecified vectors. | []
| null | null | null | null | null |
CVE-2022-31513 | The BolunHan/Krypton repository through 2021-06-03 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely. | [
"cpe:2.3:a:krypton_project:krypton:*:*:*:*:*:*:*:*"
]
| null | 9.3 | null | 6.4 | null |
|
cisco-sa-capwap-dos-TPdNTdyq | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family CAPWAP Denial of Service Vulnerabilities | Multiple vulnerabilities in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol processing of Cisco IOS XE Software for Cisco Catalyst 9800 Series Wireless Controllers could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition of an affected device.
These vulnerabilities are due to insufficient validation of CAPWAP packets. An attacker could exploit these vulnerabilities by sending a malformed CAPWAP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to crash and reload, resulting in a DoS condition on the affected device.
Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
This advisory is part of the September 24, 2020, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes 25 Cisco Security Advisories that describe 34 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: September 2020 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74268"]. | []
| null | null | 7.4 | null | null |
CVE-2022-30233 | A CWE-20: Improper Input Validation vulnerability exists that could allow the product to be maliciously manipulated when the user is tricked into performing certain actions on a webpage. Affected Products: Wiser Smart, EER21000 & EER21001 (V4.5 and prior) | [
"cpe:2.3:o:schneider-electric:wiser_smart_eer21000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:wiser_smart_eer21000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:wiser_smart_eer21001_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:wiser_smart_eer21001:-:*:*:*:*:*:*:*"
]
| null | 6.5 | null | null | null |
|
CVE-2019-1093 | An information disclosure vulnerability exists when DirectWrite improperly discloses the contents of its memory, aka 'DirectWrite Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1097. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
]
| null | null | 5.5 | 2.1 | null |
|
GHSA-j8gj-hp37-8qx9 | Multiple cross-site scripting (XSS) vulnerabilities in Layton HelpBox 3.7.1 allow remote authenticated users to inject arbitrary web script or HTML via the (1) Forename, (2) Surname, (3) Telephone, and (4) Fax fields to writeenduserenduser.asp; the (5) Filter field to statsrequestypereport.asp; and the (6) sys_request_id parameter to requestattach.asp; and allow remote authenticated users to inject arbitrary web script or HTML via the (7) Asset, (8) Location, and (9) Problem fields to editrequestenduser.asp; the (10) Asset, (11) Asset Location, (12) Problem Desc, and (13) Solution Desc fields to editrequestuser.asp; and the (14) End User and (15) Description fields to usersearchrequests.asp. NOTE: vectors 5 and 6 do not require authentication to exploit. | []
| null | null | null | null | null |
|
CVE-2022-25396 | Cosmetics and Beauty Product Online Store v1.0 was discovered to contain a SQL injection vulnerability via the search parameter. | [
"cpe:2.3:a:cosmetics_and_beauty_product_online_store_project:cosmetics_and_beauty_product_online_store:1.0:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 7.5 | null |
|
CVE-2009-1211 | Blue Coat ProxySG, when transparent interception mode is enabled, uses the HTTP Host header to determine the remote endpoint, which allows remote attackers to bypass access controls for Flash, Java, Silverlight, and probably other technologies, and possibly communicate with restricted intranet sites, via a crafted web page that causes a client to send HTTP requests with a modified Host header. | [
"cpe:2.3:a:bluecoat:proxysg_va-10:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bluecoat:proxysg_va-15:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bluecoat:proxysg_va-20:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bluecoat:proxysg_va-5:*:*:*:*:*:*:*:*",
"cpe:2.3:h:bluecoat:proxysg:*:*:*:*:*:*:*:*",
"cpe:2.3:h:bluecoat:proxysg_sg210-10:-:-:acceleration:*:*:*:*:*",
"cpe:2.3:h:bluecoat:proxysg_sg210-10:-:-:full_proxy:*:*:*:*:*",
"cpe:2.3:h:bluecoat:proxysg_sg210-25:-:-:acceleration:*:*:*:*:*",
"cpe:2.3:h:bluecoat:proxysg_sg210-25:-:-:full_proxy:*:*:*:*:*",
"cpe:2.3:h:bluecoat:proxysg_sg210-5:-:-:acceleration:*:*:*:*:*",
"cpe:2.3:h:bluecoat:proxysg_sg210-5:-:-:full_proxy:*:*:*:*:*",
"cpe:2.3:h:bluecoat:proxysg_sg510-10:-:-:acceleration:*:*:*:*:*",
"cpe:2.3:h:bluecoat:proxysg_sg510-10:-:-:full_proxy:*:*:*:*:*",
"cpe:2.3:h:bluecoat:proxysg_sg510-20:-:-:acceleration:*:*:*:*:*",
"cpe:2.3:h:bluecoat:proxysg_sg510-20:-:-:full_proxy:*:*:*:*:*",
"cpe:2.3:h:bluecoat:proxysg_sg510-25:-:-:acceleration:*:*:*:*:*",
"cpe:2.3:h:bluecoat:proxysg_sg510-25:-:-:full_proxy:*:*:*:*:*",
"cpe:2.3:h:bluecoat:proxysg_sg510-5:-:-:full_proxy:*:*:*:*:*",
"cpe:2.3:h:bluecoat:proxysg_sg810-10:-:-:acceleration:*:*:*:*:*",
"cpe:2.3:h:bluecoat:proxysg_sg810-10:-:-:full_proxy:*:*:*:*:*",
"cpe:2.3:h:bluecoat:proxysg_sg810-20:-:-:acceleration:*:*:*:*:*",
"cpe:2.3:h:bluecoat:proxysg_sg810-20:-:-:full_proxy:*:*:*:*:*",
"cpe:2.3:h:bluecoat:proxysg_sg810-25:-:-:acceleration:*:*:*:*:*",
"cpe:2.3:h:bluecoat:proxysg_sg810-25:-:-:full_proxy:*:*:*:*:*",
"cpe:2.3:h:bluecoat:proxysg_sg810-5:-:-:full_proxy:*:*:*:*:*",
"cpe:2.3:h:bluecoat:proxysg_sg9000-10:-:-:acceleration:*:*:*:*:*",
"cpe:2.3:h:bluecoat:proxysg_sg9000-10:-:-:full_proxy:*:*:*:*:*",
"cpe:2.3:h:bluecoat:proxysg_sg9000-20:-:-:acceleration:*:*:*:*:*",
"cpe:2.3:h:bluecoat:proxysg_sg9000-20:-:-:full_proxy:*:*:*:*:*",
"cpe:2.3:h:bluecoat:proxysg_sg9000-5:-:-:acceleration:*:*:*:*:*",
"cpe:2.3:h:bluecoat:proxysg_sg9000-5:-:-:full_proxy:*:*:*:*:*"
]
| null | null | null | 5.8 | null |
|
GHSA-q46x-3r3x-cfj4 | Multiple cross-site request forgery (CSRF) vulnerabilities in the Search API module 7.x-1.x before 7.x-1.3 for Drupal allow remote attackers to hijack the authentication of administrators for requests that (1) enable a server via a server action or (2) enable a search index via an enable index action. | []
| null | null | null | null | null |
|
CVE-2008-4722 | Unspecified vulnerability in Sun Integrated Lights-Out Manager (ILOM) 2.0.1.5 through 2.0.4.26 allows remote authenticated users to (1) access the service processor (SP) and cause a denial of service (shutdown or reboot), or (2) access the host operating system and have an unspecified impact, via unknown vectors. | [
"cpe:2.3:a:sun:integrated_lights-out_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:blade_6000_modular_system_with_chassis:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:blade_6048_modular_system_with_chassis:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:blade_8000_modular_system:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:blade_8000p_modular_system:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:blade_t6320_server_module:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:blade_x6220_with_server_module_software:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:blade_x6250_with_server_module_software:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:blade_x6450_with_server_module_software:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:blade_x8400:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:blade_x8420:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:blade_x8440:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:blade_x8450:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:fire_x2250_server:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:fire_x4100_server:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:fire_x4100m2_server:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:fire_x4140_server:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:fire_x4150_server:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:fire_x4200_server:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:fire_x4200m2_server:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:fire_x4240_server:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:fire_x4250_server:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:fire_x4440_server:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:fire_x4450_server:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:fire_x4500_server:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:fire_x4540_server:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:fire_x4600_server:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:fire_x4600m2_server:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:netra:*:7.1.6:*:*:*:*:*:*",
"cpe:2.3:h:sun:netra:*:7.1.4a:*:*:*:*:*:*",
"cpe:2.3:h:sun:netra_x4200m2_server:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:netra_x4250_server:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:netra_x4450:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:sparc_enterprise_server_t5120:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:sparc_enterprise_server_t5140:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:sparc_enterprise_server_t5220:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:sparc_enterprise_server_t5240:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sun:sparc_enterprise_server_t5440:*:*:*:*:*:*:*:*"
]
| null | null | null | 9 | null |
|
CVE-2018-4086 | An issue was discovered in certain Apple products. iOS before 11.2.5 is affected. macOS before 10.13.3 is affected. tvOS before 11.2.5 is affected. watchOS before 4.2.2 is affected. The issue involves the "Security" component. It allows remote attackers to spoof certificate validation via crafted name constraints. | [
"cpe:2.3:a:apple:apple_tv:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
]
| null | null | 5.9 | 4.3 | null |
|
CVE-2024-3030 | The Announce from the Dashboard plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.5.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. | []
| null | 4.4 | null | null | null |
|
GHSA-mp36-gw43-323p | In ContentService, there is a possible way to check if an account exists on the device due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-201416182 | []
| null | 5.5 | null | null | null |
|
GHSA-68x9-rcmx-ph7w | Unspecified vulnerability in the edge process in Adobe Flash Media Server (FMS) 3.0.x before 3.0.7, 3.5.x before 3.5.5, and 4.0.x before 4.0.1 allows attackers to cause a denial of service via unknown vectors. | []
| null | null | null | null | null |
|
GHSA-277v-gwfr-hmpj | Missing Authentication for Critical Function in LibreNMS | An issue was discovered in LibreNMS through 1.47. A number of scripts import the Authentication libraries, but do not enforce an actual authentication check. Several of these scripts disclose information or expose functions that are of a sensitive nature and are not expected to be publicly accessible. | []
| null | 9.1 | null | null | null |
CVE-2020-7825 | A vulnerability exists that could allow the execution of operating system commands on systems running MiPlatform 2019.05.16 and earlier. An attacker could execute arbitrary remote command by sending parameters to WinExec function in ExtCommandApi.dll module of MiPlatform. | [
"cpe:2.3:a:tobesoft:miplatform:*:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null | null |
|
GHSA-vqgx-gpv3-58p3 | The WooCommerce Customers Manager WordPress plugin before 30.2 does not have authorisation and CSRF in various AJAX actions, allowing any authenticated users, such as subscriber, to call them and update/delete/create customer metadata, also leading to Stored Cross-Site Scripting due to the lack of escaping of said metadata values. | []
| null | 6.5 | null | null | null |
|
GHSA-q42m-mp58-hxv5 | In JetBrains Ktor before 2.3.5 default configuration of ContentNegotiation with XML format was vulnerable to XXE | []
| null | 8.6 | null | null | null |
|
CVE-2006-5955 | SQL injection vulnerability in listings.asp in 20/20 DataShed (aka Real Estate Listing System) allows remote attackers to execute arbitrary SQL commands via the itemID parameter. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:20_20_applications:20_20_datashed:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 | null |
|
GHSA-4jrj-gxg8-2frj | Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory. | []
| null | 9.8 | null | null | null |
|
CVE-2018-18399 | SQL injection vulnerability in the "ContentPlaceHolder1_uxTitle" component in ArchiveNews.aspx in jco.ir KARMA 6.0.0 allows a remote attacker to execute arbitrary SQL commands via the "id" parameter. | [
"cpe:2.3:a:jco:karma:6.0.0:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 7.5 | null |
|
GHSA-j288-6xgr-g898 | Lack of validation of origin in federation API in Conduit, allowing any remote server to impersonate any user from any server in most EDUs | []
| null | 5.3 | null | null | null |
|
GHSA-c666-m54v-25m4 | Acrobat Reader versions 20.005.30574, 24.002.20736 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | []
| null | 7.8 | null | null | null |
|
GHSA-8459-gg55-8qjj | Certain DNSSEC aspects of the DNS protocol (in RFC 4035 and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses when there is a zone with many DNSKEY and RRSIG records, aka the "KeyTrap" issue. The protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records. | []
| null | 7.5 | null | null | null |
|
CVE-2007-0436 | Barron McCann X-Kryptor Driver BMS1446HRR (Xgntr BMS1351 Install BMS1472) in X-Kryptor Secure Client does not drop privileges when launching an Explorer window in response to a help command, which allows local users to gain LocalSystem privileges via interactive use of Explorer. | [
"cpe:2.3:a:barron_mccann:install:bms1472:*:*:*:*:*:*:*",
"cpe:2.3:a:barron_mccann:x-kryptor_driver:bms1446hrr:*:*:*:*:*:*:*",
"cpe:2.3:a:barron_mccann:x-kryptor_secure_client:*:*:*:*:*:*:*:*",
"cpe:2.3:a:barron_mccann:xgntr:bms1351:*:*:*:*:*:*:*"
]
| null | null | null | 4.6 | null |
|
GHSA-f3jx-26gh-ppcx | The /etc/profile.d/60alias.sh script in the Mandriva bash package for Bash 2.05b, 3.0, 3.2, 3.2.48, and 4.0 enables the --show-control-chars option in LS_OPTIONS, which allows local users to send escape sequences to terminal emulators, or hide the existence of a file, via a crafted filename. | []
| null | null | null | null | null |
|
CVE-2025-1938 | Memory safety bugs present in Firefox 135, Thunderbird 135, Firefox ESR 128.7, and Thunderbird 128.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 136, Firefox ESR < 128.8, Thunderbird < 136, and Thunderbird < 128.8. | []
| null | 6.5 | null | null | null |
|
CVE-2024-9097 | IDOR | ManageEngine Endpoint Central versions before 11.3.2440.09 are vulnerable to IDOR vulnerability which allows the attacker to change the username in the chat. | []
| null | 3.5 | null | null | null |
CVE-2020-17092 | Windows Network Connections Service Elevation of Privilege Vulnerability | Windows Network Connections Service Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012_r2:*:*:*:*:*:*:x64:*"
]
| null | 7.8 | null | null | null |
CVE-2012-2702 | The Ubercart Product Keys module 6.x-1.x before 6.x-1.1 for Drupal does not properly check access for product keys, which allows remote attackers to read all unassigned product keys via certain conditions related to the uid. | [
"cpe:2.3:a:tony_freixas:ubercart_product_keys:6.x-1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tony_freixas:ubercart_product_keys:6.x-1.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:tony_freixas:ubercart_product_keys:6.x-1.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:tony_freixas:ubercart_product_keys:6.x-1.0:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:tony_freixas:ubercart_product_keys:6.x-1.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:tony_freixas:ubercart_product_keys:6.x-1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:tony_freixas:ubercart_product_keys:6.x-1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*"
]
| null | null | null | 5 | null |
|
CVE-2024-53952 | InDesign Desktop | NULL Pointer Dereference (CWE-476) | InDesign Desktop versions ID19.5, ID18.5.4 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service. An attacker could exploit this vulnerability to crash the application, leading to a denial of service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | 5.5 | null | null | null |
CVE-2016-5194 | Unspecified vulnerabilities in Google Chrome before 54.0.2840.59. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 10 | null |
|
CVE-2007-3201 | Visual truncation vulnerability in Windows Privacy Tray (WinPT) 1.2.0 allows user-assisted remote attackers to install a key listed under the wrong user ID, and possibly cause the user to encrypt a victim's correspondence with this attacker-supplied key, via a key ID composed of the attacker's user ID, space characters, an invalid WinPT message, additional space characters, and the victim's user ID. | [
"cpe:2.3:a:winpt:winpt:1.2.0:*:*:*:*:*:*:*"
]
| null | null | null | 7.1 | null |
|
cisco-sa-asaftd-mgcp-SUqB8VKH | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Media Gateway Control Protocol Denial of Service Vulnerabilities | Multiple vulnerabilities in the Media Gateway Control Protocol (MGCP) inspection feature of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
The vulnerabilities are due to inefficient memory management. An attacker could exploit these vulnerabilities by sending crafted MGCP packets through an affected device. An exploit could allow the attacker to cause memory exhaustion resulting in a restart of an affected device, causing a DoS condition for traffic traversing the device.
Cisco has released software updates that address the vulnerabilities described in this advisory. There are no workarounds that address these vulnerabilities.
This advisory is part of the May 2020 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication, which includes 12 Cisco Security Advisories that describe 12 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: May 2020 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-73830"]. | []
| null | null | 8.6 | null | null |
CVE-2010-3026 | Cross-site request forgery (CSRF) vulnerability in application/modules/admin/controllers/users.php in Tomaz Muraus Open Blog 1.2.1, and possibly earlier, allows remote attackers to hijack the authentication of administrators for requests to admin/users/edit that grant administrative privileges. | [
"cpe:2.3:a:tomaz-muraus:open_blog:1.2.1:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 | null |
|
GHSA-wrg5-fhgm-vwvq | The IP-HTTPS server in Windows Server 2008 R2 and R2 SP1 and Server 2012 does not properly validate certificates, which allows remote attackers to bypass intended access restrictions via a revoked certificate, aka "Revoked Certificate Bypass Vulnerability." | []
| null | null | null | null | null |
|
GHSA-wxr5-p2xp-m24f | On BIG-IP AAM 13.0.0 or 12.1.0-12.1.3.7, the dcdb_convert utility used by BIG-IP AAM fails to drop group permissions when executing helper scripts, which could be used to leverage attacks against the BIG-IP system. | []
| null | null | 7.8 | null | null |
|
CVE-2008-5151 | test_parser.py in mayavi 1.5 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/err.log temporary file. | [
"cpe:2.3:a:abottoms:mayavi:1.5:*:*:*:*:*:*:*"
]
| null | null | null | 6.9 | null |
|
CVE-2022-37203 | JFinal CMS 5.1.0 is vulnerable to SQL Injection. These interfaces do not use the same component, nor do they have filters, but each uses its own SQL concatenation method, resulting in SQL injection. | [
"cpe:2.3:a:jflyfox:jfinal_cms:5.1.0:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null | null |
|
CVE-2021-22227 | A reflected cross-site script vulnerability in GitLab before versions 13.11.6, 13.12.6 and 14.0.2 allowed an attacker to send a malicious link to a victim and trigger actions on their behalf if they clicked it | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:-:*:*:*"
]
| null | 6.1 | null | null | null |
|
GHSA-jcch-9vxr-f9mg | WebKitGTK and WPE WebKit prior to version 2.24.1 failed to properly apply configured HTTP proxy settings when downloading livestream video (HLS, DASH, or Smooth Streaming), an error resulting in deanonymization. This issue was corrected by changing the way livestreams are downloaded. | []
| null | null | 5.3 | null | null |
|
CVE-2002-0727 | The Host function in Microsoft Office Web Components (OWC) 2000 and 2002 is exposed in components that are marked as safe for scripting, which allows remote attackers to execute arbitrary commands via the setTimeout method. | [
"cpe:2.3:a:microsoft:office_web_components:2000:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_web_components:2002:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:project:2002:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 | null |
|
CVE-2010-1473 | Directory traversal vulnerability in the Advertising (com_advertising) component 0.25 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php. | [
"cpe:2.3:a:johnmccollum:com_advertising:0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 | null |
|
GHSA-g632-928g-4c3h | The PrinterLogic Print Management software, versions up to and including 18.3.1.96, does not sanitize special characters allowing for remote unauthorized changes to configuration files. An unauthenticated attacker may be able to remotely execute arbitrary code with SYSTEM privileges. | []
| null | null | null | null | null |
|
GHSA-v3qq-w6xc-rjmw | A plaintext recovery of encrypted messages or a Man-in-the-middle (MiTM) attack on RSA PKCS #1 v1.5 encryption may be possible without knowledge of the server's private key. Fortinet FortiOS 5.4.6 to 5.4.9, 6.0.0 and 6.0.1 are vulnerable by such attack under SSL Deep Inspection feature when CPx being used. | []
| null | null | 5.9 | null | null |
|
CVE-2022-21128 | Insufficient control flow management in the Intel(R) Advisor software before version 7.6.0.37 may allow an authenticated user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:a:intel:advisor:*:*:*:*:*:*:*:*"
]
| null | 7.8 | null | 4.6 | null |
|
CVE-2025-20688 | In wlan AP driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00418047; Issue ID: MSV-3480. | []
| null | 5.5 | null | null | null |
|
CVE-2022-34171 | In Jenkins 2.321 through 2.355 (both inclusive) and LTS 2.332.1 through LTS 2.332.3 (both inclusive) the HTML output generated for new symbol-based SVG icons includes the 'title' attribute of 'l:ionicon' (until Jenkins 2.334) and 'alt' attribute of 'l:icon' (since Jenkins 2.335) without further escaping, resulting in a cross-site scripting (XSS) vulnerability. | [
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*",
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*"
]
| null | 5.4 | null | 4.3 | null |
|
GHSA-7922-2gj2-vj5c | SQL injection vulnerability in rss.php in MyBB (aka MyBulletinBoard) 1.1.1 allows remote attackers to execute arbitrary SQL commands via the comma parameter. NOTE: it is not clear from the original report how this attack can succeed, since the demonstration URL uses a variable that is overwritten with static data in the extracted source code. | []
| null | null | null | null | null |
|
GHSA-jc7p-5r39-9477 | Improper Input Validation in Apache Tomcat | The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own. | []
| null | null | 7.1 | null | null |
CVE-2022-21198 | Time-of-check time-of-use race condition in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:o:intel:celeron_1000m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_1000m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_1005m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_1005m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_1007u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_1007u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_1017u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_1017u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_1019y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_1019y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_1020e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_1020e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_1020m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_1020m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_1037u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_1037u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_1047ue_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_1047ue:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_2955u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_2955u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_2957u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_2957u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_2970m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_2970m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_2980u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_2980u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_2981u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_2981u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_3755u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_3755u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_3765u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_3765u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_3855u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_3855u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_3865u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_3865u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_3867u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_3867u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_3955u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_3955u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_3965u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_3965u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_3965y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_3965y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_4205u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_4205u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_4305u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_4305u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_4305ue_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_4305ue:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_5205u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_5205u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_5305u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_5305u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_6305_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_6305:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_6305e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_6305e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_6600he_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_6600he:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_725c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_725c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_7300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_7300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_7305_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_7305:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_787_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_787:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_797_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_797:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_807_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_807:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_807ue_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_807ue:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_827e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_827e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_847_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_847:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_847e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_847e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_857_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_857:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_867_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_867:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_877_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_877:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_887_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_887:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_927ue_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_927ue:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_b710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_b710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_b720_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_b720:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_b800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_b800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_b810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_b810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_b810e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_b810e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_b815_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_b815:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_b820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_b820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_b830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_b830:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_b840_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_b840:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g1610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g1610:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g1610t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g1610t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g1620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g1620:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g1620t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g1620t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g1630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g1630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g1820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g1820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g1820t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g1820t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g1820te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g1820te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g1830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g1830:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g1840_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g1840:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g1840t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g1840t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g1850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g1850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g3900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g3900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g3900e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g3900e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g3900t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g3900t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g3900te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g3900te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g3902e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g3902e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g3920_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g3920:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g3920t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g3920t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g3930_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g3930:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g3930e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g3930e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g3930t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g3930t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g3930te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g3930te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g3940_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g3940:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g3950_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g3950:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g440_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g440:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g460_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g460:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g465_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g465:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g470_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g470:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g4900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g4900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g4900t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g4900t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g4920_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g4920:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g4930_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g4930:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g4930e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g4930e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g4930t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g4930t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g4932e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g4932e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g4950_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g4950:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g5205u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g5205u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g530:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g5305u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g5305u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g530t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g530t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g540_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g540:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g540t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g540t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g550:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g550t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g550t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g555_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g555:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g5900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g5900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g5900t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g5900t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g5905_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g5905:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g5905t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g5905t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g5920_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g5920:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g5925_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g5925:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g6900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g6900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g6900t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_g6900t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_j1750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j1750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_j1800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j1800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_j1850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j1850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_j1900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j1900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_j3060_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j3060:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_j3160_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j3160:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_j3355_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j3355:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_j3355e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j3355e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_j3455_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j3455:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_j3455e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j3455e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_j4005_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j4005:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_j4025_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j4025:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_j4105_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j4105:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_j4115_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j4115:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_j4125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j4125:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_j6412_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j6412:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_j6413_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j6413:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n2805_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n2805:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n2806_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n2806:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n2807_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n2807:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n2808_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n2808:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n2810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n2810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n2815_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n2815:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n2820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n2820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n2830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n2830:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n2840_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n2840:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n2910_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n2910:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n2920_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n2920:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n2930_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n2930:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n2940_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n2940:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n3000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n3000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n3010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n3010:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n3050_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n3050:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n3060_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n3060:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n3150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n3150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n3160_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n3160:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n3350_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n3350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n3350e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n3450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n3450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n3520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n3520:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n3700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n3700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n4000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n4000c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n4000c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n4020_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n4020c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n4020c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n4100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n4120_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n4500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n4500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n4504_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n4504:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n4505_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n4505:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n5095_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n5095:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n5100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n5100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n5105_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n5105:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n6210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n6210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_n6211_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n6211:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-1000g1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-1000g4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-1005g1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10100e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10100f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10100t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10100te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10100y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10105_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10105f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10105t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10110u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10110y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10300t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10305_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10305t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10320_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10325_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-11100he_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-11100he:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-1110g4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-1115g4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-1115g4e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1115g4e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-1115gre_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1115gre:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-1120g4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-1125g4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-12100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-12100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-12100e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-12100e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-12100f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-12100f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-12100t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-12100t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-12100te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-12100te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-1210u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1210u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-1215u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1215u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-1215ue_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1215ue:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-1215ul_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1215ul:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-1220p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1220p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-1220pe_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1220pe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-12300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-12300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-12300he_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-12300he:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-12300hl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-12300hl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-12300t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-12300t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10200h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10210u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10210y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10300h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1030g4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1030g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10310u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10310y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1035g1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1035g4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1035g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1038ng7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10400f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10400h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10400t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10500e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10500h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10500t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10500te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10505_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10600k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10600kf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10600t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-11260h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11260h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-11300h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11300h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1130g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-11320h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11320h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1135g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-11400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-11400f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11400f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-11400h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11400h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-11400t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11400t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1140g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1140g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1145g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1145g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1145g7e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1145g7e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1145gre_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1145gre:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-11500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-11500h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11500h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-11500he_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11500he:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-11500t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11500t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1155g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1155g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-11600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-11600k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11600k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-11600kf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11600kf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-11600t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11600t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1230u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1230u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1235u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1235u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1235ul_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1235ul:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-12400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-12400f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12400f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-12400t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12400t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1240p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1240p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1240u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1240u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-12450h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12450h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-12450hx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12450hx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1245u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1245u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1245ue_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1245ue:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1245ul_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1245ul:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-12500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-12500e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12500e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-12500h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12500h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-12500hl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12500hl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-12500t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12500t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-12500te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12500te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1250p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1250p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1250pe_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1250pe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-12600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-12600h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12600h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-12600he_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12600he:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-12600hl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12600hl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-12600hx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12600hx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-12600k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12600k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-12600kf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12600kf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-12600t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-12600t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10510u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10510y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1060g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10610u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1065g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1068ng7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10700e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10700f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10700k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10700kf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10700t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10700te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10710u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10750h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10810u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10850h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10870h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10875h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-11370h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-11375h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-11390h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11390h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-11600h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11600h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1160g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1165g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-11700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-11700f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-11700k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-11700kf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-11700t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-11800h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1180g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-11850h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-11850he_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11850he:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1185g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1185g7e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1185gre_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1195g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1250u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1250u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1255u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1255u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1255ul_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1255ul:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1260p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1260p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1260u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1260u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-12650h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-12650h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-12650hx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-12650hx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1265u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1265u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1265ue_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1265ue:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1265ul_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1265ul:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-12700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-12700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-12700e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-12700e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-12700f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-12700f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-12700h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-12700h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-12700hl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-12700hl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-12700k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-12700k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-12700kf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-12700kf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-12700t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-12700t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-12700te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-12700te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1270p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1270p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1270pe_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1270pe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-12800h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-12800h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-12800he_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-12800he:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-12800hl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-12800hl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-12800hx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-12800hx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1280p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1280p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-12850hx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-12850hx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10850k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10885h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10900e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10900f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10900k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10900kf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10900t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10900te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10980hk_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-11900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-11900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-11900f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-11900f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-11900h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-11900h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-11900k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-11900k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-11900kf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-11900kf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-11900t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-11900t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-11950h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-11950h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-11980hk_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-11980hk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-12900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-12900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-12900e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-12900e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-12900f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-12900f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-12900h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-12900h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-12900hk_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-12900hk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-12900hx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-12900hx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-12900k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-12900k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-12900kf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-12900kf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-12900ks_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-12900ks:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-12900t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-12900t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-12900te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-12900te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-12950hx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-12950hx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_4410y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_4415u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_4415y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_4417u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_4425y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_5405u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_6405u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_6500y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_6500y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_7505_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_8500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_8500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_8505_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_8505:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_g5400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_g5400t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_g5420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_g5420t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_g5500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_g5500t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_g5600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_g5600t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_g5620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_g6400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_g6400t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_g6405_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_g6405t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_g6500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_g6500t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_g6505_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_g6505t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_g6600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_g6605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_g7400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g7400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_gold_g7400t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g7400t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_silver_n6000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_silver_n6000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_silver_n6005_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_silver_n6005:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1250p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1270_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1270p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1270p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1290p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1290t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1350_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1350p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1350p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1370_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1370p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1370p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1390:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1390p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1390p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1390t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1390t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2223_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2223:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2225_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2225:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2235_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2235:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2245_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2245:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2255_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2255:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2265_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2265:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2275_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2275:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2295_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2295:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3223_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3225_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3235_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3235:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3245_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3245m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3265_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3265m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3275_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3275m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3323_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3323:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3335_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3335:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3345_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3345:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3365_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3365:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3375:-:*:*:*:*:*:*:*"
]
| null | 7.9 | null | null | null |
|
CVE-2025-5724 | SourceCodester Student Result Management System Subjects Page subjects cross site scripting | A vulnerability was found in SourceCodester Student Result Management System 1.0. It has been classified as problematic. Affected is an unknown function of the file /script/academic/subjects of the component Subjects Page. The manipulation of the argument Subject leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | []
| 4.8 | 2.4 | 2.4 | 3.3 | null |
GHSA-f8jf-qrr8-r4w4 | In libxaac, there is a possible out of bounds read due to a missing bounds check. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-114746174 | []
| null | 6.5 | null | null | null |
|
GHSA-fchf-8pfc-crr5 | AuthInfo.java in LineContol Java Client (jlc) before 0.8.1 stores sensitive information such as user passwords in log files. | []
| null | null | null | null | null |
|
GHSA-47jj-pq3c-8pjm | Cross-site scripting (XSS) vulnerability in the GroupSpace application in BEA WebLogic Portal 9.2 GA allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors related to the rich text editor. | []
| null | null | null | null | null |
|
RHSA-2013:0561 | Red Hat Security Advisory: Red Hat Enterprise MRG Messaging 2.3 security update | qpid-cpp: qpid authentication bypass qpid-cpp: long arrays of zero-width types cause a denial of service qpid-cpp: crash due to qpid::framing::Buffer::checkAvailable() wraparound | [
"cpe:/a:redhat:enterprise_mrg:2::el5"
]
| null | null | null | null | null |
CVE-2022-41339 | In Zoho ManageEngine Mobile Device Manager Plus before 10.1.2207.5, the User Administration module allows privilege escalation. | [
"cpe:2.3:a:zohocorp:manageengine_mobile_device_manager_plus:10.1.2207.4:*:*:*:*:*:*:*"
]
| null | 7.8 | null | null | null |
|
CVE-2014-5926 | The DCU Mobile Banking (aka com.Vertifi.Mobile.P211391825) application 2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:dcu:dcu_mobile_banking:2:*:*:*:*:android:*:*"
]
| null | null | null | 5.4 | null |
|
CVE-2017-10284 | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Stored Procedure). Supported versions that are affected are 5.7.18 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
]
| null | null | 4.9 | 4 | null |
|
GHSA-vh68-cv68-mvfr | Dell PowerScale OneFS 9.0.0.x-9.4.0.x contains an Incorrect User Management vulnerability. A low privileged network attacker could potentially exploit this vulnerability, leading to escalation of privileges, and information disclosure. | []
| null | 8.8 | null | null | null |
|
CVE-2017-17891 | Readymade Video Sharing Script has CSRF via user-profile-edit.php. | [
"cpe:2.3:a:readymade_video_sharing_script_project:readymade_video_sharing_script:3.2:*:*:*:*:*:*:*"
]
| null | null | 8.8 | 6.8 | null |
|
CVE-2012-3347 | AutoFORM PDM Archive before 7.0 implements user accounts in a way that allows for JMX Console authentication, which allows remote authenticated users to bypass intended access restrictions via the /jmx-console URI, and then upload and execute arbitrary JSP code via a JBoss remote-deployment mechanism, a different vulnerability than CVE-2012-1828. | [
"cpe:2.3:a:efstechnology:autoform_pdm_archive:*:*:*:*:*:*:*:*",
"cpe:2.3:a:efstechnology:autoform_pdm_archive:6.9:*:*:*:*:*:*:*"
]
| null | null | null | 6 | null |
|
GHSA-j5mc-p7q3-p89m | Dell ECS versions prior to 3.8.1.5/ ObjectScale version 4.0.0.0 contains an Insertion of Sensitive Information into Log File vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Information disclosure. | []
| null | 5.5 | null | null | null |
|
CVE-2011-4350 | Yaws 1.91 has a directory traversal vulnerability in the way certain URLs are processed. A remote authenticated user could use this flaw to obtain content of arbitrary local files via specially-crafted URL request. | [
"cpe:2.3:a:yaws:yaws:1.91:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
]
| null | 6.5 | null | 4 | null |
|
CVE-2025-0589 | In affected versions of Octopus Deploy where customers are using Active Directory for authentication it was possible for an unauthenticated user to make an API request against two endpoints which would retrieve some data from the associated Active Directory. The requests when crafted correctly would return specific information from user profiles (Email address/UPN and Display name) from one endpoint and group information ( Group ID and Display name) from the other. This vulnerability does not expose data within the Octopus Server product itself. | []
| 6.9 | null | null | null | null |
|
RHSA-2024:10841 | Red Hat Security Advisory: OpenShift Container Platform 4.15.41 security update | runc: file descriptor leak | [
"cpe:/a:redhat:openshift:4.15::el9"
]
| null | 8.6 | null | null | null |
GHSA-j6w8-85rp-mrwv | ISPConfig 3.0.4.3: the "Add new Webdav user" can chmod and chown entire server from client interface. | []
| null | 9.8 | null | null | null |
|
PYSEC-2021-124 | null | A flaw was found in ansible. Credentials, such as secrets, are being disclosed in console log by default and not protected by no_log feature when using those modules. An attacker can take advantage of this information to steal those credentials. The highest threat from this vulnerability is to data confidentiality. Versions before ansible 2.9.18 are affected. | []
| null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.