id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
GHSA-4x26-g7hr-m7g8 | Dell PowerScale OneFS 8.2.x, 9.0.0.x-9.5.0.x contains an improper handling of insufficient permissions. A low privileged remote attacker could potentially exploit this vulnerability to cause information disclosure. | [] |
|
GHSA-864x-c48q-48jw | Information leakage vulnerability in NetIQ eDirectory before 9.1.1 HF1 due to shared memory usage. | [] |
|
GHSA-vr6q-6hw7-2592 | A input validation vulnerability in HPE Operations Orchestration product all versions prior to 10.80, allows for the execution of code remotely. | [] |
|
GHSA-rw25-wq29-68xv | The default configuration of SGOS in Blue Coat ProxySG before 6.2.16.5, 6.5 before 6.5.7.1, and 6.6 before 6.6.2.1 forwards authentication challenges from upstream origin content servers (OCS) when used in an explicit proxy deployment, which makes it easier for remote attackers to obtain sensitive information via a 407 (aka Proxy Authentication Required) HTTP status code, as demonstrated when using NTLM authentication. | [] |
|
GHSA-j7hg-4m8w-qjr3 | The sample files in the authfiles directory in Microsoft Commerce Server 2002 before SP2 allow remote attackers to bypass authentication by logging in to authfiles/login.asp with a valid username and any password, then going to the main site twice. | [] |
|
GHSA-4r8q-2frh-4j22 | AttacheCase ver.3.3.0.0 and earlier allows an arbitrary script execution via unspecified vectors. | [] |
|
CVE-2021-44040 | HTTP request line fuzzing attacks | Improper Input Validation vulnerability in request line parsing of Apache Traffic Server allows an attacker to send invalid requests. This issue affects Apache Traffic Server 8.0.0 to 8.1.3 and 9.0.0 to 9.1.1. | [
"cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] |
GHSA-6m86-m75c-rj5c | The Resource Settings page allows a high privilege attacker to load exploitable payload to be stored and reflected whenever a User visits the page. In a successful attack, some information could be obtained and/or modified. However, the attacker does not have control over what information is obtained, or the amount or kind of loss is limited. | [] |
|
GHSA-4xqh-x493-83xm | Unspecified vulnerability in Oracle Solaris 10 and 11 Express allows local users to affect availability via unknown vectors related to the Kernel. | [] |
|
CVE-2008-2040 | Stack-based buffer overflow in the HTTP::getAuthUserPass function (core/common/http.cpp) in Peercast 0.1218 and gnome-peercast allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Basic Authentication string with a long (1) username or (2) password. | [
"cpe:2.3:a:peercast:peercast:0.1218:*:*:*:*:*:*:*"
] |
|
GHSA-vqvj-v8xc-7whr | Cisco Intelligent Automation for Cloud (aka Cisco Cloud Portal) does not properly implement URL redirection, which allows remote authenticated users to obtain sensitive information via a crafted URL, aka Bug ID CSCuh84870. | [] |
|
CVE-2009-5085 | IBM Tivoli Federated Identity Manager (TFIM) 6.2.0 before 6.2.0.2, when configured as an OpenID provider, does not delete the site information cookie in response to a user's deletion of a relying-party trust entry, which allows user-assisted remote attackers to bypass intended trust restrictions via vectors that trigger absence of the consent-to-authenticate page. | [
"cpe:2.3:a:ibm:tivoli_federated_identity_manager:6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_federated_identity_manager:6.2.0.1:*:*:*:*:*:*:*"
] |
|
GHSA-rrf8-fw37-jc8w | Improper input validation in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via adjacent access. | [] |
|
CVE-2022-32845 | This issue was addressed with improved checks. This issue is fixed in watchOS 8.7, iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5. An app may be able to break out of its sandbox. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-34120 | Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79) | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [
"cpe:2.3:a:adobe:experience_manager_cloud_service:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*"
] |
CVE-2023-22283 | BIG-IP Edge Client for Windows vulnerability | On versions beginning in 7.1.5 to before 7.2.3.1, a DLL hijacking vulnerability exists in the BIG-IP Edge Client for Windows. User interaction and administrative privileges are required to exploit this vulnerability because the victim user needs to run the executable on the system and the attacker requires administrative privileges for modifying the files in the trusted search path. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
| [
"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:clients:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_edge:-:*:*:*:clients:windows:*:*"
] |
GHSA-vc49-qqxj-g453 | A vulnerability, which was classified as problematic, has been found in romadebrian WEB-Sekolah 1.0. Affected by this issue is some unknown functionality of the file /Admin/Proses_Edit_Akun.php of the component Backend. The manipulation of the argument Username_Baru/Password leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | [] |
|
CVE-2024-24763 | JumpServer Open Redirect Vulnerability | JumpServer is an open source bastion host and an operation and maintenance security audit system. Prior to version 3.10.0, attackers can exploit this vulnerability to construct malicious links, leading users to click on them, thereby facilitating phishing attacks or cross-site scripting attacks. Version 3.10.0 contains a patch for this issue. No known workarounds are available. | [
"cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:*"
] |
CVE-2024-10197 | code-projects Pharmacy Management System Manage Supplier Page manage_supplier.php cross site scripting | A vulnerability was found in code-projects Pharmacy Management System 1.0. It has been classified as problematic. Affected is an unknown function of the file /manage_supplier.php of the component Manage Supplier Page. The manipulation of the argument address leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. | [
"cpe:2.3:a:code-projects:pharmacy_management_system:1.0:*:*:*:*:*:*:*"
] |
GHSA-c2gm-j7pw-mh9p | The chat feature in the Real-Time Collaboration (RTC) services 7.3 and 7.4 in SAP NetWeaver Java AS 7.1 through 7.5 allows remote attackers to obtain sensitive user information by visiting webdynpro/resources/sap.com/tc~rtc~coll.appl.rtc~wd_chat/Chat#, pressing "Add users", and doing a search, aka SAP Security Note 2255990. | [] |
|
GHSA-cfq4-w82f-2hr4 | A vulnerability classified as problematic was found in SourceCodester Online Railway Reservation System 1.0. This vulnerability affects unknown code of the file contact_us.php of the component Message Us Form. The manipulation of the argument fullname/email/message leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | [] |
|
GHSA-6w5j-c4rf-9f2j | The Microsoft Outlook.com application before 7.8.2.12.49.7090 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] |
|
CVE-2023-3085 | X-WRT luci 404 Error Template dispatcher.uc run_action cross site scripting | A vulnerability, which was classified as problematic, has been found in X-WRT luci up to 22.10_b202303061504. This issue affects the function run_action of the file modules/luci-base/ucode/dispatcher.uc of the component 404 Error Template Handler. The manipulation of the argument request_path leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 22.10_b202303121313 is able to address this issue. The patch is named 24d7da2416b9ab246825c33c213fe939a89b369c. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-230663. | [
"cpe:2.3:a:x-wrt:luci:*:*:*:*:*:*:*:*"
] |
GHSA-x6qf-qqph-6mw5 | Best POS Management System 1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /kruxton/manage_user.php. | [] |
|
CVE-2020-23049 | Fork CMS Content Management System v5.8.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the `Displayname` field when using the `Add`, `Edit` or `Register' functions. This vulnerability allows attackers to execute arbitrary web scripts or HTML. | [
"cpe:2.3:a:fork-cms:fork_cms:5.8.0:*:*:*:*:*:*:*"
] |
|
CVE-2021-29061 | A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in Vfsjfilechooser2 version 0.2.9 and below which occurs when the application attempts to validate crafted URIs. | [
"cpe:2.3:a:vfsjfilechooser2_project:vfsjfilechooser2:*:*:*:*:*:*:*:*"
] |
|
CVE-2021-0118 | Out-of-bounds read in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable an escalation of privilege via local access. | [
"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:fas\\/aff_bios:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_bronze_3206r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_bronze_3206r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5218r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5218r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5220r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5220r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6208u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6208u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6226r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6226r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6230r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6230r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6238r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6238r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6240r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6240r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6242r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6242r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6246r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6246r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6248r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6248r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6250l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6250l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6256_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6256:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6258r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6258r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_silver_4210r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4210r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_silver_4210t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4210t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_silver_4214r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4214r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_silver_4215r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4215r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_9221_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_9221:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_9222_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_9222:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_bronze_3204_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5215_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5215l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5217_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5218_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5218b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5218n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5218t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5220_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5220s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5220t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5222_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6209u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6210u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6212u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6222v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6226_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6230_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6230n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6230n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6230t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6230t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6234_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6234:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6238_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6238l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6238t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6240_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6240l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6240y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6242_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6244_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6246_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6248_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6252_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6252n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6254_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6262v_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8253_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8256_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8260_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8260l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8260y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8268_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8270_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8276_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8276l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8280_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8280l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_9242_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_9282_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_silver_4208_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_silver_4209t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_silver_4210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_silver_4214_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_silver_4214y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_silver_4215_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_silver_4216_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6138p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6138p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_bronze_3104_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_bronze_3106_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5115_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5115:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5118_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5118:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5119t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5119t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5120_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5120:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5120t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5120t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_5122_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_5122:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6126_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6126:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6126f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6126f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6126t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6126t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6128_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6128:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6130:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6130f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6130f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6130t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6130t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6132_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6132:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6134_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6134:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6136_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6136:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6138_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6138:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6138f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6138f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6138t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6138t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6140_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6140:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6142_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6142:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6142f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6142f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6144_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6144:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6146_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6146:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6148_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6148:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6148f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6148f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6152_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6152:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_gold_6154_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold_6154:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8153_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8153:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8156_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8156:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8158_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8158:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8160_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8160:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8160f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8160f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8160t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8160t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8164_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8164:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8168_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8168:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8170_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8170:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8176_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8176:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8176f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8176f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_platinum_8180_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum_8180:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_silver_4108_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4108:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_silver_4109t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4109t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_silver_4110_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4110:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_silver_4112_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4112:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_silver_4114_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4114:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_silver_4114t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4114t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_silver_4116_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4116:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_silver_4116t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver_4116t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-11155mle_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-11155mle:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-11155mre_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-11155mre:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-11555mle_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-11555mle:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-11555mre_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-11555mre:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-11865mle_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-11865mle:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-11865mre_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-11865mre:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3323_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3323:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3335_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3335:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3345_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3345:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3365_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3365:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3375:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-11855m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-11855m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-11955m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-11955m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1350_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1350p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1350p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1370_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1370p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1370p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1390:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1390p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1390p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1390t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1390t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-10855m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-10885m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1250e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1250e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1250p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1250te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1250te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1270_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1270e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1270e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1270p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1270p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1270te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1270te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1290e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1290e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1290p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1290t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-1290te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-1290te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2223_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2223:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2225_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2225:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2235_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2235:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2245_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2245:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2255_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2255:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2265_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2265:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2275_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2275:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2295_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2295:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3223_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3225_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3235_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3235:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3245_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3245m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3265_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3265m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3275_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3275m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-3175x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-3175x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2123_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2123:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2125:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2133_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2133:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2135_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2135:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2145_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2145:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2155_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2155:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2175_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2175:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_w-2195_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_w-2195:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2314_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2314:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2324g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2324g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2334_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2334:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2336_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2336:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2356g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2356g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2374g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2374g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2378_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2378:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2378g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2378g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2386g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2386g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2388g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2388g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2226ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2254me_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2254me:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2254ml_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2254ml:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2276me_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2276me:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2276ml_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2276ml:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2278ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2278gel_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2224_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2224g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2226g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2234_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2236_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2244g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2246g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2274g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2276g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2276m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2278g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2286g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2286m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2288g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2124_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2124g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2126g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2134_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2136_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2144g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2146g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2174g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2176g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2186g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2176m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2186m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1602_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1602:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1622_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1622:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1623n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1623n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1627_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1627:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1633n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1633n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1637_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1637:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1649n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1649n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1653n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1653n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2123it_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2141i_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2142it_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2143it_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2145nt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2146nt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2161i_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2163it_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2166nt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2173it_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2177nt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2183it_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2187nt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1513n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1513n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1523n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1523n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1533n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1533n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1543n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1543n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1553n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1553n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1529_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1529:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1539_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1539:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1559_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1559:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1557_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1557:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1567_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1567:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1571_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1571:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1577_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1577:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1518_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1518:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1521_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1521:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1527_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1527:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1528_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1528:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1531_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1531:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1537_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1537:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1541_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1541:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1548_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1548:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1520:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1540_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_d-1540:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-11900h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-11900h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-11950h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-11950h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-11980hk_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-11980hk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-11900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-11900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-11900f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-11900f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-11900k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-11900k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-11900kf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-11900kf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-11900t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-11900t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-11850he_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11850he:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-11600h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11600h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-11390h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11390h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1195g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-11800h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-11850h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-11700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-11700f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-11700k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-11700kf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-11700t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-11370h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-11375h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1180g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1185g7e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1185gre_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1160g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1165g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1185g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-11500he_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11500he:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-11320h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11320h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1155g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1155g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-11260h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11260h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-11400h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11400h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-11500h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11500h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-11400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-11400f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11400f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-11400t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11400t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-11500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-11500t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11500t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-11600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-11600k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11600k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-11600kf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11600kf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-11600t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11600t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-11300h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-11300h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1140g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1140g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1145g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1145g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1145g7e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1145g7e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1145gre_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1145gre:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1130g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1135g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-11100he_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-11100he:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-1115g4e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1115g4e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-1115gre_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1115gre:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-1120g4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-1125g4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-1110g4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-1115g4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10850k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10885h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10900e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10900f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10900k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10900kf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10900t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10900te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10980hk_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10870h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10610u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10810u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1068ng7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10700e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10700f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10700k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10700kf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10700t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10700te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10750h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10850h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10875h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10510u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10510y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10710u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1060g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1065g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10505_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10500h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10200h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10310u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1038ng7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10400f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10400t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10500e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10500t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10500te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10600k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10600kf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10600t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10300h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10400h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10210u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10210y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10310y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1030g4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1030g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1035g1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1035g4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1035g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10105_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10105f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10105t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10305_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10305t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10325_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10100y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10100f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10100e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10100t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10100te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10300t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10320_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10110u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10110y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-1000g1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-1000g4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-1005g1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-9900ks_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9900ks:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-9880h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9880h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-9900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-9900t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9900t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-9980hk_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9980hk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-9900kf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9900kf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-9900k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-9700e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-9700e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-9700te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-9700te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-9850he_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-9850he:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-9850hl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-9850hl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-9700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-9700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-9700f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-9700f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-9700t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-9700t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-9750h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-9750h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-9750hf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-9750hf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-9850h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-9700kf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-9700kf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-9700k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-9500e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-9500e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-9500te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-9500te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-9300h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-9300h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-9400h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-9400h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-9400t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-9400t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-9500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-9500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-9500f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-9500f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-9500t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-9500t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-9600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-9600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-9600t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-9600t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-9300hf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-9300hf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-9400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-9400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-9400f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-9400f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-9600kf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-9600kf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-9600k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-9600k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-9100e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-9100e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-9100hl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-9100hl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-9100te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-9100te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-9100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-9100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-9100f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-9100f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-9100t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-9100t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-9300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-9300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-9300t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-9300t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-9320_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-9320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-9350k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-9350k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-9350kf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-9350kf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-8950hk_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8557u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8665ue_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8569u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8665u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8500y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8565u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8706g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8086k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8559u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8700b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8700t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8750h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8850h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8705g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8709g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8809g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7\\+8700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7\\+8700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8700k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8550u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-8650u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-8260u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-8260u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-8257u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-8257u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-8365ue_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-8365ue:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-8279u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-8279u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-8365u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-8310y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-8210y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-8200y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-8265u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-8305g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-8259u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-8269u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-8300h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-8400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-8400b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-8400h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-8400t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-8500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-8500b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-8500t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-8600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-8600t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-8600k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-8250u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-8350u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-8140u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-8140u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-8145ue_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-8100b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-8145u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-8100h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-8100t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-8109u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-8300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-8300t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-8130u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-8100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-8350k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_m3-8100y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-7560u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-7567u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-7600u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-7660u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-7700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-7700hq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-7700k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-7700t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-7820eq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-7820hk_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-7820hq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-7920hq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-7500u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-7y75_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-7260u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-7260u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-7267u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-7267u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-7287u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-7287u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-7300hq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-7300hq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-7300u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-7300u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-7360u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-7360u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-7400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-7400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-7400t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-7400t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-7440eq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-7440eq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-7440hq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-7440hq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-7442eq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-7442eq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-7500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-7500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-7500t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-7500t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-7600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-7600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-7600k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-7600k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-7600t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-7600t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-7y57_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-7y57:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-7200u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-7200u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-7y54_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-7y54:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-7020u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-7020u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-7130u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-7130u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-7100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-7100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-7100e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-7100e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-7100h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-7100h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-7100t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-7100t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-7101e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-7101e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-7101te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-7101te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-7102e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-7102e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-7167u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-7167u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-7300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-7300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-7300t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-7300t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-7320_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-7320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-7350k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-7350k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-7100u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-7100u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_m3-7y32_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_m3-7y32:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_m3-7y30_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_m3-7y30:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6785r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6785r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6660u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6660u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6770hq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6770hq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6870hq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6870hq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6970hq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6970hq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6700te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6700te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6820eq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6820eq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6822eq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6822eq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6500u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6500u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6560u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6560u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6600u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6600u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6650u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6650u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6700hq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6700hq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6700t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6700t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6820hk_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6820hk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6820hq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6820hq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6920hq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6920hq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6700k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6700k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6567u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6567u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-6585r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-6585r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-6685r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-6685r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-6350hq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-6350hq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-6402p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-6402p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-6440eq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-6440eq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-6442eq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-6442eq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-6500te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-6500te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-6200u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-6200u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-6260u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-6260u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-6267u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-6267u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-6287u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-6287u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-6300hq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-6300hq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-6300u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-6300u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-6360u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-6360u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-6400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-6400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-6400t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-6400t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-6440hq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-6440hq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-6500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-6500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-6500t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-6500t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-6600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-6600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-6600t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-6600t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-6600k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-6600k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-6006u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-6006u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-6157u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-6157u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-6098p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-6098p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-6100e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-6100e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-6100te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-6100te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-6102e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-6102e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-6100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-6100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-6100h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-6100h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-6100t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-6100t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-6100u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-6100u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-6167u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-6167u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-6300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-6300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-6300t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-6300t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-6320_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-6320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_m3-6y30_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_m3-6y30:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_m5-6y54_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_m5-6y54:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_m5-6y57_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_m5-6y57:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_m7-6y75_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_m7-6y75:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10900x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10900x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10920x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10920x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10940x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10940x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10980xe_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10980xe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-9800x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-9800x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-9820x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9820x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-9900x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9900x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-9920x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9920x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-9940x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9940x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-9960x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9960x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-9980xe_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9980xe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-7940x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-7940x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-7960x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-7960x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-7980xe_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-7980xe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-7920x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-7920x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-7640x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-7640x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-7740x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7740x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-7800x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7800x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-7820x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-7820x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-7900x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-7900x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6800k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6800k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6850k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6850k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6900k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6900k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6950x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-6950x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-5820k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-5820k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-5930k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-5930k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-5960x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-5960x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-4940mx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-4940mx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-4820k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-4820k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-4930k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-4930k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-4960x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-4960x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-4930mx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-4930mx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-3970x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-3970x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-3940xm_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-3940xm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-3920xm_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-3920xm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-3820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-3820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-3930k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-3930k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-3960x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-3960x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:atom_c3338r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c3338r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:atom_c3436l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c3436l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:atom_c3558r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c3558r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:atom_c3758r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c3758r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:atom_c3336_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c3336:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:atom_c3308_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c3308:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:atom_c3508_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c3508:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:atom_c3538_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c3538:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:atom_c3558_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c3558:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:atom_c3708_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c3708:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:atom_c3750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c3750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:atom_c3758_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c3758:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:atom_c3808_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c3808:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:atom_c3830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c3830:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:atom_c3850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c3850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:atom_c3858_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c3858:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:atom_c3950_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c3950:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:atom_c3955_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c3955:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:atom_c3958_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c3958:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:atom_c3338_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c3338:-:*:*:*:*:*:*:*"
] |
|
GHSA-g5hf-fh87-v7gq | ipmievd (aka the IPMI event daemon) in OpenIPMI, as used in the ipmitool package 1.8.11 in Red Hat Enterprise Linux (RHEL) 6, Debian GNU/Linux, Fedora 16, and other products uses 0666 permissions for its ipmievd.pid PID file, which allows local users to kill arbitrary processes by writing to this file. | [] |
|
CVE-2018-4300 | The session cookie generated by the CUPS web interface was easy to guess on Linux, allowing unauthorized scripted access to the web interface when the web interface is enabled. This issue affected versions prior to v2.2.10. | [
"cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*"
] |
|
GHSA-fxv9-m588-rfp5 | Cross-site scripting (XSS) vulnerability in the Site Documentation module before 6.x-1.5 for Drupal allows remote authenticated users with certain permissions to inject arbitrary web script or HTML via vectors related to taxonomy terms. | [] |
|
GHSA-36v6-mp2g-5c58 | A regression error in tcp-wrappers 7.6.dbs-10 and 7.6.dbs-11 might allow remote attackers to bypass intended access restrictions when a service uses libwrap but does not specify server connection information. | [] |
|
CVE-2023-0852 | Buffer overflow in the Address Book of Mobile Device function of Office / Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code. *:Satera LBP660C Series/LBP620C Series/MF740C Series/MF640C Series firmware Ver.11.04 and earlier sold in Japan. Color imageCLASS LBP660C Series/LBP 620C Series/X LBP1127C/MF740C Series/MF640C Series/X MF1127C firmware Ver.11.04 and earlier sold in US. i-SENSYS LBP660C Series/LBP620C Series/MF740C Series/MF640C Series, C1127P, C1127iF, C1127i firmware Ver.11.04 and earlier sold in Europe. | [
"cpe:2.3:o:canon:mf642cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf642cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf644cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf644cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf741cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf741cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf743cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf743cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf745cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf745cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp621c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp621c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp622c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp622c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp661c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp661c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp662c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp662c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp664c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp664c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf1127c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf1127c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf262dw_ii_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf262dw_ii:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf264dw_ii_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf264dw_ii:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf267dw_ii_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf267dw_ii:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf269dw_ii_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf269dw_ii:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf269dw_vp_ii_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf269dw_vp_ii:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf272dw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf272dw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf273dw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf273dw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf275dw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf275dw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf641cw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf641cw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:mf746cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:mf746cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp122dw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp122dw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp1127c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp1127c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp622cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp622cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp623cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp623cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:lbp664cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:lbp664cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:imageprograf_tc-20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:imageprograf_tc-20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:imageprograf_tc-20m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:imageprograf_tc-20m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:pixma_g3270_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:pixma_g3270:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:pixma_g4270_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:pixma_g4270:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:maxify_gx3020_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:maxify_gx3020:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:maxify_gx4020_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:maxify_gx4020:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_lbp621cw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_lbp621cw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_lbp623cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_lbp623cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_lbp633cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_lbp633cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_lbp664cx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_lbp664cx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_mf641cw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_mf641cw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_mf643cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_mf643cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_mf645cx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_mf645cx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_mf742cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_mf742cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_mf744cdw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_mf744cdw:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_mf746cx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_mf746cx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_x_c1127i_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_x_c1127i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_x_c1127if_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_x_c1127if:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canon:i-sensys_x_c1127p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:canon:i-sensys_x_c1127p:-:*:*:*:*:*:*:*"
] |
|
CVE-2024-56211 | WordPress UserPro plugin <= 5.1.9 - Authenticated Arbitrary User Meta Update vulnerability | Missing Authorization vulnerability in DeluxeThemes Userpro.This issue affects Userpro: from n/a through 5.1.9. | [] |
CVE-2023-31143 | Mage terminal user authentication not working properly | mage-ai is an open-source data pipeline tool for transforming and integrating data. Those who use Mage starting in version 0.8.34 and prior to 0.8.72 with user authentication enabled may be affected by a vulnerability. The terminal could be accessed by users who are not signed in or do not have editor permissions. Version 0.8.72 contains a fix for this issue. | [
"cpe:2.3:a:mage:mage-ai:*:*:*:*:*:python:*:*"
] |
GHSA-2fwm-m84p-x5qh | The view review history resource in Atlassian Crucible before version 4.4.3 (the fixed version for 4.4.x) and 4.5.0 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability through the invited reviewers for a review. | [] |
|
GHSA-mpgg-3gw5-hj57 | On Samsung mobile devices with M(6.0) and N(7.x) software, a heap overflow in the sensorhub binder service leads to code execution in a privileged process, aka SVE-2017-10991. | [] |
|
CVE-2017-0201 | A remote code execution vulnerability exists in Internet Explorer in the way that the JScript and VBScript engines render when handling objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user, aka "Scripting Engine Memory Corruption Vulnerability." This CVE ID is unique from CVE-2017-0093. | [
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*"
] |
|
CVE-2016-1000124 | Unauthenticated SQL Injection in Huge-IT Portfolio Gallery Plugin v1.0.6 | [
"cpe:2.3:a:huge-it:portfolio_gallery:1.0.6:*:*:*:*:joomla\\!:*:*"
] |
|
GHSA-w8f7-h2vw-42q9 | A vulnerability in the web framework code of Cisco Prime Infrastructure could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web interface of an affected system. More Information: CSCuw65843. Known Affected Releases: 3.1(0.0). | [] |
|
CVE-2024-45153 | Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79) | Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*"
] |
CVE-2020-12411 | Mozilla developers reported memory safety bugs present in Firefox 76. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 77. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-29996 | In NanoMQ v0.15.0-0, segment fault with Null Pointer Dereference occurs in the process of decoding subinfo_decode and unsubinfo_decode. | [
"cpe:2.3:a:emqx:nanomq:0.15.0:*:*:*:*:*:*:*"
] |
|
CVE-2020-0121 | In updateUidProcState of AppOpsService.java, there is a possible permission bypass due to a logic error. This could lead to local information disclosure of location data with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-148180766 | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
] |
|
GHSA-hmhg-vrf4-c942 | CSP MySQL User Manager 2.3.1 allows SQL injection, and resultant Authentication Bypass, via a crafted username during a login attempt. | [] |
|
CVE-2024-33864 | An issue was discovered in linqi before 1.4.0.1 on Windows. There is SSRF via Document template generation; i.e., via remote images in process creation, file inclusion, and PDF document generation via malicious JavaScript. | [
"cpe:2.3:a:linqi:linqi:*:*:*:*:*:*:*:*"
] |
|
GHSA-5rvr-q6ff-gr2c | Cross Site Scripting (XSS) vulnerability in Hughes Network Systems Router Terminal for HX200 v8.3.1.14, HX90 v6.11.0.5, HX50L v6.10.0.18, HN9460 v8.2.0.48, and HN7000S v6.9.0.37, allows unauthenticated attackers to misuse frames, include JS/HTML code and steal sensitive information from legitimate users of the application. | [] |
|
GHSA-6f94-33qx-gqcf | The Rust Programming Language rustdoc version Between 0.8 and 1.27.0 contains a CWE-427: Uncontrolled Search Path Element vulnerability in rustdoc plugins that can result in local code execution as a different user. This attack appear to be exploitable via using the --plugin flag without the --plugin-path flag. This vulnerability appears to have been fixed in 1.27.1. | [] |
|
GHSA-vg88-g3m2-5f88 | newswire/uploadmedia.cgi in 2coolcode Our Space (Ourspace) 2.0.9 allows remote attackers to upload certain files via unspecified vectors, probably involving unrestricted functionality in uploadmedia.cgi. | [] |
|
CVE-2020-10479 | CSRF in admin/add-news.php in Chadha PHPKB Standard Multi-Language 9 allows attackers to add a new news article via a crafted request. | [
"cpe:2.3:a:chadhaajay:phpkb:9.0:*:*:*:*:*:*:*"
] |
|
CVE-2024-42492 | Uncontrolled search path element in some BIOS and System Firmware Update Package for Intel(R) Server M50FCP family before version R01.02.0002 may allow a privileged user to potentially enable escalation of privilege via local access. | [] |
|
CVE-2021-36297 | SupportAssist Client version 3.8 and 3.9 contains an Untrusted search path vulnerability that allows attackers to load an arbitrary .dll file via .dll planting/hijacking, only by a separate administrative action that is not a default part of the SOSInstallerTool.exe installation for executing arbitrary dll's, | [
"cpe:2.3:a:dell:supportassist_for_home_pcs:*:*:*:*:*:*:*:*"
] |
|
CVE-2020-26274 | Command Injection Vulnerability in systeminformation | In systeminformation (npm package) before version 4.31.1 there is a command injection vulnerability. The problem was fixed in version 4.31.1 with a shell string sanitation fix. | [
"cpe:2.3:a:systeminformation:systeminformation:*:*:*:*:*:node.js:*:*"
] |
CVE-2024-12708 | Bulk Me Now <= 2.0 - Stored XSS via Shortcode | The Bulk Me Now! WordPress plugin through 2.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. | [] |
CVE-2025-32228 | WordPress Ai Image Alt Text Generator for WP plugin <= 1.0.8 - Sensitive Data Exposure vulnerability | Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in WP Messiah Ai Image Alt Text Generator for WP. This issue affects Ai Image Alt Text Generator for WP: from n/a through 1.0.8. | [] |
GHSA-338h-j3mx-wmr4 | Multiple cross-site scripting (XSS) vulnerabilities in administrative-interface pages in the management console in Symantec Brightmail Gateway 9.5.x allow remote authenticated users to inject arbitrary web script or HTML via unspecified vectors. | [] |
|
GHSA-p966-77rf-mh87 | Softing Secure Integration Server FileDirectory OPC UA Object Arbitrary File Creation Vulnerability. This vulnerability allows remote attackers to create arbitrary files on affected installations of Softing Secure Integration Server. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.The specific flaw exists within the handling of FileDirectory OPC UA Objects. The issue results from allowing unauthorized access to the filesystem. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-20549. | [] |
|
GHSA-78qh-4227-qc45 | SQL Injection vulnerability in flatCore version 1.4.6 allows an attacker to read and write to the users database. | [] |
|
CVE-2018-5916 | Buffer overread while decoding PDP modify request or network initiated secondary PDP activation in Snapdragon Automobile, Snapdragon Mobile and Snapdragon Wear in versions MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SD 845, SD 850, SDA660, SDA845, SDX20, SXR1130. | [
"cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9615_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9635m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9635m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9645_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9645:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9655_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9655:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_412_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_412:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_616_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_616:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_415:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr1130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr1130:-:*:*:*:*:*:*:*"
] |
|
CVE-2024-45407 | Sunshine has incorrect state management during pairing process may lead to incorrectly authorized client | Sunshine is a self-hosted game stream host for Moonlight. Clients that experience a MITM attack during the pairing process may inadvertantly allow access to an unintended client rather than failing authentication due to a PIN validation error. The pairing attempt fails due to the incorrect PIN, but the certificate from the forged pairing attempt is incorrectly persisted prior to the completion of the pairing request. This allows access to the certificate belonging to the attacker. | [
"cpe:2.3:a:lizardbyte:sunshine:2024-05-27:*:*:*:*:*:*:*"
] |
CVE-2020-14389 | It was found that Keycloak before version 12.0.0 would permit a user with only view-profile role to manage the resources in the new account console, allowing access and modification of data the user was not intended to have. | [
"cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-41766 | An issue was discovered in MediaWiki before 1.35.8, 1.36.x and 1.37.x before 1.37.5, and 1.38.x before 1.38.3. Upon an action=rollback operation, the alreadyrolled message can leak a user name (when the user has been revision deleted/suppressed). | [
"cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*"
] |
|
CVE-2011-4718 | Session fixation vulnerability in the Sessions subsystem in PHP before 5.5.2 allows remote attackers to hijack web sessions by specifying a session ID. | [
"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.17:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.13:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.14:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.15:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.16:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.17:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.18:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.19:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.20:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.21:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.22:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.23:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.24:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.25:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.26:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.27:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.12:rc1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.12:rc2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.13:rc1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.14:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.14:rc1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.15:rc1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.4.16:rc1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:alpha4:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:alpha5:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:alpha6:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.5.0:rc2:*:*:*:*:*:*"
] |
|
GHSA-x39f-m4x2-52g8 | Dell BIOS contains an Improper Input Validation vulnerability. An unauthenticated physical attacker may potentially exploit this vulnerability to perform arbitrary code execution. | [] |
|
CVE-2020-11152 | Race condition in HAL layer while processing callback objects received from HIDL due to lack of synchronization between accessing objects in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables | [
"cpe:2.3:h:qualcomm:apq8009w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8017:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8037:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8052:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8056:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8076:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8096au:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ar8031:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:csra6620:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:csra6640:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8916:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8917:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8920:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8937:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8940:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8952:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8953:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8956:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8976:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8976sg:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm439:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm660:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm660a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm660l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm670:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm670a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm670l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8004:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8005:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm855:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm855a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm855b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm855l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm855p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8916:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8937:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8940:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8952:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8953:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8956:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8998:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmd9655:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmi632:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmi8937:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmi8952:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmi8998:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmm8996au:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmx24:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmx50:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qat3514:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qat3522:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qat3550:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qbt1000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qbt1500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qbt2000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6320:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcc1110:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs603:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qet4100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qet4101:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qet5100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qet5100m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfe2080fc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfe2081fc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfe2082fc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfe2101:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfe2550:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfe3100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfe3440fc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfe4301:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfe4302:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfe4303:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfe4305:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfe4308:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfe4309:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfe4320:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfe4373fc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfe4455fc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfe4465fc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qln1035bd:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpa4340:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpa4360:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qpa5460:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qsw8573:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qtc800h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qtc800s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qtc800t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qtc801s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:rgr7640au:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:rsw8577:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd439:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd450:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd636:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd660:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd710:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd712:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd835:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd8cx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm830:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdr051:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdr052:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdr660:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdr8150:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdw2500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdw3100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx24:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx50m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:smb1351:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:smb1355:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:smb1358:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:smb1360:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:smb1380:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:smb1381:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:smb1390:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:smb231:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9306:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9326:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9330:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9360:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3615:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3998:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3999:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wgr7640:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:whs9410:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wtr2955:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wtr2965:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wtr3925:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wtr4905:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wtr5975:-:*:*:*:*:*:*:*"
] |
|
CVE-2024-37119 | WordPress Uncanny Automator Pro plugin < 5.3.0.1 - Unauthenticated License Settings Reset vulnerability | Missing Authorization vulnerability in Uncanny Owl Uncanny Automator Pro allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Uncanny Automator Pro: from n/a through 5.3.0.0. | [
"cpe:2.3:a:uncannyowl:uncanny_automator:*:*:*:*:*:wordpress:*:*"
] |
CVE-2019-2569 | Vulnerability in the Core RDBMS component of Oracle Database Server. Supported versions that are affected are 11.2.0.4, 12.1.0.2 and 12.2.0.1. Difficult to exploit vulnerability allows high privileged attacker having Local Logon privilege with logon to the infrastructure where Core RDBMS executes to compromise Core RDBMS. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Core RDBMS accessible data. CVSS 3.0 Base Score 4.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N). | [
"cpe:2.3:a:oracle:database_server:11.2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:12.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:12.2.0.1:*:*:*:*:*:*:*"
] |
|
GHSA-36m2-mxfm-7fx8 | Apple Safari 3.1.1 allows remote attackers to spoof the address bar by placing many "invisible" characters in the userinfo subcomponent of the authority component of the URL (aka the user field), as demonstrated by %E3%80%80 sequences. | [] |
|
GHSA-j56f-8qj6-8hq6 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.32 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [] |
|
CVE-2018-7320 | In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, the SIGCOMP protocol dissector could crash. This was addressed in epan/dissectors/packet-sigcomp.c by validating operand offsets. | [
"cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] |
|
CVE-2012-1065 | Insecure method vulnerability in TuxScripting.dll in the TuxSystem ActiveX control in 2X ApplicationServer 10.1 Build 1224 allows remote attackers to create or overwrite arbitrary files via the ExportSettings method. | [
"cpe:2.3:a:2x:applicationserver:10.1:1224:*:*:*:*:*:*"
] |
|
GHSA-wh8r-wrrv-8p2r | Directory traversal vulnerability in the FileSession object in Mod_python module 3.2.7 for Apache allows local users to execute arbitrary code via a crafted session cookie. | [] |
|
CVE-2010-3615 | named in ISC BIND 9.7.2-P2 does not check all intended locations for allow-query ACLs, which might allow remote attackers to make successful requests for private DNS records via the standard DNS query mechanism. | [
"cpe:2.3:a:isc:bind:9.7.2:p2:*:*:*:*:*:*"
] |
|
GHSA-mc87-5mpw-4292 | Cross-site scripting (XSS) vulnerability in Oracle Reports Web Cartridge (RWCGI60) in the Workflow Cartridge component, as used in Oracle Database 9.2.0.8, 10.1.0.5, and 10.2.0.3; Application Server 9.0.4.3, 10.1.2.0.2, and 10.1.2.2; Collaboration Suite 10.1.2; and Oracle E-Business Suite and Applications 11.5.10CU2; allows remote authenticated users to inject arbitrary HTML or web script via the genuser parameter to rwcgi60, aka OWF01. | [] |
|
CVE-2019-8334 | An issue was discovered in SchoolCMS 2.3.1. There is an XSS vulnerability via index.php?a=Index&c=Channel&m=Home&viewid=[XSS]. | [
"cpe:2.3:a:schoolcms:schoolcms:2.3.1:*:*:*:*:*:*:*"
] |
|
GHSA-g3qp-w2p3-c9f4 | OpenGL in Apple iOS before 9.2, OS X before 10.11.2, tvOS before 9.1, and watchOS before 2.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2015-7066. | [] |
|
CVE-2020-2638 | Vulnerability in the Enterprise Manager for Oracle Database product of Oracle Enterprise Manager (component: Enterprise Config Management). Supported versions that are affected are 12.1.0.5, 13.2.0.0 and 13.3.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Enterprise Manager for Oracle Database. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Enterprise Manager for Oracle Database accessible data as well as unauthorized update, insert or delete access to some of Enterprise Manager for Oracle Database accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Enterprise Manager for Oracle Database. CVSS 3.0 Base Score 6.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L). | [
"cpe:2.3:a:oracle:enterprise_manager:12.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager:13.2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager:13.3.0.0:*:*:*:*:*:*:*"
] |
|
CVE-2008-5673 | PHParanoid before 0.4 does not properly restrict access to the members area by unauthenticated users, which has unknown impact and remote attack vectors. | [
"cpe:2.3:a:phparanoid:phparanoid:*:*:*:*:*:*:*:*",
"cpe:2.3:a:phparanoid:phparanoid:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:phparanoid:phparanoid:0.2:*:*:*:*:*:*:*"
] |
|
GHSA-9jxc-x8cc-f2vm | A NULL Pointer Dereference vulnerability in Juniper Networks Junos OS allows an attacker to send a specific packet causing the packet forwarding engine (PFE) to crash and restart, resulting in a Denial of Service (DoS). By continuously sending these specific packets, an attacker can repeatedly disable the PFE causing a sustained Denial of Service (DoS). This issue only affects Juniper Networks NFX Series, SRX Series platforms when SSL Proxy is configured. This issue affects Juniper Networks Junos OS on NFX Series and SRX Series: 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R3-S1; 19.1 versions prior to 19.1R1-S6, 19.1R2-S2, 19.1R3; 19.2 versions prior to 19.2R1-S2, 19.2R2; 19.3 versions prior to 19.3R2. This issue does not affect Juniper Networks Junos OS versions on NFX Series and SRX Series prior to 18.3R1. | [] |
|
CVE-2022-42339 | Adobe Acrobat Reader DC XFA Parsing Stack Overflow Remote Code Execution | Adobe Acrobat Reader versions 22.002.20212 (and earlier) and 20.005.30381 (and earlier) are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*"
] |
CVE-2018-18475 | Zoho ManageEngine OpManager before 12.3 build 123214 allows Unrestricted Arbitrary File Upload. | [
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123001:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123002:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123003:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123004:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123005:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123006:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123007:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123008:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123009:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123010:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123011:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123012:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123013:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123014:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123015:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123021:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123022:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123023:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123024:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123025:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123026:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123027:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123028:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123029:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123030:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123031:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123032:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123033:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123034:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123035:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123036:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123037:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123043:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123044:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123045:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123046:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123047:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123048:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123049:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123050:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123051:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123052:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123053:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123054:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123055:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123056:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123057:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123062:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123063:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123064:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123065:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123066:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123067:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123068:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123069:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123070:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123076:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123077:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123078:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123079:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123080:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123081:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123082:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123083:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123084:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123086:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123090:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123091:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123092:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123093:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123104:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123105:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123106:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123107:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123108:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123109:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123110:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123111:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123112:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123113:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123114:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123115:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123116:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123117:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123118:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123119:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123120:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123121:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123122:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123123:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123124:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123125:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123126:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123127:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123136:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123137:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123147:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123148:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123149:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123150:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123156:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123157:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123158:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123159:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123160:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123161:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123162:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123163:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123164:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123165:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123166:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123167:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123168:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123169:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123175:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123176:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123177:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123178:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123179:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123180:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123181:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123182:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123183:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123184:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123185:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123186:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123187:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123188:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123189:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123190:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123191:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123192:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123193:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123194:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123195:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123196:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123197:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123198:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123204:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123205:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123206:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123207:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.3:build123208:*:*:*:*:*:*"
] |
|
CVE-2023-39662 | An issue in llama_index v.0.7.13 and before allows a remote attacker to execute arbitrary code via the `exec` parameter in PandasQueryEngine function. | [
"cpe:2.3:a:llamaindex_project:llamaindex:*:*:*:*:*:python:*:*"
] |
|
GHSA-69jc-r7p8-4cpg | Hitachi Vantara Pentaho Data Integration & Analytics versions before 10.1.0.0 and 9.3.0.6, including 9.5.x and 8.3.x, display the version of Tomcat when a server error is encountered. | [] |
|
GHSA-r74v-xg7r-p9h2 | The Simple Image Popup Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'sips_popup' shortcode in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
|
GHSA-h35r-h393-78gh | XnView Classic for Windows Version 2.40 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .jb2 file, related to "Data from Faulting Address controls Branch Selection starting at ntdll_77400000!RtlInterlockedPopEntrySList+0x000000000000039b." | [] |
|
CVE-2017-16534 | The cdc_parse_cdc_header function in drivers/usb/core/message.c in the Linux kernel before 4.13.6 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
|
GHSA-3pjq-c8pr-33gx | Inappropriate implementation in in Fullscreen API in Google Chrome on Android prior to 109.0.5414.74 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium) | [] |
|
CVE-2024-39353 | RemoteClusterFrame payloads are audit logged in full | Mattermost versions 9.5.x <= 9.5.5 and 9.8.0 fail to sanitize the RemoteClusterFrame payloads before audit logging them which allows a high privileged attacker with access to the audit logs to read message contents. | [
"cpe:2.3:a:mattermost:mattermost:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mattermost:mattermost:9.8.0:*:*:*:*:*:*:*"
] |
CVE-2019-11675 | The groonga-httpd package 6.1.5-1 for Debian sets the /var/log/groonga ownership to the groonga account, which might let local users obtain root access because of unsafe interaction with logrotate. For example, an attacker can exploit a race condition to insert a symlink from /var/log/groonga/httpd to /etc/bash_completion.d. NOTE: this is an issue in the Debian packaging of the Groonga HTTP server. | [
"cpe:2.3:a:groonga:groonga-httpd:6.5.1-1:*:*:*:*:debian:*:*"
] |
|
CVE-2004-1773 | Multiple buffer overflows in sharutils 4.2.1 and earlier may allow attackers to execute arbitrary code via (1) long output from wc to shar, or (2) unknown vectors in unshar. | [
"cpe:2.3:a:gnu:sharutils:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:sharutils:4.2.1:*:*:*:*:*:*:*"
] |
|
GHSA-prp5-3622-g79c | The zzip_mem_entry_extra_block function in memdisk.c in zziplib 0.13.62 allows remote attackers to cause a denial of service (invalid memory read and crash) via a crafted ZIP file. | [] |
|
GHSA-j7vw-r676-53wr | An issue was discovered in the Linux kernel through 5.11.3, as used with Xen PV. A certain part of the netback driver lacks necessary treatment of errors such as failed memory allocations (as a result of changes to the handling of grant mapping errors). A host OS denial of service may occur during misbehavior of a networking frontend driver. NOTE: this issue exists because of an incomplete fix for CVE-2021-26931. | [] |
|
GHSA-x3f4-45xf-rjm7 | `ruzstd` uninit and out-of-bounds memory reads | Affected versions of `ruzstd` miscalculate the length of the allocated and init section of its internal `RingBuffer`, leading to uninitialized or out-of-bounds reads in `copy_bytes_overshooting` of up to 15 bytes.This may result in up to 15 bytes of memory contents being written into the decoded data when decompressing a crafted archive. This may occur multiple times per archive. | [] |
CVE-2007-4363 | Multiple cross-site scripting (XSS) vulnerabilities in the nodereference module in Drupal Content Construction Kit (CCK) before 4.7.x-1.6, and 5.x before 5.x-1.6 ,allow remote attackers to inject arbitrary web script or HTML via nodereference fields, when using (1) the plain formatter or (2) the autocomplete text field widget without Views.module. | [
"cpe:2.3:a:drupal:content_construction_kit:4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:content_construction_kit:5.2:*:*:*:*:*:*:*"
] |
|
GHSA-95pq-3gq5-6v6j | Untrusted search path vulnerability in Adobe Extension Manager CS5 5.0.298 allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the same folder as a .mxi or .mxp file. | [] |
|
CVE-2012-3205 | Unspecified vulnerability in Oracle Sun Solaris 11 allows local users to affect integrity via unknown vectors related to Vino server. | [
"cpe:2.3:o:sun:sunos:5.11:*:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.