id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
5.42k
|
---|---|---|---|
GHSA-pr3x-2qh9-h52j
|
Cisco Jabber on Windows does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and modify the client-server data stream via a crafted certificate, aka Bug ID CSCug30280.
|
[] |
|
CVE-2022-21292
|
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Samples). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
|
[
"cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*"
] |
|
GHSA-5q9f-4pxq-x2gv
|
This issue was addressed with improved redaction of sensitive information. This issue is fixed in watchOS 9.5, macOS Ventura 13.4, tvOS 16.5, iOS 16.5 and iPadOS 16.5, macOS Big Sur 11.7.7, macOS Monterey 12.6.6. An app may be able to bypass Privacy preferences
|
[] |
|
GHSA-55xc-mp8m-rgvj
|
XYHCMS v3.6 contains a stored cross-site scripting (XSS) vulnerability in the component xyhai.php?s=/Link/index.
|
[] |
|
GHSA-4r77-5qxj-vjjj
|
ID4Portais in version < V.2022.837.002a returns message parameter unsanitized in the response, resulting in a HTML Injection vulnerability.
|
[] |
|
GHSA-pwxr-fc25-6gwf
|
Missing Authorization vulnerability in Croover.inc Rich Table of Contents allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Rich Table of Contents: from n/a through 1.4.0.
|
[] |
|
GHSA-q35q-53r6-jjq5
|
SQL injection vulnerability in index.php in AudiStat 1.3 allows remote attackers to execute arbitrary SQL commands via the mday parameter.
|
[] |
|
CVE-2019-5091
|
An exploitable denial-of-service vulnerability exists in the Dicom-packet parsing functionality of LEADTOOLS libltdic.so version 20.0.2019.3.15. A specially crafted packet can cause an infinite loop, resulting in a denial of service. An attacker can send a packet to trigger this vulnerability.
|
[
"cpe:2.3:a:leadtools:leadtools:20.0.2019.3.15:*:*:*:*:*:*:*"
] |
|
GHSA-4257-qx96-mgcq
|
Guangzhou Hongfan Technology Co., LTD. iOffice20 has any user login vulnerability. An attacker can log in to any system account including the system administrator through a logical flaw.
|
[] |
|
CVE-2024-50696
|
SunGrow WiNet-S V200.001.00.P025 and earlier versions is missing integrity checks for firmware upgrades. Sending a specific MQTT message allows an update to an inverter or a WiNet connectivity dongle with a bogus firmware file that is located on attacker-controlled server.
|
[] |
|
CVE-2016-11013
|
The wp-listings plugin before 2.0.2 for WordPress has includes/views/single-listing.php XSS.
|
[
"cpe:2.3:a:agentevolution:impress_listings:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2007-3628
|
Unspecified vulnerability in the fetch function in MDB2.php in PEAR Structures-DataGrid-DataSource-MDB2 0.1.9 and earlier allows attackers to "manipulate the generated sorting queries."
|
[
"cpe:2.3:a:pear:structures_datagrid_datasource_mdb2:*:*:*:*:*:*:*:*"
] |
|
GHSA-m3jr-wr6m-rfq5
|
Microsoft ODBC Driver Remote Code Execution Vulnerability
|
[] |
|
CVE-2016-1395
|
The web-based management interface on Cisco RV110W devices with firmware before 1.2.1.7, RV130W devices with firmware before 1.0.3.16, and RV215W devices with firmware before 1.3.0.8 allows remote attackers to execute arbitrary code as root via a crafted HTTP request, aka Bug ID CSCux82428.
|
[
"cpe:2.3:h:cisco:rv130w_wireless-n_multifunction_vpn_router:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130w_wireless-n_multifunction_vpn_router_firmware:1.0.0.21:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130w_wireless-n_multifunction_vpn_router_firmware:1.0.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv130w_wireless-n_multifunction_vpn_router_firmware:1.0.2.7:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv215w_wireless-n_vpn_router:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv215w_wireless-n_vpn_router_firmware:1.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv215w_wireless-n_vpn_router_firmware:1.1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv215w_wireless-n_vpn_router_firmware:1.2.0.14:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv215w_wireless-n_vpn_router_firmware:1.2.0.15:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv215w_wireless-n_vpn_router_firmware:1.3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv110w_wireless-n_vpn_firewall:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv110w_wireless-n_vpn_firewall_firmware:1.1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv110w_wireless-n_vpn_firewall_firmware:1.2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv110w_wireless-n_vpn_firewall_firmware:1.2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv110w_wireless-n_vpn_firewall_firmware:1.2.1.4:*:*:*:*:*:*:*"
] |
|
CVE-2022-0878
|
Novel attack against the Combined Charging System (CCS) in electric vehicles to remotely cause a denial of service
|
Electric Vehicle (EV) commonly utilises the Combined Charging System (CCS) for DC rapid charging. To exchange important messages such as the State of Charge (SoC) with the Electric Vehicle Supply Equipment (EVSE) CCS uses a high-bandwidth IP link provided by the HomePlug Green PHY (HPGP) power-line communication (PLC) technology. The attack interrupts necessary control communication between the vehicle and charger, causing charging sessions to abort. The attack can be conducted wirelessly from a distance using electromagnetic interference, allowing individual vehicles or entire fleets to be disrupted simultaneously. In addition, the attack can be mounted with off-the-shelf radio hardware and minimal technical knowledge. With a power budget of 1 W, the attack is successful from around 47 m distance. The exploited behavior is a required part of the HomePlug Green PHY, DIN 70121 & ISO 15118 standards and all known implementations exhibit it. In addition to electric cars, Brokenwire affects electric ships, airplanes and heavy duty vehicles utilising these standards.
|
[
"cpe:2.3:o:combined_charging_system_project:combined_charging_system_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:combined_charging_system_project:combined_charging_system:-:*:*:*:*:*:*:*"
] |
CVE-2024-40393
|
Online Clinic Management System In PHP With Free Source code v1.0 was discovered to contain a SQL injection vulnerability via the user parameter at login.php.
|
[
"cpe:2.3:a:angeljudesuarez:online_clinic_management_system:1.0:*:*:*:*:*:*:*"
] |
|
CVE-2024-29213
|
Ivanti DSM < version 2024.2 allows authenticated users on the local machine to run code with elevated privileges due to insecure ACL via unspecified attack vector.
|
[
"cpe:2.3:a:ivanti:desktop_\\&_server_management:*:*:*:*:*:*:*:*"
] |
|
CVE-2020-27715
|
On BIG-IP 15.1.0-15.1.0.5 and 14.1.0-14.1.3, crafted TLS request to the BIG-IP management interface via port 443 can cause high (~100%) CPU utilization by the httpd daemon.
|
[
"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*"
] |
|
GHSA-9fwf-m56x-47j8
|
Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22.
|
[] |
|
CVE-2025-36049
|
IBM webMethods Integration Sever XML external entity injection
|
IBM webMethods Integration Server 10.5, 10.7, 10.11, and 10.15
is vulnerable to an XML external entity injection (XXE) attack when processing XML data. A remote authenticated attacker could exploit this vulnerability to execute arbitrary commands.
|
[
"cpe:2.3:a:softwareag:webmethods:10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:softwareag:webmethods:10.7:*:*:*:*:*:*:*",
"cpe:2.3:a:softwareag:webmethods:10.11:*:*:*:*:*:*:*",
"cpe:2.3:a:softwareag:webmethods:10.15:*:*:*:*:*:*:*"
] |
CVE-2023-51027
|
TOTOlink EX1800T V9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command execution in the ‘apcliAuthMode’ parameter of the setWiFiExtenderConfig interface of the cstecgi .cgi.
|
[
"cpe:2.3:o:totolink:ex1800t_firmware:9.1.0cu.2112_b20220316:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:ex1800t:-:*:*:*:*:*:*:*"
] |
|
GHSA-69mw-4jhr-4j3r
|
libvirt.c in the API in Red Hat libvirt 0.8.8 does not properly restrict operations in a read-only connection, which allows remote attackers to cause a denial of service (host OS crash) or possibly execute arbitrary code via a (1) virNodeDeviceDettach, (2) virNodeDeviceReset, (3) virDomainRevertToSnapshot, (4) virDomainSnapshotDelete, (5) virNodeDeviceReAttach, or (6) virConnectDomainXMLToNative call, a different vulnerability than CVE-2008-5086.
|
[] |
|
CVE-2010-3878
|
Cross-site request forgery (CSRF) vulnerability in the JMX Console in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.3 before 4.3.0.CP09 allows remote attackers to hijack the authentication of administrators for requests that deploy WAR files.
|
[
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:cp01:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:cp02:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:cp03:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:cp04:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:cp05:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:cp06:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:cp07:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:cp08:*:*:*:*:*:*"
] |
|
GHSA-254h-gvgq-x2xg
|
An issue was discovered in GitLab-EE starting with version 13.3 before 17.1.7, 17.2 before 17.2.5, and 17.3 before 17.3.2 that would allow an attacker to modify an on-demand DAST scan without permissions and leak variables.
|
[] |
|
CVE-2014-9469
|
Cross-site scripting (XSS) vulnerability in vBulletin 3.5.4, 3.6.0, 3.6.7, 3.8.7, 4.2.2, 5.0.5, and 5.1.3.
|
[
"cpe:2.3:a:vbulletin:vbulletin:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:vbulletin:vbulletin:3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:vbulletin:vbulletin:3.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:vbulletin:vbulletin:3.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:vbulletin:vbulletin:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vbulletin:vbulletin:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:vbulletin:vbulletin:5.1.3:*:*:*:*:*:*:*"
] |
|
GHSA-g5q4-36jf-94r5
|
WebKit before r51295, as used in Google Chrome before 4.0.249.78, presents a directory-listing page in response to an XMLHttpRequest for a file:/// URL that corresponds to a directory, which allows attackers to obtain sensitive information or possibly have unspecified other impact via a crafted local HTML document.
|
[] |
|
CVE-2023-46865
|
/api/v1/company/upload-logo in CompanyController.php in crater through 6.0.6 allows a superadmin to execute arbitrary PHP code by placing this code into an image/png IDAT chunk of a Company Logo image.
|
[
"cpe:2.3:a:craterapp:crater:*:*:*:*:*:*:*:*"
] |
|
CVE-2016-9193
|
A vulnerability in the malicious file detection and blocking features of Cisco Firepower Management Center and Cisco FireSIGHT System Software could allow an unauthenticated, remote attacker to bypass malware detection mechanisms on an affected system. Affected Products: Cisco Firepower Management Center and FireSIGHT System Software are affected when they are configured to use a file policy that has the Block Malware action. More Information: CSCvb27494. Known Affected Releases: 6.0.1.1 6.1.0.
|
[
"cpe:2.3:a:cisco:firesight_system_software:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firesight_system_software:6.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firesight_system_software:6.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firesight_system_software:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firesight_system_software:6.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firesight_system_software:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:6.1.0:*:*:*:*:*:*:*"
] |
|
CVE-2022-27588
|
Vulnerability in QVR
|
We have already fixed this vulnerability in the following versions of QVR: QVR 5.1.6 build 20220401 and later
|
[
"cpe:2.3:a:qnap:qvr:*:*:*:*:*:*:*:*"
] |
CVE-2023-44209
|
Local privilege escalation due to improper soft link handling. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 29051.
|
[
"cpe:2.3:a:acronis:agent:c22.02:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
GHSA-mhfw-jv7r-2344
|
Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.
|
[] |
|
GHSA-6fm8-px7c-8gm4
|
Race condition in the Health and Performance Monitoring (HPM) for ASDM feature in Cisco ASA Software 8.3 before 8.3(2.42), 8.4 before 8.4(7.11), 8.5 before 8.5(1.19), 8.6 before 8.6(1.13), 8.7 before 8.7(1.11), 9.0 before 9.0(4.8), and 9.1 before 9.1(4.5) allows remote attackers to cause a denial of service (device reload) via TCP traffic that triggers many half-open connections at the same time, aka Bug ID CSCum00556.
|
[] |
|
GHSA-42g3-v99m-3ggh
|
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka 'Microsoft Excel Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1193, CVE-2020-1335, CVE-2020-1594.
|
[] |
|
CVE-2014-1343
|
WebKit, as used in Apple Safari before 6.1.4 and 7.x before 7.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-05-21-1.
|
[
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:6.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.0.3:*:*:*:*:*:*:*"
] |
|
CVE-2017-5753
|
Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
|
[
"cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c:c2316:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c:c2338:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c:c2350:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c:c2358:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c:c2508:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c:c2516:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c:c2518:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c:c2530:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c:c2538:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c:c2550:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c:c2558:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c:c2718:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c:c2730:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c:c2738:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c:c2750:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c:c2758:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_x3:c3130:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_x3:c3200rk:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_x3:c3205rk:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_x3:c3230rk:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_x3:c3235rk:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_x3:c3265rk:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_x3:c3295rk:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_x3:c3405:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_x3:c3445:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_z:z3770d:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_z:z3775:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_z:z3775d:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_z:z3785:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:atom_z:z3795:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j:j1750:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j:j1800:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j:j1850:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j:j1900:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j:j3060:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j:j3160:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j:j3355:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n:n2805:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n:n2806:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n:n2807:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n:n2808:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n:n2810:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n:n2815:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n:n2820:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n:n2830:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n:n2840:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n:n2910:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n:n2920:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n:n2930:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n:n2940:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n:n3000:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n:n3010:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n:n3050:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n:n3060:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n:n3150:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n:n3160:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n:n3350:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n:n4000:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_n:n4100:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3450:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_m:5y10:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_m:5y10a:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_m:5y10c:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_m:5y31:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_m:5y51:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_m:5y70:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_m:5y71:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_m3:6y30:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_m3:7y30:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_m3:7y32:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_m5:6y54:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_m5:6y57:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_m7:6y75:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_j:j2850:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_j:j2900:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_j:j3710:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_j:j4205:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_n:n3510:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_n:n3520:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_n:n3530:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_n:n3540:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_n:n3700:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_n:n3710:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_n:n4200:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:e5502:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:e5503:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:e5504:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:e5506:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:e5507:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:e5520:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:e5530:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:e5540:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:e5603:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:e5606:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:e5607:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:e5620:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:e5630:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:e5640:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:e5645:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:e5649:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:e6510:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:e6540:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:e7520:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:e7530:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:e7540:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:ec5509:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:ec5539:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:ec5549:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:l3406:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:l3426:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:l5506:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:l5508:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:l5518:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:l5520:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:l5530:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:l5609:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:l5618:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:l5630:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:l5638:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:l5640:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:l7545:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:l7555:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:lc5518:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:lc5528:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:w3670:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:w3680:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:w3690:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:w5580:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:w5590:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:x3430:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:x3440:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:x3450:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:x3460:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:x3470:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:x3480:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:x5550:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:x5560:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:x5570:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:x5647:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:x5650:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:x5660:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:x5667:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:x5670:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:x5672:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:x5675:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:x5677:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:x5680:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:x5687:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:x5690:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:x6550:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:x7542:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:x7550:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:x7560:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e-1105c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3:1505m_v6:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3:1515m_v5:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3:1535m_v5:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3:1535m_v6:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3:1545m_v5:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3:1558l_v5:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3:1565l_v5:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3:1575m_v5:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3:1578l_v5:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3:1585_v5:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3:1585l_v5:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1105c_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1125c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1125c_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1220:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1220_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1220_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_12201:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_12201_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1220l_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1225:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1225_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1225_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1226_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1230:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1230_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1230_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1230l_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1231_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1235:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1240:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1240_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1240_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1240l_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1241_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1245:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1245_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1245_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1246_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1258l_v4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1260l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1265l_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1265l_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1265l_v4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1268l_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1270:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1270_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1270_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1271_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1275:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1275_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1275_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1275l_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1276_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1278l_v4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1280:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1280_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1280_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1281_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1285_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1285_v4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1285l_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1285l_v4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1286_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1286l_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1290:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1290_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1501l_v6:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1501m_v6:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1505l_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1505l_v6:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e3_1505m_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:2650l_v4:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:2658:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:2658_v2:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:2658_v3:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:2658_v4:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:2658a_v3:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:2660:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:2660_v2:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:2660_v3:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:2660_v4:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:2665:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:2667:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:2667_v2:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:2667_v3:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:2667_v4:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:2670:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:2670_v2:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:2670_v3:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:2680:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:2680_v2:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:2680_v3:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:2680_v4:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:2683_v3:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:2683_v4:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:2687w:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:2687w_v2:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:2687w_v3:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:2687w_v4:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:2690:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:2690_v2:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:2690_v3:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:2690_v4:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:2695_v2:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:2695_v3:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:2695_v4:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:2697_v2:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:2697_v3:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:2697_v4:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:2697a_v4:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:2698_v3:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:2698_v4:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:2699_v3:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:2699_v4:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:2699a_v4:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:2699r_v4:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:4603:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:4603_v2:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:4607:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:4607_v2:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:4610:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:4610_v2:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:4610_v3:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:4610_v4:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:4617:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:4620:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:4620_v2:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:4620_v3:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:4620_v4:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:4624l_v2:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:4627_v2:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:4627_v3:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:4627_v4:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:4628l_v4:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:4640:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:4640_v2:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:4640_v3:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:4640_v4:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:4648_v3:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:4650:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:4650_v2:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:4650_v3:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:4650_v4:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:4650l:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:4655_v3:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:4655_v4:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:4657l_v2:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:4660_v3:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:4660_v4:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:4667_v3:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:4667_v4:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:4669_v3:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5:4669_v4:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_1428l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_1428l_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_1428l_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_1620:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_1620_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_1620_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_1620_v4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_1630_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_1630_v4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_1650:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_1650_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_1650_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_1650_v4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_1660:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_1660_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_1660_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_1660_v4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_1680_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_1680_v4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2403:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2403_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2407:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2407_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2408l_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2418l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2418l_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2418l_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2420:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2420_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2428l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2428l_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2428l_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2430:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2430_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2430l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2430l_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2438l_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2440:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2440_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2448l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2448l_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2450:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2450_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2450l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2450l_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2470:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2470_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2603:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2603_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2603_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2603_v4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2608l_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2608l_v4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2609:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2609_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2609_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2609_v4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2618l_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2618l_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2618l_v4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2620:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2620_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2620_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2620_v4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2623_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2623_v4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2628l_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2628l_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2628l_v4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2630:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2630_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2630_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2630_v4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2630l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2630l_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2630l_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2630l_v4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2637:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2637_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2637_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2637_v4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2640:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2640_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2640_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2640_v4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2643:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2643_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2643_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2643_v4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2648l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2648l_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2648l_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2648l_v4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2650:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2650_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2650_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2650_v4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2650l:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2650l_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e5_2650l_v3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:2803:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:2820:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:2830:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:2850:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:2850_v2:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:2860:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:2870:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:2870_v2:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:2880_v2:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:2890_v2:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:4807:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:4809_v2:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:4809_v3:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:4809_v4:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:4820:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:4820_v2:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:4820_v3:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:4820_v4:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:4830:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:4830_v2:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:4830_v3:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:4830_v4:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:4850:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:4850_v2:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:4850_v3:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:4850_v4:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:4860:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:4860_v2:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:4870:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:4870_v2:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:4880_v2:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:4890_v2:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:8830:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:8837:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:8850:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:8850_v2:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:8857_v2:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:8860:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:8860_v3:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:8860_v4:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:8867_v3:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:8867_v4:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:8867l:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:8870:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:8870_v2:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:8870_v3:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:8870_v4:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:8880_v2:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:8880_v3:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:8880_v4:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:8880l_v2:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:8880l_v3:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:8890_v2:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:8890_v3:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:8890_v4:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:8891_v2:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:8891_v3:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:8891_v4:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:8893_v2:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:8893_v3:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:8893_v4:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_e7:8894_v4:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:5118:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:5119t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:5120:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:5120t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:5122:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6126:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6126f:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6126t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6128:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6130:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6130f:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6130t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6132:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6134:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6134m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6136:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6138:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6138f:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6138t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6140:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6140m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6142:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6142f:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6142m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6144:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6146:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6148:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6148f:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6150:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6152:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_gold:6154:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_phi:7210:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_phi:7210f:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_phi:7230:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_phi:7230f:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_phi:7235:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_phi:7250:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_phi:7250f:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_phi:7285:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_phi:7290:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_phi:7290f:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_phi:7295:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:local_service_management_system:13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:local_service_management_system:13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:local_service_management_system:13.3:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:synology:diskstation_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:synology:router_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*",
"cpe:2.3:a:synology:virtual_machine_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:o:synology:vs960hd_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:synology:vs360hd_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:synology:vs360hd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_desktop:12:sp2:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_desktop:12:sp3:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp4:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp2:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp2:*:*:*:*:raspberry_pi:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp3:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_software_development_kit:12:sp2:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_software_development_kit:12:sp3:*:*:*:*:*:*",
"cpe:2.3:o:arm:cortex-r7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arm:cortex-r7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arm:cortex-r8_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arm:cortex-r8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arm:cortex-a8_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arm:cortex-a8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arm:cortex-a9_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arm:cortex-a9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arm:cortex-a12_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arm:cortex-a12:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arm:cortex-a15_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arm:cortex-a15:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arm:cortex-a17_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arm:cortex-a17:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arm:cortex-a57_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arm:cortex-a57:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arm:cortex-a72_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arm:cortex-a72:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arm:cortex-a73_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arm:cortex-a73:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arm:cortex-a75_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arm:cortex-a75:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arm:cortex-a76_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arm:cortex-a76:-:*:*:*:*:*:*:*",
"cpe:2.3:a:pepperl-fuchs:visunet_rm_shell:-:*:*:*:*:*:*:*",
"cpe:2.3:o:pepperl-fuchs:btc12_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:pepperl-fuchs:btc12:-:*:*:*:*:*:*:*",
"cpe:2.3:o:pepperl-fuchs:btc14_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:pepperl-fuchs:btc14:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:hci:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:bl_ppc_1000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:bl_ppc_1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:bl_ppc12_1000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:bl_ppc12_1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:bl_ppc15_1000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:bl_ppc15_1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:bl_ppc17_1000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:bl_ppc17_1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:bl_bpc_2000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:bl_bpc_2000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:bl_bpc_2001_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:bl_bpc_2001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:bl_bpc_3000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:bl_bpc_3000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:bl_bpc_3001_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:bl_bpc_3001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:bl_ppc15_3000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:bl_ppc15_3000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:bl_ppc17_3000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:bl_ppc17_3000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:bl_bpc_7000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:bl_bpc_7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:bl_bpc_7001_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:bl_bpc_7001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:bl_ppc_7000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:bl_ppc_7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:bl_ppc15_7000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:bl_ppc15_7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:bl_ppc17_7000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:bl_ppc17_7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:bl_rackmount_2u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:bl_rackmount_2u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:bl_rackmount_4u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:bl_rackmount_4u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:bl2_bpc_1000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:bl2_bpc_1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:bl2_ppc_1000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:bl2_ppc_1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:bl2_bpc_2000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:bl2_bpc_2000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:bl2_ppc_2000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:bl2_ppc_2000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:bl2_bpc_7000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:bl2_bpc_7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:bl2_ppc_7000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:bl2_ppc_7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:dl_ppc15_1000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:dl_ppc15_1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:dl_ppc15m_7000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:dl_ppc15m_7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:dl_ppc18.5m_7000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:dl_ppc18.5m_7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:dl_ppc21.5m_7000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:dl_ppc21.5m_7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:el_ppc_1000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:el_ppc_1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:el_ppc_1000\\/wt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:el_ppc_1000\\/wt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:el_ppc_1000\\/m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:el_ppc_1000\\/m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:valueline_ipc_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:valueline_ipc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:vl_bpc_1000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:vl_bpc_1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:vl_bpc_2000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:vl_bpc_2000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:vl_ppc_2000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:vl_ppc_2000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:vl_bpc_3000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:vl_bpc_3000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:vl_ppc_3000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:vl_ppc_3000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:vl_ipc_p7000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:vl_ipc_p7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:vl2_bpc_1000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:vl2_bpc_1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:vl2_ppc_1000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:vl2_ppc_1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:vl2_bpc_2000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:vl2_bpc_2000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:vl2_ppc_2000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:vl2_ppc_2000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:vl2_bpc_3000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:vl2_bpc_3000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:vl2_ppc_3000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:vl2_ppc_3000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:vl2_bpc_7000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:vl2_bpc_7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:vl2_ppc_7000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:vl2_ppc_7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:vl2_bpc_9000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:vl2_bpc_9000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:vl2_ppc_9000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:vl2_ppc_9000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:vl2_ppc7_1000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:vl2_ppc7_1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:vl2_ppc9_1000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:vl2_ppc9_1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:vl2_ppc12_1000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:vl2_ppc12_1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_itc1500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_itc1500:v3:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_itc1500_pro_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_itc1500_pro:v3:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_itc1900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_itc1900:v3:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_itc1900_pro_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_itc1900_pro:v3:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_itc2200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_itc2200:v3:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_itc2200_pro_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_itc2200_pro:v3:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_winac_rtx_\\(f\\)_2010_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_winac_rtx_\\(f\\)_2010_firmware:2010:-:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_winac_rtx_\\(f\\)_2010_firmware:2010:sp1:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_winac_rtx_\\(f\\)_2010_firmware:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_winac_rtx_\\(f\\)_2010:-:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:-:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201312101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201312102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201312401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201312402:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201403101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201403102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201403201:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201403202:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201403203:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201403204:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201403205:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201403206:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201403207:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201403208:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201403209:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201403210:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201403211:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201404401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201404402:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201404403:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201404420:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201406401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201407101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201407102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201407401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201407402:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201407403:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201407404:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201407405:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201409101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201409201:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201409202:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201409203:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201409204:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201409205:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201409206:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201409207:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201410101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201410401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201410402:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201410403:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201410404:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201410405:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201410406:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201501101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201501401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201501402:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201501403:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201501404:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201501405:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201502401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201504201:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201505101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201505401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201505402:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201505403:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201505404:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201509101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201509102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201509201:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201509202:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201509203:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201509204:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201509205:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201509206:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201509207:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201509208:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201509209:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201509210:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201509211:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201509212:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201509213:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201510401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201512101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201512102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201512401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201512402:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201512403:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201512404:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201601401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201602401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201608101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201608102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201608401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201608402:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201608403:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201608404:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201608405:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201609101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201609102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201609401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201609402:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201609403:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201612101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201612102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201612401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201612402:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201703401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201709101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201709102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201709103:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201709401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201709402:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:5.5.0:550-201709403:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:-:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201504401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201505401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201507101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201507102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201507401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201507402:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201507403:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201507404:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201507405:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201507406:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201507407:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201509101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201509102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201509201:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201509202:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201509203:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201509204:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201509205:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201509206:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201509207:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201509208:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201509209:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201509210:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201510401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201511401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201601101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201601102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201601401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201601402:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201601403:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201601404:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201601405:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201602401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201603101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201603102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201603201:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201603202:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201603203:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201603204:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201603205:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201603206:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201603207:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201603208:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201605401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201608101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201608401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201608402:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201608403:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201608404:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201608405:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201610410:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201611401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201611402:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201611403:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201702101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201702102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201702201:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201702202:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201702203:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201702204:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201702205:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201702206:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201702207:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201702208:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201702209:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201702210:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201702211:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201702212:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201703401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201706101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201706102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201706103:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201706401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201706402:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201706403:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.0:600-201710301:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*",
"cpe:2.3:o:arm:cortex-a77_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arm:cortex-a77:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arm:cortex-a78_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arm:cortex-a78:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arm:cortex-a78ae_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arm:cortex-a78ae:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arm:neoverse_n1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arm:neoverse_n1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arm:neoverse_n2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arm:neoverse_n2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arm:cortex-x1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arm:cortex-x1:-:*:*:*:*:*:*:*"
] |
|
GHSA-r9jc-5j5w-5h63
|
NUUO Network Video Recorder NVRsolo 3.9.1 is affected by a Cross Site Scripting (XSS) vulnerability. An attacker can steal the user's session by injecting malicious JavaScript codes which leads to session hijacking.
|
[] |
|
CVE-2019-9223
|
An issue was discovered in GitLab Community and Enterprise Edition before 11.6.10, 11.7.x before 11.7.6, and 11.8.x before 11.8.1. It allows Information Exposure.
|
[
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] |
|
GHSA-hj44-m8j3-28qx
|
A vulnerability classified as critical has been found in juzaweb CMS up to 3.4.2. This affects an unknown part of the file /admin-cp/log-viewer of the component Error Logs Page. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] |
|
GHSA-7588-9g3v-qw47
|
A logic issue was addressed with improved state management. This issue affected versions prior to iOS 12.1.
|
[] |
|
CVE-2021-4168
|
Cross-Site Request Forgery (CSRF) in star7th/showdoc
|
showdoc is vulnerable to Cross-Site Request Forgery (CSRF)
|
[
"cpe:2.3:a:showdoc:showdoc:*:*:*:*:*:*:*:*"
] |
GHSA-2f39-fqh2-875p
|
An issue was discovered in Pluck 4.7.10-dev2. There is a CSRF vulnerability that can editpage via a /admin.php?action=editpage
|
[] |
|
GHSA-m3mr-7w8m-ffxc
|
Incomplete blacklist vulnerability in includes/upload/UploadBase.php in MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2 allows remote attackers to inject arbitrary web script or HTML via an application/xml MIME type for a nested SVG with a data: URI.
|
[] |
|
GHSA-9m92-p89q-cwj7
|
Cross-site scripting (XSS) vulnerability in the inline MIME viewer in Horde-IMP (Internet Messaging Program) 3.2.4 and earlier, when used with Internet Explorer, allows remote attackers to inject arbitrary web script or HTML via an e-mail message.
|
[] |
|
CVE-2024-4872
|
A vulnerability exists in the query validation of the MicroSCADA Pro/X SYS600 product. If exploited this could allow an authenticated attacker to inject code towards persistent data. Note that to successfully exploit this vulnerability
an attacker must have a valid credential.
|
[
"cpe:2.3:a:hitachienergy:microscada_sys600:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachienergy:microscada_pro_sys600:9.4:fixpack_2_hf1:*:*:*:*:*:*",
"cpe:2.3:a:hitachienergy:microscada_pro_sys600:9.4:fixpack_2_hf2:*:*:*:*:*:*",
"cpe:2.3:a:hitachienergy:microscada_pro_sys600:9.4:fixpack_2_hf3:*:*:*:*:*:*",
"cpe:2.3:a:hitachienergy:microscada_pro_sys600:9.4:fixpack_2_hf4:*:*:*:*:*:*",
"cpe:2.3:a:hitachienergy:microscada_pro_sys600:9.4:fixpack_2_hf5:*:*:*:*:*:*",
"cpe:2.3:a:hitachienergy:microscada_x_sys600:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-43500
|
Cross-site scripting vulnerability in WordPress versions prior to 6.0.3 allows a remote unauthenticated attacker to inject an arbitrary script. The developer also provides new patched releases for all versions since 3.7.
|
[
"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*"
] |
|
GHSA-6f3v-3c9w-7rq7
|
In kdeconnect-kde (aka KDE Connect) before 20.08.2, an attacker on the local network could send crafted packets that trigger use of large amounts of CPU, memory, or network connection slots, aka a Denial of Service attack.
|
[] |
|
CVE-2020-10912
|
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.7.0.29478. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the SetFieldValue command of the communication API. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9945.
|
[
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
GHSA-3c32-4hq9-6wgj
|
SpiceDB calls to LookupResources using LookupResources2 with caveats may return context is missing when it is not
|
ImpactClients that have enabled `LookupResources2` and have caveats in the evaluation path for their requests can return a permissionship of `CONDITIONAL` with context marked as missing, even then the context was supplied.LookupResources2 is the new default in SpiceDB 1.37.0 and has been opt-in since SpiceDB 1.35.0PatchesThe bug will be released as part of SpiceDB 1.37.1WorkaroundsDisable LookupResources2 via the `--enable-experimental-lookup-resources` flag by setting it to `false`
|
[] |
GHSA-cqhg-vp8q-p8vh
|
Windows Kernel Elevation of Privilege Vulnerability
|
[] |
|
CVE-2024-7914
|
SourceCodester Yoga Class Registration System SystemSettings.php cross site scripting
|
A vulnerability classified as problematic has been found in SourceCodester Yoga Class Registration System 1.0. Affected is an unknown function of the file /php-ycrs/classes/SystemSettings.php. The manipulation of the argument address leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
|
[
"cpe:2.3:a:sourcecodester:yoga_class_registration_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oretnom23:yoga_class_registration_system:1.0:*:*:*:*:*:*:*"
] |
GHSA-vvc6-rvwr-3cr6
|
axmldec 1.2.0 has an out-of-bounds write in the jitana::axml_parser::parse_start_namespace function in lib/jitana/util/axml_parser.cpp.
|
[] |
|
CVE-2021-1924
|
Information disclosure through timing and power side-channels during mod exponentiation for RSA-CRT in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
|
[
"cpe:2.3:o:qualcomm:apq8009_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8009:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8009w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8009w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8016_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8017_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8017:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8037_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8037:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8052_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8052:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8056_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8056:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8062_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8062:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8064au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8064au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8076_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8076:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8084_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8084:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8096au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8096au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ar3012_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ar3012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ar7420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ar7420:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ar8031:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ar9380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ar9380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ar9580_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ar9580:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:csr6030_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:csr6030:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:csr8811_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:csr8811:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:csra6620:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:csra6640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:csrb31024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:csrb31024:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fsm10055_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fsm10055:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fsm10056_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fsm10056:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fsm9900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fsm9900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fsm9905_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fsm9905:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fsm9910_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fsm9910:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fsm9915_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fsm9915:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fsm9916_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fsm9916:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fsm9950_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fsm9950:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fsm9955_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fsm9955:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq4018_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq4018:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq4019_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq4019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq4028_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq4028:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq4029_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq4029:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq5010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq5010:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq5018_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq5018:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq5028_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq5028:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq6000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq6000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq6005_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq6005:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq6010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq6010:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq6018_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq6018:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq6028_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq6028:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8062_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8062:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8064_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8064:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8065_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8065:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8066_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8066:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8068_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8068:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8069_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8069:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8070_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8070:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8070a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8070a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8071_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8071:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8071a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8071a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8072_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8072:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8072a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8072a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8074_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8074:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8074a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8074a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8076_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8076:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8076a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8076a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8078_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8078:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8078a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8078a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8173_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8173:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ipq8174_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ipq8174:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm8207_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm8207:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm8635m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm8635m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9207_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9207:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9225_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9225:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9225m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9225m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9230_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9230:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9235m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9235m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9330_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9330:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9625m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9625m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9626_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9626:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9628_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9628:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9635m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9635m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9645_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9645:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9655_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9655:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8108_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8108:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8208_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8208:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8209_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8209:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8608_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8608:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8916_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8916:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8917_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8917:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8920_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8920:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8937_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8937:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8940_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8940:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8952_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8952:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8956_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8956:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8962_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8962:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8976_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8976:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8976sg_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8976sg:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pm8937_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pm8937:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pmd9635_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmd9635:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:pmp8074_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:pmp8074:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca10901_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca10901:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca1990_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca1990:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca4004_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca4004:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca4020_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca4020:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca4024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca4024:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6164_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6164:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6174_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6174:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6175a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6175a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6234_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6234:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6310:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6320_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6335_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6335:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6421_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6428_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6428:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6431_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6438_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6438:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6564_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6564:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6584_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6584:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6694_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6694:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6694au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6694au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca7500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca7500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca7520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca7520:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca7550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca7550:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8072_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8072:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8075_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8075:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9367_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9367:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9379_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9379:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9531_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9531:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9558_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9558:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9561_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9561:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9880_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9880:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9882_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9882:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9886_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9886:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9887_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9887:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9888_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9888:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9889_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9889:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9890_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9890:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9898_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9898:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9980_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9980:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9982_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9982:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9984_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9984:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9985_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9985:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9987_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9987:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9990_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9990:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9992_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9992:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9994_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9994:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm2290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm2290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm4290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm6125:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn3018_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn3018:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5021_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5021:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5022_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5022:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5024:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5052_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5052:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5054_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5054:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5064_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5064:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5121_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5121:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5122_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5122:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5124_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5124:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5152_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5152:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5154_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5154:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5164_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5164:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn5550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn5550:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6023_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6023:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6122_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6122:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9022_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9022:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9070_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9070:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9072_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9072:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9074:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs2290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs2290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs405_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs4290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs603_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs603:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs6125:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcx315_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcx315:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfe1100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfe1100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfe1922_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfe1922:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfe1952_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfe1952:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qrb5165_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qrb5165:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qrb5165n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qsm8250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qsm8250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qsm8350_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qsm8350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qsw8573_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qsw8573:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qualcomm215_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qualcomm215:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa415m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa415m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa515m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa515m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6155:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc8180x\\+sdx55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc8180x\\+sdx55:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc8280xp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc8280xp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_455_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_455:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_636_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_636:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_675:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_8c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_8c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_8cx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_8cx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd429_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd429:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd439_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd439:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd460_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd460:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd480_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd632_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd632:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd662_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd662:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd665_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd665:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd675_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd675:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd678_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd678:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd690_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd690_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd712_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd712:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd720g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd720g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd730_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd730:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd750g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd750g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd765_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd765:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd765g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd765g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd768g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd768g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd778g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd778g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd780g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd780g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd7c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd7c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd821_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd821:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd870_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd870:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd888_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd888_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda429w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda429w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm830:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdw2500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdw2500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx12_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx12:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx20m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx20m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx50m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx50m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx57m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx57m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdxr1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdxr1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdxr2_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdxr2_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm4125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm4125:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6225_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6225:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6250p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6250p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6375:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7325_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7325:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9306_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9306:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9330_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9330:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9360_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9360:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9371_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9371:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3610:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3660a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3660a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3680_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3680:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3910:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3991_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3991:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3999_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3999:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6851_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6851:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6856_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6856:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn7850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn7850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn7851_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn7851:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:whs9410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:whs9410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wtr3925l_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wtr3925l:-:*:*:*:*:*:*:*"
] |
|
CVE-2007-5612
|
CIM Server in IBM Director 5.20.1 and earlier allows remote attackers to cause a denial of service (CPU consumption, connection slot exhaustion, and daemon crash) via a large number of idle connections.
|
[
"cpe:2.3:a:ibm:director:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:director:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:director:5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:director:5.10.3:*:*:*:*:*:*:*"
] |
|
GHSA-gp55-63jp-32x8
|
Adobe Flash Player before 13.0.0.259 and 14.x through 16.x before 16.0.0.235 on Windows and OS X and before 11.2.202.425 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-9164.
|
[] |
|
CVE-2020-15916
|
goform/AdvSetLanip endpoint on Tenda AC15 AC1900 15.03.05.19 devices allows remote attackers to execute arbitrary system commands via shell metacharacters in the lanIp POST parameter.
|
[
"cpe:2.3:o:tenda:ac15_firmware:15.03.05.19:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:ac15:-:*:*:*:*:*:*:*"
] |
|
GHSA-rx2h-jrq8-8mj2
|
Premium Anti-Spam in Ipswitch IMail Secure Server 2006 and Collaboration Suite 2006 Premium, when using a certain .dat file in the StarEngine /data directory from 20060630 or earlier, does not properly receive and implement bullet signature updates, which allows context-dependent attackers to use the server for spam transmission.
|
[] |
|
GHSA-fcwq-9mfq-3788
|
A Cross Site Scripting (XSS) vulnerability in the web SQL monitor login page in Redgate SQL Monitor 12.1.31.893 allows remote attackers to inject arbitrary web Script or HTML via the returnUrl parameter.
|
[] |
|
GHSA-cmv3-c9g2-j3g5
|
Netgear R8500 v1.0.2.160 was discovered to contain a stack overflow via the ipv6_static_ip parameter in the ipv6_tunnel function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
|
[] |
|
CVE-2014-3756
|
The client in Mumble 1.2.x before 1.2.6 allows remote attackers to force the loading of an external file and cause a denial of service (hang and resource consumption) via a crafted string that is treated as rich-text by a Qt widget, as demonstrated by the (1) user or (2) channel name in a Qt dialog, (3) subject common name or (4) email address to the Certificate Wizard, or (5) server name in a tooltip.
|
[
"cpe:2.3:a:mumble:mumble:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mumble:mumble:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mumble:mumble:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mumble:mumble:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mumble:mumble:1.2.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mumble:mumble:1.2.3:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mumble:mumble:1.2.3:rc3:*:*:*:*:*:*",
"cpe:2.3:a:mumble:mumble:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mumble:mumble:1.2.4:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mumble:mumble:1.2.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mumble:mumble:1.2.5:*:*:*:*:*:*:*"
] |
|
CVE-2021-29397
|
Cleartext Transmission of Sensitive Information in /northstar/Admin/login.jsp in Northstar Technologies Inc NorthStar Club Management 6.3 allows remote local user to intercept users credentials transmitted in cleartext over HTTP.
|
[
"cpe:2.3:a:globalnorthstar:northstar_club_management:6.3:*:*:*:*:*:*:*"
] |
|
GHSA-rqvx-2c23-x225
|
A NULL pointer dereference in the component /libsrc/dcrleccd.cc of DCMTK v3.6.9+ DEV allows attackers to cause a Denial of Service (DoS) via a crafted DICOM file.
|
[] |
|
GHSA-8v6f-ww2f-hcqw
|
In the Linux kernel, the following vulnerability has been resolved:nexthop: Fix memory leaks in nexthop notification chain listenerssyzkaller discovered memory leaks [1] that can be reduced to the
following commands:ip nexthop add id 1 blackholedevlink dev reload pci/0000:06:00.0As part of the reload flow, mlxsw will unregister its netdevs and then
unregister from the nexthop notification chain. Before unregistering
from the notification chain, mlxsw will receive delete notifications for
nexthop objects using netdevs registered by mlxsw or their uppers. mlxsw
will not receive notifications for nexthops using netdevs that are not
dismantled as part of the reload flow. For example, the blackhole
nexthop above that internally uses the loopback netdev as its nexthop
device.One way to fix this problem is to have listeners flush their nexthop
tables after unregistering from the notification chain. This is
error-prone as evident by this patch and also not symmetric with the
registration path where a listener receives a dump of all the existing
nexthops.Therefore, fix this problem by replaying delete notifications for the
listener being unregistered. This is symmetric to the registration path
and also consistent with the netdev notification chain.The above means that unregister_nexthop_notifier(), like
register_nexthop_notifier(), will have to take RTNL in order to iterate
over the existing nexthops and that any callers of the function cannot
hold RTNL. This is true for mlxsw and netdevsim, but not for the VXLAN
driver. To avoid a deadlock, change the latter to unregister its nexthop
listener without holding RTNL, making it symmetric to the registration
path.[1]
unreferenced object 0xffff88806173d600 (size 512):
comm "syz-executor.0", pid 1290, jiffies 4295583142 (age 143.507s)
hex dump (first 32 bytes):
41 9d 1e 60 80 88 ff ff 08 d6 73 61 80 88 ff ff A..`......sa....
08 d6 73 61 80 88 ff ff 01 00 00 00 00 00 00 00 ..sa............
backtrace:
[<ffffffff81a6b576>] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline]
[<ffffffff81a6b576>] slab_post_alloc_hook+0x96/0x490 mm/slab.h:522
[<ffffffff81a716d3>] slab_alloc_node mm/slub.c:3206 [inline]
[<ffffffff81a716d3>] slab_alloc mm/slub.c:3214 [inline]
[<ffffffff81a716d3>] kmem_cache_alloc_trace+0x163/0x370 mm/slub.c:3231
[<ffffffff82e8681a>] kmalloc include/linux/slab.h:591 [inline]
[<ffffffff82e8681a>] kzalloc include/linux/slab.h:721 [inline]
[<ffffffff82e8681a>] mlxsw_sp_nexthop_obj_group_create drivers/net/ethernet/mellanox/mlxsw/spectrum_router.c:4918 [inline]
[<ffffffff82e8681a>] mlxsw_sp_nexthop_obj_new drivers/net/ethernet/mellanox/mlxsw/spectrum_router.c:5054 [inline]
[<ffffffff82e8681a>] mlxsw_sp_nexthop_obj_event+0x59a/0x2910 drivers/net/ethernet/mellanox/mlxsw/spectrum_router.c:5239
[<ffffffff813ef67d>] notifier_call_chain+0xbd/0x210 kernel/notifier.c:83
[<ffffffff813f0662>] blocking_notifier_call_chain kernel/notifier.c:318 [inline]
[<ffffffff813f0662>] blocking_notifier_call_chain+0x72/0xa0 kernel/notifier.c:306
[<ffffffff8384b9c6>] call_nexthop_notifiers+0x156/0x310 net/ipv4/nexthop.c:244
[<ffffffff83852bd8>] insert_nexthop net/ipv4/nexthop.c:2336 [inline]
[<ffffffff83852bd8>] nexthop_add net/ipv4/nexthop.c:2644 [inline]
[<ffffffff83852bd8>] rtm_new_nexthop+0x14e8/0x4d10 net/ipv4/nexthop.c:2913
[<ffffffff833e9a78>] rtnetlink_rcv_msg+0x448/0xbf0 net/core/rtnetlink.c:5572
[<ffffffff83608703>] netlink_rcv_skb+0x173/0x480 net/netlink/af_netlink.c:2504
[<ffffffff833de032>] rtnetlink_rcv+0x22/0x30 net/core/rtnetlink.c:5590
[<ffffffff836069de>] netlink_unicast_kernel net/netlink/af_netlink.c:1314 [inline]
[<ffffffff836069de>] netlink_unicast+0x5ae/0x7f0 net/netlink/af_netlink.c:1340
[<ffffffff83607501>] netlink_sendmsg+0x8e1/0xe30 net/netlink/af_netlink.c:1929
[<ffffffff832fde84>] sock_sendmsg_nosec net/socket.c:704 [inline
---truncated---
|
[] |
|
CVE-2008-4192
|
The pserver_shutdown function in fence_egenera in cman 2.20080629 and 2.20080801 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/eglog temporary file.
|
[
"cpe:2.3:a:redhat:cman:2.20080629:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:cman:2.20080801:*:*:*:*:*:*:*"
] |
|
CVE-2020-9416
|
TIBCO Spotfire Stored Cross Site Scripting Vulnerability
|
The Spotfire client component of TIBCO Software Inc.'s TIBCO Spotfire Analyst, TIBCO Spotfire Analytics Platform for AWS Marketplace, TIBCO Spotfire Desktop, and TIBCO Spotfire Server contains a vulnerability that theoretically allows a legitimate user to inject scripts. If executed by a victim authenticated to the affected system these scripts will be executed at the privileges of the victim. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Analyst: versions 10.7.0, 10.8.0, 10.9.0, and 10.10.0, TIBCO Spotfire Analytics Platform for AWS Marketplace: versions 10.7.0, 10.8.0, 10.8.1, 10.9.0, 10.10.0, and 10.10.1, TIBCO Spotfire Desktop: versions 10.7.0, 10.8.0, 10.9.0, and 10.10.0, and TIBCO Spotfire Server: versions 10.7.0, 10.8.0, 10.8.1, 10.9.0, 10.10.0, and 10.10.1.
|
[
"cpe:2.3:a:tibco:spotfire_analyst:10.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:spotfire_analyst:10.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:spotfire_analyst:10.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:spotfire_analyst:10.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:spotfire_analytics_platform:10.7.0:*:*:*:*:aws_marketplace:*:*",
"cpe:2.3:a:tibco:spotfire_analytics_platform:10.8.0:*:*:*:*:aws_marketplace:*:*",
"cpe:2.3:a:tibco:spotfire_analytics_platform:10.8.1:*:*:*:*:aws_marketplace:*:*",
"cpe:2.3:a:tibco:spotfire_analytics_platform:10.9.0:*:*:*:*:aws_marketplace:*:*",
"cpe:2.3:a:tibco:spotfire_analytics_platform:10.10.0:*:*:*:*:aws_marketplace:*:*",
"cpe:2.3:a:tibco:spotfire_analytics_platform:10.10.1:*:*:*:*:aws_marketplace:*:*",
"cpe:2.3:a:tibco:spotfire_desktop:10.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:spotfire_desktop:10.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:spotfire_desktop:10.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:spotfire_desktop:10.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:spotfire_server:10.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:spotfire_server:10.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:spotfire_server:10.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:spotfire_server:10.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:spotfire_server:10.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:spotfire_server:10.10.1:*:*:*:*:*:*:*"
] |
GHSA-62p4-hcq9-29cq
|
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka "Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-0945, CVE-2018-0946, CVE-2018-0951, CVE-2018-0953, CVE-2018-0954, CVE-2018-0955, CVE-2018-1022, CVE-2018-8114, CVE-2018-8122, CVE-2018-8137, CVE-2018-8139.
|
[] |
|
GHSA-hc22-q8g2-56vr
|
An exploitable denial-of-service vulnerability exists in the Host Access Point Daemon (hostapd) on the NETGEAR N300 (WNR2000v5 with Firmware Version V1.0.0.70) wireless router. A SOAP request sent in an invalid sequence to the <WFAWLANConfig:1#PutMessage> service can cause a null pointer dereference, resulting in the hostapd service crashing. An unauthenticated attacker can send a specially-crafted SOAP request to trigger this vulnerability.
|
[] |
|
CVE-2021-32030
|
The administrator application on ASUS GT-AC2900 devices before 3.0.0.4.386.42643 and Lyra Mini before 3.0.0.4_384_46630 allows authentication bypass when processing remote input from an unauthenticated user, leading to unauthorized access to the administrator interface. This relates to handle_request in router/httpd/httpd.c and auth_check in web_hook.o. An attacker-supplied value of '\0' matches the device's default value of '\0' in some situations. Note: All versions of Lyra Mini and earlier which are unsupported (End-of-Life, EOL) are also affected by this vulnerability, Consumers can mitigate this vulnerability by disabling the remote access features from WAN.
|
[
"cpe:2.3:o:asus:gt-ac2900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:gt-ac2900:-:*:*:*:*:*:*:*"
] |
|
CVE-2012-0187
|
Untrusted search path vulnerability in IBM Lotus Expeditor 6.1.x and 6.2.x before 6.2 FP5+Security Pack allows local users to gain privileges via a Trojan horse DLL in the current working directory.
|
[
"cpe:2.3:a:ibm:lotus_expeditor:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_expeditor:6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_expeditor:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_expeditor:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_expeditor:6.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_expeditor:6.2.3:*:*:*:*:*:*:*"
] |
|
CVE-2021-38099
|
CDRRip.dll in Corel PhotoPaint Standard 2020 22.0.0.474 is affected by an Out-of-bounds Write vulnerability when parsing a crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious CPT file. This is different from CVE-2021-38101.
|
[
"cpe:2.3:a:corel:photopaint_2020:22.0.0.474:*:*:*:standard:*:*:*"
] |
|
GHSA-g5fc-q72r-xgfm
|
The ICMPv6 parser in tcpdump before 4.9.2 has a buffer over-read in print-icmp6.c:icmp6_print().
|
[] |
|
GHSA-h7cg-8375-67fx
|
Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to unauthenticated arbitrary file delete vulnerability induced due to improper input validation in meta_driver_srv.js class with saveDriverData action using invalidated driverID. An attacker can send specially crafted packets to delete the files on the system where IPM software is installed.
|
[] |
|
CVE-2016-3503
|
Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92 allows local users to affect confidentiality, integrity, and availability via vectors related to Install.
|
[
"cpe:2.3:a:oracle:jdk:1.6.0:update115:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update115:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"
] |
|
CVE-2019-14193
|
An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with an unvalidated length at nfs_readlink_reply, in the "if" block after calculating the new path length.
|
[
"cpe:2.3:a:denx:u-boot:*:*:*:*:*:*:*:*"
] |
|
GHSA-q88j-2hcx-grw4
|
osTicket before 1.14.3 allows XSS because include/staff/banrule.inc.php has an unvalidated echo $info['notes'] call.
|
[] |
|
GHSA-xxjr-c99v-4h9c
|
A vulnerability classified as critical has been found in Campcodes Beauty Salon Management System 1.0. This affects an unknown part of the file /admin/edit_category.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-235233 was assigned to this vulnerability.
|
[] |
|
GHSA-322m-vpmh-c9m9
|
Mail Management Agent (MAILMA) (aka Mail Management Server) in Rockliffe MailSite 7.0.3.1 and earlier allows remote attackers to attempt authentication with an unlimited number of user account names and passwords without denying connections, limiting the rate of connections, or locking out an account.
|
[] |
|
GHSA-cfrr-p6rw-prf5
|
In the Linux kernel, the following vulnerability has been resolved:dmaengine: idxd: Prevent use after free on completion memoryOn driver unload any pending descriptors are flushed at the
time the interrupt is freed:
idxd_dmaengine_drv_remove() ->
drv_disable_wq() ->
idxd_wq_free_irq() ->
idxd_flush_pending_descs().If there are any descriptors present that need to be flushed this
flow triggers a "not present" page fault as below:BUG: unable to handle page fault for address: ff391c97c70c9040
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present pageThe address that triggers the fault is the address of the
descriptor that was freed moments earlier via:
drv_disable_wq()->idxd_wq_free_resources()Fix the use after free by freeing the descriptors after any possible
usage. This is done after idxd_wq_reset() to ensure that the memory
remains accessible during possible completion writes by the device.
|
[] |
|
CVE-2018-11759
|
The Apache Web Server (httpd) specific code that normalised the requested path before matching it to the URI-worker map in Apache Tomcat JK (mod_jk) Connector 1.2.0 to 1.2.44 did not handle some edge cases correctly. If only a sub-set of the URLs supported by Tomcat were exposed via httpd, then it was possible for a specially constructed request to expose application functionality through the reverse proxy that was not intended for clients accessing the application via the reverse proxy. It was also possible in some configurations for a specially constructed request to bypass the access controls configured in httpd. While there is some overlap between this issue and CVE-2018-1323, they are not identical.
|
[
"cpe:2.3:a:apache:tomcat_jk_connector:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*"
] |
|
GHSA-ghmj-xphc-2mq4
|
The ProBot bot through 2021-02-08 for Discord might allow attackers to interfere with the intended purpose of the "Send an image when a user joins the server" feature (or possibly have unspecified other impact) because the uploader web service allows double extensions (such as .html.jpg) with the text/html content type. NOTE: there may not be cases in which an uploader web service is customer controlled; however, the nature of the issue has substantial interaction with customer controlled configuration.
|
[] |
|
GHSA-32xp-j985-fwr3
|
IBM Sterling Control Center 6.2.1, 6.3.1, and 6.4.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
|
[] |
|
CVE-2021-20320
|
A flaw was found in s390 eBPF JIT in bpf_jit_insn in arch/s390/net/bpf_jit_comp.c in the Linux kernel. In this flaw, a local attacker with special user privilege can circumvent the verifier and may lead to a confidentiality problem.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.15:-:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"
] |
|
GHSA-65c4-xx3j-xwcj
|
Cross-Site Request Forgery (CSRF) vulnerability in KrishaWeb Add Multiple Marker plugin <= 1.2 versions.
|
[] |
|
CVE-2019-17296
|
SugarCRM before 8.0.4 and 9.x before 9.0.2 allows SQL injection in the Contacts module by a Regular user.
|
[
"cpe:2.3:a:sugarcrm:sugarcrm:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:sugarcrm:sugarcrm:*:*:*:*:professional:*:*:*",
"cpe:2.3:a:sugarcrm:sugarcrm:*:*:*:*:ultimate:*:*:*"
] |
|
GHSA-xpr8-vpc7-7vfc
|
Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
|
[] |
|
CVE-2019-14818
|
A flaw was found in all dpdk version 17.x.x before 17.11.8, 16.x.x before 16.11.10, 18.x.x before 18.11.4 and 19.x.x before 19.08.1 where a malicious master, or a container with access to vhost_user socket, can send specially crafted VRING_SET_NUM messages, resulting in a memory leak including file descriptors. This flaw could lead to a denial of service condition.
|
[
"cpe:2.3:a:dpdk:data_plane_development_kit:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:enterprise_linux_fast_datapath:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:enterprise_linux_fast_datapath:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:virtualization_eus:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
] |
|
GHSA-46fr-522j-965p
|
Directory traversal vulnerability in aides/index.php in DomPHP 0.82 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the page parameter.
|
[] |
|
GHSA-6h7g-c2fp-7732
|
Cross-site scripting (XSS) vulnerability in the Easy Career Openings plugin 0.4 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via unspecified parameters.
|
[] |
|
GHSA-84q3-wqp7-r229
|
TOTOLINK N600R V4.3.0cu.7570_B20200620 was discovered to contain a command injection vulnerability via the pingCheck function.
|
[] |
|
CVE-2010-5220
|
Untrusted search path vulnerability in MEO Encryption Software 2.02 allows local users to gain privileges via a Trojan horse dwmapi.dll file in the current working directory, as demonstrated by a directory that contains a .meo or .cry file. NOTE: some of these details are obtained from third party information.
|
[
"cpe:2.3:a:nchsoftware:meo_encryption_software:2.02:*:*:*:*:*:*:*"
] |
|
GHSA-592x-6m4j-68cc
|
funboot v1.1 is vulnerable to Cross Site Scripting (XSS) via the title field in "create a message ."
|
[] |
|
GHSA-x2v8-652m-p279
|
An issue was discovered in Kabona AB WebDatorCentral (WDC) application prior to Version 3.4.0. WDC does not limit authentication attempts that may allow a brute force attack method.
|
[] |
|
GHSA-mqwc-qppr-fm7q
|
Unspecified vulnerability in Adobe Flash Media Server 2 before 2.0.5, and Connect Enterprise Server 6 before SP3, allows remote attackers to "take control of the affected system" via unspecified vectors, a different issue than CVE-2007-6148 and CVE-2007-6149.
|
[] |
|
CVE-2023-40590
|
Untrusted search path on Windows systems leading to arbitrary code execution
|
GitPython is a python library used to interact with Git repositories. When resolving a program, Python/Windows look for the current working directory, and after that the PATH environment. GitPython defaults to use the `git` command, if a user runs GitPython from a repo has a `git.exe` or `git` executable, that program will be run instead of the one in the user's `PATH`. This is more of a problem on how Python interacts with Windows systems, Linux and any other OS aren't affected by this. But probably people using GitPython usually run it from the CWD of a repo. An attacker can trick a user to download a repository with a malicious `git` executable, if the user runs/imports GitPython from that directory, it allows the attacker to run any arbitrary commands. There is no fix currently available for windows users, however there are a few mitigations. 1: Default to an absolute path for the git program on Windows, like `C:\\Program Files\\Git\\cmd\\git.EXE` (default git path installation). 2: Require users to set the `GIT_PYTHON_GIT_EXECUTABLE` environment variable on Windows systems. 3: Make this problem prominent in the documentation and advise users to never run GitPython from an untrusted repo, or set the `GIT_PYTHON_GIT_EXECUTABLE` env var to an absolute path. 4: Resolve the executable manually by only looking into the `PATH` environment variable.
|
[
"cpe:2.3:a:gitpython_project:gitpython:*:*:*:*:*:python:*:*"
] |
CVE-2018-11150
|
Quest DR Series Disk Backup software version before 4.0.3.1 allows command injection (issue 8 of 46).
|
[
"cpe:2.3:a:quest:disk_backup:*:*:*:*:*:*:*:*"
] |
|
GHSA-5w8x-782h-cm76
|
Acrobat Reader DC versions 2021.005.20054 (and earlier), 2020.004.30005 (and earlier) and 2017.011.30197 (and earlier) are affected by a Path traversal vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] |
|
GHSA-rmg8-qpvh-whhg
|
The specific function of HR Portal of Soar Cloud System accepts any type of object to be deserialized. Attackers can send malicious serialized objects to execute arbitrary commands.
|
[] |
|
GHSA-685v-cwv9-jxp3
|
Even if the authentication fails for local service authentication, the requested command could still execute regardless of authentication status.
|
[] |
|
CVE-2024-41038
|
firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers
|
In the Linux kernel, the following vulnerability has been resolved:
firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers
Check that all fields of a V2 algorithm header fit into the available
firmware data buffer.
The wmfw V2 format introduced variable-length strings in the algorithm
block header. This means the overall header length is variable, and the
position of most fields varies depending on the length of the string
fields. Each field must be checked to ensure that it does not overflow
the firmware data buffer.
As this ia bugfix patch, the fixes avoid making any significant change to
the existing code. This makes it easier to review and less likely to
introduce new bugs.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
CVE-2017-17859
|
Samsung Internet Browser 6.2.01.12 allows remote attackers to bypass the Same Origin Policy, and conduct UXSS attacks to obtain sensitive information, via vectors involving an IFRAME element inside XSLT data in one part of an MHTML file. Specifically, JavaScript code in another part of this MHTML file does not have a document.domain value corresponding to the domain that is hosting the MHTML file, but instead has a document.domain value corresponding to an arbitrary URL within the content of the MHTML file.
|
[
"cpe:2.3:a:samsung:internet_browser:6.2.01.12:*:*:*:*:*:*:*"
] |
|
CVE-2015-8900
|
The ReadHDRImage function in coders/hdr.c in ImageMagick 6.x and 7.x allows remote attackers to cause a denial of service (infinite loop) via a crafted HDR file.
|
[
"cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.