cve,vendor_name,epss,severity_score,exploit_poc_availability,vuln_prod_hw,vuln_prod_app,vuln_prod_os,vulnerability_type,cve_published_date,patch_availability,patch_release_date,advice_availability,advice_release_date,patch_timeliness,description,cvss_vector,attack_vector,attack_complexity,privileges_required,user_interaction,scope,confidentiality_impact,integrity_impact,availability_impact,base_severity,exploitability_score,impact_score,weaknesses,cpe,total_exploits,verified_exploits
CVE-2016-0002,Microsoft,0.79612,7.5,0.0,0.0,1.0,0.0,1,2016-01-13,1.0,2016-02-19,,,0.0,"The Microsoft (1) VBScript 5.7 and 5.8 and (2) JScript 5.7 and 5.8 engines, as used in Internet Explorer 8 through 11 and other products, allow remote attackers to execute arbitrary code via a crafted web site, aka ""Scripting Engine Memory Corruption Vulnerability.""",CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,HIGH,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.6,5.9,['CWE-119'],,0,0
CVE-2016-0003,Microsoft,0.95183,9.6,0.0,0.0,1.0,0.0,1,2016-01-13,1.0,2015-12-08,,,1.0,"Microsoft Edge allows remote attackers to execute arbitrary code via unspecified vectors, aka ""Microsoft Edge Memory Corruption Vulnerability.""",CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,CHANGED,HIGH,HIGH,HIGH,CRITICAL,2.8,6.0,['CWE-119'],['cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*'],0,0
CVE-2016-4447,Microsoft,0.0016,7.5,0.0,0.0,0.0,1.0,1,2016-06-09,0.0,,0.0,,,"The xmlParseElementDecl function in parser.c in libxml2 before 2.9.4 allows context-dependent attackers to cause a denial of service (heap-based buffer underread and application crash) via a crafted file, involving xmlParseName.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-119'],"['cpe:2.3:a:hp:icewall_federation_agent:3.0:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*', 'cpe:2.3:o:oracle:vm_server:3.3:*:*:*:*:*:*:*', 'cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:*:*', 'cpe:2.3:a:apple:itunes:12.4.1:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*', 'cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*']",0,0
CVE-2016-4448,Microsoft,0.01018,9.8,0.0,0.0,0.0,1.0,1,2016-06-09,0.0,,0.0,,,Format string vulnerability in libxml2 before 2.9.4 allows attackers to have unspecified impact via format string specifiers in unknown vectors.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-134'],"['cpe:2.3:a:hp:icewall_federation_agent:3.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*', 'cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*', 'cpe:2.3:o:slackware:slackware_linux:14.0:*:*:*:*:*:*:*', 'cpe:2.3:o:slackware:slackware_linux:14.1:*:*:*:*:*:*:*', 'cpe:2.3:o:oracle:vm_server:3.3:*:*:*:*:*:*:*', 'cpe:2.3:o:oracle:vm_server:3.4:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:a:tenable:log_correlation_engine:4.8.0:*:*:*:*:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*', 'cpe:2.3:o:oracle:linux:7:0:*:*:*:*:*:*']",0,0
CVE-2016-6914,Microsoft,0.00062,7.8,1.0,0.0,0.0,1.0,1,2017-12-27,0.0,,0.0,,,"Ubiquiti UniFi Video before 3.8.0 for Windows uses weak permissions for the installation directory, which allows local users to gain SYSTEM privileges via a Trojan horse taskkill.exe file.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-276'],"['cpe:2.3:a:ui:unifi_video:*:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*']",1,0
CVE-2016-7225,Microsoft,0.00046,6.1,1.0,0.0,0.0,1.0,1,2016-11-10,1.0,2016-10-31,,,1.0,"Virtual Hard Disk Driver in Windows 10 Gold, 1511, and 1607 and Windows Server 2016 does not properly restrict access to files, which allows local users to gain privileges via a crafted application, aka ""VHD Driver Elevation of Privilege Vulnerability.""",CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N,LOCAL,LOW,LOW,NONE,UNCHANGED,LOW,HIGH,NONE,MEDIUM,1.8,4.2,['CWE-284'],"['cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*']",1,1
CVE-2016-7081,Microsoft,0.00135,7.8,0.0,0.0,0.0,1.0,0,2016-12-29,0.0,,0.0,,,"Multiple heap-based buffer overflows in VMware Workstation Pro 12.x before 12.5.0 and VMware Workstation Player 12.x before 12.5.0 on Windows, when Cortado ThinPrint virtual printing is enabled, allow guest OS users to execute arbitrary code on the host OS via unspecified vectors.",CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H,LOCAL,HIGH,LOW,NONE,CHANGED,HIGH,HIGH,HIGH,HIGH,1.1,6.0,['CWE-119'],"['cpe:2.3:a:vmware:workstation_player:12.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:vmware:workstation_player:12.0.1:*:*:*:*:*:*:*', 'cpe:2.3:a:vmware:workstation_player:12.1.0:*:*:*:*:*:*:*', 'cpe:2.3:a:vmware:workstation_player:12.1.1:*:*:*:*:*:*:*', 'cpe:2.3:a:vmware:workstation_pro:12.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:vmware:workstation_pro:12.0.1:*:*:*:*:*:*:*', 'cpe:2.3:a:vmware:workstation_pro:12.1.0:*:*:*:*:*:*:*', 'cpe:2.3:a:vmware:workstation_pro:12.1.1:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*']",0,0
CVE-2017-0064,Microsoft,0.00232,6.5,0.0,0.0,1.0,0.0,0,2017-05-12,1.0,2017-05-09,,,1.0,"A security feature bypass vulnerability exists in Internet Explorer that allows for bypassing Mixed Content warnings, aka ""Internet Explorer Security Feature Bypass Vulnerability.""",CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,NONE,HIGH,NONE,MEDIUM,2.8,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*']",0,0
CVE-2018-17653,Microsoft,0.01175,8.8,0.0,0.0,0.0,1.0,0,2019-01-24,0.0,,0.0,,,This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the resolveNode method of a TimeField. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6503.,CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-416'],"['cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*', 'cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*']",0,0
CVE-2018-18098,Microsoft,0.00044,7.3,0.0,0.0,0.0,1.0,0,2019-01-10,0.0,,0.0,,,Improper file verification in install routine for Intel(R) SGX SDK and Platform Software for Windows before 2.2.100 may allow an escalation of privilege via local access.,CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.3,5.9,['CWE-732'],"['cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:sgx_platform_software:*:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:sgx_sdk:*:*:*:*:*:*:*:*']",0,0
CVE-2018-21026,Microsoft,0.00273,7.5,0.0,0.0,0.0,1.0,0,2019-11-12,0.0,,0.0,,,A vulnerability in Hitachi Command Suite 7.x and 8.x before 8.6.5-00 allows an unauthenticated remote user to read internal information.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-200'],"['cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*', 'cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:*:*', 'cpe:2.3:a:hitachi:device_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*', 'cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:*:*', 'cpe:2.3:a:hitachi:tiered_storage_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*', 'cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:*:*', 'cpe:2.3:a:hitachi:replication_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*', 'cpe:2.3:a:hitachi:tuning_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*', 'cpe:2.3:a:hitachi:compute_systems_manager:*:*:*:*:*:*:*:*']",0,0
CVE-2018-7250,Microsoft,0.00069,5.5,0.0,0.0,0.0,1.0,0,2018-02-26,0.0,,0.0,,,"An issue was discovered in secdrv.sys as shipped in Microsoft Windows Vista, Windows 7, Windows 8, and Windows 8.1 before KB3086255, and as shipped in Macrovision SafeDisc. An uninitialized kernel pool allocation in IOCTL 0xCA002813 allows a local unprivileged attacker to leak 16 bits of uninitialized kernel PagedPool data.",CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.8,3.6,['CWE-200'],"['cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_8:*:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*', 'cpe:2.3:a:tivo:safedisc:-:*:*:*:*:*:*:*']",0,0
CVE-2018-8239,Microsoft,0.00604,5.5,0.0,0.0,0.0,1.0,0,2018-06-14,1.0,2018-06-12,,,1.0,"An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka ""Windows GDI Information Disclosure Vulnerability."" This affects Windows Server 2016, Windows 10, Windows 10 Servers.",CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.8,3.6,['CWE-200'],"['cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*']",0,0
CVE-2018-8447,Microsoft,0.13667,7.5,0.0,0.0,1.0,1.0,0,2018-09-13,1.0,2018-09-11,,,1.0,"A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory, aka ""Internet Explorer Memory Corruption Vulnerability."" This affects Internet Explorer 9, Internet Explorer 11, Internet Explorer 10. This CVE ID is unique from CVE-2018-8461.",CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,HIGH,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.6,5.9,['CWE-787'],"['cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*']",0,0
CVE-2018-8513,Microsoft,0.08351,7.5,0.0,0.0,1.0,1.0,0,2018-10-10,1.0,2018-10-09,,,1.0,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka ""Chakra Scripting Engine Memory Corruption Vulnerability."" This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8503, CVE-2018-8505, CVE-2018-8510, CVE-2018-8511.",CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,HIGH,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.6,5.9,['CWE-787'],"['cpe:2.3:a:microsoft:chakracore:-:*:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*']",0,0
CVE-2018-8653,Microsoft,0.02264,7.5,0.0,0.0,1.0,1.0,0,2018-12-20,1.0,2018-12-19,,,1.0,"A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka ""Scripting Engine Memory Corruption Vulnerability."" This affects Internet Explorer 9, Internet Explorer 11, Internet Explorer 10. This CVE ID is unique from CVE-2018-8643.",CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,HIGH,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.6,5.9,['CWE-787'],"['cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:pro_n:*:*:*', 'cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*']",0,0
CVE-2019-1351,Microsoft,0.00255,7.5,0.0,0.0,1.0,0.0,0,2020-01-24,1.0,2019-12-10,,,1.0,"A tampering vulnerability exists when Git for Visual Studio improperly handles virtual drive paths, aka 'Git for Visual Studio Tampering Vulnerability'.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,HIGH,NONE,HIGH,3.9,3.6,['CWE-706'],"['cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*']",0,0
CVE-2019-4057,Microsoft,0.00044,6.7,0.0,0.0,0.0,1.0,0,2019-07-01,0.0,,0.0,,,"IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, and 11.1 could allow malicious user with access to the DB2 instance account to leverage a fenced execution process to execute arbitrary code as root. IBM X-Force ID: 156567.",CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.8,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:a:ibm:db2:9.7.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:9.7.0.1:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:9.7.0.2:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:9.7.0.3:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:9.7.0.4:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:9.7.0.5:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:9.7.0.6:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:9.7.0.7:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:9.7.0.8:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:9.7.0.9:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:9.7.0.10:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:9.7.0.11:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:10.1.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:10.1.0.1:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:10.1.0.2:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:10.1.0.3:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:10.1.0.4:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:10.1.0.5:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:10.1.0.6:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:10.5.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:10.5.0.1:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:10.5.0.2:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:10.5.0.3:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:10.5.0.4:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:10.5.0.5:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:10.5.0.6:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:10.5.0.7:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:10.5.0.8:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:10.5.0.9:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:10.5.0.10:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:11.1.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:11.1.1.1:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:11.1.2.2:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:11.1.3.3:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:11.1.4.4:*:*:*:*:*:*:*', 'cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*']",0,0
CVE-2019-4738,Microsoft,0.00057,6.5,0.0,0.0,0.0,1.0,0,2020-12-10,1.0,2020-07-22,,,1.0,IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5 and 6.0.0.0 through 6.0.3.1 discloses sensitive information to an authenticated user from the dashboard UI which could be used in further attacks against the system. IBM X-Force ID: 172753.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,2.8,3.6,['CWE-312'],"['cpe:2.3:o:hp:hp-ux:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*', 'cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:-:*', 'cpe:2.3:a:ibm:sterling_b2b_integrator:*:*:*:*:standard:*:*:*', 'cpe:2.3:a:ibm:sterling_b2b_integrator:*:*:*:*:standard:*:*:*']",0,0
CVE-2019-6748,Microsoft,0.0027,7.8,0.0,0.0,0.0,1.0,0,2019-06-03,0.0,,0.0,,,"This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Studio Photo 3.6.6. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of EZI files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7637.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-787'],"['cpe:2.3:a:foxitsoftware:foxit_studio_photo:*:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*']",0,0
CVE-2019-7069,Microsoft,0.00566,8.8,0.0,0.0,0.0,1.0,0,2019-05-24,0.0,,0.0,,,"Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have a type confusion vulnerability. Successful exploitation could lead to arbitrary code execution .",CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-843'],"['cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*', 'cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*', 'cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*', 'cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*', 'cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*', 'cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*', 'cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*']",0,0
CVE-2019-7814,Microsoft,0.05642,8.8,0.0,0.0,0.0,1.0,0,2019-05-22,0.0,,0.0,,,"Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution.",CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-416'],"['cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*', 'cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*', 'cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*', 'cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*', 'cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*', 'cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*', 'cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*']",0,0
CVE-2019-8002,Microsoft,0.00239,7.5,0.0,0.0,0.0,1.0,0,2019-08-20,0.0,,0.0,,,"Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure .",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-125'],"['cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*', 'cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*', 'cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*', 'cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*', 'cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*', 'cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*', 'cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*']",0,0
CVE-2019-8021,Microsoft,0.00239,7.5,0.0,0.0,0.0,1.0,0,2019-08-20,0.0,,0.0,,,"Adobe Acrobat and Reader versions 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure .",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-125'],"['cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*', 'cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*', 'cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*', 'cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*', 'cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*', 'cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*', 'cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*']",0,0
CVE-2020-0664,Microsoft,0.00869,6.5,0.0,0.0,0.0,1.0,0,2020-09-11,1.0,2020-09-08,,,1.0,"
An information disclosure vulnerability exists when Active Directory integrated DNS (ADIDNS) mishandles objects in memory. An authenticated attacker who successfully exploited this vulnerability would be able to read sensitive information about the target system.
To exploit this condition, an authenticated attacker would need to send a specially crafted request to the AD|DNS service. Note that the information disclosure vulnerability by itself would not be sufficient for an attacker to compromise a system. However, an attacker could combine this vulnerability with additional vulnerabilities to further exploit the system.
The update addresses the vulnerability by correcting how Active Directory integrated DNS (ADIDNS) handles objects in memory.
",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,2.8,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*', 'cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*', 'cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*']",0,0
CVE-2020-1327,Microsoft,0.00123,6.1,0.0,0.0,0.0,1.0,0,2020-06-09,1.0,2020-06-09,,,1.0,"A spoofing vulnerability exists in Microsoft Azure DevOps Server when it fails to properly handle web requests, aka 'Azure DevOps Server HTML Injection Vulnerability'.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:microsoft:azure_devops_server:2019:update1:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:azure_devops_server:2019:update1.1:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:azure_devops_server:2019.0.1:*:*:*:*:*:*:*']",0,0
CVE-2020-1366,Microsoft,0.00043,7.8,0.0,0.0,0.0,1.0,0,2020-07-14,1.0,2020-07-14,,,1.0,"An elevation of privilege vulnerability exists when the Windows Print Workflow Service improperly handles objects in memory, aka 'Windows Print Workflow Service Elevation of Privilege Vulnerability'.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*']",0,0
CVE-2020-1452,Microsoft,0.0067,8.6,0.0,0.0,1.0,0.0,0,2020-09-11,1.0,2020-09-08,,,1.0,"A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the SharePoint application pool and the SharePoint server farm account.
Exploitation of this vulnerability requires that a user uploads a specially crafted SharePoint application package to an affected version of SharePoint.
The security update addresses the vulnerability by correcting how SharePoint checks the source markup of application packages.
",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L,NETWORK,LOW,NONE,NONE,UNCHANGED,LOW,HIGH,LOW,HIGH,3.9,4.7,['CWE-494'],"['cpe:2.3:a:microsoft:sharepoint_enterprise_server:2013:sp1:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:sharepoint_foundation:2010:sp2:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:sharepoint_foundation:2013:sp1:*:*:*:*:*:*', 'cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*']",0,0
CVE-2020-3927,Microsoft,0.00071,7.5,0.0,0.0,0.0,1.0,0,2020-02-03,0.0,,0.0,,,"An arbitrary-file-access vulnerability exists in ServiSign security plugin, as long as the attackers learn the specific API function, they may access arbitrary files on target system via crafted API parameter.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,HIGH,NONE,HIGH,3.9,3.6,['CWE-552'],"['cpe:2.3:a:changingtec:servisign:*:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*']",0,0
CVE-2020-4414,Microsoft,0.00042,4.4,0.0,0.0,0.0,1.0,0,2020-07-01,1.0,2020-12-10,,,0.0,"IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, 11.1, and 11.5 could allow a local attacker to perform unauthorized actions on the system, caused by improper usage of shared memory. By sending a specially-crafted request, an attacker could exploit this vulnerability to obtain sensitive information or cause a denial of service. IBM X-Force ID: 179989.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L,LOCAL,LOW,LOW,NONE,UNCHANGED,LOW,NONE,LOW,MEDIUM,1.8,2.5,['NVD-CWE-noinfo'],"['cpe:2.3:a:ibm:db2:9.7.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:10.1.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:10.5.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:11.1.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:db2:11.5.0.0:*:*:*:*:*:*:*', 'cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*']",0,0
CVE-2020-4842,Microsoft,0.00196,4.9,0.0,0.0,0.0,1.0,0,2020-12-21,1.0,2020-09-16,,,1.0,IBM Security Secret Server 10.6 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 190046.,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.2,3.6,['CWE-209'],"['cpe:2.3:a:ibm:security_secret_server:10.6:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*']",0,0
CVE-2020-4935,Microsoft,0.0005,5.4,0.0,0.0,0.0,1.0,0,2021-07-01,1.0,2021-06-30,,,1.0,IBM Datacap Fastdoc Capture (IBM Datacap Navigator 9.1.7 ) is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 191753.,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,LOW,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.3,2.7,['CWE-79'],"['cpe:2.3:a:ibm:datacap_navigator:9.1.7:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*']",0,0
CVE-2020-6938,Microsoft,0.00149,7.5,0.0,0.0,0.0,1.0,0,2020-07-08,0.0,,0.0,,,"A sensitive information disclosure vulnerability in Tableau Server 10.5, 2018.x, 2019.x, 2020.x released before June 26, 2020, could allow access to sensitive information in log files.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-532'],"['cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*', 'cpe:2.3:a:tableau:tableau_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:tableau:tableau_server:10.5:*:*:*:*:*:*:*']",0,0
CVE-2020-8844,Microsoft,0.54609,7.8,0.0,0.0,0.0,1.0,0,2020-02-14,0.0,,0.0,,,"This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.6.0.25114. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JPEG files within CovertToPDF. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9102.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-190'],"['cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*', 'cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*']",0,0
CVE-2021-0076,Microsoft,0.00044,5.5,0.0,0.0,0.0,1.0,0,2022-02-09,0.0,,0.0,,,"Improper Validation of Specified Index, Position, or Offset in Input in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable denial of service via local access.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,1.8,3.6,['CWE-20'],"['cpe:2.3:o:intel:amt_ac_8260_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:amt_ac_8260:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:amt_ac_8265_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:amt_ac_8265:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:amt_ac_9260_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:amt_ac_9260:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:amt_ac_9560_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:amt_ac_9560:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:amt_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:amt_wi-fi_6_ax200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:amt_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:amt_wi-fi_6_ax201:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:amt_wi-fi_6_ax210_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:amt_wi-fi_6_ax210:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:proset_ac_3165_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:proset_ac_3168_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:proset_ac_8260_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:proset_ac_8265_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:proset_ac_9260_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:proset_ac_9461_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:proset_ac_9462_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:proset_ac_9560_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:killer_ac_1550_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*']",0,0
CVE-2021-1051,Microsoft,0.00042,8.4,0.0,0.0,0.0,1.0,0,2021-01-08,0.0,,0.0,,,"NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape in which a local user can get elevated privileges to modify display configuration data, which may result in denial of service of the display.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H,LOCAL,LOW,LOW,NONE,CHANGED,NONE,HIGH,HIGH,HIGH,2.0,5.8,['CWE-269'],"['cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*', 'cpe:2.3:a:nvidia:gpu_driver:*:*:*:*:*:*:*:*', 'cpe:2.3:a:nvidia:gpu_driver:*:*:*:*:*:*:*:*', 'cpe:2.3:a:nvidia:gpu_driver:*:*:*:*:*:*:*:*', 'cpe:2.3:a:nvidia:gpu_driver:*:*:*:*:*:*:*:*']",0,0
CVE-2021-1088,Microsoft,0.00044,4.4,0.0,0.0,0.0,1.0,0,2021-11-20,0.0,,0.0,,,"NVIDIA GPU and Tegra hardware contain a vulnerability in the internal microcontroller which may allow a user with elevated privileges to utilize debug mechanisms with insufficient access control, which may lead to information disclosure.",CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N,LOCAL,LOW,HIGH,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,0.8,3.6,['NVD-CWE-Other'],"['cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:dgx-1_p100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:dgx-1_v100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:dgx-2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:dgx_station_a100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:drive_constellation:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gt_605:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gt_610:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gt_620:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gt_625:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gt_630:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gt_635:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gt_640:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gt_705:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gt_710:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gt_720:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gt_730:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gt_740:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_1050:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_1050_ti:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_1060:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_1070:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_1070_ti:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_1080:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_1080_ti:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_1650:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_1650_super:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_1660:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_1660_super:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_1660_ti:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_645:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_650:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_650_ti:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_650_ti_boost:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_660:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_660_ti:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_670:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_680:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_690:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_745:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_750:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_750_ti:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_760:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_760_ti:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_770:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_780:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_780_ti:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_950:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_960:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_970:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_980:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_gtx_titan_x:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_rtx_2060:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_rtx_2060_super:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_rtx_2070:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_rtx_2070_super:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_rtx_2080:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_rtx_2080_super:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:geforce_rtx_2080_ti:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:gtx_titan:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:gtx_titan_black:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:gtx_titan_z:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:jetson_agx_xavier_16gb:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:jetson_agx_xavier_32gb:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:jetson_agx_xavier_8gb:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:jetson_nano:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:jetson_nano:-:*:-:*:*:*:*:*', 'cpe:2.3:h:nvidia:jetson_nano:-:*:developer_kit:*:*:*:*:*', 'cpe:2.3:h:nvidia:jetson_tx1:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:jetson_tx2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:jetson_tx2_4gb:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:jetson_tx2_nx:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:jetson_tx2i:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:jetson_xavier_nx:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:jetson_xavier_nx:-:*:developer_kit:*:*:*:*:*', 'cpe:2.3:h:nvidia:jetson_xavier_nx:-:*:production:*:*:*:*:*', 'cpe:2.3:h:nvidia:nvidia_hgx-2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:nvidia_t1000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:nvidia_t2000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:nvidia_t4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:nvidia_t400:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:nvidia_t600:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_gv100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_m1000m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_m1200:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_m2000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_m2000m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_m2200:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_m3000m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_m4000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_m4000m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_m5000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_m5000m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_m500m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_m520:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_m5500:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_m6000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_m600m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_m620:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_p1000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_p2000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_p2200:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_p3000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_p3200:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_p400:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_p4000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_p4200:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_p500:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_p5000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_p520:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_p5200:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_p600:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_p6000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_p620:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_rtx_3000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_rtx_4000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_rtx_5000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_rtx_6000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_rtx_8000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_t1000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_t2000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_t400:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:quadro_t600:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:shield_tv:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:shield_tv_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:tesla_m10:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:tesla_m4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:tesla_m40:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:tesla_m6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:tesla_m60:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:tesla_p100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:tesla_p4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:tesla_p40:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:tesla_p6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:tesla_v100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:tesla_v100s:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:titan_rtx:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:titan_v:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:titan_x:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:titan_xp:-:*:*:*:*:*:*:*']",0,0
CVE-2021-1492,Microsoft,0.00042,7.1,0.0,0.0,0.0,1.0,0,2021-03-25,0.0,,0.0,,,"The Duo Authentication Proxy installer prior to 5.2.1 did not properly validate file installation paths. This allows an attacker with local user privileges to coerce the installer to write to arbitrary privileged directories. If successful, an attacker can manipulate files used by Duo Authentication Proxy installer, cause Denial of Service (DoS) by deleting file(s), or replace system files to potentially achieve elevation of privileges. This is only exploitable during new installations, while the installer is running, and is not exploitable once installation has finished. Versions 5.2.1 of Duo Authentication Proxy installer addresses this issue.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,NONE,HIGH,HIGH,HIGH,1.8,5.2,['CWE-64'],"['cpe:2.3:a:duo:authentication_proxy:*:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*']",0,0
CVE-2022-2188,Microsoft,0.00042,5.5,0.0,0.0,0.0,1.0,0,2022-11-07,1.0,2022-06-29,,,1.0,"Privilege escalation vulnerability in DXL Broker for Windows prior to 6.0.0.280 allows local users to gain elevated privileges by exploiting weak directory controls in the logs directory. This can lead to a denial-of-service attack on the DXL Broker.
",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,1.8,3.6,['CWE-732'],"['cpe:2.3:a:mcafee:data_exchange_layer:*:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*']",0,0
CVE-2022-22319,Microsoft,0.00096,5.4,0.0,0.0,0.0,1.0,0,2022-05-09,1.0,2022-04-01,,,1.0,IBM Robotic Process Automation 21.0.1 could allow a register user on the system to physically delete a queue that could cause disruption for any scripts dependent on the queue. IBM X-Force ID: 218366.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L,NETWORK,LOW,LOW,NONE,UNCHANGED,NONE,LOW,LOW,MEDIUM,2.8,2.5,['NVD-CWE-noinfo'],"['cpe:2.3:a:ibm:robotic_process_automation:21.0.1:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:robotic_process_automation:21.0.1.2:*:*:*:*:*:*:*', 'cpe:2.3:a:ibm:robotic_process_automation_as_a_service:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*']",0,0
CVE-2022-23764,Microsoft,0.0048,9.8,0.0,0.0,0.0,1.0,0,2022-08-17,0.0,,0.0,,,"The vulnerability causing from insufficient verification procedures for downloaded files during WebCube update. Remote attackers can bypass this verification logic to update both digitally signed and unauthorized files, enabling remote code execution.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-346'],"['cpe:2.3:a:teruten:webcube:*:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*']",0,0
CVE-2016-0862,General Electric,0.00184,6.5,1.0,1.0,0.0,1.0,1,2016-02-05,1.0,2018-08-23,,,0.0,General Electric (GE) Industrial Solutions UPS SNMP/Web Adapter devices with firmware before 4.8 allow remote authenticated users to obtain sensitive cleartext account information via unspecified vectors.,CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,2.8,3.6,['CWE-200'],"['cpe:2.3:o:ge:snmp\\/web_adapter_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:snmp\\/web_adapter_1024746:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:snmp\\/web_adapter_1024747:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:snmp\\/web_adapter_1024748:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:snmp\\/web_adapter_1024921:-:*:*:*:*:*:*:*']",1,1
CVE-2016-2310,General Electric,0.00423,9.8,0.0,1.0,0.0,1.0,1,2016-06-09,1.0,2016-06-07,,,1.0,"General Electric (GE) Multilink ML800, ML1200, ML1600, and ML2400 switches with firmware before 5.5.0 and ML810, ML3000, and ML3100 switches with firmware before 5.5.0k have hardcoded credentials, which allows remote attackers to modify configuration settings via the web interface.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-798'],"['cpe:2.3:o:ge:multilink_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilink_ml1200:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilink_ml1600:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilink_ml2400:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilink_ml800:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilink_ml810:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilink_ml3000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilink_ml3100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilink_ml810:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilink_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2016-5788,General Electric,0.00637,10.0,0.0,1.0,0.0,1.0,1,2016-11-25,1.0,2016-10-16,,,1.0,"General Electric (GE) Bently Nevada 3500/22M USB with firmware before 5.0 and Bently Nevada 3500/22M Serial have open ports, which makes it easier for remote attackers to obtain privileged access via unspecified vectors.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,CHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,6.0,['CWE-254'],"['cpe:2.3:o:ge:bently_nevada_3500\\/22m_usb_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:bently_nevada_3500\\/22m_usb:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:bently_nevada_3500\\/22m_serial_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:bently_nevada_3500\\/22m_serial:-:*:*:*:*:*:*:*']",0,0
CVE-2016-9360,General Electric,0.00067,6.7,0.0,0.0,1.0,0.0,1,2017-02-13,0.0,,0.0,,,"An issue was discovered in General Electric (GE) Proficy HMI/SCADA iFIX Version 5.8 SIM 13 and prior versions, Proficy HMI/SCADA CIMPLICITY Version 9.0 and prior versions, and Proficy Historian Version 6.0 and prior versions. An attacker may be able to retrieve user passwords if he or she has access to an authenticated session.",CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:L,LOCAL,HIGH,HIGH,NONE,CHANGED,HIGH,LOW,LOW,MEDIUM,0.8,5.3,['CWE-522'],"['cpe:2.3:a:ge:cimplicity:*:*:*:*:*:*:*:*', 'cpe:2.3:a:ge:historian:*:*:*:*:*:*:*:*', 'cpe:2.3:a:ge:ifix:*:*:*:*:*:*:*:*']",0,0
CVE-2017-12732,General Electric,0.00612,6.8,0.0,0.0,1.0,0.0,1,2017-10-05,0.0,,0.0,,,"A Stack-based Buffer Overflow issue was discovered in GE CIMPLICITY Versions 9.0 and prior. A function reads a packet to indicate the next packet length. The next packet length is not verified, allowing a buffer overwrite that could lead to an arbitrary remote code execution.",CVSS:3.0/AV:A/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,HIGH,LOW,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.9,5.9,"['CWE-119', 'CWE-121']",['cpe:2.3:a:ge:intelligent_platforms_proficy_hmi\\/scada_cimplicity:*:*:*:*:*:*:*:*'],0,0
CVE-2017-14002,General Electric,0.00231,9.8,0.0,1.0,0.0,1.0,1,2018-03-20,1.0,2018-03-13,,,1.0,GE Infinia/Infinia with Hawkeye 4 medical imaging systems all current versions are affected these devices use default or hard-coded credentials. Successful exploitation of this vulnerability may allow a remote attacker to bypass authentication and gain access to the affected devices.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,"['CWE-798', 'CWE-287']","['cpe:2.3:o:ge:infinia_hawkeye_4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:infinia_hawkeye_4:-:*:*:*:*:*:*:*']",0,0
CVE-2017-14006,General Electric,0.00355,9.8,0.0,0.0,1.0,0.0,1,2018-03-20,1.0,2018-03-13,,,1.0,"GE Xeleris versions 1.0,1.1,2.1,3.0,3.1, medical imaging systems, all current versions are affected, these devices use default or hard-coded credentials. Successful exploitation of this vulnerability may allow a remote attacker to bypass authentication and gain access to the affected devices.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,"['CWE-798', 'CWE-287']","['cpe:2.3:a:ge:xeleris:1.0:*:*:*:*:*:*:*', 'cpe:2.3:a:ge:xeleris:1.1:*:*:*:*:*:*:*', 'cpe:2.3:a:ge:xeleris:2.1:*:*:*:*:*:*:*', 'cpe:2.3:a:ge:xeleris:3.0:*:*:*:*:*:*:*', 'cpe:2.3:a:ge:xeleris:3.1:*:*:*:*:*:*:*']",0,0
CVE-2017-7905,General Electric,0.00207,9.8,0.0,1.0,0.0,1.0,1,2017-06-30,0.0,,0.0,,,"A Weak Cryptography for Passwords issue was discovered in General Electric (GE) Multilin SR 750 Feeder Protection Relay, firmware versions prior to Version 7.47; SR 760 Feeder Protection Relay, firmware versions prior to Version 7.47; SR 469 Motor Protection Relay, firmware versions prior to Version 5.23; SR 489 Generator Protection Relay, firmware versions prior to Version 4.06; SR 745 Transformer Protection Relay, firmware versions prior to Version 5.23; SR 369 Motor Protection Relay, all firmware versions; Multilin Universal Relay, firmware Version 6.0 and prior versions; and Multilin URplus (D90, C90, B95), all versions. Ciphertext versions of user passwords were created with a non-random initialization vector leaving them susceptible to dictionary attacks. Ciphertext of user passwords can be obtained from the front LCD panel of affected products and through issued Modbus commands.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,"['CWE-326', 'CWE-261']","['cpe:2.3:o:ge:multilin_sr_750_feeder_protection_relay_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_sr_750_feeder_protection_relay:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_sr_760_feeder_protection_relay_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_sr_760_feeder_protection_relay:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_sr_469_motor_protection_relay_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_sr_469_motor_protection_relay:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_sr_489_generator_protection_relay_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_sr_489_generator_protection_relay:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_sr_745_transformer_protection_relay_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_sr_745_transformer_protection_relay:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_sr_369_motor_protection_relay_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_sr_369_motor_protection_relay:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_universal_relay_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_universal_relay:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_urplus_d90_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_urplus_d90:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_urplus_c90_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_urplus_c90:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_urplus_b95_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_urplus_b95:-:*:*:*:*:*:*:*']",0,0
CVE-2018-10611,General Electric,0.03999,9.8,0.0,0.0,1.0,0.0,1,2018-06-04,1.0,2018-05-31,,,1.0,Java remote method invocation (RMI) input port in GE MDS PulseNET and MDS PulseNET Enterprise version 3.2.1 and prior may be exploited to allow unauthenticated users to launch applications and support remote code execution through web services.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-287'],"['cpe:2.3:a:ge:mds_pulsenet:*:*:*:*:*:*:*:*', 'cpe:2.3:a:ge:mds_pulsenet:*:*:*:*:enterprise:*:*:*']",0,0
CVE-2018-10615,General Electric,0.00168,8.1,0.0,0.0,1.0,0.0,1,2018-06-04,1.0,2018-05-31,,,1.0,Directory traversal may lead to files being exfiltrated or deleted on the GE MDS PulseNET and MDS PulseNET Enterprise version 3.2.1 and prior host platform.,CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,NONE,HIGH,2.8,5.2,"['CWE-22', 'CWE-23']","['cpe:2.3:a:ge:mds_pulsenet:*:*:*:*:*:*:*:*', 'cpe:2.3:a:ge:mds_pulsenet:*:*:*:*:enterprise:*:*:*']",0,0
CVE-2018-15362,General Electric,0.0028,9.1,0.0,0.0,1.0,0.0,1,2018-12-07,1.0,2018-12-06,,,1.0,"XXE in GE Proficy Cimplicity GDS versions 9.0 R2, 9.5, 10.0",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,HIGH,CRITICAL,3.9,5.2,['CWE-611'],"['cpe:2.3:a:ge:cimplicity:9.0_r2:*:*:*:*:*:*:*', 'cpe:2.3:a:ge:cimplicity:9.5:*:*:*:*:*:*:*', 'cpe:2.3:a:ge:cimplicity:10.0:*:*:*:*:*:*:*']",0,0
CVE-2018-17925,General Electric,0.00044,4.8,0.0,0.0,1.0,0.0,1,2018-10-10,1.0,2017-06-30,,,1.0,"Multiple instances of this vulnerability (Unsafe ActiveX Control Marked Safe For Scripting) have been identified in the third-party ActiveX object provided to GE iFIX versions 2.0 - 5.8 by Gigasoft. Only the independent use of the Gigasoft charting package outside the iFIX product may expose users to the reported vulnerability. The reported method shown to impact Internet Explorer is not exposed in the iFIX product, nor is the core functionality of the iFIX product known to be impacted.",CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L,LOCAL,LOW,LOW,REQUIRED,UNCHANGED,LOW,LOW,LOW,MEDIUM,1.3,3.4,"['NVD-CWE-noinfo', 'CWE-623']",['cpe:2.3:a:ge:ifix:*:*:*:*:*:*:*:*'],0,0
CVE-2018-5473,General Electric,0.03792,9.8,0.0,1.0,0.0,1.0,1,2018-02-19,1.0,2018-02-12,,,1.0,An Improper Restriction of Operations within the Bounds of a Memory Buffer issue was discovered in GE D60 Line Distance Relay devices running firmware Version 7.11 and prior. The SSH functions of the device are vulnerable to buffer overflow conditions that may allow a remote attacker to execute arbitrary code on the device.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-119'],"['cpe:2.3:o:ge:d60_line_distance_relay_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:d60_line_distance_relay:-:*:*:*:*:*:*:*']",0,0
CVE-2018-5475,General Electric,0.01753,9.8,0.0,1.0,0.0,1.0,1,2018-02-19,1.0,2018-02-12,,,1.0,"A Stack-based Buffer Overflow issue was discovered in GE D60 Line Distance Relay devices running firmware Version 7.11 and prior. Multiple stack-based buffer overflow vulnerabilities have been identified, which may allow remote code execution.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,"['CWE-787', 'CWE-121']","['cpe:2.3:o:ge:d60_line_distance_relay_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:d60_line_distance_relay:-:*:*:*:*:*:*:*']",0,0
CVE-2018-8867,General Electric,0.00132,7.5,0.0,1.0,0.0,1.0,1,2018-05-18,1.0,2018-05-21,,,0.0,"In GE PACSystems RX3i CPE305/310 version 9.20 and prior, RX3i CPE330 version 9.21 and prior, RX3i CPE 400 version 9.30 and prior, PACSystems RSTi-EP CPE 100 all versions, and PACSystems CPU320/CRU320 RXi all versions, the device does not properly validate input, which could allow a remote attacker to send specially crafted packets causing the device to become unavailable.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-20'],"['cpe:2.3:o:ge:pacsystems_rx3i_cpe305_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:pacsystems_rx3i_cpe305:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:pacsystems_rx3i_cpe310_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:pacsystems_rx3i_cpe310:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:rx3i_cpe330_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:rx3i_cpe330:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:rx3i_cpe_400_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:rx3i_cpe_400:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:pacsystems_rsti-ep_cpe_100_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:pacsystems_rsti-ep_cpe_100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:pacsystems_cpu320_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:pacsystems_cpu320:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:pacsystems_cru320_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:pacsystems_cru320:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:pacsystems_rxi_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:pacsystems_rxi:-:*:*:*:*:*:*:*']",0,0
CVE-2019-10966,General Electric,0.00073,5.3,0.0,1.0,0.0,1.0,1,2019-07-10,0.0,,1.0,2019-07-24,,"In GE Aestiva and Aespire versions 7100 and 7900, a vulnerability exists where serial devices are connected via an added unsecured terminal server to a TCP/IP network configuration, which could allow an attacker to remotely modify device configuration and silence alarms.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,LOW,NONE,MEDIUM,3.9,1.4,['CWE-287'],"['cpe:2.3:o:ge:aestiva_7100_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:aestiva_7100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:aestiva_7900_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:aestiva_7900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:aespire_7100_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:aespire_7100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:aespire_7900_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:aespire_7900:-:*:*:*:*:*:*:*']",0,0
CVE-2019-18255,General Electric,0.00042,5.5,0.0,0.0,1.0,0.0,1,2021-02-18,1.0,2021-02-09,,,1.0,HMI/SCADA iFIX (Versions 6.1 and prior) allows a local authenticated user to modify system-wide iFIX configurations through section objects. This may allow privilege escalation.,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N,LOCAL,LOW,LOW,NONE,UNCHANGED,NONE,HIGH,NONE,MEDIUM,1.8,3.6,['CWE-732'],['cpe:2.3:a:ge:ifix:*:*:*:*:*:*:*:*'],0,0
CVE-2020-16242,General Electric,0.001,6.1,0.0,1.0,0.0,1.0,1,2020-09-25,1.0,2020-09-28,,,0.0,"The affected Reason S20 Ethernet Switch is vulnerable to cross-site scripting (XSS), which may allow an attacker to trick application users into performing critical application actions that include, but are not limited to, adding and updating accounts.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:ge:s2020_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:s2020:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:s2024_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:s2024:-:*:*:*:*:*:*:*']",0,0
CVE-2020-27263,General Electric,0.01554,9.1,0.0,0.0,1.0,0.0,1,2021-01-14,1.0,2021-01-05,,,1.0,"KEPServerEX: v6.0 to v6.9, ThingWorx Kepware Server: v6.8 and v6.9, ThingWorx Industrial Connectivity: All versions, OPC-Aggregator: All versions, Rockwell Automation KEPServer Enterprise, GE Digital Industrial Gateway Server: v7.68.804 and v7.66, Software Toolbox TOP Server: All 6.x versions, are vulnerable to a heap-based buffer overflow. Opening a specifically crafted OPC UA message could allow an attacker to crash the server and potentially leak data.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,HIGH,CRITICAL,3.9,5.2,"['CWE-787', 'CWE-122']","['cpe:2.3:a:ge:industrial_gateway_server:7.66:*:*:*:*:*:*:*', 'cpe:2.3:a:ge:industrial_gateway_server:7.68.804:*:*:*:*:*:*:*', 'cpe:2.3:a:ptc:kepware_kepserverex:6.0:*:*:*:*:*:*:*', 'cpe:2.3:a:ptc:kepware_kepserverex:6.9:*:*:*:*:*:*:*', 'cpe:2.3:a:ptc:opc-aggregator:-:*:*:*:*:*:*:*', 'cpe:2.3:a:ptc:thingworx_industrial_connectivity:-:*:*:*:*:*:*:*', 'cpe:2.3:a:ptc:thingworx_kepware_server:6.8:*:*:*:*:*:*:*', 'cpe:2.3:a:ptc:thingworx_kepware_server:6.9:*:*:*:*:*:*:*', 'cpe:2.3:a:rockwellautomation:kepserver_enterprise:6.6.504.0:*:*:*:*:*:*:*', 'cpe:2.3:a:rockwellautomation:kepserver_enterprise:6.9.572.0:*:*:*:*:*:*:*', 'cpe:2.3:a:softwaretoolbox:top_server:*:*:*:*:*:*:*:*']",0,0
CVE-2020-27267,General Electric,0.01554,9.1,0.0,0.0,1.0,0.0,1,2021-01-14,1.0,2021-01-05,,,1.0,"KEPServerEX v6.0 to v6.9, ThingWorx Kepware Server v6.8 and v6.9, ThingWorx Industrial Connectivity (all versions), OPC-Aggregator (all versions), Rockwell Automation KEPServer Enterprise, GE Digital Industrial Gateway Server v7.68.804 and v7.66, and Software Toolbox TOP Server all 6.x versions, are vulnerable to a heap-based buffer overflow. Opening a specifically crafted OPC UA message could allow an attacker to crash the server and potentially leak data.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,HIGH,CRITICAL,3.9,5.2,"['CWE-787', 'CWE-416']","['cpe:2.3:a:ge:industrial_gateway_server:7.66:*:*:*:*:*:*:*', 'cpe:2.3:a:ge:industrial_gateway_server:7.68.804:*:*:*:*:*:*:*', 'cpe:2.3:a:ptc:kepware_kepserverex:6.0:*:*:*:*:*:*:*', 'cpe:2.3:a:ptc:kepware_kepserverex:6.9:*:*:*:*:*:*:*', 'cpe:2.3:a:ptc:opc-aggregator:-:*:*:*:*:*:*:*', 'cpe:2.3:a:ptc:thingworx_industrial_connectivity:-:*:*:*:*:*:*:*', 'cpe:2.3:a:ptc:thingworx_kepware_server:6.8:*:*:*:*:*:*:*', 'cpe:2.3:a:ptc:thingworx_kepware_server:6.9:*:*:*:*:*:*:*', 'cpe:2.3:a:rockwellautomation:kepserver_enterprise:6.6.504.0:*:*:*:*:*:*:*', 'cpe:2.3:a:rockwellautomation:kepserver_enterprise:6.9.572.0:*:*:*:*:*:*:*', 'cpe:2.3:a:softwaretoolbox:top_server:*:*:*:*:*:*:*:*']",0,0
CVE-2020-6992,General Electric,0.00042,6.7,0.0,0.0,1.0,0.0,1,2020-04-15,1.0,2020-01-31,,,1.0,"A local privilege escalation vulnerability has been identified in the GE Digital CIMPLICITY HMI/SCADA product v10.0 and prior. If exploited, this vulnerability could allow an adversary to modify the system, leading to the arbitrary execution of code. This vulnerability is only exploitable if an attacker has access to an authenticated session. GE Digital CIMPLICITY v11.0, released January 2020, contains mitigation for this local privilege escalation vulnerability. GE Digital recommends all users upgrade to GE CIMPLICITY v11.0 or newer.",CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.8,5.9,['CWE-269'],['cpe:2.3:a:ge:cimplicity:*:*:*:*:*:*:*:*'],0,0
CVE-2021-27438,General Electric,0.0009,8.8,0.0,1.0,0.0,0.0,1,2021-03-25,1.0,2021-03-23,,,1.0,The software contains a hard-coded password it uses for its own inbound authentication or for outbound communication to external components on the Reason DR60 (all firmware versions prior to 02A04.1).,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,"['CWE-798', 'CWE-94']","['cpe:2.3:o:ge:reason_dr60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:reason_dr60:-:*:*:*:*:*:*:*']",0,0
CVE-2021-27450,General Electric,0.00044,7.8,0.0,1.0,0.0,0.0,1,2021-03-25,1.0,2021-03-23,,,1.0,"SSH server configuration file does not implement some best practices. This could lead to a weakening of the SSH protocol strength, which could lead to additional misconfiguration or be leveraged as part of a larger attack on the MU320E (all firmware versions prior to v04A00.1).",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-326'],"['cpe:2.3:o:ge:mu320e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:mu320e:-:*:*:*:*:*:*:*']",0,0
CVE-2021-27454,General Electric,0.00044,7.8,0.0,1.0,0.0,0.0,1,2021-03-25,1.0,2021-03-23,,,1.0,"The software performs an operation at a privilege level higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses on the Reason DR60 (all firmware versions prior to 02A04.1).",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,"['CWE-269', 'CWE-250']","['cpe:2.3:h:ge:reason_dr60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:reason_dr60_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2022-21798,General Electric,0.00193,9.8,0.0,0.0,1.0,0.0,1,2022-02-25,1.0,2022-02-24,,,1.0,"The affected product is vulnerable due to cleartext transmission of credentials seen in the CIMPLICITY network, which can be easily spoofed and used to log in to make operational changes to the system.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-319'],['cpe:2.3:a:ge:cimplicity:*:*:*:*:*:*:*:*'],0,0
CVE-2017-14004,General Electric,0.00355,9.8,0.0,0.0,1.0,0.0,0,2018-03-20,1.0,2018-03-13,,,1.0,GE GEMNet License server (EchoServer) all current versions are affected these devices use default or hard-coded credentials. Successful exploitation of this vulnerability may allow a remote attacker to bypass authentication and gain access to the affected devices.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,"['CWE-798', 'CWE-287']",['cpe:2.3:a:ge:gemnet_license_server:-:*:*:*:*:*:*:*'],0,0
CVE-2017-7908,General Electric,0.00081,7.6,0.0,0.0,1.0,0.0,0,2018-10-02,1.0,2018-10-02,,,1.0,"A heap-based buffer overflow exists in the third-party product Gigasoft, v5 and prior, included in GE Communicator 3.15 and prior. A malicious HTML file that loads the ActiveX controls can trigger the vulnerability via unchecked function calls.",CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,LOW,LOW,HIGH,HIGH,2.8,4.7,"['CWE-119', 'CWE-122']","['cpe:2.3:a:gigasoft:proessentials:*:*:*:*:*:*:*:*', 'cpe:2.3:a:ge:ge_communicator:*:*:*:*:*:*:*:*']",0,0
CVE-2018-19003,General Electric,0.00116,7.5,0.0,1.0,0.0,1.0,0,2018-12-14,1.0,2018-12-13,,,1.0,"GE Mark VIe, EX2100e, EX2100e_Reg, and LS2100e Versions 03.03.28C to 05.02.04C, EX2100e All versions prior to v04.09.00C, EX2100e_Reg All versions prior to v04.09.00C, and LS2100e All versions prior to v04.09.00C The affected versions of the application have a path traversal vulnerability that fails to restrict the ability of an attacker to gain access to restricted information.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-22'],"['cpe:2.3:o:ge:ex2100e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:ex2100e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:ls2100e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:ls2100e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:ex2100e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:ex2100e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:ls2100e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:ls2100e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:mark_vle_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:mark_vle:-:*:*:*:*:*:*:*']",0,0
CVE-2019-13554,General Electric,0.00104,8.8,0.0,0.0,0.0,1.0,0,2020-04-07,0.0,,1.0,2019-10-15,,GE Mark VIe Controller has an unsecured Telnet protocol that may allow a user to create an authenticated session using generic default credentials. GE recommends that users disable the Telnet service.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,"['NVD-CWE-Other', 'CWE-285']",['cpe:2.3:o:ge:mark_vie_control_system:-:*:*:*:*:*:*:*'],0,0
CVE-2019-6544,General Electric,0.00093,5.6,0.0,0.0,1.0,0.0,0,2019-05-09,1.0,2019-05-02,,,1.0,"GE Communicator, all versions prior to 4.0.517, has a service running with system privileges that may allow an unprivileged user to perform certain administrative actions, which may allow the execution of scheduled scripts with system administrator privileges. This service is inaccessible to attackers if Windows default firewall settings are used by the end user.",CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L,NETWORK,HIGH,NONE,NONE,UNCHANGED,LOW,LOW,LOW,MEDIUM,2.2,3.4,"['NVD-CWE-Other', 'CWE-284']",['cpe:2.3:a:ge:ge_communicator:*:*:*:*:*:*:*:*'],0,0
CVE-2019-6546,General Electric,0.00065,7.8,0.0,0.0,1.0,0.0,0,2019-05-09,1.0,2019-05-02,,,1.0,"GE Communicator, all versions prior to 4.0.517, allows an attacker to place malicious files within the working directory of the program, which may allow an attacker to manipulate widgets and UI elements.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-427'],['cpe:2.3:a:ge:ge_communicator:*:*:*:*:*:*:*:*'],0,0
CVE-2019-6548,General Electric,0.00213,9.8,0.0,0.0,1.0,0.0,0,2019-05-09,1.0,2019-05-02,,,1.0,"GE Communicator, all versions prior to 4.0.517, contains two backdoor accounts with hardcoded credentials, which may allow control over the database. This service is inaccessible to attackers if Windows default firewall settings are used by the end user.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-798'],['cpe:2.3:a:ge:ge_communicator:*:*:*:*:*:*:*:*'],0,0
CVE-2019-6564,General Electric,0.00065,7.8,0.0,0.0,1.0,0.0,0,2019-05-09,1.0,2019-05-02,,,1.0,"GE Communicator, all versions prior to 4.0.517, allows a non-administrative user to place malicious files within the installer file directory, which may allow an attacker to gain administrative privileges on a system during installation or upgrade.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-427'],['cpe:2.3:a:ge:ge_communicator:*:*:*:*:*:*:*:*'],0,0
CVE-2020-12017,General Electric,0.0024,9.8,0.0,1.0,0.0,1.0,0,2020-06-02,1.0,2020-06-02,,,1.0,"GE Grid Solutions Reason RT Clocks, RT430, RT431, and RT434, all firmware versions prior to 08A05. The device’s vulnerability in the web application could allow multiple unauthenticated attacks that could cause serious impact. The vulnerability may allow an unauthenticated attacker to execute arbitrary commands and send a request to a specific URL that could cause the device to become unresponsive. The unauthenticated attacker may change the password of the 'configuration' user account, allowing the attacker to modify the configuration of the device via the web interface using the new password. This vulnerability may also allow an unauthenticated attacker to bypass the authentication required to configure the device and reboot the system.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-306'],"['cpe:2.3:h:ge:rt430:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:rt430_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:rt431:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:rt431_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:rt434:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:rt434_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2020-16240,General Electric,0.0008,5.3,0.0,0.0,1.0,0.0,0,2020-09-23,1.0,2021-01-05,,,0.0,"GE Digital APM Classic, Versions 4.4 and prior. An insecure direct object reference (IDOR) vulnerability allows user account data to be downloaded in JavaScript object notation (JSON) format by users who should not have access to such functionality. An attacker can download sensitive data related to user accounts without having the proper privileges.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,LOW,NONE,NONE,MEDIUM,3.9,1.4,['CWE-639'],['cpe:2.3:a:ge:asset_performance_management_classic:*:*:*:*:*:*:*:*'],0,0
CVE-2020-16244,General Electric,0.00104,7.2,0.0,0.0,1.0,0.0,0,2020-09-23,1.0,2020-09-22,,,1.0,"GE Digital APM Classic, Versions 4.4 and prior. Salt is not used for hash calculation of passwords, making it possible to decrypt passwords. This design flaw, along with the IDOR vulnerability, puts the entire platform at high risk because an authenticated user can retrieve all user account data and then retrieve the actual passwords.",CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.2,5.9,"['NVD-CWE-Other', 'CWE-759']",['cpe:2.3:a:ge:asset_performance_management_classic:*:*:*:*:*:*:*:*'],0,0
CVE-2020-16246,General Electric,0.001,6.1,0.0,1.0,0.0,1.0,0,2020-10-20,1.0,2020-09-28,,,1.0,"The affected Reason S20 Ethernet Switch is vulnerable to cross-site scripting (XSS), which may allow attackers to trick users into following a link or navigating to a page that posts a malicious JavaScript statement to the vulnerable site, causing the malicious JavaScript to be rendered by the site and executed by the victim client.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:h:ge:s2020:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:s2020_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:s2024:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:s2024_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2020-25193,General Electric,0.00074,5.3,0.0,1.0,0.0,1.0,0,2022-03-18,1.0,2021-01-05,,,1.0,"By having access to the hard-coded cryptographic key for GE Reason RT430, RT431 & RT434 GNSS clocks in firmware versions prior to version 08A06, attackers would be able to intercept and decrypt encrypted traffic through an HTTPS connection.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,LOW,NONE,NONE,MEDIUM,3.9,1.4,"['CWE-798', 'CWE-321']","['cpe:2.3:o:ge:rt430_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:rt430:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:rt431_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:rt431:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:rt434_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:rt434:-:*:*:*:*:*:*:*']",0,0
CVE-2020-25197,General Electric,0.00271,8.8,0.0,1.0,0.0,1.0,0,2022-03-18,1.0,2021-01-05,,,1.0,"A code injection vulnerability exists in one of the webpages in GE Reason RT430, RT431 & RT434 GNSS clocks in firmware versions prior to version 08A06 that could allow an authenticated remote attacker to execute arbitrary code on the system.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-94'],"['cpe:2.3:h:ge:rt430:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:rt430_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:rt431:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:rt431_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:rt434:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:rt434_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2020-6977,General Electric,0.00067,6.8,0.0,1.0,0.0,1.0,0,2020-02-20,0.0,,1.0,2020-02-18,,"A restricted desktop environment escape vulnerability exists in the Kiosk Mode functionality of affected devices. Specially crafted inputs can allow the user to escape the restricted environment, resulting in access to the underlying operating system. Affected devices include the following GE Ultrasound Products: Vivid products - all versions; LOGIQ - all versions not including LOGIQ 100 Pro; Voluson - all versions; Versana Essential - all versions; Invenia ABUS Scan station - all versions; Venue - all versions not including Venue 40 R1-3 and Venue 50 R4-5",CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,PHYSICAL,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.9,5.9,"['CWE-20', 'CWE-693']","['cpe:2.3:h:ge:vivid_e95:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:vivid_e95_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:vivid_e90:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:vivid_e90_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:vivid_s70n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:vivid_s70n_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:vivid_t8:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:vivid_t8_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:vivid_t9:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:vivid_t9_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:vivid_iq:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:vivid_iq_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:logiq_e10:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:logiq_e10_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:logiq_e9:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:logiq_e9_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:logiq_s8_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:logiq_s8:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:logiq_s7_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:logiq_s7:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:logiq_p9_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:logiq_p9:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:logiq_e9_with_xdclear_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:logiq_e9_with_xdclear:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:voluson_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:voluson:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:versana_essential_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:versana_essential:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:invenia_abus_scan_station_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:invenia_abus_scan_station:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:venue_go_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:venue_go:-:*:*:*:*:*:*:*']",0,0
CVE-2021-27418,General Electric,0.001,6.1,0.0,1.0,0.0,1.0,0,2022-03-23,1.0,2021-03-16,,,1.0,"GE UR firmware versions prior to version 8.1x supports web interface with read-only access. The device fails to properly validate user input, making it possible to perform cross-site scripting attacks, which may be used to send a malicious script. Also, UR Firmware web server does not perform HTML encoding of user-supplied strings.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,"['CWE-79', 'CWE-20']","['cpe:2.3:h:ge:multilin_b30:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_b30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_b90:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_b90_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_c60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_c60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_c70:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_c70_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_c95:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_c95_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_d30:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_d30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_d60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_d60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_f35:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_f35_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_f60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_f60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_g30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_g30:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_g60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_g60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_l30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_l30:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_l60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_l60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_l90_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_l90:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_m60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_m60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_n60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_n60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_t35_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_t35:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_t60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_t60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_c30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_c30:-:*:*:*:*:*:*:*']",0,0
CVE-2021-27420,General Electric,0.00086,5.3,0.0,1.0,0.0,1.0,0,2022-03-23,1.0,2021-03-16,,,1.0,"GE UR firmware versions prior to version 8.1x web server task does not properly handle receipt of unsupported HTTP verbs, resulting in the web server becoming temporarily unresponsive after receiving a series of unsupported HTTP requests. When unresponsive, the web server is inaccessible. By itself, this is not particularly significant as the relay remains effective in all other functionality and communication channels.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,LOW,MEDIUM,3.9,1.4,['CWE-20'],"['cpe:2.3:o:ge:multilin_b30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_b30:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_b90_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_b90:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_c60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_c60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_c70_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_c70:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_c95_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_c95:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_d30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_d30:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_d60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_d60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_f35_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_f35:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_f60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_f60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_g30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_g30:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_g60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_g60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_l30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_l30:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_l60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_l60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_l90_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_l90:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_m60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_m60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_n60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_n60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_t35_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_t35:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_t60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_t60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_c30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_c30:-:*:*:*:*:*:*:*']",0,0
CVE-2021-27422,General Electric,0.00152,7.5,0.0,1.0,0.0,1.0,0,2022-03-23,1.0,2021-03-16,,,1.0,GE UR firmware versions prior to version 8.1x web server interface is supported on UR over HTTP protocol. It allows sensitive information exposure without authentication.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,"['CWE-319', 'CWE-200']","['cpe:2.3:o:ge:multilin_b30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_b30:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_b90_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_b90:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_c60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_c60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_c70_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_c70:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_c95_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_c95:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_d30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_d30:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_d60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_d60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_f35_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_f35:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_f60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_f60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_g30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_g30:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_g60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_g60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_l30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_l30:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_l60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_l60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_l90_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_l90:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_m60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_m60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_n60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_n60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_t35_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_t35:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_t60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_t60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_c30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_c30:-:*:*:*:*:*:*:*']",0,0
CVE-2021-27426,General Electric,0.00213,9.8,0.0,1.0,0.0,1.0,0,2022-03-23,1.0,2021-03-16,,,1.0,"GE UR IED firmware versions prior to version 8.1x with “Basic” security variant does not allow the disabling of the “Factory Mode,” which is used for servicing the IED by a “Factory” user.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,"['NVD-CWE-Other', 'CWE-453']","['cpe:2.3:o:ge:multilin_b30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_b30:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_b90_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_b90:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_c60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_c60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_c70_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_c70:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_c95_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_c95:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_d30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_d30:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_d60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_d60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_f35_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_f35:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_f60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_f60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_g30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_g30:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_g60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_g60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_l30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_l30:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_l60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_l60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_l90_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_l90:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_m60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_m60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_n60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_n60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_t35_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_t35:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_t60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_t60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_c30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_c30:-:*:*:*:*:*:*:*']",0,0
CVE-2021-27428,General Electric,0.00213,9.8,0.0,1.0,0.0,1.0,0,2022-03-23,1.0,2021-03-16,,,1.0,"GE UR IED firmware versions prior to version 8.1x supports upgrading firmware using UR Setup configuration tool – Enervista UR Setup. This UR Setup tool validates the authenticity and integrity of firmware file before uploading the UR IED. An illegitimate user could upgrade firmware without appropriate privileges. The weakness is assessed, and mitigation is implemented in firmware Version 8.10.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-434'],"['cpe:2.3:o:ge:multilin_b30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_b30:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_b90_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_b90:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_c60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_c60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_c70_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_c70:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_c95_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_c95:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_d30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_d30:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_d60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_d60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_f35_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_f35:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_f60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_f60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_g30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_g30:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_g60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_g60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_l30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_l30:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_l60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_l60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_l90_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_l90:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_m60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_m60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_n60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_n60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_t35_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_t35:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_t60_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_t60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:multilin_c30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ge:multilin_c30:-:*:*:*:*:*:*:*']",0,0
CVE-2021-27430,General Electric,0.00065,6.8,0.0,0.0,1.0,0.0,0,2022-03-23,1.0,2021-03-16,,,1.0,"GE UR bootloader binary Version 7.00, 7.01 and 7.02 included unused hardcoded credentials. Additionally, a user with physical access to the UR IED can interrupt the boot sequence by rebooting the UR.",CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,PHYSICAL,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.9,5.9,['CWE-798'],"['cpe:2.3:a:ge:ur_bootloader_binary:7.00:*:*:*:*:*:*:*', 'cpe:2.3:a:ge:ur_bootloader_binary:7.01:*:*:*:*:*:*:*', 'cpe:2.3:a:ge:ur_bootloader_binary:7.02:*:*:*:*:*:*:*']",0,0
CVE-2021-31477,General Electric,0.00924,7.3,0.0,1.0,0.0,1.0,0,2021-06-16,1.0,2021-03-26,,,1.0,This vulnerability allows remote attackers to execute arbitrary code on affected installations of GE Reason RPV311 14A03. Authentication is not required to exploit this vulnerability. The specific flaw exists within the firmware and filesystem of the device. The firmware and filesystem contain hard-coded default credentials. An attacker can leverage this vulnerability to execute code in the context of the download user. Was ZDI-CAN-11852.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L,NETWORK,LOW,NONE,NONE,UNCHANGED,LOW,LOW,LOW,HIGH,3.9,3.4,['CWE-798'],"['cpe:2.3:h:ge:rpv311:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ge:reason_rpv311_firmware:14a03:*:*:*:*:*:*:*']",0,0
CVE-2021-44477,General Electric,0.00195,7.5,0.0,0.0,1.0,0.0,0,2022-03-25,1.0,2022-01-25,,,1.0,GE Gas Power ToolBoxST Version v04.07.05C suffers from an XML external entity (XXE) vulnerability using the DTD parameter entities technique that could result in disclosure and retrieval of arbitrary data on the affected node via an out-of-band (OOB) attack. The vulnerability is triggered when input passed to the XML parser is not sanitized while parsing the XML project/template file.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-611'],['cpe:2.3:a:ge:toolboxst:*:*:*:*:*:*:*:*'],0,0
CVE-2022-23921,General Electric,0.00042,7.8,0.0,0.0,1.0,0.0,0,2022-02-25,1.0,2022-02-22,,,1.0,"Exploitation of this vulnerability may result in local privilege escalation and code execution. GE maintains exploitation of this vulnerability is only possible if the attacker has login access to a machine actively running CIMPLICITY, the CIMPLICITY server is not already running a project, and the server is licensed for multiple projects.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-269'],['cpe:2.3:a:ge:proficy_cimplicitiy:*:*:*:*:*:*:*:*'],0,0
CVE-2022-37952,General Electric,0.00072,6.1,0.0,0.0,1.0,0.0,0,2022-08-25,1.0,2022-08-24,,,1.0,"A reflected cross-site scripting (XSS) vulnerability exists in the iHistorian Data Display of WorkstationST (= V3.0 _with_ Siemens Healthineers Informatics products), RAPIDPoint 500 systems (V2.4.X_with_ Siemens Healthineers Informatics products), RAPIDPoint 500 systems (All versions =< V2.3 _with_ Siemens Healthineers Informatics products), RAPIDPoint 400 systems (All versions _with_ Siemens Healthineers Informatics products). Remote attackers with either local or remote credentialed access to the ""Remote View"" feature might be able to elevate their privileges, compromising confidentiality, integrity, and availability of the system. No special skills or user interaction are required to perform this attack. At the time of advisory publication, no public exploitation of this security vulnerability is known. Siemens Healthineers confirms the security vulnerability and provides mitigations to resolve the security issue.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,"['CWE-269', 'CWE-284']","['cpe:2.3:o:siemens:rapidpoint_400_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:rapidpoint_400:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:rapidpoint_500_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:rapidpoint_500_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:rapidpoint_500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:rapidlab_1200_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:rapidlab_1200:-:*:*:*:*:*:*:*']",0,0
CVE-2018-4848,Siemens,0.00059,6.1,0.0,1.0,0.0,0.0,1,2018-06-14,1.0,2020-01-14,,,0.0,"A vulnerability has been identified in SCALANCE X-200 switch family (incl. SIPLUS NET variants) (All versions < V5.2.3), SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) (All versions < V5.4.1), SCALANCE X-200RNA switch family (All versions < V3.2.7), SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) (All versions < V4.1.3). The integrated configuration web server of the affected devices could allow Cross-Site Scripting (XSS) attacks if unsuspecting users are tricked into accessing a malicious link. User interaction is required for a successful exploitation. The user must be logged into the web interface in order for the exploitation to succeed. At the stage of publishing this security advisory no public exploitation is known. The vendor has confirmed the vulnerability and provides mitigations to resolve it.",CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,"['CWE-79', 'CWE-80']","['cpe:2.3:o:siemens:scalance_x300_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x300:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x-200_irt_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x-200_irt:-:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x-200_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x-200:-:*:*:*:*:*:*:*']",0,0
CVE-2018-4852,Siemens,0.00293,9.8,0.0,1.0,0.0,0.0,1,2018-07-03,0.0,,1.0,2018-07-03,,A vulnerability has been identified in SICLOCK TC100 (All versions) and SICLOCK TC400 (All versions). An attacker with network access to the device could potentially circumvent the authentication mechanism if he/she is able to obtain certain knowledge specific to the attacked device.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,"['CWE-287', 'CWE-288']","['cpe:2.3:o:siemens:siclock_tc400_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:siclock_tc400:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:siclock_tc100_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:siclock_tc100:-:*:*:*:*:*:*:*']",0,0
CVE-2019-13918,Siemens,0.0017,9.8,0.0,0.0,1.0,0.0,1,2019-09-13,1.0,2019-09-10,,,1.0,"A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V2.0 SP1). The web interface has no means to prevent password guessing attacks. The vulnerability could be exploited by an attacker with network access to the vulnerable software, requiring no privileges and no user interaction. The vulnerability could allow full access to the web interface. At the time of advisory publication no public exploitation of this security vulnerability was known.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,"['CWE-521', 'CWE-307']","['cpe:2.3:a:siemens:sinema_remote_connect_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:sinema_remote_connect_server:2.0:-:*:*:*:*:*:*', 'cpe:2.3:a:siemens:sinema_remote_connect_server:2.0:hf1:*:*:*:*:*:*']",0,0
CVE-2019-13919,Siemens,0.00054,4.3,0.0,0.0,1.0,0.0,1,2019-09-13,1.0,2019-09-10,,,1.0,A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V2.0 SP1). Some pages that should only be accessible by a privileged user can also be accessed by a non-privileged user. The security vulnerability could be exploited by an attacker with network access and valid credentials for the web interface. No user interaction is required. The vulnerability could allow an attacker to access information that he should not be able to read. The affected information does not include passwords. At the time of advisory publication no public exploitation of this security vulnerability was known.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N,NETWORK,LOW,LOW,NONE,UNCHANGED,LOW,NONE,NONE,MEDIUM,2.8,1.4,"['NVD-CWE-Other', 'CWE-284']","['cpe:2.3:a:siemens:sinema_remote_connect_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:sinema_remote_connect_server:2.0:hf1:*:*:*:*:*:*']",0,0
CVE-2019-13921,Siemens,0.0011,7.5,0.0,0.0,1.0,0.0,1,2019-10-10,1.0,2020-01-14,,,0.0,A vulnerability has been identified in SIMATIC WinAC RTX (F) 2010 (All versions < SP3 Update 1). Affected versions of the software contain a vulnerability that could allow an unauthenticated attacker to trigger a denial-of-service condition. The vulnerability can be triggered if a large HTTP request is sent to the executing service. The security vulnerability could be exploited by an attacker with network access to the affected systems. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise availability of the service provided by the software.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,"['CWE-400', 'CWE-410']","['cpe:2.3:a:siemens:simatic_winac_rtx_\\(f\\)_2010:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simatic_winac_rtx_\\(f\\)_2010:-:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simatic_winac_rtx_\\(f\\)_2010:-:update_1:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simatic_winac_rtx_\\(f\\)_2010:-:update_2:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simatic_winac_rtx_\\(f\\)_2010:-:update_3:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simatic_winac_rtx_\\(f\\)_2010:sp1:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simatic_winac_rtx_\\(f\\)_2010:sp2:-:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simatic_winac_rtx_\\(f\\)_2010:sp2:update_1:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simatic_winac_rtx_\\(f\\)_2010:sp2:update_2:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simatic_winac_rtx_\\(f\\)_2010:sp2:update_3:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simatic_winac_rtx_\\(f\\)_2010:sp2:update_4:*:*:*:*:*:*']",0,0
CVE-2020-12762,Siemens,0.00111,7.8,0.0,0.0,1.0,0.0,1,2020-05-09,1.0,2022-09-13,,,0.0,"json-c through 0.14 has an integer overflow and out-of-bounds write via a large JSON file, as demonstrated by printbuf_memappend.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-190'],"['cpe:2.3:a:json-c:json-c:*:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*', 'cpe:2.3:a:siemens:sinec_ins:-:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:sinec_ins:1.0:-:*:*:*:*:*:*', 'cpe:2.3:a:siemens:sinec_ins:1.0:sp1:*:*:*:*:*:*']",0,0
CVE-2020-13987,Siemens,0.00172,7.5,0.0,1.0,0.0,0.0,1,2020-12-11,1.0,2022-03-08,,,0.0,An issue was discovered in Contiki through 3.0. An Out-of-Bounds Read vulnerability exists in the uIP TCP/IP Stack component when calculating the checksums for IP packets in upper_layer_chksum in net/ipv4/uip.c.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-125'],"['cpe:2.3:o:contiki-os:contiki:*:*:*:*:*:*:*:*', 'cpe:2.3:a:uip_project:uip:*:*:*:*:*:*:*:*', 'cpe:2.3:a:open-iscsi_project:open-iscsi:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:sentron_3va_com100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:sentron_3va_com100_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:sentron_3va_com800:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:sentron_3va_com800_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:sentron_pac3200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:sentron_pac3200_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:sentron_pac4200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:sentron_pac4200_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2020-7575,Siemens,0.00078,6.1,0.0,1.0,0.0,0.0,1,2020-04-14,1.0,2021-02-09,,,0.0,"A vulnerability has been identified in Climatix POL908 (BACnet/IP module) (All versions), Climatix POL909 (AWM module) (All versions < V11.32). A persistent cross-site scripting (XSS) vulnerability exists in the web server access log page of the affected devices that could allow an attacker to inject arbitrary JavaScript code via specially crafted GET requests. The code could be potentially executed later by another (privileged) user. The security vulnerability could be exploited by an attacker with network access to the affected system. Successful exploitation requires no system privileges. An attacker could use the vulnerability to compromise the confidentiality and integrity of other users' web sessions.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,"['CWE-79', 'CWE-80']","['cpe:2.3:o:siemens:climatix_pol908_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:climatix_pol908:-:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:climatix_pol909:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:climatix_pol909_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2020-7576,Siemens,0.00054,5.4,0.0,0.0,1.0,0.0,1,2020-07-14,1.0,2021-01-12,,,0.0,"A vulnerability has been identified in Camstar Enterprise Platform (All versions), Opcenter Execution Core (All versions < V8.2), Opcenter Execution Core (V8.2). An authenticated user with the ability to create containers, packages or register defects could perform stored Cross-Site Scripting (XSS) attacks within the vulnerable software. The impact of this attack could result in the session cookies of legitimate users being stolen. Should the attacker gain access to these cookies, they could then hijack the session and perform arbitrary actions in the name of the victim.",CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,LOW,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.3,2.7,['CWE-79'],['cpe:2.3:a:siemens:opcenter_execution_core:*:*:*:*:*:*:*:*'],0,0
CVE-2020-7577,Siemens,0.00058,8.1,0.0,0.0,1.0,0.0,1,2020-07-14,1.0,2021-01-12,,,0.0,"A vulnerability has been identified in Camstar Enterprise Platform (All versions), Opcenter Execution Core (All versions < V8.2). Through the use of several vulnerable fields of the application, an authenticated user could perform an SQL Injection attack by passing a modified SQL query downstream to the back-end server. The exploit of this vulnerability could be used to read, and potentially modify application data to which the user has access to.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,NONE,HIGH,2.8,5.2,['CWE-89'],['cpe:2.3:a:siemens:opcenter_execution_core:*:*:*:*:*:*:*:*'],0,0
CVE-2020-7588,Siemens,0.0011,5.3,0.0,0.0,1.0,0.0,1,2020-07-14,1.0,2021-07-13,,,0.0,"A vulnerability has been identified in Opcenter Execution Discrete (All versions < V3.2), Opcenter Execution Foundation (All versions < V3.2), Opcenter Execution Process (All versions < V3.2), Opcenter Intelligence (All versions < V3.3), Opcenter Quality (All versions < V11.3), Opcenter RD&L (V8.0), SIMATIC IT LMS (All versions < V2.6), SIMATIC IT Production Suite (All versions < V8.0), SIMATIC Notifier Server for Windows (All versions), SIMATIC PCS neo (All versions < V3.0 SP1), SIMATIC STEP 7 (TIA Portal) V15 (All versions < V15.1 Update 5), SIMATIC STEP 7 (TIA Portal) V16 (All versions < V16 Update 2), SIMOCODE ES V15.1 (All versions < V15.1 Update 4), SIMOCODE ES V16 (All versions < V16 Update 1), Soft Starter ES V15.1 (All versions < V15.1 Update 3), Soft Starter ES V16 (All versions < V16 Update 1). Sending a specially crafted packet to the affected service could cause a partial remote denial-of-service, that would cause the service to restart itself.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,LOW,MEDIUM,3.9,1.4,['CWE-20'],"['cpe:2.3:a:siemens:opcenter_execution_discrete:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:opcenter_execution_foundation:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:opcenter_execution_process:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:opcenter_intelligence:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:opcenter_quality:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:opcenter_rd\\&l:8.0:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simatic_it_lms:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simatic_it_production_suite:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simatic_notifier_server:*:*:*:*:*:windows:*:*', 'cpe:2.3:a:siemens:simatic_pcs_neo:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simatic_step_7:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simatic_step_7:16:-:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simatic_step_7:16:update_1:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simocode_es:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:soft_starter_es:*:*:*:*:*:*:*:*']",0,0
CVE-2020-8704,Siemens,0.00044,6.4,0.0,1.0,0.0,0.0,1,2021-06-09,1.0,2022-12-13,,,0.0,Race condition in a subsystem in the Intel(R) LMS versions before 2039.1.0.0 may allow a privileged user to potentially enable escalation of privilege via local access.,CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H,LOCAL,HIGH,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.5,5.9,['CWE-362'],"['cpe:2.3:a:intel:local_manageability_service:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_ipc527g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_ipc527g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*']",0,0
CVE-2020-8745,Siemens,0.00102,6.8,0.0,1.0,0.0,0.0,1,2020-11-12,1.0,2022-12-13,,,0.0,"Insufficient control flow management in subsystem for Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25 , Intel(R) TXE versions before 3.1.80 and 4.0.30 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.",CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,PHYSICAL,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.9,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:trusted_execution_technology:*:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:trusted_execution_technology:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_drive_controller_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_drive_controller:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_et200sp_1515sp_pc2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_et200sp_1515sp_pc2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_ipc127e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_ipc127e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_ipc527g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_ipc527g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_ipc667e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_ipc667e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:sinumerik_828d_hw_pu.4_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:sinumerik_828d_hw_pu.4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:sinumerik_mc_mcu_1720_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:sinumerik_mc_mcu_1720:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:sinumerik_one_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:sinumerik_one:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:sinumerik_840d_sl_ht_10_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:sinumerik_840d_sl_ht_10:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:sinumerik_one_ncu_1740_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:sinumerik_one_ncu_1740:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:sinumerik_one_ppu_1740_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:sinumerik_one_ppu_1740:-:*:*:*:*:*:*:*']",0,0
CVE-2021-22897,Siemens,0.00412,5.3,0.0,0.0,1.0,0.0,1,2021-06-11,1.0,2022-03-08,,,0.0,"curl 7.61.0 through 7.76.1 suffers from exposure of data element to wrong session due to a mistake in the code for CURLOPT_SSL_CIPHER_LIST when libcurl is built to use the Schannel TLS library. The selected cipher set was stored in a single ""static"" variable in the library, which has the surprising side-effect that if an application sets up multiple concurrent transfers, the last one that sets the ciphers will accidentally control the set used by all transfers. In a worst-case scenario, this weakens transport security significantly.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,LOW,NONE,NONE,MEDIUM,3.9,1.4,"['CWE-668', 'CWE-840']","['cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:1.11.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:1.10.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:1.15.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:1.15.1:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:1.8.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:1.15.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:essbase:*:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:essbase:*:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:solidfire\\,_enterprise_sds_\\&_hci_storage_node:-:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:solidfire_\\&_hci_management_node:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:hci_compute_node_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*', 'cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*', 'cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*', 'cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:*']",0,0
CVE-2021-27383,Siemens,0.00179,7.5,0.0,1.0,1.0,0.0,1,2021-05-12,1.0,2021-08-10,,,0.0,"A vulnerability has been identified in SIMATIC HMI Comfort Outdoor Panels V15 7\"" & 15\"" (incl. SIPLUS variants) (All versions < V15.1 Update 6), SIMATIC HMI Comfort Outdoor Panels V16 7\"" & 15\"" (incl. SIPLUS variants) (All versions < V16 Update 4), SIMATIC HMI Comfort Panels V15 4\"" - 22\"" (incl. SIPLUS variants) (All versions < V15.1 Update 6), SIMATIC HMI Comfort Panels V16 4\"" - 22\"" (incl. SIPLUS variants) (All versions < V16 Update 4), SIMATIC HMI KTP Mobile Panels V15 KTP400F, KTP700, KTP700F, KTP900 and KTP900F (All versions < V15.1 Update 6), SIMATIC HMI KTP Mobile Panels V16 KTP400F, KTP700, KTP700F, KTP900 and KTP900F (All versions < V16 Update 4), SIMATIC WinCC Runtime Advanced V15 (All versions < V15.1 Update 6), SIMATIC WinCC Runtime Advanced V16 (All versions < V16 Update 4), SINAMICS GH150 (All versions), SINAMICS GL150 (with option X30) (All versions), SINAMICS GM150 (with option X30) (All versions), SINAMICS SH150 (All versions), SINAMICS SL150 (All versions), SINAMICS SM120 (All versions), SINAMICS SM150 (All versions), SINAMICS SM150i (All versions). SmartVNC has a heap allocation leak vulnerability in the server Tight encoder, which could result in a Denial-of-Service condition.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-770'],"['cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:16:-:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:16:update1:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:16:update2:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:16:update3:*:*:*:*:*:*', 'cpe:2.3:o:siemens:sinamics_sh150_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:sinamics_sh150:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:sinamics_sm150i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:sinamics_sm150i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:sinamics_gh150_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:sinamics_gh150:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:sinamics_gl150_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:sinamics_gl150:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:sinamics_gm150_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:sinamics_gm150:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:sinamics_sl150_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:sinamics_sl150:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:sinamics_sm120_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:sinamics_sm120:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:sinamics_sm150_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:sinamics_sm150:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_7\\""_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_7\\""_firmware:16:-:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_7\\""_firmware:16:update1:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_7\\""_firmware:16:update2:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_7\\""_firmware:16:update3:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_hmi_comfort_outdoor_panels_7\\"":-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_15\\""_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_15\\""_firmware:16:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_15\\""_firmware:16:-:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_15\\""_firmware:16:update1:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_15\\""_firmware:16:update2:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_15\\""_firmware:16:update3:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_hmi_comfort_outdoor_panels_15\\"":-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_4\\""_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_4\\""_firmware:16:-:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_4\\""_firmware:16:update1:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_4\\""_firmware:16:update2:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_4\\""_firmware:16:update3:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_hmi_comfort_panels_4\\"":-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_22\\""_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_22\\""_firmware:16:-:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_22\\""_firmware:16:update1:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_22\\""_firmware:16:update2:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_22\\""_firmware:16:update3:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_hmi_comfort_panels_22\\"":-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp400f_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp400f_firmware:16:-:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp400f_firmware:16:update1:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp400f_firmware:16:update2:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp400f_firmware:16:update3:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp400f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp700:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700_firmware:16:-:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700_firmware:16:update1:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700_firmware:16:update2:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700_firmware:16:update3:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp700f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700f_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700f_firmware:16:-:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700f_firmware:16:update1:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700f_firmware:16:update2:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700f_firmware:16:update3:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900_firmware:16:-:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900_firmware:16:update1:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900_firmware:16:update2:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900_firmware:16:update3:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900f_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900f_firmware:16:-:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900f_firmware:16:update1:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900f_firmware:16:update2:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900f_firmware:16:update3:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp900f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_7\\""_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_7\\""_firmware:15.1:-:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_7\\""_firmware:15.1:update1:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_7\\""_firmware:15.1:update2:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_7\\""_firmware:15.1:update3:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_7\\""_firmware:15.1:update4:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_7\\""_firmware:15.1:update5:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_hmi_comfort_outdoor_panels_7\\"":-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_15\\""_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_15\\""_firmware:15.1:-:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_15\\""_firmware:15.1:update1:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_15\\""_firmware:15.1:update2:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_15\\""_firmware:15.1:update3:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_15\\""_firmware:15.1:update4:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_15\\""_firmware:15.1:update5:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_hmi_comfort_outdoor_panels_15\\"":-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_4\\""_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_4\\""_firmware:15.1:-:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_4\\""_firmware:15.1:update1:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_4\\""_firmware:15.1:update2:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_4\\""_firmware:15.1:update3:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_4\\""_firmware:15.1:update4:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_4\\""_firmware:15.1:update5:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_hmi_comfort_panels_4\\"":-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_22\\""_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_22\\""_firmware:15.1:-:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_22\\""_firmware:15.1:update1:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_22\\""_firmware:15.1:update2:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_22\\""_firmware:15.1:update3:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_22\\""_firmware:15.1:update4:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_22\\""_firmware:15.1:update5:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_hmi_comfort_panels_22\\"":-:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp400f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp400f_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp400f_firmware:15.1:-:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp400f_firmware:15.1:update1:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp400f_firmware:15.1:update2:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp400f_firmware:15.1:update3:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp400f_firmware:15.1:update4:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp400f_firmware:15.1:update5:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp700:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700_firmware:15.1:-:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700_firmware:15.1:update1:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700_firmware:15.1:update2:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700_firmware:15.1:update3:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700_firmware:15.1:update4:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700_firmware:15.1:update5:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp700f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700f_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700f_firmware:15.1:-:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700f_firmware:15.1:update1:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700f_firmware:15.1:update2:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700f_firmware:15.1:update3:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700f_firmware:15.1:update4:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700f_firmware:15.1:update5:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900_firmware:15.1:-:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900_firmware:15.1:update1:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900_firmware:15.1:update2:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900_firmware:15.1:update3:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900_firmware:15.1:update4:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900_firmware:15.1:update5:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp900f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900f_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900f_firmware:15.1:-:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900f_firmware:15.1:update1:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900f_firmware:15.1:update2:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900f_firmware:15.1:update3:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900f_firmware:15.1:update4:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900f_firmware:15.1:update5:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:15.1:-:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:15.1:update1:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:15.1:update2:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:15.1:update3:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:15.1:update4:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:15.1:update5:*:*:*:*:*:*']",0,0
CVE-2021-27385,Siemens,0.0035,7.5,0.0,1.0,1.0,0.0,1,2021-05-12,1.0,2021-08-10,,,0.0,"A vulnerability has been identified in SIMATIC HMI Comfort Outdoor Panels V15 7\"" & 15\"" (incl. SIPLUS variants) (All versions < V15.1 Update 6), SIMATIC HMI Comfort Outdoor Panels V16 7\"" & 15\"" (incl. SIPLUS variants) (All versions < V16 Update 4), SIMATIC HMI Comfort Panels V15 4\"" - 22\"" (incl. SIPLUS variants) (All versions < V15.1 Update 6), SIMATIC HMI Comfort Panels V16 4\"" - 22\"" (incl. SIPLUS variants) (All versions < V16 Update 4), SIMATIC HMI KTP Mobile Panels V15 KTP400F, KTP700, KTP700F, KTP900 and KTP900F (All versions < V15.1 Update 6), SIMATIC HMI KTP Mobile Panels V16 KTP400F, KTP700, KTP700F, KTP900 and KTP900F (All versions < V16 Update 4), SIMATIC WinCC Runtime Advanced V15 (All versions < V15.1 Update 6), SIMATIC WinCC Runtime Advanced V16 (All versions < V16 Update 4), SINAMICS GH150 (All versions), SINAMICS GL150 (with option X30) (All versions), SINAMICS GM150 (with option X30) (All versions), SINAMICS SH150 (All versions), SINAMICS SL150 (All versions), SINAMICS SM120 (All versions), SINAMICS SM150 (All versions), SINAMICS SM150i (All versions). A remote attacker could send specially crafted packets to SmartVNC device layout handler on client side, which could influence the amount of resources consumed and result in a Denial-of-Service (infinite loop) condition.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,"['CWE-835', 'CWE-400']","['cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:16:-:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:16:update1:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:16:update2:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:16:update3:*:*:*:*:*:*', 'cpe:2.3:o:siemens:sinamics_sh150_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:sinamics_sh150:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:sinamics_sm150i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:sinamics_sm150i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:sinamics_gh150_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:sinamics_gh150:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:sinamics_gl150_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:sinamics_gl150:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:sinamics_gm150_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:sinamics_gm150:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:sinamics_sl150_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:sinamics_sl150:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:sinamics_sm120_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:sinamics_sm120:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:sinamics_sm150_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:sinamics_sm150:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_7\\""_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_7\\""_firmware:16:-:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_7\\""_firmware:16:update1:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_7\\""_firmware:16:update2:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_7\\""_firmware:16:update3:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_hmi_comfort_outdoor_panels_7\\"":-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_15\\""_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_15\\""_firmware:16:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_15\\""_firmware:16:-:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_15\\""_firmware:16:update1:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_15\\""_firmware:16:update2:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_15\\""_firmware:16:update3:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_hmi_comfort_outdoor_panels_15\\"":-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_4\\""_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_4\\""_firmware:16:-:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_4\\""_firmware:16:update1:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_4\\""_firmware:16:update2:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_4\\""_firmware:16:update3:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_hmi_comfort_panels_4\\"":-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_22\\""_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_22\\""_firmware:16:-:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_22\\""_firmware:16:update1:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_22\\""_firmware:16:update2:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_22\\""_firmware:16:update3:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_hmi_comfort_panels_22\\"":-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp400f_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp400f_firmware:16:-:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp400f_firmware:16:update1:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp400f_firmware:16:update2:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp400f_firmware:16:update3:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp400f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp700:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700_firmware:16:-:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700_firmware:16:update1:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700_firmware:16:update2:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700_firmware:16:update3:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp700f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700f_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700f_firmware:16:-:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700f_firmware:16:update1:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700f_firmware:16:update2:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700f_firmware:16:update3:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900_firmware:16:-:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900_firmware:16:update1:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900_firmware:16:update2:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900_firmware:16:update3:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900f_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900f_firmware:16:-:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900f_firmware:16:update1:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900f_firmware:16:update2:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900f_firmware:16:update3:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp900f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_7\\""_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_7\\""_firmware:15.1:-:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_7\\""_firmware:15.1:update1:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_7\\""_firmware:15.1:update2:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_7\\""_firmware:15.1:update3:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_7\\""_firmware:15.1:update4:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_7\\""_firmware:15.1:update5:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_hmi_comfort_outdoor_panels_7\\"":-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_15\\""_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_15\\""_firmware:15.1:-:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_15\\""_firmware:15.1:update1:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_15\\""_firmware:15.1:update2:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_15\\""_firmware:15.1:update3:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_15\\""_firmware:15.1:update4:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_outdoor_panels_15\\""_firmware:15.1:update5:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_hmi_comfort_outdoor_panels_15\\"":-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_4\\""_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_4\\""_firmware:15.1:-:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_4\\""_firmware:15.1:update1:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_4\\""_firmware:15.1:update2:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_4\\""_firmware:15.1:update3:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_4\\""_firmware:15.1:update4:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_4\\""_firmware:15.1:update5:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_hmi_comfort_panels_4\\"":-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_22\\""_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_22\\""_firmware:15.1:-:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_22\\""_firmware:15.1:update1:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_22\\""_firmware:15.1:update2:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_22\\""_firmware:15.1:update3:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_22\\""_firmware:15.1:update4:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_comfort_panels_22\\""_firmware:15.1:update5:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_hmi_comfort_panels_22\\"":-:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp400f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp400f_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp400f_firmware:15.1:-:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp400f_firmware:15.1:update1:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp400f_firmware:15.1:update2:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp400f_firmware:15.1:update3:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp400f_firmware:15.1:update4:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp400f_firmware:15.1:update5:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp700:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700_firmware:15.1:-:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700_firmware:15.1:update1:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700_firmware:15.1:update2:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700_firmware:15.1:update3:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700_firmware:15.1:update4:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700_firmware:15.1:update5:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp700f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700f_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700f_firmware:15.1:-:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700f_firmware:15.1:update1:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700f_firmware:15.1:update2:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700f_firmware:15.1:update3:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700f_firmware:15.1:update4:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp700f_firmware:15.1:update5:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900_firmware:15.1:-:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900_firmware:15.1:update1:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900_firmware:15.1:update2:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900_firmware:15.1:update3:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900_firmware:15.1:update4:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900_firmware:15.1:update5:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_hmi_ktp_mobile_panels_ktp900f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900f_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900f_firmware:15.1:-:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900f_firmware:15.1:update1:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900f_firmware:15.1:update2:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900f_firmware:15.1:update3:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900f_firmware:15.1:update4:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_hmi_ktp_mobile_panels_ktp900f_firmware:15.1:update5:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:15.1:-:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:15.1:update1:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:15.1:update2:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:15.1:update3:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:15.1:update4:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simatic_wincc_runtime_advanced:15.1:update5:*:*:*:*:*:*']",0,0
CVE-2021-27391,Siemens,0.0082,9.8,0.0,1.0,0.0,0.0,1,2021-09-14,1.0,2021-09-14,,,1.0,"A vulnerability has been identified in APOGEE MBC (PPC) (P2 Ethernet) (All versions >= V2.6.3), APOGEE MEC (PPC) (P2 Ethernet) (All versions >= V2.6.3), APOGEE PXC Compact (BACnet) (All versions < V3.5.3), APOGEE PXC Compact (P2 Ethernet) (All versions >= V2.8), APOGEE PXC Modular (BACnet) (All versions < V3.5.3), APOGEE PXC Modular (P2 Ethernet) (All versions >= V2.8), TALON TC Compact (BACnet) (All versions < V3.5.3), TALON TC Modular (BACnet) (All versions < V3.5.3). The web server of affected devices lacks proper bounds checking when parsing the Host parameter in HTTP requests, which could lead to a buffer overflow. An unauthenticated remote attacker could exploit this vulnerability to execute arbitrary code on the device with root privileges.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-120'],"['cpe:2.3:o:siemens:apogee_mbc_\\(ppc\\)_\\(p2_ethernet\\)_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:apogee_mbc_\\(ppc\\)_\\(p2_ethernet\\):*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:apogee_mec_\\(ppc\\)_\\(p2_ethernet\\)_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:apogee_mec_\\(ppc\\)_\\(p2_ethernet\\):*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:apogee_pxc_bacnet_automation_controller_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:apogee_pxc_bacnet_automation_controller:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:apogee_pxc_compact_\\(p2_ethernet\\)_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:apogee_pxc_compact_\\(p2_ethernet\\):*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:apogee_pxc_modular_\\(bacnet\\)_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:apogee_pxc_modular_\\(bacnet\\):*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:apogee_pxc_modular_\\(p2_ethernet\\)_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:apogee_pxc_modular_\\(p2_ethernet\\):*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:talon_tc_compact_\\(bacnet\\)_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:talon_tc_compact_\\(bacnet\\):*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:talon_tc_modular_\\(bacnet\\)_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:talon_tc_modular_\\(bacnet\\):*:*:*:*:*:*:*:*']",0,0
CVE-2021-27393,Siemens,0.00084,5.3,0.0,0.0,1.0,0.0,1,2021-04-22,1.0,2021-11-09,,,0.0,"A vulnerability has been identified in Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2013.08), Nucleus Source Code (Versions including affected DNS modules). The DNS client does not properly randomize UDP port numbers of DNS requests. That could allow an attacker to poison the DNS cache or spoof DNS resolving.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,LOW,NONE,MEDIUM,3.9,1.4,['CWE-330'],"['cpe:2.3:a:siemens:nucleus_net:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:nucleus_readystart_v3:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:nucleus_source_code:-:*:*:*:*:*:*:*']",0,0
CVE-2021-29998,Siemens,0.0041,9.8,0.0,1.0,0.0,0.0,1,2021-04-13,1.0,2022-05-10,,,0.0,An issue was discovered in Wind River VxWorks before 6.5. There is a possible heap overflow in dhcp client.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:o:windriver:vxworks:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:ruggedcom_win_subscriber_station:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:ruggedcom_win_subscriber_station_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x200-4_p_irt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x200-4_p_irt_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x201-3p_irt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x201-3p_irt_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x201-3p_irt_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x201-3p_irt_pro_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x202-2_irt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x202-2_irt_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x202-2p_irt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x202-2p_irt_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x202-2p_irt_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x202-2p_irt_pro_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x204_irt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x204_irt_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x204_irt_pro_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x204_irt_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x204-2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x204-2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x204-2fm_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x204-2fm:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x204-2ld_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x204-2ld:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x204-2ld_ts_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x204-2ld_ts:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x204-2ts_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x204-2ts:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x206-1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x206-1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x206-1ld_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x206-1ld:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x208_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x208:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x208_pro_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x208_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x212-2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x212-2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x212-2ld_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x212-2ld:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x216_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x216:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x224_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x224:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x300_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x300:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x408_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x408:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_xf201-3p_irt_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_xf201-3p_irt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_xf202-2p_irt_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_xf202-2p_irt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_xf204_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_xf204:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_xf204_irt_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_xf204_irt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_xf204-2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_xf204-2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_xf204-2ba_irt_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_xf204-2ba_irt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_xf206-1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_xf206-1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_xf208_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_xf208:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_rf_181_eip_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_rf_181_eip:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_rf_182c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_rf_182c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:sinamics_perfect_harmony_gh180_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:sinamics_perfect_harmony_gh180:-:*:*:*:*:*:*:*']",0,0
CVE-2021-41534,Siemens,0.00066,3.3,0.0,1.0,1.0,0.0,1,2021-09-28,1.0,2021-09-28,,,1.0,"A vulnerability has been identified in NX 1980 Series (All versions < V1984), Solid Edge SE2021 (All versions < SE2021MP8). The affected application is vulnerable to an out of bounds read past the end of an allocated buffer when parsing JT files. An attacker could leverage this vulnerability to leak information in the context of the current process (ZDI-CAN-13703).",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,LOW,NONE,NONE,LOW,1.8,1.4,['CWE-125'],"['cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:solid_edge:se2021:-:*:*:*:*:*:*', 'cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack1:*:*:*:*:*:*', 'cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack2:*:*:*:*:*:*', 'cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack3:*:*:*:*:*:*', 'cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack4:*:*:*:*:*:*', 'cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack5:*:*:*:*:*:*', 'cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack6:*:*:*:*:*:*', 'cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack7:*:*:*:*:*:*', 'cpe:2.3:o:siemens:nx_1984_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:nx_1984:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:nx_1988_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:nx_1988:-:*:*:*:*:*:*:*']",0,0
CVE-2022-22826,Siemens,0.01343,8.8,0.0,0.0,1.0,0.0,1,2022-01-10,1.0,2022-06-14,,,0.0,nextScaffoldPart in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-190'],"['cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*', 'cpe:2.3:a:tenable:nessus:*:*:*:*:*:*:*:*', 'cpe:2.3:a:tenable:nessus:*:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:sinema_remote_connect_server:*:*:*:*:*:*:*:*']",0,0
CVE-2022-23102,Siemens,0.00403,6.1,0.0,0.0,1.0,0.0,1,2022-02-09,1.0,2022-02-08,,,1.0,A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V2.0). Affected products contain an open redirect vulnerability. An attacker could trick a valid authenticated user to the device into clicking a malicious link there by leading to phishing attacks.,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-601'],['cpe:2.3:a:siemens:sinema_remote_connect_server:*:*:*:*:*:*:*:*'],0,0
CVE-2022-23312,Siemens,0.00073,6.1,0.0,0.0,1.0,0.0,1,2022-02-09,1.0,2022-02-08,,,1.0,"A vulnerability has been identified in Spectrum Power 4 (All versions < V4.70 SP9 Security Patch 1). The integrated web application ""Online Help"" in affected product contains a Cross-Site Scripting (XSS) vulnerability that could be exploited if unsuspecting users are tricked into accessing a malicious link.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:a:siemens:spectrum_power_4:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:spectrum_power_4:4.70:-:*:*:*:*:*:*', 'cpe:2.3:a:siemens:spectrum_power_4:4.70:sp7:*:*:*:*:*:*', 'cpe:2.3:a:siemens:spectrum_power_4:4.70:sp8:*:*:*:*:*:*']",0,0
CVE-2022-26335,Siemens,0.00178,7.5,0.0,1.0,0.0,0.0,1,2022-04-12,1.0,2022-04-12,,,1.0,"A vulnerability has been identified in SCALANCE X302-7 EEC (230V), SCALANCE X302-7 EEC (230V, coated), SCALANCE X302-7 EEC (24V), SCALANCE X302-7 EEC (24V, coated), SCALANCE X302-7 EEC (2x 230V), SCALANCE X302-7 EEC (2x 230V, coated), SCALANCE X302-7 EEC (2x 24V), SCALANCE X302-7 EEC (2x 24V, coated), SCALANCE X304-2FE, SCALANCE X306-1LD FE, SCALANCE X307-2 EEC (230V), SCALANCE X307-2 EEC (230V, coated), SCALANCE X307-2 EEC (24V), SCALANCE X307-2 EEC (24V, coated), SCALANCE X307-2 EEC (2x 230V), SCALANCE X307-2 EEC (2x 230V, coated), SCALANCE X307-2 EEC (2x 24V), SCALANCE X307-2 EEC (2x 24V, coated), SCALANCE X307-3, SCALANCE X307-3, SCALANCE X307-3LD, SCALANCE X307-3LD, SCALANCE X308-2, SCALANCE X308-2, SCALANCE X308-2LD, SCALANCE X308-2LD, SCALANCE X308-2LH, SCALANCE X308-2LH, SCALANCE X308-2LH+, SCALANCE X308-2LH+, SCALANCE X308-2M, SCALANCE X308-2M, SCALANCE X308-2M PoE, SCALANCE X308-2M PoE, SCALANCE X308-2M TS, SCALANCE X308-2M TS, SCALANCE X310, SCALANCE X310, SCALANCE X310FE, SCALANCE X310FE, SCALANCE X320-1 FE, SCALANCE X320-1-2LD FE, SCALANCE X408-2, SCALANCE XR324-12M (230V, ports on front), SCALANCE XR324-12M (230V, ports on front), SCALANCE XR324-12M (230V, ports on rear), SCALANCE XR324-12M (230V, ports on rear), SCALANCE XR324-12M (24V, ports on front), SCALANCE XR324-12M (24V, ports on front), SCALANCE XR324-12M (24V, ports on rear), SCALANCE XR324-12M (24V, ports on rear), SCALANCE XR324-12M TS (24V), SCALANCE XR324-12M TS (24V), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (24V, ports on front), SCALANCE XR324-4M EEC (24V, ports on front), SCALANCE XR324-4M EEC (24V, ports on rear), SCALANCE XR324-4M EEC (24V, ports on rear), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on front), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC, ports on rear), SCALANCE XR324-4M EEC (2x 24V, ports on front), SCALANCE XR324-4M EEC (2x 24V, ports on front), SCALANCE XR324-4M EEC (2x 24V, ports on rear), SCALANCE XR324-4M EEC (2x 24V, ports on rear), SCALANCE XR324-4M PoE (230V, ports on front), SCALANCE XR324-4M PoE (230V, ports on rear), SCALANCE XR324-4M PoE (24V, ports on front), SCALANCE XR324-4M PoE (24V, ports on rear), SCALANCE XR324-4M PoE TS (24V, ports on front), SIPLUS NET SCALANCE X308-2. Affected devices do not properly validate the URI of incoming HTTP GET requests. This could allow an unauthenticated remote attacker to crash affected devices.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-120'],"['cpe:2.3:o:siemens:scalance_x302-7eec_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x302-7eec:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x304-2fe_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x304-2fe:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x306-1ldfe_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x306-1ldfe:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x307-2eec_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x307-2eec:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x307-3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x307-3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x307-3ld_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x307-3ld:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x308-2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x308-2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x308-2ld_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x308-2ld:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x308-2lh_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x308-2lh:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x308-2lh\\+_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x308-2lh\\+:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x308-2m_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x308-2m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x308-2m_poe_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x308-2m_poe:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x308-2m_ts_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x308-2m_ts:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x310_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x310:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x310fe_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x310fe:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x320-1fe_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x320-1fe:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x320-1-2ldfe_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x320-1-2ldfe:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x408-2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x408-2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_xr324-4m_eec_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_xr324-4m_eec:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_xr324-4m_poe_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_xr324-4m_poe:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_xr324-4m_poe_ts_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_xr324-4m_poe_ts:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_xr324-12m_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_xr324-12m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_xr324-12m_ts_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_xr324-12m_ts:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:siplus_net_scalance_x308-2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:siplus_net_scalance_x308-2:-:*:*:*:*:*:*:*']",0,0
CVE-2022-26649,Siemens,0.00164,7.5,0.0,1.0,0.0,0.0,1,2022-07-12,1.0,2022-07-12,,,1.0,"A vulnerability has been identified in SCALANCE X200-4P IRT (All versions < V5.5.2), SCALANCE X201-3P IRT (All versions < V5.5.2), SCALANCE X201-3P IRT PRO (All versions < V5.5.2), SCALANCE X202-2IRT (All versions < V5.5.2), SCALANCE X202-2IRT (All versions < V5.5.2), SCALANCE X202-2P IRT (All versions < V5.5.2), SCALANCE X202-2P IRT PRO (All versions < V5.5.2), SCALANCE X204-2 (All versions < V5.2.6), SCALANCE X204-2FM (All versions < V5.2.6), SCALANCE X204-2LD (All versions < V5.2.6), SCALANCE X204-2LD TS (All versions < V5.2.6), SCALANCE X204-2TS (All versions < V5.2.6), SCALANCE X204IRT (All versions < V5.5.2), SCALANCE X204IRT (All versions < V5.5.2), SCALANCE X204IRT PRO (All versions < V5.5.2), SCALANCE X206-1 (All versions < V5.2.6), SCALANCE X206-1LD (All versions < V5.2.6), SCALANCE X208 (All versions < V5.2.6), SCALANCE X208PRO (All versions < V5.2.6), SCALANCE X212-2 (All versions < V5.2.6), SCALANCE X212-2LD (All versions < V5.2.6), SCALANCE X216 (All versions < V5.2.6), SCALANCE X224 (All versions < V5.2.6), SCALANCE XF201-3P IRT (All versions < V5.5.2), SCALANCE XF202-2P IRT (All versions < V5.5.2), SCALANCE XF204 (All versions < V5.2.6), SCALANCE XF204-2 (All versions < V5.2.6), SCALANCE XF204-2BA IRT (All versions < V5.5.2), SCALANCE XF204IRT (All versions < V5.5.2), SCALANCE XF206-1 (All versions < V5.2.6), SCALANCE XF208 (All versions < V5.2.6). Affected devices do not properly validate the URI of incoming HTTP GET requests. This could allow an unauthenticated remote attacker to crash affected devices.",CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,CHANGED,HIGH,HIGH,HIGH,CRITICAL,2.8,6.0,['CWE-120'],"['cpe:2.3:o:siemens:scalance_x204-2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x204-2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x204-2fm_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x204-2fm:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x204-2ld_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x204-2ld:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x204-2ld_ts_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x204-2ld_ts:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x204-2ts_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x204-2ts:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x206-1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x206-1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x206-1ld_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x206-1ld:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x208_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x208:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x208_pro_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x208_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x212-2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x212-2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x212-2ld_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x212-2ld:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x216_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x216:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x224_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x224:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_xf204_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_xf204:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_xf204-2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_xf204-2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_xf206-1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_xf206-1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_xf208_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_xf208:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x200-4p_irt_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x200-4p_irt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x201-3p_irt_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x201-3p_irt:-:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x201-3p_irt_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x201-3p_irt_pro_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x202-2irt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x202-2irt_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x202-2p_irt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x202-2p_irt_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x202-2p_irt_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x202-2p_irt_pro_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x204irt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x204irt_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_x204irt_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_x204irt_pro_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_xf201-3p_irt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_xf201-3p_irt_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_xf202-2p_irt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_xf202-2p_irt_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_xf204-2ba_irt_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_xf204-2ba_irt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_xf204irt_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_xf204irt:-:*:*:*:*:*:*:*']",0,0
CVE-2016-9042,Siemens,0.01865,5.9,0.0,1.0,0.0,0.0,0,2018-06-04,1.0,2021-06-08,,,0.0,An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate replies from targeted peers will fail the origin timestamp check (TEST2) causing the reply to be dropped and creating a denial of service condition.,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,HIGH,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.2,3.6,['CWE-20'],"['cpe:2.3:a:ntp:ntp:4.2.8:p9:*:*:*:*:*:*', 'cpe:2.3:o:freebsd:freebsd:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:freebsd:freebsd:11.0:*:*:*:*:*:*:*', 'cpe:2.3:a:hpe:hpux-ntp:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_net_cp_443-1_opc_ua_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_net_cp_443-1_opc_ua:-:*:*:*:*:*:*:*']",0,0
CVE-2018-20748,Siemens,0.00427,9.8,0.0,1.0,0.0,0.0,0,2019-01-30,1.0,2021-12-14,,,0.0,LibVNC before 0.9.12 contains multiple heap out-of-bounds write vulnerabilities in libvncclient/rfbproto.c. The fix for CVE-2018-20019 was incomplete.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:a:libvnc_project:libvncserver:*:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_itc1500_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_itc1500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_itc1500_pro_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_itc1500_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_itc1900_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_itc1900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_itc1900_pro_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_itc1900_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_itc2200_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_itc2200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_itc2200_pro_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_itc2200_pro:-:*:*:*:*:*:*:*']",0,0
CVE-2018-21247,Siemens,0.00216,7.5,0.0,1.0,0.0,0.0,0,2020-06-17,1.0,2021-12-14,,,0.0,An issue was discovered in LibVNCServer before 0.9.13. There is an information leak (of uninitialized memory contents) in the libvncclient/rfbproto.c ConnectToRFBRepeater function.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-909'],"['cpe:2.3:a:libvnc_project:libvncserver:*:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_itc1500_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_itc1500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_itc1500_pro_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_itc1500_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_itc1900_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_itc1900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_itc1900_pro_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_itc1900_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_itc2200_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_itc2200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_itc2200_pro_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_itc2200_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*']",0,0
CVE-2018-5380,Siemens,0.00463,4.3,0.0,1.0,0.0,0.0,0,2018-02-19,1.0,2019-04-09,,,0.0,"The Quagga BGP daemon (bgpd) prior to version 1.2.3 can overrun internal BGP code-to-string conversion tables used for debug by 1 pointer value, based on input.",CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L,NETWORK,LOW,LOW,NONE,UNCHANGED,NONE,NONE,LOW,MEDIUM,2.8,1.4,['CWE-125'],"['cpe:2.3:a:quagga:quagga:*:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:ruggedcom_rox_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:ruggedcom_rox_ii:-:*:*:*:*:*:*:*']",0,0
CVE-2019-13935,Siemens,0.00054,5.4,0.0,0.0,1.0,0.0,0,2019-11-27,0.0,,0.0,,,Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in webclient of Siemens AG Polarion could allow an attacker to exploit a reflected XSS vulnerability. This issue affects: Siemens AG Polarion All versions < 19.2.,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,LOW,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.3,2.7,['CWE-79'],['cpe:2.3:a:siemens:polarion:*:*:*:*:*:*:*:*'],0,0
CVE-2020-11656,Siemens,0.01062,9.8,0.0,0.0,1.0,0.0,0,2020-04-09,1.0,2022-03-08,,,0.0,"In SQLite through 3.31.1, the ALTER TABLE implementation has a use-after-free, as demonstrated by an ORDER BY clause that belongs to a compound SELECT statement.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-416'],"['cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.2:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.1.2.4:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*', 'cpe:2.3:o:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*', 'cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*']",0,0
CVE-2020-12358,Siemens,0.00044,4.4,0.0,1.0,0.0,0.0,0,2021-06-09,1.0,2022-12-13,,,0.0,Out of bounds write in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable denial of service via local access.,CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H,LOCAL,LOW,HIGH,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,0.8,3.6,['CWE-787'],"['cpe:2.3:o:intel:bios:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-l13g4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-l16g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1060ng7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-11700b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6498du:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6500u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6560u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6567u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6600u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6650u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6660u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6700:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6700hq:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6700k:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6700t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6700te:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6770hq:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6785r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6820eq:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6820hk:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6820hq:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6822eq:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6870hq:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6920hq:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6970hq:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-10900x:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-10920x:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-10940x:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-10980xe:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_bronze_3206r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1513n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1518:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1520:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1521:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1523n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1524n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1527:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1528:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1529:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1531:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1533n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1537:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1539:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1540:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1541:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1543n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1548:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1553n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1557:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1559:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1563n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1567:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1571:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1573n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1577:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1581:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1587:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1602:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1612:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1622:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1623n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1627:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1632:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1633n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1637:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1649n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1653n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2191:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2104g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2254me:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2254ml:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2276me:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2276ml:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1205_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1220_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1220_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1225_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1225_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1230_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1230_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1235l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1240_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1240_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1240l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1245_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1245_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1260l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1268l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1270_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1270_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1275_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1275_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1280_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1280_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1285_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1501l_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1501m_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1505l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1505l_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1505m_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1505m_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1515m_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1535m_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1535m_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1545m_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1558l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1565l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1575m_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1578l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1585_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1585l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1428l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1603_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1603_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1607_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1607_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1620_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1620_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1630_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1630_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1650_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1650_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1660_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1660_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1680_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1680_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2408l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2418l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2428l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2438l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2603_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2603_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2608l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2608l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2609_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2609_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2618l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2618l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2620_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2620_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2623_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2623_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2628l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2628l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2630_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2630_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2630l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2630l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2637_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2637_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2640_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2640_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2643_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2643_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2648l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2648l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2650_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2650_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2650l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2650l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2658_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2658_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2658a_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2660_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2660_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2667_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2667_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2670_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2679_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2680_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2680_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2683_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2683_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2685_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2687w_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2687w_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2689_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2690_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2690_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2695_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2695_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2697_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2697_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2697a_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2698_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2698_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2699_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2699_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2699a_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2699r_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4610_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4610_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4620_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4620_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4627_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4627_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4628l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4640_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4640_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4648_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4650_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4650_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4655_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4655_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4660_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4660_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4667_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4667_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4669_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4669_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-4809_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-4820_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-4830_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-4850_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8855_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8860_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8867_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8870_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8880_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8890_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8891_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8893_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8894_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5115:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5117:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5117f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5118:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5119t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5120:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5120t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5122:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5218r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5219y:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5220r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6122:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6126:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6126f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6126t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6128:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6129:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6130:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6130f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6130h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6130t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6132:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6134:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6134m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6135:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6136:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6137:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6138:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6138f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6138p:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6138t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6140:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6140m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6142:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6142f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6142m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6143:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6144:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6146:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6148:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6148f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6150:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6152:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6154:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6162:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6208u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6222:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6226r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6230n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6230r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6230t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6234:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6240r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6242r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6246r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6248r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6250:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6250l:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6256:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6258r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6262:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6269y:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8153:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8156:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8158:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8160:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8160f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8160h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8160m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8160t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8164:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8165:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8168:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8170:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8170m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8174:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8176:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8176f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8176m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8180:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8180m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8274:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8284:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_9221:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_9222:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4106h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4108:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4109t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4110:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4112:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4114:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4114t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4116:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4116t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4123:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4210r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4210t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4214r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4215r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-11855m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-11955m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1250e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1250te:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1270e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1270te:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1290e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1290te:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1350:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1350p:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1370:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1370p:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1390:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1390p:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1390t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2102:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2104:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2123:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2125:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2133:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2135:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2145:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2155:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2175:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2195:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2223:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2225:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2235:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2245:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2255:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2265:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2275:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2295:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3175x:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3235:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:aff_bios:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:e-series_bios:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:fas_bios:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:hci_compute_node_bios:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:hci_storage_node_bios:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:solidfire_bios:-:*:*:*:*:*:*:*']",0,0
CVE-2020-12360,Siemens,0.00044,7.8,0.0,1.0,0.0,0.0,0,2021-06-09,1.0,2022-12-13,,,0.0,Out of bounds read in the firmware for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via local access.,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-125'],"['cpe:2.3:o:intel:bios:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-l13g4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-l16g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1060ng7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-11700b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6498du:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6500u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6560u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6567u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6600u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6650u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6660u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6700:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6700hq:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6700k:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6700t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6700te:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6770hq:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6785r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6820eq:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6820hk:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6820hq:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6822eq:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6870hq:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6920hq:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6970hq:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-10900x:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-10920x:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-10940x:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-10980xe:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_bronze_3206r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1513n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1518:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1520:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1521:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1523n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1524n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1527:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1528:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1529:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1531:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1533n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1537:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1539:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1540:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1541:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1543n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1548:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1553n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1557:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1559:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1563n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1567:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1571:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1573n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1577:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1581:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1587:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1602:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1612:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1622:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1623n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1627:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1632:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1633n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1637:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1649n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1653n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2191:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2104g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2254me:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2254ml:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2276me:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2276ml:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1205_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1220_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1220_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1225_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1225_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1230_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1230_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1235l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1240_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1240_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1240l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1245_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1245_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1260l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1268l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1270_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1270_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1275_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1275_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1280_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1280_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1285_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1501l_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1501m_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1505l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1505l_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1505m_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1505m_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1515m_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1535m_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1535m_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1545m_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1558l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1565l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1575m_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1578l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1585_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1585l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1428l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1603_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1603_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1607_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1607_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1620_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1620_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1630_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1630_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1650_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1650_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1660_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1660_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1680_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1680_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2408l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2418l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2428l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2438l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2603_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2603_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2608l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2608l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2609_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2609_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2618l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2618l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2620_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2620_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2623_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2623_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2628l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2628l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2630_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2630_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2630l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2630l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2637_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2637_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2640_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2640_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2643_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2643_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2648l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2648l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2650_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2650_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2650l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2650l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2658_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2658_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2658a_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2660_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2660_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2667_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2667_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2670_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2679_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2680_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2680_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2683_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2683_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2685_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2687w_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2687w_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2689_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2690_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2690_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2695_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2695_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2697_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2697_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2697a_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2698_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2698_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2699_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2699_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2699a_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2699r_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4610_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4610_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4620_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4620_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4627_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4627_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4628l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4640_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4640_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4648_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4650_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4650_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4655_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4655_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4660_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4660_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4667_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4667_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4669_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4669_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-4809_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-4820_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-4830_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-4850_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8855_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8860_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8867_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8870_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8880_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8890_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8891_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8893_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8894_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5115:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5117:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5117f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5118:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5119t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5120:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5120t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5122:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5218r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5219y:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5220r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6122:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6126:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6126f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6126t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6128:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6129:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6130:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6130f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6130h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6130t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6132:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6134:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6134m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6135:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6136:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6137:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6138:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6138f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6138p:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6138t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6140:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6140m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6142:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6142f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6142m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6143:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6144:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6146:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6148:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6148f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6150:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6152:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6154:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6162:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6208u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6222:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6226r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6230n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6230r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6230t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6234:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6240r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6242r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6246r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6248r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6250:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6250l:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6256:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6258r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6262:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6269y:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8153:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8156:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8158:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8160:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8160f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8160h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8160m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8160t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8164:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8165:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8168:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8170:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8170m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8174:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8176:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8176f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8176m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8180:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8180m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8274:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8284:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_9221:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_9222:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4106h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4108:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4109t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4110:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4112:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4114:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4114t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4116:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4116t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4123:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4210r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4210t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4214r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4215r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-11855m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-11955m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1250e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1250te:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1270e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1270te:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1290e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1290te:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1350:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1350p:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1370:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1370p:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1390:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1390p:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1390t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2102:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2104:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2123:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2125:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2133:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2135:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2145:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2155:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2175:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2195:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2223:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2225:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2235:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2245:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2255:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2265:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2275:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2295:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3175x:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3235:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:aff_bios:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:e-series_bios:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:fas_bios:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:hci_compute_node_bios:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:hci_storage_node_bios:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:solidfire_bios:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_cpu_1518-4_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_cpu_1518-4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_cpu_1518f-4_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_cpu_1518f-4:-:*:*:*:*:*:*:*']",0,0
CVE-2020-13631,Siemens,0.00105,5.5,0.0,0.0,1.0,0.0,0,2020-05-27,1.0,2022-03-08,,,0.0,"SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N,LOCAL,LOW,LOW,NONE,UNCHANGED,NONE,HIGH,NONE,MEDIUM,1.8,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*', 'cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:solidfire\\,_enterprise_sds_\\&_hci_storage_node:-:*:*:*:*:*:*:*', 'cpe:2.3:o:brocade:fabric_operating_system:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:hci_compute_node_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*', 'cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*', 'cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:outside_in_technology:8.5.4:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*']",0,0
CVE-2020-14396,Siemens,0.00164,7.5,0.0,1.0,0.0,0.0,0,2020-06-17,1.0,2021-11-14,,,0.0,An issue was discovered in LibVNCServer before 0.9.13. libvncclient/tls_openssl.c has a NULL pointer dereference.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-476'],"['cpe:2.3:a:libvnc_project:libvncserver:*:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_itc1500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_itc1500_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_itc1500_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_itc1500_pro_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_itc1900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_itc1900_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_itc1900_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_itc1900_pro_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_itc2200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_itc2200_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_itc2200_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_itc2200_pro_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2020-14405,Siemens,0.00178,6.5,0.0,1.0,0.0,0.0,0,2020-06-17,1.0,2021-12-14,,,0.0,An issue was discovered in LibVNCServer before 0.9.13. libvncclient/rfbproto.c does not limit TextChat size.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.8,3.6,['CWE-770'],"['cpe:2.3:a:libvnc_project:libvncserver:*:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_itc1500_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_itc1500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_itc1500_pro_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_itc1500_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_itc1900_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_itc1900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_itc1900_pro_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_itc1900_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_itc2200_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_itc2200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_itc2200_pro_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_itc2200_pro:-:*:*:*:*:*:*:*']",0,0
CVE-2020-7590,Siemens,0.00061,6.8,0.0,1.0,0.0,0.0,0,2020-10-13,0.0,,1.0,2020-10-13,,"A vulnerability has been identified in DCA Vantage Analyzer (All versions < V4.5 are affected by CVE-2020-7590. In addition, serial numbers < 40000 running software V4.4.0 are also affected by CVE-2020-15797). Affected devices use a hard-coded password to protect the onboard database. This could allow an attacker to read and or modify the onboard database. Successful exploitation requires direct physical access to the device.",CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,PHYSICAL,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.9,5.9,['CWE-259'],"['cpe:2.3:h:siemens:dca_vantage_analyzer:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:dca_vantage_analyzer_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2020-8285,Siemens,0.0071,7.5,0.0,0.0,1.0,0.0,0,2020-12-14,1.0,2022-03-08,,,0.0,curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-674'],"['cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:hci_bootstrap_os:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:hci_storage_node:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:hci_storage_node_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.3.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.14.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:essbase:21.2:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*', 'cpe:2.3:h:fujitsu:m10-1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:fujitsu:m10-1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:fujitsu:m10-4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:fujitsu:m10-4_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:fujitsu:m10-4s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:fujitsu:m10-4s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:fujitsu:m12-1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:fujitsu:m12-1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:fujitsu:m12-2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:fujitsu:m12-2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:fujitsu:m12-2s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:fujitsu:m12-2s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:fujitsu:m10-1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:fujitsu:m10-1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:fujitsu:m10-4_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:fujitsu:m10-4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:fujitsu:m10-4s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:fujitsu:m10-4s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:fujitsu:m12-1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:fujitsu:m12-1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:fujitsu:m12-2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:fujitsu:m12-2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:fujitsu:m12-2s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:fujitsu:m12-2s:-:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*', 'cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*', 'cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*', 'cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:*']",0,0
CVE-2020-8625,Siemens,0.18732,8.1,0.0,0.0,1.0,0.0,0,2021-02-17,1.0,2022-03-08,,,0.0,"BIND servers are vulnerable if they are running an affected version and are configured to use GSS-TSIG features. In a configuration which uses BIND's default settings the vulnerable code path is not exposed, but a server can be rendered vulnerable by explicitly setting valid values for the tkey-gssapi-keytab or tkey-gssapi-credentialconfiguration options. Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers. The most likely outcome of a successful exploitation of the vulnerability is a crash of the named process. However, remote code execution, while unproven, is theoretically possible. Affects: BIND 9.5.0 -> 9.11.27, 9.12.0 -> 9.16.11, and versions BIND 9.11.3-S1 -> 9.11.27-S1 and 9.16.8-S1 -> 9.16.11-S1 of BIND Supported Preview Edition. Also release versions 9.17.0 -> 9.17.1 of the BIND 9.17 development branch",CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,HIGH,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.2,5.9,['CWE-120'],"['cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*', 'cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*', 'cpe:2.3:a:isc:bind:9.11.3:s1:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.11.5:s3:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.11.5:s5:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.11.6:s1:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.11.7:s1:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.11.8:s1:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.11.21:s1:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.11.27:s1:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.16.8:s1:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.16.11:s1:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.17.0:*:*:*:*:*:*:*', 'cpe:2.3:a:isc:bind:9.17.1:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:a250:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:a250_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:500f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:500f_firmware:-:*:*:*:*:*:*:*']",0,0
CVE-2020-9272,Siemens,0.0016,7.5,0.0,1.0,0.0,0.0,0,2020-02-20,1.0,2022-06-14,,,0.0,ProFTPD 1.3.7 has an out-of-bounds (OOB) read vulnerability in mod_cap via the cap_text.c cap_to_text function.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-125'],"['cpe:2.3:a:proftpd:proftpd:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_net_cp_1543-1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_net_cp_1543-1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_net_cp_1545-1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_net_cp_1545-1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*', 'cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*']",0,0
CVE-2020-9273,Siemens,0.07013,8.8,0.0,1.0,0.0,0.0,0,2020-02-20,1.0,2022-06-14,,,0.0,"In ProFTPD 1.3.7, it is possible to corrupt the memory pool by interrupting the data transfer channel. This triggers a use-after-free in alloc_pool in pool.c, and possible remote code execution.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-416'],"['cpe:2.3:a:proftpd:proftpd:1.3.7:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*', 'cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*', 'cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_net_cp_1545-1_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_net_cp_1545-1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_net_cp_1543-1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_net_cp_1543-1:-:*:*:*:*:*:*:*']",0,0
CVE-2021-22884,Siemens,0.00545,7.5,0.0,0.0,1.0,0.0,0,2021-03-03,1.0,2022-03-08,,,0.0,"Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes “localhost6”. When “localhost6” is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the “localhost6” domain. As long as the attacker uses the “localhost6” domain, they can still apply the attack described in CVE-2018-7160.",CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,HIGH,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.6,5.9,"['NVD-CWE-Other', 'CWE-350']","['cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*', 'cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*', 'cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:graalvm:19.3.5:*:*:*:enterprise:*:*:*', 'cpe:2.3:a:oracle:graalvm:20.3.1.2:*:*:*:enterprise:*:*:*', 'cpe:2.3:a:oracle:graalvm:21.0.0.2:*:*:*:enterprise:*:*:*', 'cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:*:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:nosql_database:*:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*']",0,0
CVE-2021-22923,Siemens,0.00191,5.3,0.0,0.0,1.0,0.0,0,2021-08-05,1.0,2022-03-08,,,0.0,"When curl is instructed to get content using the metalink feature, and a user name and password are used to download the metalink XML file, those same credentials are then subsequently passed on to each of the servers from which curl will download or try to download the contents from. Often contrary to the user's expectations and intentions and without telling the user it happened.",CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N,NETWORK,HIGH,NONE,REQUIRED,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.6,3.6,['CWE-319'],"['cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*', 'cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*', 'cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*', 'cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:*']",0,0
CVE-2021-25215,Siemens,0.0674,7.5,0.0,0.0,1.0,0.0,0,2021-04-29,1.0,2022-03-08,,,0.0,"In BIND 9.0.0 -> 9.11.29, 9.12.0 -> 9.16.13, and versions BIND 9.9.3-S1 -> 9.11.29-S1 and 9.16.8-S1 -> 9.16.13-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.11 of the BIND 9.17 development branch, when a vulnerable version of named receives a query for a record triggering the flaw described above, the named process will terminate due to a failed assertion check. The vulnerability affects all currently maintained BIND 9 branches (9.11, 9.11-S, 9.16, 9.16-S, 9.17) as well as all other versions of BIND 9.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-617'],"['cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*', 'cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*', 'cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*', 'cpe:2.3:a:isc:bind:9.9.3:s1:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.9.12:s1:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.9.13:s1:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.10.5:s1:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.10.7:s1:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.11.3:s1:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.11.5:s3:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.11.5:s5:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.11.5:s6:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.11.6:s1:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.11.7:s1:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.11.8:s1:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.11.12:s1:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.11.21:s1:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.11.27:s1:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.11.29:s1:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.16.8:s1:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.16.11:s1:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.16.13:s1:*:*:supported_preview:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*', 'cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:a250_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:a250:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:500f_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:500f:-:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:tekelec_platform_distribution:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*']",0,0
CVE-2021-25219,Siemens,0.00707,5.3,0.0,0.0,1.0,0.0,0,2021-10-27,1.0,2022-03-08,,,0.0,"In BIND 9.3.0 -> 9.11.35, 9.12.0 -> 9.16.21, and versions 9.9.3-S1 -> 9.11.35-S1 and 9.16.8-S1 -> 9.16.21-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.18 of the BIND 9.17 development branch, exploitation of broken authoritative servers using a flaw in response processing can cause degradation in BIND resolver performance. The way the lame cache is currently designed makes it possible for its internal data structures to grow almost infinitely, which may cause significant delays in client query processing.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,LOW,MEDIUM,3.9,1.4,['NVD-CWE-noinfo'],"['cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*', 'cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*', 'cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*', 'cpe:2.3:a:isc:bind:9.9.3:s1:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.9.12:s1:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.9.13:s1:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.10.5:s1:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.10.7:s1:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.11.3:s1:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.11.5:s3:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.11.5:s5:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.11.5:s6:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.11.6:s1:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.11.7:s1:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.11.8:s1:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.11.12:s1:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.11.21:s1:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.11.27:s1:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.11.29:s1:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.11.35:s1:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.16.8:s1:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.16.11:s1:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.16.13:s1:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.16.21:s1:*:*:supported_preview:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*']",0,0
CVE-2021-25678,Siemens,0.00078,7.8,0.0,0.0,1.0,0.0,0,2021-04-22,1.0,2021-06-08,,,0.0,"A vulnerability has been identified in Solid Edge SE2020 (All versions < SE2020MP13), Solid Edge SE2020 (All versions < SE2020MP14), Solid Edge SE2021 (All Versions < SE2021MP4). Affected applications lack proper validation of user-supplied data when parsing PAR files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12529)",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-787'],"['cpe:2.3:a:siemens:solid_edge_se2020:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:solid_edge_se2021:*:*:*:*:*:*:*:*']",0,0
CVE-2021-27290,Siemens,0.00242,7.5,0.0,0.0,1.0,0.0,0,2021-03-12,1.0,2022-03-08,,,0.0,"ssri 5.2.2-8.0.0, fixed in 8.0.1, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['NVD-CWE-Other'],"['cpe:2.3:a:ssri_project:ssri:*:*:*:*:*:node.js:*:*', 'cpe:2.3:a:ssri_project:ssri:*:*:*:*:*:node.js:*:*', 'cpe:2.3:a:oracle:graalvm:20.3.3:*:*:*:enterprise:*:*:*', 'cpe:2.3:a:oracle:graalvm:21.2.0:*:*:*:enterprise:*:*:*', 'cpe:2.3:a:siemens:sinec_infrastructure_network_services:*:*:*:*:*:*:*:*']",0,0
CVE-2021-27382,Siemens,0.00606,7.8,0.0,0.0,1.0,0.0,0,2021-04-22,1.0,2021-06-08,,,0.0,"A vulnerability has been identified in Solid Edge SE2020 (All versions < SE2020MP13), Solid Edge SE2020 (All versions < SE2020MP14), Solid Edge SE2021 (All Versions < SE2021MP4). Affected applications lack proper validation of user-supplied data when parsing of PAR files. This could result in a stack based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-13040)",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,"['CWE-121', 'CWE-787']","['cpe:2.3:a:siemens:solid_edge_se2020:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:solid_edge_se2021:*:*:*:*:*:*:*:*']",0,0
CVE-2021-27387,Siemens,0.00078,7.8,0.0,0.0,1.0,0.0,0,2021-06-08,1.0,2021-06-08,,,1.0,"A vulnerability has been identified in Simcenter Femap 2020.2 (All versions < V2020.2.MP3), Simcenter Femap 2021.1 (All versions < V2021.1.MP3). The femap.exe application lacks proper validation of user-supplied data when parsing FEMAP files. This could result in an out of bounds write past the end of an allocated structure, a different vulnerability than CVE-2021-27399. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12819)",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-787'],"['cpe:2.3:a:siemens:simcenter_femap:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simcenter_femap:2020.2:-:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simcenter_femap:2020.2:maintenance_pack1:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simcenter_femap:2020.2:maintenance_pack2:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simcenter_femap:2021.1:-:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simcenter_femap:2021.1:maintenance_pack1:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simcenter_femap:2021.1:maintenance_pack2:*:*:*:*:*:*']",0,0
CVE-2021-27389,Siemens,0.0017,9.8,0.0,0.0,1.0,0.0,0,2021-04-22,0.0,,1.0,2021-04-13,,"A vulnerability has been identified in Opcenter Quality (All versions < V12.2), QMS Automotive (All versions < V12.30). A private sign key is shipped with the product without adequate protection.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-321'],"['cpe:2.3:a:siemens:opcenter_quality:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:qms_automotive:*:*:*:*:*:*:*:*']",0,0
CVE-2021-27392,Siemens,0.00365,8.8,0.0,0.0,1.0,0.0,0,2021-04-22,1.0,2021-04-13,,,1.0,"A vulnerability has been identified in Siveillance Video Open Network Bridge (2020 R3), Siveillance Video Open Network Bridge (2020 R2), Siveillance Video Open Network Bridge (2020 R1), Siveillance Video Open Network Bridge (2019 R3), Siveillance Video Open Network Bridge (2019 R2), Siveillance Video Open Network Bridge (2019 R1), Siveillance Video Open Network Bridge (2018 R3), Siveillance Video Open Network Bridge (2018 R2). Affected Open Network Bridges store user credentials for the authentication between ONVIF clients and ONVIF server using a hard-coded key. The encrypted credentials can be retrieved via the MIP SDK. This could allow an authenticated remote attacker to retrieve and decrypt all credentials stored on the ONVIF server.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,"['CWE-798', 'CWE-321']","['cpe:2.3:a:siemens:siveillance_video_open_network_bridge:2018:r2:*:*:*:*:*:*', 'cpe:2.3:a:siemens:siveillance_video_open_network_bridge:2018:r3:*:*:*:*:*:*', 'cpe:2.3:a:siemens:siveillance_video_open_network_bridge:2019:r1:*:*:*:*:*:*', 'cpe:2.3:a:siemens:siveillance_video_open_network_bridge:2019:r2:*:*:*:*:*:*', 'cpe:2.3:a:siemens:siveillance_video_open_network_bridge:2019:r3:*:*:*:*:*:*', 'cpe:2.3:a:siemens:siveillance_video_open_network_bridge:2020:r1:*:*:*:*:*:*', 'cpe:2.3:a:siemens:siveillance_video_open_network_bridge:2020:r2:*:*:*:*:*:*', 'cpe:2.3:a:siemens:siveillance_video_open_network_bridge:2020:r3:*:*:*:*:*:*']",0,0
CVE-2021-27398,Siemens,0.0029,7.8,0.0,0.0,1.0,0.0,0,2021-05-12,1.0,2021-05-11,,,1.0,"A vulnerability has been identified in Tecnomatix Plant Simulation (All versions < V16.0.5). The PlantSimCore.dll library lacks proper validation of user-supplied data when parsing SPP files. This could result in a stack based buffer overflow, a different vulnerability than CVE-2021-27396. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-13290)",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-121'],['cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*'],0,0
CVE-2021-27399,Siemens,0.00078,7.8,0.0,0.0,1.0,0.0,0,2021-06-08,1.0,2021-06-08,,,1.0,"A vulnerability has been identified in Simcenter Femap 2020.2 (All versions < V2020.2.MP3), Simcenter Femap 2021.1 (All versions < V2021.1.MP3). The femap.exe application lacks proper validation of user-supplied data when parsing FEMAP files. This could result in an out of bounds write past the end of an allocated structure, a different vulnerability than CVE-2021-27387. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12820)",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-787'],"['cpe:2.3:a:siemens:simcenter_femap:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simcenter_femap:2020.2:-:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simcenter_femap:2020.2:maintenance_pack1:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simcenter_femap:2020.2:maintenance_pack2:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simcenter_femap:2021.1:-:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simcenter_femap:2021.1:maintenance_pack1:*:*:*:*:*:*', 'cpe:2.3:a:siemens:simcenter_femap:2021.1:maintenance_pack2:*:*:*:*:*:*']",0,0
CVE-2021-27490,Siemens,0.00136,7.8,0.0,1.0,0.0,0.0,0,2021-05-27,1.0,2021-05-25,,,1.0,"Datakit Software libraries CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior are vulnerable to an out-of-bounds read, which may allow an attacker to execute arbitrary code.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-125'],"['cpe:2.3:a:datakit:crosscadware:*:*:*:*:*:*:*:*', 'cpe:2.3:a:luxion:keyshot:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:solid_edge_se2020:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:solid_edge_se2020_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:solid_edge_se2021:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:solid_edge_se2021_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2021-27494,Siemens,0.00428,7.8,0.0,1.0,0.0,0.0,0,2021-05-27,1.0,2021-05-25,,,1.0,"Datakit Software libraries CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior lack proper validation of user-supplied data when parsing STP files. This could result in a stack-based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-121'],"['cpe:2.3:a:datakit:crosscadware:*:*:*:*:*:*:*:*', 'cpe:2.3:a:luxion:keyshot:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:solid_edge_se2020_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:solid_edge_se2020:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:solid_edge_se2021_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:solid_edge_se2021:-:*:*:*:*:*:*:*']",0,0
CVE-2021-44165,Siemens,0.00226,7.2,0.0,1.0,0.0,0.0,0,2021-12-14,1.0,2021-12-14,,,1.0,"A vulnerability has been identified in POWER METER SICAM Q100 (All versions < V2.41), POWER METER SICAM Q100 (All versions < V2.41), POWER METER SICAM Q100 (All versions < V2.41), POWER METER SICAM Q100 (All versions < V2.41). The affected firmware contains a buffer overflow vulnerability in the web application that could allow a remote attacker with engineer or admin priviliges to potentially perform remote code execution.",CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.2,5.9,['CWE-121'],"['cpe:2.3:o:siemens:7kg9501-0aa01-2aa1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:7kg9501-0aa01-2aa1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:7kg9501-0aa31-0aa1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:7kg9501-0aa31-0aa1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:7kg9501-0aa31-2aa1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:7kg9501-0aa31-2aa1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:7kg9501-0aa01-0aa1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:7kg9501-0aa01-0aa1:-:*:*:*:*:*:*:*']",0,0
CVE-2022-24282,Siemens,0.00088,7.2,0.0,0.0,1.0,0.0,0,2022-03-08,1.0,2022-10-11,,,0.0,"A vulnerability has been identified in SINEC NMS (All versions >= V1.0.3 < V2.0), SINEC NMS (All versions < V1.0.3), SINEMA Server V14 (All versions). The affected system allows to upload JSON objects that are deserialized to Java objects. Due to insecure deserialization of user-supplied content by the affected software, a privileged attacker could exploit this vulnerability by sending a maliciously crafted serialized Java object. This could allow the attacker to execute arbitrary code on the device with root privileges.",CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.2,5.9,['CWE-502'],['cpe:2.3:a:siemens:sinec_network_management_system:*:*:*:*:*:*:*:*'],0,0
CVE-2022-25311,Siemens,0.00044,7.2,0.0,0.0,1.0,0.0,0,2022-03-08,1.0,2022-10-11,,,0.0,"A vulnerability has been identified in SINEC NMS (All versions >= V1.0.3 < V2.0), SINEC NMS (All versions < V1.0.3), SINEMA Server V14 (All versions). The affected software do not properly check privileges between users during the same web browser session, creating an unintended sphere of control. This could allow an authenticated low privileged user to achieve privilege escalation.",CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.3,5.9,"['CWE-269', 'NVD-CWE-Other']","['cpe:2.3:a:siemens:sinec_network_management_system:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:sinema_server:14.0:*:*:*:*:*:*:*']",0,0
CVE-2022-27242,Siemens,0.00044,5.5,0.0,0.0,1.0,0.0,0,2022-05-20,1.0,2022-05-10,,,1.0,"A vulnerability has been identified in OpenV2G (V0.9.4). The OpenV2G EXI parsing feature is missing a length check when parsing X509 serial numbers. Thus, an attacker could introduce a buffer overflow that leads to memory corruption.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,1.8,3.6,['CWE-120'],['cpe:2.3:a:siemens:openv2g:0.9.4:*:*:*:*:*:*:*'],0,0
CVE-2022-27653,Siemens,0.00057,7.8,0.0,0.0,1.0,0.0,0,2022-05-20,1.0,2022-05-10,,,1.0,A vulnerability has been identified in Simcenter Femap (All versions < V2022.2). The affected application contains an out of bounds write past the end of an allocated structure while parsing specially crafted .NEU files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-15594),CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-787'],['cpe:2.3:a:siemens:simcenter_femap:*:*:*:*:*:*:*:*'],0,0
CVE-2016-7454,Vantiva,0.00129,8.0,1.0,1.0,0.0,1.0,1,2016-12-17,0.0,,0.0,,,"CSRF vulnerability on Technicolor TC dpc3941T (formerly Cisco dpc3941T) devices with firmware dpc3941-P20-18-v303r20421733-160413a-CMCST allows an attacker to change the Wi-Fi password, open the remote management interface, or reset the router.",CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.1,5.9,['CWE-352'],"['cpe:2.3:o:technicolor:xfinity_gateway_router_dpc3941t_firmware:dpc3941-p20-18-v303r20421733-160413a-cmcst:*:*:*:*:*:*:*', 'cpe:2.3:h:technicolor:xfinity_gateway_router_dpc3941t:-:*:*:*:*:*:*:*']",1,0
CVE-2017-11320,Vantiva,0.00141,6.1,1.0,1.0,0.0,1.0,1,2017-08-03,0.0,,0.0,,,Persistent XSS through the SSID of nearby Wi-Fi devices on Technicolor TC7337 routers 08.89.17.20.00 allows an attacker to cause DNS Poisoning and steal credentials from the router.,CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:technicolor:tc7337_firmware:08.89.17.20.00:*:*:*:*:*:*:*', 'cpe:2.3:h:technicolor:tc7337:-:*:*:*:*:*:*:*']",1,0
CVE-2017-14127,Vantiva,0.00429,9.8,0.0,1.0,0.0,1.0,1,2017-09-04,0.0,,0.0,,,Command Injection in the Ping Module in the Web Interface on Technicolor TD5336 OI_Fw_v7 devices allows remote attackers to execute arbitrary OS commands as root via shell metacharacters in the pingAddr parameter to mnt_ping.cgi.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-78'],"['cpe:2.3:o:technicolor:td5336_firmware:7.0:*:*:*:*:*:*:*', 'cpe:2.3:h:technicolor:td5336:-:*:*:*:*:*:*:*']",0,0
CVE-2017-5135,Vantiva,0.01306,9.1,1.0,1.0,0.0,1.0,1,2017-04-27,0.0,,0.0,,,"Certain Technicolor devices have an SNMP access-control bypass, possibly involving an ISP customization in some cases. The Technicolor (formerly Cisco) DPC3928SL with firmware D3928SL-P15-13-A386-c3420r55105-160127a could be reached by any SNMP community string from the Internet; also, you can write in the MIB because it provides write properties, aka Stringbleed. NOTE: the string-bleed/StringBleed-CVE-2017-5135 GitHub repository is not a valid reference as of 2017-04-27; it contains Trojan horse code purported to exploit this vulnerability.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,NONE,CRITICAL,3.9,5.2,['NVD-CWE-noinfo'],"['cpe:2.3:o:technicolor:dpc3928sl_firmware:d3928sl-p15-13-a386-c3420r55105-160127a:*:*:*:*:*:*:*', 'cpe:2.3:h:technicolor:dpc3928sl:-:*:*:*:*:*:*:*']",1,0
CVE-2018-15852,Vantiva,0.0016,6.5,0.0,1.0,0.0,1.0,1,2018-08-25,0.0,,0.0,,,"Technicolor TC7200.20 devices allow remote attackers to cause a denial of service (networking outage) via a flood of random MAC addresses, as demonstrated by macof. NOTE: Technicolor denies that the described behavior is a vulnerability and states that Wi-Fi traffic is slowed or stopped only while the devices are exposed to a MAC flooding attack. This has been confirmed through testing against official up-to-date versions",CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.8,3.6,['CWE-400'],"['cpe:2.3:o:technicolor:tc7200.20_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:technicolor:tc7200.20:-:*:*:*:*:*:*:*']",0,0
CVE-2018-15907,Vantiva,0.0016,6.5,0.0,1.0,0.0,1.0,1,2018-08-29,0.0,,0.0,,,"Technicolor (formerly RCA) TC8305C devices allow remote attackers to cause a denial of service (networking outage) via a flood of random MAC addresses, as demonstrated by macof. NOTE: this might overlap CVE-2018-15852 and CVE-2018-16310. NOTE: Technicolor denies that the described behavior is a vulnerability and states that Wi-Fi traffic is slowed or stopped only while the devices are exposed to a MAC flooding attack. This has been confirmed through testing against official up-to-date versions",CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.8,3.6,['CWE-400'],"['cpe:2.3:o:technicolor:tc8305c_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:technicolor:tc8305c:-:*:*:*:*:*:*:*']",0,0
CVE-2018-16310,Vantiva,0.0016,6.5,0.0,1.0,0.0,1.0,1,2018-09-06,0.0,,0.0,,,"Technicolor TG588V V2 devices allow remote attackers to cause a denial of service (networking outage) via a flood of random MAC addresses, as demonstrated by macof. NOTE: this might overlap CVE-2018-15852 and CVE-2018-15907. NOTE: Technicolor denies that the described behavior is a vulnerability and states that Wi-Fi traffic is slowed or stopped only while the devices are exposed to a MAC flooding attack. This has been confirmed through testing against official up-to-date versions",CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.8,3.6,['CWE-400'],"['cpe:2.3:o:technicolor:tg588v_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:technicolor:tg588v:2:*:*:*:*:*:*:*']",0,0
CVE-2018-20379,Vantiva,0.00087,4.7,0.0,1.0,0.0,1.0,1,2018-12-23,0.0,,0.0,,,Technicolor DPC3928SL D3928SL-PSIP-13-A010-c3420r55105-160428a devices allow XSS via a Cross Protocol Injection attack with setSSID of 1.3.6.1.4.1.4413.2.2.2.1.18.1.2.1.1.3.10001.,CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,HIGH,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,1.6,2.7,['CWE-79'],"['cpe:2.3:o:technicolor:dpc3928sl_firmware:d3928sl-psip-13-a010-c3420r55105-160428a:*:*:*:*:*:*:*', 'cpe:2.3:h:technicolor:dpc3928sl:-:*:*:*:*:*:*:*']",0,0
CVE-2018-20381,Vantiva,0.02419,9.8,0.0,1.0,0.0,1.0,1,2018-12-23,0.0,,0.0,,,Technicolor DPC2320 dpc2300r2-v202r1244101-150420a-v6 devices allow remote attackers to discover credentials via iso.3.6.1.4.1.4491.2.4.1.1.6.1.1.0 and iso.3.6.1.4.1.4491.2.4.1.1.6.1.2.0 SNMP requests.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:technicolor:dpc2320_firmware:dpc2300r2-v202r1244101-150420a-v6:*:*:*:*:*:*:*', 'cpe:2.3:h:technicolor:dpc2320:-:*:*:*:*:*:*:*']",0,0
CVE-2018-20393,Vantiva,0.02419,9.8,0.0,1.0,0.0,1.0,1,2018-12-23,0.0,,0.0,,,"Technicolor CGA0111 CGA0111E-ES-13-E23E-c8000r5712-170217-0829-TRU, CWA0101 CWA0101E-A23E-c7000r5712-170315-SKC, DPC3928SL D3928SL-PSIP-13-A010-c3420r55105-170214a, TC7110.AR STD3.38.03, TC7110.B STC8.62.02, TC7110.D STDB.79.02, TC7200.d1I TC7200.d1IE-N23E-c7000r5712-170406-HAT, and TC7200.TH2v2 SC05.00.22 devices allow remote attackers to discover credentials via iso.3.6.1.4.1.4491.2.4.1.1.6.1.1.0 and iso.3.6.1.4.1.4491.2.4.1.1.6.1.2.0 SNMP requests.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:technicolor:cga0111_firmware:cga0111e-es-13-e23e-c8000r5712-170217-0829-tru:*:*:*:*:*:*:*', 'cpe:2.3:h:technicolor:cga0111:1.0:*:*:*:*:*:*:*', 'cpe:2.3:o:technicolor:cga0101_firmware:cwa0101e-a23e-c7000r5712-170315-skc:*:*:*:*:*:*:*', 'cpe:2.3:h:technicolor:cga0101:1.0:*:*:*:*:*:*:*', 'cpe:2.3:o:technicolor:dpc3928sl_firmware:d3928sl-psip-13-a010-c3420r55105-170214a:*:*:*:*:*:*:*', 'cpe:2.3:h:technicolor:dpc3928sl:1.0:*:*:*:*:*:*:*', 'cpe:2.3:o:technicolor:tc7110.ar_firmware:std3.38.03:*:*:*:*:*:*:*', 'cpe:2.3:h:technicolor:tc7110.ar:1.0:*:*:*:*:*:*:*', 'cpe:2.3:o:technicolor:tc7110.b_firmware:stc8.62.02:*:*:*:*:*:*:*', 'cpe:2.3:h:technicolor:tc7110.b:2.0:*:*:*:*:*:*:*', 'cpe:2.3:o:technicolor:tc7110.d_firmware:stdb.79.02:*:*:*:*:*:*:*', 'cpe:2.3:h:technicolor:tc7110.d:1.0:*:*:*:*:*:*:*', 'cpe:2.3:o:technicolor:tc7200.d1i_firmware:tc7200.d1ie-n23e-c7000r5712-170406-hat:*:*:*:*:*:*:*', 'cpe:2.3:h:technicolor:tc7200.d1i:1.0:*:*:*:*:*:*:*', 'cpe:2.3:o:technicolor:tc7200.th2v2.d1i_firmware:sc05.00.22:*:*:*:*:*:*:*', 'cpe:2.3:h:technicolor:tc7200.th2v2.d1i:01.00:*:*:*:*:*:*:*']",0,0
CVE-2018-20394,Vantiva,0.02419,9.8,0.0,1.0,0.0,1.0,1,2018-12-23,0.0,,0.0,,,"Thomson DWG849 STC0.01.16, DWG850-4 ST9C.05.25, DWG855 ST80.20.26, and TWG870 STB2.01.36 devices allow remote attackers to discover credentials via iso.3.6.1.4.1.4491.2.4.1.1.6.1.1.0 and iso.3.6.1.4.1.4491.2.4.1.1.6.1.2.0 SNMP requests.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-522'],"['cpe:2.3:o:technicolor:dwg849_firmware:stc0.01.16:*:*:*:*:*:*:*', 'cpe:2.3:h:technicolor:dwg849:1.0:*:*:*:*:*:*:*', 'cpe:2.3:o:technicolor:dwg850-4_firmware:st9c.05.25:*:*:*:*:*:*:*', 'cpe:2.3:h:technicolor:dwg850-4:2.1:*:*:*:*:*:*:*', 'cpe:2.3:o:technicolor:dwg855_firmware:st80.20.26:*:*:*:*:*:*:*', 'cpe:2.3:h:technicolor:dwg855:2.1:*:*:*:*:*:*:*', 'cpe:2.3:o:technicolor:twg870_firmware:stb2.01.36:*:*:*:*:*:*:*', 'cpe:2.3:h:technicolor:twg870:1.1:*:*:*:*:*:*:*']",0,0
CVE-2018-20438,Vantiva,0.01404,9.8,0.0,1.0,0.0,1.0,1,2018-12-25,0.0,,0.0,,,Technicolor TC7110.AR STD3.38.03 devices allow remote attackers to discover Wi-Fi credentials via iso.3.6.1.4.1.2863.205.10.1.30.4.1.14.1.3.32 and iso.3.6.1.4.1.2863.205.10.1.30.4.2.4.1.2.32 SNMP requests.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-522'],"['cpe:2.3:o:technicolor:tc7110.ar_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:technicolor:tc7110.ar:-:*:*:*:*:*:*:*']",0,0
CVE-2018-20439,Vantiva,0.00515,9.8,0.0,1.0,0.0,1.0,1,2018-12-25,0.0,,0.0,,,Technicolor DPC3928SL D3928SL-PSIP-13-A010-c3420r55105-170214a devices allow remote attackers to discover Wi-Fi credentials via iso.3.6.1.4.1.4413.2.2.2.1.5.4.1.14.1.3.10001 and 1.3.6.1.4.1.4413.2.2.2.1.18.1.2.3.4.1.2.10001 SNMP requests.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-522'],"['cpe:2.3:o:technicolor:dpc3928sl_firmware:d3928sl-psip-13-a010-c3420r55105-170214a:*:*:*:*:*:*:*', 'cpe:2.3:h:technicolor:dpc3928sl:-:*:*:*:*:*:*:*']",0,0
CVE-2018-20440,Vantiva,0.01404,9.8,0.0,1.0,0.0,1.0,1,2018-12-25,0.0,,0.0,,,Technicolor CWA0101 CWA0101E-A23E-c7000r5712-170315-SKC devices allow remote attackers to discover Wi-Fi credentials via iso.3.6.1.4.1.4413.2.2.2.1.5.4.1.14.1.3.10001 and 1.3.6.1.4.1.4413.2.2.2.1.18.1.2.3.4.1.2.10001 SNMP requests.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-522'],"['cpe:2.3:o:technicolor:cwa0101_firmware:cwa0101e-a23e-c7000r5712-170315-skc:*:*:*:*:*:*:*', 'cpe:2.3:h:technicolor:cwa0101:-:*:*:*:*:*:*:*']",0,0
CVE-2018-20441,Vantiva,0.01404,9.8,0.0,1.0,0.0,1.0,1,2018-12-25,0.0,,0.0,,,Technicolor TC7200.TH2v2 SC05.00.22 devices allow remote attackers to discover Wi-Fi credentials via iso.3.6.1.4.1.2863.205.10.1.30.4.1.14.1.3.32 and iso.3.6.1.4.1.2863.205.10.1.30.4.2.4.1.2.32 SNMP requests.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-522'],"['cpe:2.3:o:technicolor:tc7200.th2v2_firmware:sc05.00.22:*:*:*:*:*:*:*', 'cpe:2.3:h:technicolor:tc7200.th2v2:-:*:*:*:*:*:*:*']",0,0
CVE-2018-20442,Vantiva,0.01404,9.8,0.0,1.0,0.0,1.0,1,2018-12-25,0.0,,0.0,,,Technicolor TC7110.B STC8.62.02 devices allow remote attackers to discover Wi-Fi credentials via iso.3.6.1.4.1.2863.205.10.1.30.4.1.14.1.3.32 and iso.3.6.1.4.1.2863.205.10.1.30.4.2.4.1.2.32 SNMP requests.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-522'],"['cpe:2.3:o:technicolor:tc7110.b_firmware:stc8.62.02:*:*:*:*:*:*:*', 'cpe:2.3:h:technicolor:tc7110.b:-:*:*:*:*:*:*:*']",0,0
CVE-2018-20443,Vantiva,0.01404,9.8,0.0,1.0,0.0,1.0,1,2018-12-25,0.0,,0.0,,,Technicolor TC7200.d1I TC7200.d1IE-N23E-c7000r5712-170406-HAT devices allow remote attackers to discover Wi-Fi credentials via iso.3.6.1.4.1.4413.2.2.2.1.5.4.1.14.1.3.10001 and 1.3.6.1.4.1.4413.2.2.2.1.18.1.2.3.4.1.2.10001 SNMP requests.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-522'],"['cpe:2.3:o:technicolor:tc7200.d1i_firmware:tc7200.d1ie-n23e-c7000r5712-170406-hat:*:*:*:*:*:*:*', 'cpe:2.3:h:technicolor:tc7200.d1i:-:*:*:*:*:*:*:*']",0,0
CVE-2018-20444,Vantiva,0.00515,9.8,0.0,1.0,0.0,1.0,1,2018-12-25,0.0,,0.0,,,Technicolor CGA0111 CGA0111E-ES-13-E23E-c8000r5712-170217-0829-TRU devices allow remote attackers to discover Wi-Fi credentials via iso.3.6.1.4.1.4413.2.2.2.1.5.4.1.14.1.3.10001 and 1.3.6.1.4.1.4413.2.2.2.1.18.1.2.3.4.1.2.10001 SNMP requests.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-522'],"['cpe:2.3:o:technicolor:cga0111_firmware:cga0111e-es-13-e23e-c8000r5712-170217-0829-tru:*:*:*:*:*:*:*', 'cpe:2.3:h:technicolor:cga0111:-:*:*:*:*:*:*:*']",0,0
CVE-2018-8827,Vantiva,0.00323,6.1,0.0,1.0,0.0,1.0,1,2019-01-03,0.0,,0.0,,,"The admin web interface on Technicolor MediaAccess TG789vac v2 HP devices with firmware v16.3.7190-2761005-20161004084353 displays unsanitised user input, which allows an unauthenticated malicious user to embed JavaScript into the Log viewer interface via a crafted HTTP Referer header, aka XSS.",CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:technicolor:tg789vac_firmware:16.3.7190-2761005-20161004084353:*:*:*:*:*:*:*', 'cpe:2.3:h:technicolor:tg789vac:2:*:*:*:*:*:*:*']",0,0
CVE-2019-19494,Vantiva,0.15168,8.8,0.0,1.0,0.0,1.0,1,2020-01-09,0.0,,0.0,,,"Broadcom based cable modems across multiple vendors are vulnerable to a buffer overflow, which allows a remote attacker to execute arbitrary code at the kernel level via JavaScript run in a victim's browser. Examples of affected products include Sagemcom F@st 3890 prior to 50.10.21_T4, Sagemcom F@st 3890 prior to 05.76.6.3f, Sagemcom F@st 3686 3.428.0, Sagemcom F@st 3686 4.83.0, NETGEAR CG3700EMR 2.01.05, NETGEAR CG3700EMR 2.01.03, NETGEAR C6250EMR 2.01.05, NETGEAR C6250EMR 2.01.03, Technicolor TC7230 STEB 01.25, COMPAL 7284E 5.510.5.11, and COMPAL 7486E 5.510.5.11.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-120'],"['cpe:2.3:o:sagemcom:f\\@st_3890_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:sagemcom:f\\@st_3890:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sagemcom:f\\@st_3890_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:sagemcom:f\\@st_3890:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sagemcom:f\\@st_3686_firmware:3.428.0:*:*:*:*:*:*:*', 'cpe:2.3:o:sagemcom:f\\@st_3686_firmware:4.83.0:*:*:*:*:*:*:*', 'cpe:2.3:h:sagemcom:f\\@st_3686:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netgear:cg3700emr_firmware:2.01.03:*:*:*:*:*:*:*', 'cpe:2.3:o:netgear:cg3700emr_firmware:2.01.05:*:*:*:*:*:*:*', 'cpe:2.3:h:netgear:cg3700emr:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netgear:c6250emr_firmware:2.01.03:*:*:*:*:*:*:*', 'cpe:2.3:o:netgear:c6250emr_firmware:2.01.05:*:*:*:*:*:*:*', 'cpe:2.3:h:netgear:c6250emr:-:*:*:*:*:*:*:*', 'cpe:2.3:o:technicolor:tc7230_steb_firmware:01.25:*:*:*:*:*:*:*', 'cpe:2.3:h:technicolor:tc7230_steb:-:*:*:*:*:*:*:*', 'cpe:2.3:o:compal:7284e_firmware:5.510.5.11:*:*:*:*:*:*:*', 'cpe:2.3:h:compal:7284e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:compal:7486e_firmware:5.510.5.11:*:*:*:*:*:*:*', 'cpe:2.3:h:compal:7486e:-:*:*:*:*:*:*:*']",0,0
CVE-2019-19495,Vantiva,0.03213,9.8,0.0,1.0,0.0,1.0,1,2020-01-08,0.0,,0.0,,,"The web interface on the Technicolor TC7230 STEB 01.25 is vulnerable to DNS rebinding, which allows a remote attacker to configure the cable modem via JavaScript in a victim's browser. The attacker can then configure the cable modem to port forward the modem's internal TELNET server, allowing external access to a root shell.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-20'],"['cpe:2.3:o:technicolor:tc7230_steb_firmware:0.1.25:*:*:*:*:*:*:*', 'cpe:2.3:h:technicolor:tc7230_steb:-:*:*:*:*:*:*:*']",0,0
CVE-2020-10376,Vantiva,0.01218,9.8,0.0,1.0,0.0,1.0,1,2020-03-11,0.0,,0.0,,,"Technicolor TC7337NET 08.89.17.23.03 devices allow remote attackers to discover passwords by sniffing the network for an ""Authorization: Basic"" HTTP header.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-319'],"['cpe:2.3:o:technicolor:tc7337net_firmware:08.89.17.23.03:*:*:*:*:*:*:*', 'cpe:2.3:h:technicolor:tc7337net:-:*:*:*:*:*:*:*']",0,0
CVE-2020-11449,Vantiva,0.00485,7.5,0.0,1.0,0.0,1.0,1,2020-04-01,0.0,,0.0,,,"An issue was discovered on Technicolor TC7337 8.89.17 devices. An attacker can discover admin credentials in the backup file, aka backupsettings.conf.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-522'],"['cpe:2.3:o:technicolor:tc7337_firmware:8.89.17:*:*:*:*:*:*:*', 'cpe:2.3:h:technicolor:tc7337:-:*:*:*:*:*:*:*']",0,0
CVE-2018-25034,Vantiva,0.00084,5.4,0.0,1.0,0.0,1.0,0,2022-06-12,0.0,,0.0,,,"A vulnerability, which was classified as problematic, has been found in Thomson TCW710 ST5D.10.05. This issue affects some unknown processing of the file /goform/wlanPrimaryNetwork. The manipulation of the argument ServiceSetIdentifier with the input > as part of POST Request leads to basic cross site scripting (Persistent). The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-126695.",CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,LOW,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.3,2.7,"['CWE-80', 'CWE-79']","['cpe:2.3:o:technicolor:thomson_tcw710_firmware:st5d.10.05:*:*:*:*:*:*:*', 'cpe:2.3:h:technicolor:thomson_tcw710:-:*:*:*:*:*:*:*']",0,0
CVE-2018-25035,Vantiva,0.00073,5.4,0.0,1.0,0.0,1.0,0,2022-06-12,0.0,,0.0,,,"A vulnerability, which was classified as problematic, was found in Thomson TCW710 ST5D.10.05. Affected is an unknown function of the file /goform/RGFirewallEL. The manipulation of the argument EmailAddress/SmtpServerName with the input > as part of POST Request leads to cross site scripting (Persistent). It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.",CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,LOW,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.3,2.7,"['CWE-79', 'CWE-80']","['cpe:2.3:h:technicolor:thomson_tcw710:-:*:*:*:*:*:*:*', 'cpe:2.3:o:technicolor:thomson_tcw710_firmware:st5d.10.05:*:*:*:*:*:*:*']",0,0
CVE-2018-25036,Vantiva,0.00073,5.4,0.0,1.0,0.0,1.0,0,2022-06-12,0.0,,0.0,,,A vulnerability has been found in Thomson TCW710 ST5D.10.05 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /goform/RgTime. The manipulation of the argument TimeServer1/TimeServer2/TimeServer3 with the input > as part of POST Request leads to cross site scripting (Persistent). The attack can be launched remotely. The exploit has been disclosed to the public and may be used.,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,LOW,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.3,2.7,"['CWE-79', 'CWE-80']","['cpe:2.3:o:technicolor:thomson_tcw710_firmware:st5d.10.05:*:*:*:*:*:*:*', 'cpe:2.3:h:technicolor:thomson_tcw710:-:*:*:*:*:*:*:*']",0,0
CVE-2018-25037,Vantiva,0.00073,5.4,0.0,1.0,0.0,1.0,0,2022-06-12,0.0,,0.0,,,A vulnerability was found in Thomson TCW710 ST5D.10.05 and classified as problematic. Affected by this issue is some unknown functionality of the file /goform/RgDdns. The manipulation of the argument DdnsHostName with the input > as part of POST Request leads to cross site scripting (Persistent). The attack may be launched remotely. The exploit has been disclosed to the public and may be used.,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,LOW,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.3,2.7,"['CWE-79', 'CWE-80']","['cpe:2.3:o:technicolor:thomson_tcw710_firmware:st5d.10.05:*:*:*:*:*:*:*', 'cpe:2.3:h:technicolor:thomson_tcw710:-:*:*:*:*:*:*:*']",0,0
CVE-2018-25038,Vantiva,0.00073,5.4,0.0,1.0,0.0,1.0,0,2022-06-12,0.0,,0.0,,,A vulnerability was found in Thomson TCW710 ST5D.10.05. It has been classified as problematic. This affects an unknown part of the file /goform/RgDhcp. The manipulation of the argument PppUserName with the input > as part of POST Request leads to cross site scripting (Persistent). It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,LOW,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.3,2.7,"['CWE-79', 'CWE-80']","['cpe:2.3:o:technicolor:thomson_tcw710_firmware:st5d.10.05:*:*:*:*:*:*:*', 'cpe:2.3:h:technicolor:thomson_tcw710:-:*:*:*:*:*:*:*']",0,0
CVE-2018-25039,Vantiva,0.00103,5.4,0.0,1.0,0.0,1.0,0,2022-06-12,0.0,,0.0,,,A vulnerability was found in Thomson TCW710 ST5D.10.05. It has been declared as problematic. This vulnerability affects unknown code of the file /goform/RgUrlBlock.asp. The manipulation of the argument BasicParentalNewKeyword with the input > as part of POST Request leads to cross site scripting (Persistent). The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,LOW,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.3,2.7,"['CWE-79', 'CWE-80']","['cpe:2.3:o:technicolor:thomson_tcw710_firmware:st5d.10.05:*:*:*:*:*:*:*', 'cpe:2.3:h:technicolor:thomson_tcw710:-:*:*:*:*:*:*:*']",0,0
CVE-2019-17523,Vantiva,0.00145,5.4,0.0,1.0,0.0,1.0,0,2019-11-13,0.0,,0.0,,,An XSS vulnerability on Technicolor TC7300 STFA.51.20 devices allows remote attackers to inject arbitrary web script via the FileName parameter to /FTPDiag.asp.,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,LOW,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.3,2.7,['CWE-79'],"['cpe:2.3:h:technicolor:tc7300.b0:-:*:*:*:*:*:*:*', 'cpe:2.3:o:technicolor:tc7300.b0_firmware:stfa.51.20:*:*:*:*:*:*:*']",0,0
CVE-2019-17524,Vantiva,0.00145,5.4,0.0,1.0,0.0,1.0,0,2019-11-13,0.0,,0.0,,,"An XSS vulnerability on Technicolor TC7300 STFA.51.20 devices allows remote attackers to inject arbitrary web script via the ""Connected Clients"" field to /wlanAccess.asp. An intranet host can use a crafted hostname to exploit this.",CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,LOW,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.3,2.7,['CWE-79'],"['cpe:2.3:o:technicolor:tc7300.b0_firmware:stfa.51.20:*:*:*:*:*:*:*', 'cpe:2.3:h:technicolor:tc7300.b0:-:*:*:*:*:*:*:*']",0,0
CVE-2019-18396,Vantiva,0.04831,7.2,1.0,1.0,0.0,1.0,0,2019-10-31,0.0,,0.0,,,An issue was discovered in certain Oi third-party firmware that may be installed on Technicolor TD5130v2 devices. A Command Injection in the Ping module in the Web Interface in OI_Fw_V20 allows remote attackers to execute arbitrary OS commands in the pingAddr parameter to mnt_ping.cgi. NOTE: This may overlap CVE-2017–14127.,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.2,5.9,['CWE-78'],"['cpe:2.3:o:technicolor:td5130v2_firmware:oi_fw_v20:*:*:*:*:*:*:*', 'cpe:2.3:h:technicolor:td5130v2:-:*:*:*:*:*:*:*']",1,0
CVE-2016-7830,Sony,0.00063,8.8,0.0,1.0,0.0,1.0,1,2017-06-09,1.0,2016-12-16,,,1.0,"Sony PCS-XG100, PCS-XG100S, PCS-XG100C, PCS-XG77, PCS-XG77S, PCS-XG77C devices with firmware versions prior to Ver.1.51 and PCS-XC1 devices with firmware version prior to Ver.1.22 allow an attacker on the same network segment to bypass authentication to perform administrative operations via unspecified vectors.",CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-306'],"['cpe:2.3:o:sony:pcs-xg100_firmware:1.50:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:pcs-xg100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:pcs-xg100s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:pcs-xg100_firmware:1.42:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:pcs-xg100c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:pcs-xg77_firmware:1.50:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:pcs-xg77:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:pcs-xg77s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:pcs-xg77_firmware:1.42:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:pcs-xg77c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:pcs-xc1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:pcs-xc1:-:*:*:*:*:*:*:*']",0,0
CVE-2016-7834,Sony,0.00153,8.8,0.0,1.0,0.0,0.0,1,2017-04-13,1.0,2016-12-26,,,1.0,"SONY SNC-CH115, SNC-CH120, SNC-CH160, SNC-CH220, SNC-CH260, SNC-DH120, SNC-DH120T, SNC-DH160, SNC-DH220, SNC-DH220T, SNC-DH260, SNC-EB520, SNC-EM520, SNC-EM521, SNC-ZB550, SNC-ZM550, SNC-ZM551, SNC-EP550, SNC-EP580, SNC-ER550, SNC-ER550C, SNC-ER580, SNC-ER585, SNC-ER585H, SNC-ZP550, SNC-ZR550, SNC-EP520, SNC-EP521, SNC-ER520, SNC-ER521, SNC-ER521C network cameras with firmware before Ver.1.86.00 and SONY SNC-CX600, SNC-CX600W, SNC-EB600, SNC-EB600B, SNC-EB602R, SNC-EB630, SNC-EB630B, SNC-EB632R, SNC-EM600, SNC-EM601, SNC-EM602R, SNC-EM602RC, SNC-EM630, SNC-EM631, SNC-EM632R, SNC-EM632RC, SNC-VB600, SNC-VB600B, SNC-VB600B5, SNC-VB630, SNC-VB6305, SNC-VB6307, SNC-VB632D, SNC-VB635, SNC-VM600, SNC-VM600B, SNC-VM600B5, SNC-VM601, SNC-VM601B, SNC-VM602R, SNC-VM630, SNC-VM6305, SNC-VM6307, SNC-VM631, SNC-VM632R, SNC-WR600, SNC-WR602, SNC-WR602C, SNC-WR630, SNC-WR632, SNC-WR632C, SNC-XM631, SNC-XM632, SNC-XM636, SNC-XM637, SNC-VB600L, SNC-VM600L, SNC-XM631L, SNC-WR602CL network cameras with firmware before Ver.2.7.2 are prone to sensitive information disclosure. This may allow an attacker on the same local network segment to login to the device with administrative privileges and perform operations on the device.",CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-200'],"['cpe:2.3:o:sony:snc_series_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-cx600:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-cx600w:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-eb600:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-eb600b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-eb602r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-eb630:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-eb630b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-eb632r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-em600:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-em601:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-em602r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-em602rc:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-em630:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-em631:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-em632r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-em632rc:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-vb600:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-vb600b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-vb600b5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-vb600l:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-vb630:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-vb6305:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-vb6307:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-vb632d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-vb635:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-vm600:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-vm600b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-vm600b5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-vm600l:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-vm601:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-vm601b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-vm602r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-vm630:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-vm6305:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-vm6307:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-vm631:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-vm632r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-wr600:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-wr602:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-wr602c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-wr602cl:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-wr630:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-wr632:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-wr632c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-xm631:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-xm631l:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-xm632:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-xm636:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-xm637:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:snc_series_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-ch115:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-ch120:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-ch160:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-ch220:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-ch260:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-dh120:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-dh120t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-dh160:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-dh220:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-dh220t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-dh260:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-eb520:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-em520:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-em521:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-ep520:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-ep521:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-ep550:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-ep580:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-er520:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-er521:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-er521c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-er550:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-er550c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-er580:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-er585:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-er585h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-zb550:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-zm550:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-zm551:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-zp550:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-zr550:-:*:*:*:*:*:*:*']",0,0
CVE-2017-2275,Sony,0.00104,7.2,0.0,1.0,0.0,1.0,1,2017-07-22,0.0,,1.0,2017-07-19,,WG-C10 v3.0.79 and earlier allows an attacker to execute arbitrary OS commands via unspecified vectors.,CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.2,5.9,['CWE-78'],"['cpe:2.3:o:sony:wg-c10_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:wg-c10:-:*:*:*:*:*:*:*']",0,0
CVE-2017-2276,Sony,0.0009,7.2,0.0,1.0,0.0,1.0,1,2017-07-22,0.0,,1.0,2017-07-19,,Buffer overflow in WG-C10 v3.0.79 and earlier allows an attacker to execute arbitrary commands via unspecified vectors.,CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.2,5.9,['CWE-119'],"['cpe:2.3:o:sony:wg-c10_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:wg-c10:-:*:*:*:*:*:*:*']",0,0
CVE-2017-2277,Sony,0.00202,9.1,0.0,1.0,0.0,1.0,1,2017-07-22,0.0,,1.0,2017-07-19,,WG-C10 v3.0.79 and earlier allows an attacker to bypass access restrictions to obtain or alter information stored in the external storage connected to the product via unspecified vectors.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,NONE,CRITICAL,3.9,5.2,['NVD-CWE-noinfo'],"['cpe:2.3:h:sony:wg-c10:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:wg-c10_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2017-2286,Sony,0.00059,7.8,0.0,1.0,0.0,1.0,1,2017-08-02,1.0,2017-07-28,,,1.0,"Untrusted search path vulnerability in NFC Port Software Version 5.5.0.6 and earlier (for RC-S310, RC-S320, RC-S330, RC-S370, RC-S380, RC-S380/S), NFC Port Software Version 5.3.6.7 and earlier (for RC-S320, RC-S310/J1C, RC-S310/ED4C), PC/SC Activator for Type B Ver.1.2.1.0 and earlier, SFCard Viewer 2 Ver.2.5.0.0 and earlier, NFC Net Installer Ver.1.1.0.0 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.",CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-427'],"['cpe:2.3:h:sony:rc-s310:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:rc-s320:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:rc-s330:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:rc-s370:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:rc-s380:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:rc-s380\\/s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:nfc_port_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:rc-s310\\/ed4c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:rc-s310\\/j1c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:rc-s320:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:nfc_port_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:pc\\/sc_activator_for_type_b:*:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:sfcard_viewer_2:2.5.0.0:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:nfc_net_installer:*:*:*:*:*:*:*:*']",0,0
CVE-2018-14983,Sony,0.00042,5.5,0.0,1.0,0.0,1.0,1,2019-04-25,0.0,,0.0,,,"The Sony Xperia L1 Android device with a build fingerprint of Sony/G3313/G3313:7.0/43.0.A.6.49/2867558199:user/release-keys contains the android framework (i.e., system_server) with a package name of android (versionCode=24, versionName=7.0) that has been modified by Sony or another entity in the supply chain. The system_server process in the core android package has an exported broadcast receiver that allows any app co-located on the device to programmatically initiate the taking of a screenshot and have the resulting screenshot be written to external storage. The taking of a screenshot is not transparent to the user; the device has a screen animation as the screenshot is taken and there is a notification indicating that a screenshot occurred. If the attacking app also requests the EXPAND_STATUS_BAR permission, it can wake the device up using certain techniques and expand the status bar to take a screenshot of the user's notifications even if the device has an active screen lock. The notifications may contain sensitive data such as text messages used in two-factor authentication. The system_server process that provides this capability cannot be disabled, as it is part of the Android framework. The notification can be removed by a local Denial of Service (DoS) attack to reboot the device.",CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.8,3.6,['CWE-20'],"['cpe:2.3:o:sony:xperia_l1_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xperia_l1:-:*:*:*:*:*:*:*']",0,0
CVE-2018-3937,Sony,0.00554,7.2,0.0,1.0,0.0,1.0,1,2018-08-14,1.0,2018-07-19,,,1.0,An exploitable command injection vulnerability exists in the measurementBitrateExec functionality of Sony IPELA E Series Network Camera G5 firmware 1.87.00. A specially crafted GET request can cause arbitrary commands to be executed. An attacker can send an HTTP request to trigger this vulnerability.,CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.2,5.9,['CWE-78'],"['cpe:2.3:o:sony:snc-eb600_firmware:1.87.00:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-eb600:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:snc-eb630_firmware:1.87.00:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-eb630:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:snc-eb600b_firmware:1.87.00:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-eb600b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:snc-eb630b_firmware:1.87.00:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-eb630b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:snc-eb602r_firmware:1.87.00:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-eb602r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:snc-eb632r_firmware:1.87.00:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-eb632r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:snc-em600_firmware:1.87.00:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-em600:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:snc-em601_firmware:1.87.00:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-em601:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:snc-em630_firmware:1.87.00:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-em630:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:snc-em631_firmware:1.87.00:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-em631:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:snc-em602r_firmware:1.87.00:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-em602r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:snc-em632r_firmware:1.87.00:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-em632r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:snc-em602rc_firmware:1.87.00:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-em602rc:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:snc-em632rc_firmware:1.87.00:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-em632rc:-:*:*:*:*:*:*:*']",0,0
CVE-2018-3938,Sony,0.01499,10.0,0.0,1.0,0.0,1.0,1,2018-08-14,1.0,2018-07-19,,,1.0,"An exploitable stack-based buffer overflow vulnerability exists in the 802dot1xclientcert.cgi functionality of Sony IPELA E Series Camera G5 firmware 1.87.00. A specially crafted POST can cause a stack-based buffer overflow, resulting in remote code execution. An attacker can send a malicious POST request to trigger this vulnerability.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,CHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,6.0,['CWE-787'],"['cpe:2.3:o:sony:snc-eb600_firmware:1.87.00:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-eb600:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:snc-eb630_firmware:1.87.00:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-eb630:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:snc-eb600b_firmware:1.87.00:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-eb600b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:snc-eb630b_firmware:1.87.00:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-eb630b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:snc-eb602r_firmware:1.87.00:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-eb602r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:snc-eb632r_firmware:1.87.00:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-eb632r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:snc-em600_firmware:1.87.00:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-em600:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:snc-em601_firmware:1.87.00:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-em601:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:snc-em630_firmware:1.87.00:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-em630:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:snc-em631_firmware:1.87.00:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-em631:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:snc-em602r_firmware:1.87.00:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-em602r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:snc-em632r_firmware:1.87.00:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-em632r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:snc-em602rc_firmware:1.87.00:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-em602rc:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:snc-em632rc_firmware:1.87.00:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:snc-em632rc:-:*:*:*:*:*:*:*']",0,0
CVE-2019-11889,Sony,0.02267,7.5,0.0,1.0,0.0,1.0,1,2019-07-09,0.0,,0.0,,,Sony BRAVIA Smart TV devices allow remote attackers to cause a denial of service (device hang) via a crafted web page over HbbTV.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:sony:bravia_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:bravia:-:*:*:*:*:*:*:*']",0,0
CVE-2019-11890,Sony,0.01819,7.5,0.0,1.0,0.0,1.0,1,2019-07-09,0.0,,0.0,,,Sony Bravia Smart TV devices allow remote attackers to cause a denial of service (device hang or reboot) via a SYN flood attack over a wired or Wi-Fi LAN.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-400'],"['cpe:2.3:o:sony:bravia_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:bravia:-:*:*:*:*:*:*:*']",0,0
CVE-2019-12762,Sony,0.00044,4.2,0.0,1.0,0.0,1.0,1,2019-06-06,0.0,,0.0,,,"Xiaomi Mi 5s Plus devices allow attackers to trigger touchscreen anomalies via a radio signal between 198 kHz and 203 kHz, as demonstrated by a transmitter and antenna hidden just beneath the surface of a coffee-shop table, aka Ghost Touch.",CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N,PHYSICAL,HIGH,NONE,NONE,UNCHANGED,NONE,HIGH,NONE,MEDIUM,0.5,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:mi:mi_5s_plus_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:mi_5s_plus:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:xperia_z4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xperia_z4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:samsung:galaxy_s6_edge_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:samsung:galaxy_s6_edge:-:*:*:*:*:*:*:*', 'cpe:2.3:o:samsung:galaxy_s4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:samsung:galaxy_s4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:google:nexus_7_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:google:nexus_7:-:*:*:*:*:*:*:*', 'cpe:2.3:o:google:nexus_9_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:google:nexus_9:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sharp:aquos_zeta_sh-04f_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sharp:aquos_zeta_sh-04f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:fujitsu:arrows_nx_f05-f_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:fujitsu:arrows_nx_f05-f:-:*:*:*:*:*:*:*']",0,0
CVE-2019-15416,Sony,0.00044,7.8,0.0,1.0,0.0,1.0,1,2019-11-14,0.0,,0.0,,,"The Sony keyaki_kddi Android device with a build fingerprint of Sony/keyaki_kddi/keyaki_kddi:7.1.1/TONE3-3.0.0-KDDI-170517-0326/1:user/dev-keys contains a pre-installed app with a package name of com.kddi.android.packageinstaller app (versionCode=70008, versionName=08.10.03) that allows other pre-installed apps to perform app installation via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:sony:xperia_xzs_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xperia_xzs:-:*:*:*:*:*:*:*']",0,0
CVE-2019-15743,Sony,0.00044,5.5,0.0,1.0,0.0,1.0,1,2019-11-14,0.0,,0.0,,,"The Sony Xperia Touch Android device with a build fingerprint of Sony/blanc_windy/blanc_windy:7.0/LOIRE-SMART-BLANC-1.0.0-170530-0834/1:user/dev-keys contains a pre-installed app with a package name of com.sonymobile.android.maintenancetool.testmic app (versionCode=24, versionName=7.0) that allows unauthorized microphone audio recording via a confused deputy attack. This capability can be accessed by any app co-located on the device. This app allows a third-party app to use its open interface to record audio to external storage.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.8,3.6,['CWE-610'],"['cpe:2.3:o:sony:xperia_touch_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xperia_touch:-:*:*:*:*:*:*:*']",0,0
CVE-2017-10891,Sony,0.00059,7.8,0.0,0.0,1.0,0.0,0,2017-12-01,1.0,2017-12-13,,,0.0,Untrusted search path vulnerability in Media Go version 3.2.0.191 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.,CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-426'],['cpe:2.3:a:sony:media_go:*:*:*:*:*:*:*:*'],0,0
CVE-2017-10892,Sony,0.00059,7.8,0.0,0.0,1.0,0.0,0,2017-12-01,1.0,2017-12-13,,,0.0,Untrusted search path vulnerability in Music Center for PC version 1.0.00 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.,CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-426'],['cpe:2.3:a:sony:music_center:1.0.00:*:*:*:*:*:*:*'],0,0
CVE-2017-10909,Sony,0.00059,7.8,0.0,0.0,1.0,0.0,0,2017-12-22,1.0,2017-12-22,,,1.0,Untrusted search path vulnerability in Music Center for PC version 1.0.01 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.,CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-426'],['cpe:2.3:a:sony:music_center:*:*:*:*:*:*:*:*'],0,0
CVE-2017-17010,Sony,0.00059,7.8,0.0,0.0,1.0,0.0,0,2017-12-27,1.0,2017-12-22,,,1.0,Untrusted search path vulnerability in Content Manager Assistant for PlayStation version 3.55.7671.0901 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.,CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-426'],['cpe:2.3:a:sony:content_manager_assistant:*:*:*:*:*:*:playstation:*'],0,0
CVE-2017-2287,Sony,0.00059,7.8,0.0,0.0,1.0,0.0,0,2017-08-02,1.0,2017-07-27,,,1.0,Untrusted search path vulnerability in NFC Port Software remover Ver.1.3.0.1 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.,CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-427'],['cpe:2.3:a:sony:nfc_port_software_remover:*:*:*:*:*:*:*:*'],0,0
CVE-2018-0600,Sony,0.0007,7.8,0.0,0.0,1.0,0.0,0,2018-06-26,0.0,,1.0,2018-05-24,,Untrusted search path vulnerability in the installer of PlayMemories Home for Windows ver.5.5.01 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.,CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-426'],"['cpe:2.3:a:sony:playmemories_home:*:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*']",0,0
CVE-2018-0656,Sony,0.0007,7.8,0.0,0.0,1.0,0.0,0,2018-09-04,1.0,2018-08-21,,,1.0,Untrusted search path vulnerability in The installer of Digital Paper App version 1.4.0.16050 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.,CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-426'],['cpe:2.3:a:sony:digital_paper_app:*:*:*:*:*:*:*:*'],0,0
CVE-2018-0690,Sony,0.00159,7.5,0.0,0.0,1.0,0.0,0,2018-11-15,1.0,2018-10-11,,,1.0,An unvalidated software update vulnerability in Music Center for PC version 1.0.02 and earlier could allow a man-in-the-middle attacker to tamper with an update file and inject executable files.,CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,HIGH,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.6,5.9,['NVD-CWE-noinfo'],['cpe:2.3:a:sony:music_center_for_pc:*:*:*:*:*:*:*:*'],0,0
CVE-2018-16593,Sony,0.00086,8.8,0.0,1.0,0.0,1.0,0,2019-06-19,1.0,2018-08-30,,,1.0,The Photo Sharing Plus component on Sony Bravia TV through 8.587 devices allows Shell Metacharacter Injection.,CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-78'],"['cpe:2.3:o:sony:r5c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32r500c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32r503c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32r505c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-40r550c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-40r553c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-40r555c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-48r550c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-48r553c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-48r555c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:wd75_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32wd750:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32wd751:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32wd752:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32wd753:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32wd754:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32wd755:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32wd756:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32wd757:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32wd758:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32wd759:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-43wd750:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-43wd751:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-43wd752:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-43wd753:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-43wd754:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-43wd755:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-43wd756:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-43wd757:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-43wd758:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-43wd759:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49wd750:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49wd751:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49wd752:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49wd753:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49wd754:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49wd755:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49wd756:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49wd757:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49wd758:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49wd759:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:wd65_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-40wd650:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-40wd653:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-40wd655:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-48wd650:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-48wd653:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-48wd655:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:xe70_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-43xe7000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-43xe7002:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-43xe7003:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-43xe7004:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-43xe7005:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-43xe7073:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-43xe7077:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-43xe7093:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-43xe7096:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-49xe7000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-49xe7002:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-49xe7003:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-49xe7004:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-49xe7005:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-49xe7073:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-49xe7077:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-49xe7093:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-49xe7096:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-55xe7000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-55xe7002:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-55xe7003:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-55xe7004:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-55xe7005:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-55xe7073:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-55xe7077:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-55xe7093:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-55xe7096:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-65xe7002:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-65xe7003:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-65xe7004:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-65xe7005:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-65xe7093:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-65xe7096:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:xf70_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xf70:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:we75_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-43we750:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-43we753:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-43we754:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-43we755:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49we750:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49we753:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49we754:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49we755:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:we6_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32we610:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32we613:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32we615:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-40we660:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-40we663:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-40we665:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49we660:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49we663:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49we665:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:wf6_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:wf6:-:*:*:*:*:*:*:*']",0,0
CVE-2018-16594,Sony,0.00073,8.1,0.0,1.0,0.0,1.0,0,2019-06-19,1.0,2018-08-30,,,1.0,The Photo Sharing Plus component on Sony Bravia TV through 8.587 devices allows Directory Traversal.,CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,NONE,HIGH,2.8,5.2,['CWE-22'],"['cpe:2.3:o:sony:r5c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32r500c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32r503c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32r505c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-40r550c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-40r553c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-40r555c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-48r550c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-48r553c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-48r555c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:wd75_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32wd750:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32wd751:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32wd752:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32wd753:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32wd754:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32wd755:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32wd756:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32wd757:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32wd758:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32wd759:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-43wd750:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-43wd751:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-43wd752:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-43wd753:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-43wd754:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-43wd755:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-43wd756:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-43wd757:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-43wd758:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-43wd759:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49wd750:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49wd751:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49wd752:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49wd753:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49wd754:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49wd755:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49wd756:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49wd757:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49wd758:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49wd759:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:wd65_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-40wd650:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-40wd653:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-40wd655:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-48wd650:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-48wd653:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-48wd655:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:xe70_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-43xe7000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-43xe7002:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-43xe7003:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-43xe7004:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-43xe7005:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-43xe7073:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-43xe7077:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-43xe7093:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-43xe7096:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-49xe7000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-49xe7002:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-49xe7003:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-49xe7004:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-49xe7005:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-49xe7073:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-49xe7077:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-49xe7093:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-49xe7096:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-55xe7000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-55xe7002:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-55xe7003:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-55xe7004:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-55xe7005:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-55xe7073:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-55xe7077:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-55xe7093:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-55xe7096:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-65xe7002:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-65xe7003:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-65xe7004:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-65xe7005:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-65xe7093:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-65xe7096:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:xf70_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xf70:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:we75_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-43we750:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-43we753:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-43we754:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-43we755:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49we750:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49we753:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49we754:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49we755:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:we6_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32we610:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32we613:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32we615:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-40we660:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-40we663:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-40we665:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49we660:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49we663:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49we665:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:wf6_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:wf6:-:*:*:*:*:*:*:*']",0,0
CVE-2018-16595,Sony,0.00066,6.5,0.0,1.0,0.0,1.0,0,2019-06-19,1.0,2018-08-30,,,1.0,The Photo Sharing Plus component on Sony Bravia TV through 8.587 devices has a Buffer Overflow.,CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.8,3.6,['CWE-119'],"['cpe:2.3:o:sony:r5c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32r500c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32r503c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32r505c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-40r550c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-40r553c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-40r555c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-48r550c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-48r553c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-48r555c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:wd75_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32wd750:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32wd751:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32wd752:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32wd753:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32wd754:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32wd755:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32wd756:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32wd757:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32wd758:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32wd759:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-43wd750:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-43wd751:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-43wd752:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-43wd753:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-43wd754:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-43wd755:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-43wd756:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-43wd757:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-43wd758:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-43wd759:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49wd750:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49wd751:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49wd752:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49wd753:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49wd754:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49wd755:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49wd756:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49wd757:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49wd758:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49wd759:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:wd65_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-40wd650:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-40wd653:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-40wd655:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-48wd650:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-48wd653:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-48wd655:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:xe70_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-43xe7000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-43xe7002:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-43xe7003:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-43xe7004:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-43xe7005:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-43xe7073:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-43xe7077:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-43xe7093:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-43xe7096:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-49xe7000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-49xe7002:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-49xe7003:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-49xe7004:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-49xe7005:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-49xe7073:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-49xe7077:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-49xe7093:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-49xe7096:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-55xe7000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-55xe7002:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-55xe7003:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-55xe7004:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-55xe7005:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-55xe7073:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-55xe7077:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-55xe7093:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-55xe7096:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-65xe7002:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-65xe7003:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-65xe7004:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-65xe7005:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-65xe7093:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kd-65xe7096:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:xf70_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xf70:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:we75_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-43we750:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-43we753:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-43we754:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-43we755:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49we750:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49we753:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49we754:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49we755:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:we6_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32we610:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32we613:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-32we615:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-40we660:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-40we663:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-40we665:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49we660:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49we663:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-49we665:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:wf6_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:wf6:-:*:*:*:*:*:*:*']",0,0
CVE-2019-10844,Sony,0.00186,9.8,0.0,0.0,1.0,0.0,0,2019-04-04,0.0,,0.0,,,"nbla/logger.cpp in libnnabla.a in Sony Neural Network Libraries (aka nnabla) through v1.0.14 relies on the HOME environment variable, which might be untrusted.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['NVD-CWE-noinfo'],['cpe:2.3:a:sony:neural_network_libraries:*:*:*:*:*:*:*:*'],0,0
CVE-2019-10886,Sony,0.00255,5.9,0.0,1.0,1.0,0.0,0,2019-04-19,1.0,2019-04-12,,,1.0,An incorrect access control exists in the Sony Photo Sharing Plus application in the firmware before PKG6.5629 version (for the X7500D TV and other applicable TVs). This vulnerability allows an attacker to read arbitrary files without authentication over HTTP when Photo Sharing Plus application is running. This may allow an attacker to browse a particular directory (e.g. images) inside the private network.,CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,HIGH,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,2.2,3.6,['CWE-306'],"['cpe:2.3:h:sony:kdl-50w800c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-50w805c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-50w807c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-50w809c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-50w820c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-55w800c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-55w805c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-65w850c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-65w855c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-65w857c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-75w850c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-75w855c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:x7500d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-100z9d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-43x800d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-43x800e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-43x830c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-49x700d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-49x800c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-49x800d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-49x800e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-49x830c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-49x835c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-49x835d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-49x837c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-49x839c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-49x900e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-55a1e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-55x700d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-55x800e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-55x805c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-55x806e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-55x807c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-55x809c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-55x810c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-55x850c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-55x850d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-55x855c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-55x855d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-55x857c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-55x857d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-55x900c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-55x900e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-55x905c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-55x907c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-55x930d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-55x930e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65a1e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65x750d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65x800c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65x805c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65x807c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65x809c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65x810c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65x850c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65x850d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65x850e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65x855c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65x855d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65x857c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65x857d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65x900c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65x900e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65x905c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65x907c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65x930c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65x930d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65x930e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65x935d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65x937d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65z9d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-75x850c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-75x850d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-75x850e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-75x855c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-75x855d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-75x857d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-75x900e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-75x910c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-75x940c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-75x940d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-75x940e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-75x945c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-75z9d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-77a1e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-85x850d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-85x855d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-85x857d:-:*:*:*:*:*:*:*', 'cpe:2.3:a:sony:photo_sharing_plus:*:*:*:*:*:*:*:*']",0,0
CVE-2019-11336,Sony,0.00541,8.1,0.0,1.0,1.0,0.0,0,2019-05-14,1.0,2019-04-12,,,1.0,"Sony Bravia Smart TV devices allow remote attackers to retrieve the static Wi-Fi password (used when the TV is acting as an access point) by using the Photo Sharing Plus application to execute a backdoor API command, a different vulnerability than CVE-2019-10886.",CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,HIGH,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.2,5.9,['CWE-532'],"['cpe:2.3:a:sony:photo_sharing_plus:*:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-50w800c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-50w805c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-50w807c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-50w809c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-50w820c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-55w800c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-55w805c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-65w850c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-65w855c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-65w857c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-75w850c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:kdl-75w855c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:x7500d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-100z9d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-43x800d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-43x800e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-43x830c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-49x700d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-49x800c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-49x800d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-49x800e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-49x830c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-49x835c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-49x835d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-49x837c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-49x839c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-49x900e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-55a1e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-55x700d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-55x800e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-55x805c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-55x806e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-55x807c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-55x809c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-55x810c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-55x850c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-55x850d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-55x855c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-55x855d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-55x857c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-55x857d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-55x900c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-55x900e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-55x905c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-55x907c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-55x930d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-55x930e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65a1e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65x750d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65x800c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65x805c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65x807c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65x809c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65x810c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65x850c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65x850d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65x850e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65x855c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65x855d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65x857c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65x857d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65x900c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65x900e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65x905c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65x907c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65x930c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65x930d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65x930e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65x935d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65x937d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-65z9d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-75x850c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-75x850d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-75x850e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-75x855c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-75x855d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-75x857d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-75x900e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-75x910c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-75x940c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-75x940d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-75x940e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-75x945c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-75z9d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-77a1e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-85x850d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-85x855d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xbr-85x857d:-:*:*:*:*:*:*:*']",0,0
CVE-2019-15744,Sony,0.00044,3.3,0.0,1.0,0.0,1.0,0,2019-11-14,0.0,,0.0,,,"The Sony Xperia Xperia XZs Android device with a build fingerprint of Sony/keyaki_softbank/keyaki_softbank:7.1.1/TONE3-3.0.0-SOFTBANK-170517-0323/1:user/dev-keys contains a pre-installed app with a package name of jp.softbank.mb.tdrl app (versionCode=1413005, versionName=1.3.0) that allows unauthorized wireless settings modification via a confused deputy attack. This capability can be accessed by any app co-located on the device.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N,LOCAL,LOW,LOW,NONE,UNCHANGED,NONE,LOW,NONE,LOW,1.8,1.4,['CWE-610'],"['cpe:2.3:o:sony:xperia_xzs_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:xperia_xzs:-:*:*:*:*:*:*:*']",0,0
CVE-2019-19364,Sony,0.00091,7.8,0.0,0.0,1.0,0.0,0,2019-12-04,0.0,,0.0,,,"A weak malicious user can escalate its privilege whenever CatalystProductionSuite.2019.1.exe (version 1.1.0.21) and CatalystBrowseSuite.2019.1.exe (version 1.1.0.21) installers run. The vulnerability is in the form of DLL Hijacking. The installers try to load DLLs that don’t exist from its current directory; by doing so, an attacker can quickly escalate its privileges.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-427'],"['cpe:2.3:a:sony:catalyst_browse:*:*:*:*:*:*:*:*', 'cpe:2.3:a:sony:catalyst_production_suite:*:*:*:*:*:*:*:*']",0,0
CVE-2019-5981,Sony,0.0007,7.8,0.0,0.0,1.0,0.0,0,2019-07-05,1.0,2019-06-26,,,1.0,Improper authorization vulnerability in VAIO Update 7.3.0.03150 and earlier allows an attackers to execute arbitrary executable file with administrative privilege via unspecified vectors.,CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['NVD-CWE-noinfo'],['cpe:2.3:a:sony:vaio_update:*:*:*:*:*:*:*:*'],0,0
CVE-2019-5982,Sony,0.00136,7.5,0.0,0.0,1.0,0.0,0,2019-07-05,1.0,2019-06-26,,,1.0,Improper download file verification vulnerability in VAIO Update 7.3.0.03150 and earlier allows remote attackers to conduct a man-in-the-middle attack via a malicous wireless LAN access point. A successful exploitation may result in a malicious file being downloaded/executed.,CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,HIGH,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.6,5.9,['CWE-494'],['cpe:2.3:a:sony:vaio_update:*:*:*:*:*:*:*:*'],0,0
CVE-2020-5589,Sony,0.00077,8.8,0.0,1.0,0.0,1.0,0,2020-06-09,1.0,2020-06-23,,,0.0,"SONY Wireless Headphones WF-1000X, WF-SP700N, WH-1000XM2, WH-1000XM3, WH-CH700N, WH-H900N, WH-XB700, WH-XB900N, WI-1000X, WI-C600N and WI-SP600N with firmware versions prior to 4.5.2 have vulnerability that someone within the Bluetooth range can make the Bluetooth pairing and operate such as changing volume of the product.",CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-306'],"['cpe:2.3:h:sony:wf-1000x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:wf-1000x_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:wf-sp700n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:wf-sp700n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:wh-1000xm2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:wh-1000xm2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:wh-1000xm3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:wh-1000xm3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:wh-ch700n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:wh-ch700n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:wh-h900n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:wh-h900n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:wh-xb700:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:wh-xb700_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:wh-xb900n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:wh-xb900n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:wi-1000x_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:wi-1000x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:wi-c600n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:wi-c600n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:wi-sp600n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:wi-sp600n:-:*:*:*:*:*:*:*']",0,0
CVE-2021-20793,Sony,0.00164,7.8,0.0,0.0,1.0,0.0,0,2021-08-26,1.0,2021-08-24,,,1.0,Untrusted search path vulnerability in the installer of Sony Audio USB Driver V1.10 and prior and the installer of HAP Music Transfer Ver.1.3.0 and prior allows an attacker to gain privileges and execute arbitrary code via a Trojan horse DLL in an unspecified directory.,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-427'],"['cpe:2.3:a:sony:audio_usb_driver:*:*:*:*:*:*:*:*', 'cpe:2.3:a:sony:hap_music_transfer:*:*:*:*:*:*:*:*']",0,0
CVE-2021-38544,Sony,0.00522,5.9,0.0,1.0,0.0,1.0,0,2021-08-11,0.0,,0.0,,,"Sony SRS-XB33 and SRS-XB43 devices through 2021-08-09 allow remote attackers to recover speech signals from an LED on the device, via a telescope and an electro-optical sensor, aka a ""Glowworm"" attack. The power indicator LED of the speakers is connected directly to the power line, as a result, the intensity of a device's power indicator LED is correlative to the power consumption. The sound played by the speakers affects their power consumption and as a result is also correlative to the light intensity of the LEDs. By analyzing measurements obtained from an electro-optical sensor directed at the power indicator LEDs of the speakers, we can recover the sound played by them.",CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,HIGH,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,2.2,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:sony:srs-xb33_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:srs-xb33:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sony:srs-xb43_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:sony:srs-xb43:-:*:*:*:*:*:*:*']",0,0
CVE-2022-41796,Sony,0.00068,7.8,0.0,0.0,1.0,0.0,0,2022-10-24,0.0,,1.0,2022-10-11,,Untrusted search path vulnerability in the installer of Content Transfer (for Windows) Ver.1.3 and prior allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-427'],['cpe:2.3:a:sony:content_transfer:*:*:*:*:*:windows:*:*'],0,0
CVE-2016-8731,Foscam,0.00192,9.8,0.0,1.0,0.0,1.0,1,2017-06-21,0.0,,0.0,,,Hard-coded FTP credentials (r:r) are included in the Foscam C1 running firmware 1.9.1.12. Knowledge of these credentials would allow remote access to any cameras found on the internet that do not have port 50021 blocked by an intermediate device.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-798'],"['cpe:2.3:o:foscam:c1_webcam_firmware:1.9.1.12:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:c1_webcam:-:*:*:*:*:*:*:*']",0,0
CVE-2017-2805,Foscam,0.00179,9.8,0.0,1.0,0.0,1.0,1,2017-06-21,0.0,,0.0,,,An exploitable stack-based buffer overflow vulnerability exists in the web management interface used by the Foscam C1 Indoor HD Camera. A specially crafted http request can cause a stack-based buffer overflow resulting in overwriting arbitrary data on the stack frame. An attacker can simply send an http request to the device to trigger this vulnerability.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:o:foscam:c1_hd_indoor_camera_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:c1_hd_indoor_camera:-:*:*:*:*:*:*:*']",0,0
CVE-2017-2828,Foscam,0.00113,8.8,0.0,0.0,0.0,1.0,1,2017-06-21,0.0,,0.0,,,An exploitable command injection vulnerability exists in the web management interface used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.37. A specially crafted HTTP request can allow for a user to inject arbitrary shell characters during account creation resulting in command injection. An attacker can simply send an HTTP request to the device to trigger this vulnerability.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-78'],"['cpe:2.3:o:foscam:c1_indoor_hd_camera_firmware:2.52.2.37:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:c1_indoor_hd_camera:-:*:*:*:*:*:*:*']",0,0
CVE-2017-2830,Foscam,0.00178,7.5,0.0,0.0,0.0,1.0,1,2017-06-21,0.0,,0.0,,,An exploitable buffer overflow vulnerability exists in the web management interface used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.37. A specially crafted HTTP request can cause a buffer overflow resulting in overwriting arbitrary data. An attacker can simply send an HTTP request to the device to trigger this vulnerability.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,HIGH,NONE,HIGH,3.9,3.6,['CWE-120'],"['cpe:2.3:o:foscam:c1_indoor_hd_camera_firmware:2.52.2.37:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:c1_indoor_hd_camera:-:*:*:*:*:*:*:*']",0,0
CVE-2017-2831,Foscam,0.00178,7.5,0.0,0.0,0.0,1.0,1,2017-06-21,0.0,,0.0,,,An exploitable buffer overflow vulnerability exists in the web management interface used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.37. A specially crafted HTTP request can cause a buffer overflow resulting in overwriting arbitrary data. An attacker can simply send an HTTP request to the device to trigger this vulnerability.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,HIGH,NONE,HIGH,3.9,3.6,['CWE-120'],"['cpe:2.3:o:foscam:c1_indoor_hd_camera_firmware:2.52.2.37:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:c1_indoor_hd_camera:-:*:*:*:*:*:*:*']",0,0
CVE-2017-2832,Foscam,0.00066,7.2,0.0,1.0,0.0,1.0,1,2018-04-24,0.0,,0.0,,,An exploitable command injection vulnerability exists in the web management interface used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.37. A specially crafted HTTP request can allow for a user to inject arbitrary shell characters during a password change resulting in command injection. An attacker can simply send an HTTP request to the device to trigger this vulnerability.,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.2,5.9,['CWE-77'],"['cpe:2.3:o:foscam:c1_firmware:2.52.2.37:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:c1:-:*:*:*:*:*:*:*']",0,0
CVE-2017-2842,Foscam,0.0013,8.8,0.0,0.0,0.0,1.0,1,2017-06-27,0.0,,0.0,,,"In the web management interface in Foscam C1 Indoor HD Camera running application firmware 2.52.2.37, a specially crafted HTTP request can allow for a user to inject arbitrary data in the ""msmtprc"" configuration file resulting in command execution. An attacker can simply send an HTTP request to the device to trigger this vulnerability.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-78'],"['cpe:2.3:o:foscam:c1_indoor_hd_camera_firmware:2.52.2.37:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:c1_indoor_hd_camera:-:*:*:*:*:*:*:*']",0,0
CVE-2017-2844,Foscam,0.0013,8.8,0.0,0.0,0.0,1.0,1,2017-06-29,0.0,,0.0,,,"In the web management interface in Foscam C1 Indoor HD cameras with application firmware 2.52.2.37, a specially crafted HTTP request can allow for a user to inject arbitrary data in the ""msmtprc"" configuration file resulting in command execution. An attacker can simply send an HTTP request to the device to trigger this vulnerability.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-78'],"['cpe:2.3:o:foscam:c1_indoor_hd_camera_firmware:2.52.2.37:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:c1_indoor_hd_camera:-:*:*:*:*:*:*:*']",0,0
CVE-2017-2854,Foscam,0.00293,8.1,0.0,1.0,0.0,1.0,1,2018-09-17,0.0,,0.0,,,"An exploitable buffer overflow vulnerability exists in the DDNS client used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. On devices with DDNS enabled, an attacker who is able to intercept HTTP connections will be able to fully compromise the device by creating a rogue HTTP server.",CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,HIGH,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.2,5.9,['CWE-120'],"['cpe:2.3:o:foscam:c1_firmware:2.52.2.43:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:c1:-:*:*:*:*:*:*:*']",0,0
CVE-2017-2856,Foscam,0.00293,8.1,0.0,1.0,0.0,1.0,1,2018-09-17,0.0,,0.0,,,"An exploitable buffer overflow vulnerability exists in the DDNS client used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. On devices with DDNS enabled, an attacker who is able to intercept HTTP connections will be able to fully compromise the device by creating a rogue HTTP server.",CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,HIGH,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.2,5.9,['CWE-120'],"['cpe:2.3:o:foscam:c1_firmware:2.52.2.43:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:c1:-:*:*:*:*:*:*:*']",0,0
CVE-2017-2874,Foscam,0.00231,7.5,0.0,1.0,0.0,1.0,1,2018-09-17,0.0,,0.0,,,An information disclosure vulnerability exists in the Multi-Camera interface used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. A specially crafted request on port 10001 can allow for a user to retrieve sensitive information without authentication.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:foscam:c1_firmware:2.52.2.43:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:c1:-:*:*:*:*:*:*:*']",0,0
CVE-2017-7648,Foscam,0.00323,8.1,0.0,1.0,0.0,0.0,1,2017-04-10,0.0,,0.0,,,"Foscam networked devices use the same hardcoded SSL private key across different customers' installations, which allows remote attackers to defeat cryptographic protection mechanisms by leveraging knowledge of this key from another installation.",CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,HIGH,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.2,5.9,['CWE-798'],"['cpe:2.3:h:foscam:c1:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:c1_lite:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:c2:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9800xe:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9826p:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9828p:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9851p:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9853ep:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9901ep:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9903p:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9928p:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:r2:*:*:*:*:*:*:*:*']",0,0
CVE-2018-19064,Foscam,0.00659,9.8,0.0,1.0,0.0,1.0,1,2018-11-07,0.0,,0.0,,,"An issue was discovered on Foscam C2 devices with System Firmware 1.11.1.8 and Application Firmware 2.72.1.32, and Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. The ftpuser1 account has a blank password, which cannot be changed.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-521'],"['cpe:2.3:o:opticam:i5_application_firmware:2.21.1.128:*:*:*:*:*:*:*', 'cpe:2.3:o:opticam:i5_system_firmware:1.5.2.11:*:*:*:*:*:*:*', 'cpe:2.3:h:opticam:i5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:c2_application_firmware:2.72.1.32:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:c2_system_firmware:1.11.1.8:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:c2:-:*:*:*:*:*:*:*']",0,0
CVE-2018-19067,Foscam,0.00659,9.8,0.0,1.0,0.0,1.0,1,2018-11-07,0.0,,0.0,,,"An issue was discovered on Foscam C2 devices with System Firmware 1.11.1.8 and Application Firmware 2.72.1.32, and Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. There is a hardcoded Ak47@99 password for the factory~ account.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-798'],"['cpe:2.3:o:opticam:i5_application_firmware:2.21.1.128:*:*:*:*:*:*:*', 'cpe:2.3:o:opticam:i5_system_firmware:1.5.2.11:*:*:*:*:*:*:*', 'cpe:2.3:h:opticam:i5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:c2_application_firmware:2.72.1.32:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:c2_system_firmware:1.11.1.8:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:c2:-:*:*:*:*:*:*:*']",0,0
CVE-2018-19068,Foscam,0.00061,4.9,0.0,1.0,0.0,1.0,1,2018-11-07,0.0,,0.0,,,An issue was discovered on Foscam Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. The CGIProxy.fcgi?cmd=setTelnetSwitch feature is authorized for hidden factory credentials.,CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N,NETWORK,LOW,HIGH,NONE,UNCHANGED,NONE,HIGH,NONE,MEDIUM,1.2,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:opticam:i5_application_firmware:2.21.1.128:*:*:*:*:*:*:*', 'cpe:2.3:o:opticam:i5_system_firmware:1.5.2.11:*:*:*:*:*:*:*', 'cpe:2.3:h:opticam:i5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:c2_application_firmware:2.72.1.32:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:c2_system_firmware:1.11.1.8:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:c2:-:*:*:*:*:*:*:*']",0,0
CVE-2018-19070,Foscam,0.00993,7.2,0.0,1.0,0.0,1.0,1,2018-11-07,0.0,,0.0,,,"An issue was discovered on Foscam C2 devices with System Firmware 1.11.1.8 and Application Firmware 2.72.1.32, and Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. They allow remote attackers to execute arbitrary OS commands via shell metacharacters in the usrName parameter of a CGIProxy.fcgi addAccount action.",CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.2,5.9,['CWE-78'],"['cpe:2.3:o:opticam:i5_application_firmware:2.21.1.128:*:*:*:*:*:*:*', 'cpe:2.3:o:opticam:i5_system_firmware:1.5.2.11:*:*:*:*:*:*:*', 'cpe:2.3:h:opticam:i5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:c2_application_firmware:2.72.1.32:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:c2_system_firmware:1.11.1.8:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:c2:-:*:*:*:*:*:*:*']",0,0
CVE-2018-19072,Foscam,0.00042,5.5,0.0,1.0,0.0,1.0,1,2018-11-07,0.0,,0.0,,,"An issue was discovered on Foscam C2 devices with System Firmware 1.11.1.8 and Application Firmware 2.72.1.32, and Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. /mnt/mtd/app has 0777 permissions, allowing local users to replace an archive file (within that directory) to control what is extracted to RAM at boot time.",CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N,LOCAL,LOW,LOW,NONE,UNCHANGED,NONE,HIGH,NONE,MEDIUM,1.8,3.6,['CWE-732'],"['cpe:2.3:o:opticam:i5_application_firmware:2.21.1.128:*:*:*:*:*:*:*', 'cpe:2.3:o:opticam:i5_system_firmware:1.5.2.11:*:*:*:*:*:*:*', 'cpe:2.3:h:opticam:i5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:c2_application_firmware:2.72.1.32:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:c2_system_firmware:1.11.1.8:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:c2:-:*:*:*:*:*:*:*']",0,0
CVE-2018-19074,Foscam,0.0011,7.5,0.0,1.0,0.0,1.0,1,2018-11-07,0.0,,0.0,,,"An issue was discovered on Foscam C2 devices with System Firmware 1.11.1.8 and Application Firmware 2.72.1.32, and Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. The firewall has no effect except for blocking port 443 and partially blocking port 88.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,HIGH,NONE,HIGH,3.9,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:opticam:i5_application_firmware:2.21.1.128:*:*:*:*:*:*:*', 'cpe:2.3:o:opticam:i5_system_firmware:1.5.2.11:*:*:*:*:*:*:*', 'cpe:2.3:h:opticam:i5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:c2_application_firmware:2.72.1.32:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:c2_system_firmware:1.11.1.8:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:c2:-:*:*:*:*:*:*:*']",0,0
CVE-2018-19077,Foscam,0.00267,7.5,0.0,1.0,0.0,1.0,1,2018-11-07,0.0,,0.0,,,An issue was discovered on Foscam Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. RtspServer allows remote attackers to cause a denial of service (daemon hang or restart) via a negative integer in the RTSP Content-Length header.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-125'],"['cpe:2.3:o:opticam:i5_application_firmware:2.21.1.128:*:*:*:*:*:*:*', 'cpe:2.3:o:opticam:i5_system_firmware:1.5.2.11:*:*:*:*:*:*:*', 'cpe:2.3:h:opticam:i5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:c2_application_firmware:2.72.1.32:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:c2_system_firmware:1.11.1.8:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:c2:-:*:*:*:*:*:*:*']",0,0
CVE-2018-19080,Foscam,0.00083,6.1,0.0,1.0,0.0,1.0,1,2018-11-07,0.0,,0.0,,,An issue was discovered on Foscam Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. The ONVIF devicemgmt SetHostname method allows unauthenticated persistent XSS.,CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:opticam:i5_application_firmware:2.21.1.128:*:*:*:*:*:*:*', 'cpe:2.3:o:opticam:i5_system_firmware:1.5.2.11:*:*:*:*:*:*:*', 'cpe:2.3:h:opticam:i5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:c2_application_firmware:2.72.1.32:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:c2_system_firmware:1.11.1.8:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:c2:-:*:*:*:*:*:*:*']",0,0
CVE-2018-19081,Foscam,0.01861,9.8,0.0,1.0,0.0,1.0,1,2018-11-07,0.0,,0.0,,,An issue was discovered on Foscam Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. The ONVIF devicemgmt SetDNS method allows remote attackers to execute arbitrary OS commands via the IPv4Address field.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-78'],"['cpe:2.3:o:opticam:i5_application_firmware:2.21.1.128:*:*:*:*:*:*:*', 'cpe:2.3:o:opticam:i5_system_firmware:1.5.2.11:*:*:*:*:*:*:*', 'cpe:2.3:h:opticam:i5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:c2_application_firmware:2.72.1.32:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:c2_system_firmware:1.11.1.8:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:c2:-:*:*:*:*:*:*:*']",0,0
CVE-2018-19082,Foscam,0.01097,9.8,0.0,1.0,0.0,1.0,1,2018-11-07,0.0,,0.0,,,An issue was discovered on Foscam Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. The ONVIF devicemgmt SetDNS method allows remote attackers to conduct stack-based buffer overflow attacks via the IPv4Address field.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:o:opticam:i5_application_firmware:2.21.1.128:*:*:*:*:*:*:*', 'cpe:2.3:o:opticam:i5_system_firmware:1.5.2.11:*:*:*:*:*:*:*', 'cpe:2.3:h:opticam:i5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:c2_application_firmware:2.72.1.32:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:c2_system_firmware:1.11.1.8:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:c2:-:*:*:*:*:*:*:*']",0,0
CVE-2018-6830,Foscam,0.00247,7.5,0.0,1.0,0.0,1.0,1,2018-07-09,1.0,2018-05-17,,,1.0,"Directory traversal vulnerability in Foscam Cameras C1 Lite V3, and C1 V3 with firmware 2.82.2.33 and earlier, FI9800P V3, FI9803P V4, FI9851P V3, and FI9853EP V2 2.84.2.33 and earlier, FI9816P V3, FI9821EP V2, FI9821P V3, FI9826P V3, and FI9831P V3 2.81.2.33 and earlier, C1, C1 V2, C1 Lite, and C1 Lite V2 2.52.2.47 and earlier, FI9800P, FI9800P V2, FI9803P V2, FI9803P V3, and FI9851P V2 2.54.2.47 and earlier, FI9815P, FI9815P V2, FI9816P, and FI9816P V2, 2.51.2.47 and earlier, R2 and R4 2.71.1.59 and earlier, C2 and FI9961EP 2.72.1.59 and earlier, FI9900EP, FI9900P, and FI9901EP 2.74.1.59 and earlier, FI9928P 2.74.1.58 and earlier, FI9803EP and FI9853EP 2.22.2.31 and earlier, FI9803P and FI9851P 2.24.2.31 and earlier, FI9821P V2, FI9826P V2, FI9831P V2, and FI9821EP 2.21.2.31 and earlier, FI9821W V2, FI9831W, FI9826W, FI9821P, FI9831P, and FI9826P 2.11.1.120 and earlier, FI9818W V2 2.13.2.120 and earlier, FI9805W, FI9804W, FI9804P, FI9805E, and FI9805P 2.14.1.120 and earlier, FI9828P, and FI9828W 2.13.1.120 and earlier, and FI9828P V2 2.11.1.133 and earlier allows remote attackers to delete arbitrary files via a .. (dot dot) in the URI path component.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,HIGH,NONE,HIGH,3.9,3.6,['CWE-22'],"['cpe:2.3:o:foscam:c1_lite_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:c1_lite:3:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:c1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:c1:3:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9800p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9800p:3:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9821ep_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9821ep:2:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9821p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9821p:3:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9826p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9826p:3:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9831p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9831p:3:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:c1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:c1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:c1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:c1:2:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:c1_lite_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:c1_lite:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:c1_lite_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:c1_lite:2:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9800p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9800p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9800p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9800p:2:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9803p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9803p:2:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9803p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9803p:3:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9851p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9851p:2:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9815p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9815p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9815p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9815p:2:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9816p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9816p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9816p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9816p:2:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:r2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:r2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:r4_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:r4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:c2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:c2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9961ep_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9961ep:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9900ep_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9900ep:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9900p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9900p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9901ep_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9901ep:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9928p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9928p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9803ep_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9803ep:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9853ep_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9853ep:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9803p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9803p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9851p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9851p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9821p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9821p:2:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9826p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9826p:2:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9831p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9831p:2:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9821ep_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9821ep:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9821w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9821w:2:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9831w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9831w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9826w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9826w:-:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9821p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9821p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9831p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9831p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9826p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9826p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9818w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9818w:2:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9805w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9805w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9804w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9804w:-:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9804p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9804p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9805e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9805e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9805p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9805p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9828p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9828p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9828w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9828w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9828p:2:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9828p_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2018-6832,Foscam,0.00384,7.5,0.0,1.0,0.0,1.0,1,2018-07-09,1.0,2018-05-17,,,1.0,"Stack-based buffer overflow in the getSWFlag function in Foscam Cameras C1 Lite V3, and C1 V3 with firmware 2.82.2.33 and earlier, FI9800P V3, FI9803P V4, FI9851P V3, and FI9853EP V2 2.84.2.33 and earlier, FI9816P V3, FI9821EP V2, FI9821P V3, FI9826P V3, and FI9831P V3 2.81.2.33 and earlier, C1, C1 V2, C1 Lite, and C1 Lite V2 2.52.2.47 and earlier, FI9800P, FI9800P V2, FI9803P V2, FI9803P V3, and FI9851P V2 2.54.2.47 and earlier, FI9815P, FI9815P V2, FI9816P, and FI9816P V2, 2.51.2.47 and earlier, R2 and R4 2.71.1.59 and earlier, C2 and FI9961EP 2.72.1.59 and earlier, FI9900EP, FI9900P, and FI9901EP 2.74.1.59 and earlier, FI9928P 2.74.1.58 and earlier, FI9803EP and FI9853EP 2.22.2.31 and earlier, FI9803P and FI9851P 2.24.2.31 and earlier, FI9821P V2, FI9826P V2, FI9831P V2, and FI9821EP 2.21.2.31 and earlier, FI9821W V2, FI9831W, FI9826W, FI9821P, FI9831P, and FI9826P 2.11.1.120 and earlier, FI9818W V2 2.13.2.120 and earlier, FI9805W, FI9804W, FI9804P, FI9805E, and FI9805P 2.14.1.120 and earlier, FI9828P, and FI9828W 2.13.1.120 and earlier, and FI9828P V2 2.11.1.133 and earlier allows remote attackers to cause a denial of service (crash and reboot), via the callbackJson parameter.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-787'],"['cpe:2.3:o:foscam:c1_lite_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:c1_lite:3:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:c1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:c1:3:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9800p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9800p:3:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9821ep_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9821ep:2:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9821p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9821p:3:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9826p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9826p:3:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9831p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9831p:3:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:c1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:c1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:c1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:c1:2:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:c1_lite_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:c1_lite:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:c1_lite_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:c1_lite:2:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9800p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9800p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9800p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9800p:2:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9803p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9803p:2:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9803p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9803p:3:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9851p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9851p:2:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9815p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9815p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9815p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9815p:2:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9816p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9816p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9816p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9816p:2:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:r2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:r2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:r4_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:r4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:c2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:c2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9961ep_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9961ep:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9900ep_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9900ep:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9900p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9900p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9901ep_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9901ep:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9928p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9928p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9803ep_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9803ep:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9853ep_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9853ep:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9803p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9803p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9851p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9851p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9821p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9821p:2:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9826p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9826p:2:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9831p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9831p:2:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9821ep_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9821ep:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9821w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9821w:2:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9831w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9831w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9826w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9826w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9821p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9821p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9831p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9831p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9826p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9826p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9818w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9818w:2:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9805w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9805w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9804w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9804w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9804p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9804p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9805e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9805e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9805p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9805p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9828p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9828p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9828w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9828w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:fi9828p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9828p:2:*:*:*:*:*:*:*']",0,0
CVE-2022-28743,Foscam,0.00211,6.6,0.0,1.0,0.0,0.0,1,2022-04-21,1.0,2022-04-21,,,1.0,"Time-of-check Time-of-use (TOCTOU) Race Condition vulerability in Foscam R2C IP camera running System FW <= 1.13.1.6, and Application FW <= 2.91.2.66, allows an authenticated remote attacker with administrator permissions to execute arbitrary remote code via a malicious firmware patch. The impact of this vulnerability is that the remote attacker could gain full remote access to the IP camera and the underlying Linux system with root permissions. With root access to the camera's Linux OS, an attacker could effectively change the code that is running, add backdoor access, or invade the privacy of the user by accessing the live camera stream.",CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H,NETWORK,HIGH,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.7,5.9,['CWE-367'],"['cpe:2.3:o:foscam:r2c_application_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:foscam:r2c_system_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:r2c:-:*:*:*:*:*:*:*']",0,0
CVE-2020-28096,Foscam,0.00096,6.8,0.0,1.0,0.0,1.0,0,2020-12-28,0.0,,0.0,,,FOSCAM FHD X1 1.14.2.4 devices allow attackers (with physical UART access) to login via the ipc.fos~ password.,CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,PHYSICAL,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.9,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:foscammall:foscam_x1_firmware:1.14.2.4:*:*:*:*:*:*:*', 'cpe:2.3:h:foscammall:foscam_x1:-:*:*:*:*:*:*:*']",0,0
CVE-2021-43517,Foscam,0.00283,9.8,0.0,1.0,0.0,1.0,0,2022-04-08,0.0,,0.0,,,FOSCAM Camera FI9805E with firmware V4.02.R12.00018510.10012.143900.00000 contains a backdoor that opens Telnet port when special command is sent on port 9530.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:foscam:fi9805e_firmware:4.02.r12.00018510.10012.143900.00000:*:*:*:*:*:*:*', 'cpe:2.3:h:foscam:fi9805e:-:*:*:*:*:*:*:*']",0,0
CVE-2017-10677,Linksys,0.00112,8.8,0.0,0.0,0.0,1.0,1,2017-08-06,1.0,2017-08-03,,,1.0,"Cross-Site Request Forgery (CSRF) exists on Linksys EA4500 devices with Firmware Version before 2.1.41.164606, as demonstrated by a request to apply.cgi to disable SIP.",CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-352'],"['cpe:2.3:o:linksys:ea4500_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:linksys:ea4500:-:*:*:*:*:*:*:*']",0,0
CVE-2017-17411,Linksys,0.97407,9.8,1.0,1.0,0.0,0.0,1,2017-12-21,1.0,2017-12-18,,,1.0,This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Linksys WVBR0. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web management portal. The issue lies in the lack of proper validation of user data before executing a system call. An attacker could leverage this vulnerability to execute code with root privileges. Was ZDI-CAN-4892.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-78'],"['cpe:2.3:o:linksys:wvbr0_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:linksys:wvbr0:-:*:*:*:*:*:*:*']",2,0
CVE-2018-17208,Linksys,0.01061,8.8,0.0,1.0,0.0,1.0,1,2018-09-19,0.0,,0.0,,,"Linksys Velop 1.1.2.187020 devices allow unauthenticated command injection, providing an attacker with full root access, via cgi-bin/zbtest.cgi or cgi-bin/zbtest2.cgi (scripts that can be discovered with binwalk on the firmware, but are not visible in the web interface). This occurs because shell metacharacters in the query string are mishandled by ShellExecute, as demonstrated by the zbtest.cgi?cmd=level&level= substring. This can also be exploited via CSRF.",CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-78'],"['cpe:2.3:h:linksys:velop:-:*:*:*:*:*:*:*', 'cpe:2.3:o:linksys:velop_firmware:1.1.2.187020:*:*:*:*:*:*:*']",0,0
CVE-2018-3953,Linksys,0.00205,7.2,0.0,1.0,0.0,1.0,1,2018-10-17,1.0,2018-10-04,,,1.0,"Devices in the Linksys ESeries line of routers (Linksys E1200 Firmware Version 2.0.09 and Linksys E2500 Firmware Version 3.0.04) are susceptible to OS command injection vulnerabilities due to improper filtering of data passed to and retrieved from NVRAM. Data entered into the 'Router Name' input field through the web portal is submitted to apply.cgi as the value to the 'machine_name' POST parameter. When the 'preinit' binary receives the SIGHUP signal, it enters a code path that continues until it reaches offset 0x0042B5C4 in the 'start_lltd' function. Within the 'start_lltd' function, a 'nvram_get' call is used to obtain the value of the user-controlled 'machine_name' NVRAM entry. This value is then entered directly into a command intended to write the host name to a file and subsequently executed.",CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.2,5.9,['CWE-78'],"['cpe:2.3:o:linksys:e1200_firmware:2.0.09:*:*:*:*:*:*:*', 'cpe:2.3:h:linksys:e1200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:linksys:e2500_firmware:3.0.04:*:*:*:*:*:*:*', 'cpe:2.3:h:linksys:e2500:-:*:*:*:*:*:*:*']",0,0
CVE-2018-3954,Linksys,0.00205,7.2,0.0,1.0,0.0,1.0,1,2018-10-17,1.0,2018-10-04,,,1.0,Devices in the Linksys ESeries line of routers (Linksys E1200 Firmware Version 2.0.09 and Linksys E2500 Firmware Version 3.0.04) are susceptible to OS command injection vulnerabilities due to improper filtering of data passed to and retrieved from NVRAMData entered into the 'Router Name' input field through the web portal is submitted to apply.cgi as the value to the 'machine_name' POST parameter. When the 'preinit' binary receives the SIGHUP signal it enters a code path that calls a function named 'set_host_domain_name' from its libshared.so shared object.,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.2,5.9,['CWE-78'],"['cpe:2.3:o:linksys:e1200_firmware:2.0.09:*:*:*:*:*:*:*', 'cpe:2.3:h:linksys:e1200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:linksys:e2500_firmware:3.0.04:*:*:*:*:*:*:*', 'cpe:2.3:h:linksys:e2500:-:*:*:*:*:*:*:*']",0,0
CVE-2018-3955,Linksys,0.00227,7.2,0.0,1.0,0.0,1.0,1,2018-10-17,1.0,2018-10-04,,,1.0,"An exploitable operating system command injection exists in the Linksys ESeries line of routers (Linksys E1200 Firmware Version 2.0.09 and Linksys E2500 Firmware Version 3.0.04). Specially crafted entries to network configuration information can cause execution of arbitrary system commands, resulting in full control of the device. An attacker can send an authenticated HTTP request to trigger this vulnerability. Data entered into the 'Domain Name' input field through the web portal is submitted to apply.cgi as the value to the 'wan_domain' POST parameter. The wan_domain data goes through the nvram_set process described above. When the 'preinit' binary receives the SIGHUP signal it enters a code path that calls a function named 'set_host_domain_name' from its libshared.so shared object.",CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.2,5.9,['CWE-78'],"['cpe:2.3:o:linksys:e1200_firmware:2.0.09:*:*:*:*:*:*:*', 'cpe:2.3:h:linksys:e1200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:linksys:e2500_firmware:3.0.04:*:*:*:*:*:*:*', 'cpe:2.3:h:linksys:e2500:-:*:*:*:*:*:*:*']",0,0
CVE-2019-11535,Linksys,0.00794,9.8,0.0,1.0,0.0,1.0,1,2019-07-17,1.0,2019-05-16,,,1.0,Unsanitized user input in the web interface for Linksys WiFi extender products (RE6400 and RE6300 through 1.2.04.022) allows for remote command execution. An attacker can access system OS configurations and commands that are not intended for use beyond the web UI.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-77'],"['cpe:2.3:o:linksys:re6400_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:linksys:re6400:1:*:*:*:*:*:*:*', 'cpe:2.3:o:linksys:re6300_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:linksys:re6300:1:*:*:*:*:*:*:*']",0,0
CVE-2019-16340,Linksys,0.00942,9.8,0.0,1.0,0.0,1.0,1,2019-11-21,1.0,2019-07-22,,,1.0,Belkin Linksys Velop 1.1.8.192419 devices allows remote attackers to discover the recovery key via a direct request for the /sysinfo_json.cgi URI.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-425'],"['cpe:2.3:o:linksys:velop_whw0303_firmware:1.1.8.192419:*:*:*:*:*:*:*', 'cpe:2.3:h:linksys:velop_whw0303:-:*:*:*:*:*:*:*', 'cpe:2.3:o:linksys:velop_whw0302_firmware:1.1.8.192419:*:*:*:*:*:*:*', 'cpe:2.3:h:linksys:velop_whw0302:-:*:*:*:*:*:*:*', 'cpe:2.3:o:linksys:velop_whw0301_firmware:1.1.8.192419:*:*:*:*:*:*:*', 'cpe:2.3:h:linksys:velop_whw0301:-:*:*:*:*:*:*:*']",0,0
CVE-2019-7311,Linksys,0.00046,7.8,0.0,1.0,0.0,1.0,1,2019-06-06,0.0,,0.0,,,"An issue was discovered on Linksys WRT1900ACS 1.0.3.187766 devices. A lack of encryption in how the user login cookie (admin-auth) is stored on a victim's computer results in the admin password being discoverable by a local attacker, and usable to gain administrative access to the victim's router. The admin password is stored in base64 cleartext in an ""admin-auth"" cookie. An attacker sniffing the network at the time of login could acquire the router's admin password. Alternatively, gaining physical access to the victim's computer soon after an administrative login could result in compromise.",CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-311'],"['cpe:2.3:o:linksys:wrt1900acs_firmware:1.0.3.187766:*:*:*:*:*:*:*', 'cpe:2.3:h:linksys:wrt1900acs:-:*:*:*:*:*:*:*']",0,0
CVE-2019-7579,Linksys,0.00365,7.5,0.0,1.0,0.0,1.0,1,2019-06-17,0.0,,0.0,,,"An issue was discovered on Linksys WRT1900ACS 1.0.3.187766 devices. An ability exists for an unauthenticated user to browse a confidential ui/1.0.99.187766/dynamic/js/setup.js.localized file on the router's webserver, allowing for an attacker to identify possible passwords that the system uses to set the default guest network password. An attacker can use this list of 30 words along with a random 2 digit number to brute force their access onto a router's guest network.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-287'],"['cpe:2.3:o:linksys:wrt1900acs_firmware:1.0.3.187766:*:*:*:*:*:*:*', 'cpe:2.3:h:linksys:wrt1900acs:-:*:*:*:*:*:*:*']",0,0
CVE-2020-35713,Linksys,0.95916,9.8,0.0,1.0,0.0,1.0,1,2020-12-26,1.0,2020-06-24,,,1.0,Belkin LINKSYS RE6500 devices before 1.0.012.001 allow remote attackers to execute arbitrary commands or set a new password via shell metacharacters to the goform/setSysAdm page.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-78'],"['cpe:2.3:o:linksys:re6500_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:linksys:re6500:-:*:*:*:*:*:*:*']",0,0
CVE-2020-35714,Linksys,0.00942,8.8,0.0,1.0,0.0,1.0,1,2020-12-26,1.0,2020-06-24,,,1.0,Belkin LINKSYS RE6500 devices before 1.0.11.001 allow remote authenticated users to execute arbitrary commands via goform/systemCommand?command= in conjunction with the goform/pingstart program.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-78'],"['cpe:2.3:o:linksys:re6500_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:linksys:re6500:-:*:*:*:*:*:*:*']",0,0
CVE-2020-35715,Linksys,0.00942,8.8,0.0,1.0,0.0,1.0,1,2020-12-26,1.0,2020-06-24,,,1.0,Belkin LINKSYS RE6500 devices before 1.0.012.001 allow remote authenticated users to execute arbitrary commands via shell metacharacters in a filename to the upload_settings.cgi page.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-78'],"['cpe:2.3:o:linksys:re6500_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:linksys:re6500:-:*:*:*:*:*:*:*']",0,0
CVE-2020-35716,Linksys,0.00515,7.5,0.0,1.0,0.0,1.0,1,2020-12-26,1.0,2020-06-24,,,1.0,Belkin LINKSYS RE6500 devices before 1.0.012.001 allow remote attackers to cause a persistent denial of service (segmentation fault) via a long /goform/langSwitch langSelectionOnly parameter.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:linksys:re6500_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:linksys:re6500:-:*:*:*:*:*:*:*']",0,0
CVE-2022-24372,Linksys,0.00088,4.6,0.0,1.0,0.0,1.0,1,2022-04-27,0.0,,0.0,,,Linksys MR9600 devices before 2.0.5 allow attackers to read arbitrary files via a symbolic link to the root directory of a NAS SMB share.,CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,PHYSICAL,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,0.9,3.6,['CWE-59'],"['cpe:2.3:o:linksys:mr9600_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:linksys:mr9600:-:*:*:*:*:*:*:*']",0,0
CVE-2022-38555,Linksys,0.00214,9.8,0.0,1.0,0.0,1.0,1,2022-08-28,0.0,,0.0,,,Linksys E1200 v1.0.04 is vulnerable to Buffer Overflow via ej_get_web_page_name.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:o:linksys:e1200_firmware:1.0.04:*:*:*:*:*:*:*', 'cpe:2.3:h:linksys:e1200:-:*:*:*:*:*:*:*']",0,0
CVE-2022-35572,Linksys,0.00205,7.5,0.0,1.0,0.0,1.0,0,2022-09-12,0.0,,0.0,,,"On Linksys E5350 WiFi Router with firmware version 1.0.00.037 and lower, (and potentially other vendors/devices due to code reuse), the /SysInfo.htm URI does not require a session ID. This web page calls a show_sysinfo function which retrieves WPA passwords, SSIDs, MAC Addresses, serial numbers, WPS Pins, and hardware/firmware versions, and prints this information into the web page. This web page is visible when remote management is enabled. A user who has access to the web interface of the device can extract these secrets. If the device has remote management enabled and is connected directly to the internet, this vulnerability is exploitable over the internet without interaction.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-306'],"['cpe:2.3:o:linksys:e5350_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:linksys:e5350:-:*:*:*:*:*:*:*']",0,0
CVE-2017-10930,ZTE,0.00245,9.8,0.0,1.0,0.0,1.0,1,2017-09-19,1.0,2017-08-10,,,1.0,"The ZXR10 1800-2S before v3.00.40 incorrectly restricts access to a resource from an unauthorized actor, resulting in ordinary users being able to download configuration files to steal information like administrator accounts and passwords.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-552'],"['cpe:2.3:o:zte:zxr10_1800-2s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxr10_1800-2s:-:*:*:*:*:*:*:*']",0,0
CVE-2017-10931,ZTE,0.0019,7.5,0.0,1.0,0.0,1.0,1,2017-09-19,1.0,2017-08-10,,,1.0,"The ZXR10 1800-2S before v3.00.40 incorrectly restricts the download of the file directory range for WEB users, resulting in the ability to download any files and cause information leaks such as system configuration.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-22'],"['cpe:2.3:o:zte:zxr10_1800-2s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxr10_1800-2s:-:*:*:*:*:*:*:*']",0,0
CVE-2017-10937,ZTE,0.00112,7.5,0.0,1.0,0.0,1.0,1,2018-07-25,1.0,2017-12-08,,,1.0,"SQL injection vulnerability in all versions prior to V2.01.05.09 of the ZTE ZXIPTV-UCM product allows remote attackers to execute arbitrary SQL commands via the opertype parameter, resulting in the disclosure of database information.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-89'],"['cpe:2.3:o:zte:zxiptv-ucm_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxiptv-ucm:-:*:*:*:*:*:*:*']",0,0
CVE-2017-3216,ZTE,0.00754,9.8,0.0,1.0,0.0,1.0,1,2017-06-20,0.0,,1.0,2017-07-24,,"WiMAX routers based on the MediaTek SDK (libmtk) that use a custom httpd plugin are vulnerable to an authentication bypass allowing a remote, unauthenticated attacker to gain administrator access to the device by performing an administrator password change on the device via a crafted POST request.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-306'],"['cpe:2.3:o:greenpacket:ox350_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:greenpacket:ox350:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:bm2022_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:bm2022:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:hes-309m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:hes-309m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:hes-319m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:hes-319m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:hes-319m2w_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:hes-319m2w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:hes-339m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:hes-339m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mada:soho_wireless_router_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mada:soho_wireless_router:-:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:ox-330p_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:ox-330p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:zyxel:max218m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:zyxel:max218m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:zyxel:max218m1w_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:zyxel:max218m1w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:zyxel:max218mw_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:zyxel:max218mw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:zyxel:max308m_fimware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:zyxel:max308m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:zyxel:max318m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:zyxel:max318m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:zyxel:max338m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:zyxel:max338m:-:*:*:*:*:*:*:*']",0,0
CVE-2018-7355,ZTE,0.00124,6.1,1.0,1.0,0.0,1.0,1,2018-09-26,0.0,,1.0,2018-09-10,,"All versions up to V1.0.0B05 of ZTE MF65 and all versions up to V1.0.0B02 of ZTE MF65M1 are impacted by cross-site scripting vulnerability. Due to improper neutralization of input during web page generation, an attacker could exploit this vulnerability to conduct reflected XSS or HTML injection attacks on the devices.",CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:zte:mf65_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:mf65:-:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:mf65m1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:mf65m1:-:*:*:*:*:*:*:*']",1,0
CVE-2018-7356,ZTE,0.00169,7.5,0.0,1.0,0.0,1.0,1,2018-11-01,1.0,2018-10-31,,,1.0,"All versions up to V3.03.10.B23P2 of ZTE ZXR10 8905E product are impacted by TCP Initial Sequence Number (ISN) reuse vulnerability, which can generate easily predictable ISN, and allows remote attackers to spoof connections.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,HIGH,NONE,HIGH,3.9,3.6,['CWE-294'],"['cpe:2.3:o:zte:zxr10_8905e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxr10_8905e:-:*:*:*:*:*:*:*']",0,0
CVE-2018-7357,ZTE,0.16016,8.8,1.0,1.0,0.0,1.0,1,2018-11-14,1.0,2018-11-13,,,1.0,"ZTE ZXHN H168N product with versions V2.2.0_PK1.2T5, V2.2.0_PK1.2T2, V2.2.0_PK11T7 and V2.2.0_PK11T have an improper access control vulnerability, which may allow an unauthorized user to gain unauthorized access.",CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-306'],"['cpe:2.3:o:zte:zxhn_h168n_firmware:2.2.0_pk1.2t2:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:zxhn_h168n_firmware:2.2.0_pk1.2t5:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:zxhn_h168n_firmware:2.2.0_pk11t:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:zxhn_h168n_firmware:2.2.0_pk11t7:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxhn_h168n:-:*:*:*:*:*:*:*']",1,1
CVE-2018-7360,ZTE,0.0012,6.5,0.0,1.0,0.0,0.0,1,2018-11-16,1.0,2019-01-29,,,0.0,"All versions up to V1.1.10P3T18 of ZTE ZXHN F670 product are impacted by information exposure vulnerability, which may allow an unauthenticated attacker to get the GPON SN information via appviahttp service.",CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,2.8,3.6,['CWE-200'],"['cpe:2.3:o:zte:zxhn_f670_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxhn_f670:-:*:*:*:*:*:*:*']",0,0
CVE-2018-7361,ZTE,0.001,6.5,0.0,1.0,0.0,1.0,1,2018-11-16,1.0,2019-01-29,,,0.0,"All versions up to V1.1.10P3T18 of ZTE ZXHN F670 product are impacted by null pointer dereference vulnerability, which may allows an attacker to cause a denial of service via appviahttp service.",CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.8,3.6,['CWE-476'],"['cpe:2.3:o:zte:zxhn_f670_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxhn_f670:-:*:*:*:*:*:*:*']",0,0
CVE-2018-7362,ZTE,0.00077,8.8,0.0,1.0,0.0,0.0,1,2018-11-16,1.0,2019-01-29,,,0.0,"All versions up to V1.1.10P3T18 of ZTE ZXHN F670 product are impacted by improper access control vulnerability, which may allows an unauthorized user to perform unauthorized operations on the router.",CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-284'],"['cpe:2.3:o:zte:zxhn_f670_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxhn_f670:-:*:*:*:*:*:*:*']",0,0
CVE-2018-7363,ZTE,0.0012,8.8,0.0,1.0,0.0,0.0,1,2018-11-16,1.0,2019-01-29,,,0.0,"All versions up to V1.1.10P3T18 of ZTE ZXHN F670 product are impacted by improper authorization vulnerability. Since appviahttp service has no authorization delay, an attacker can be allowed to brute force account credentials.",CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-863'],"['cpe:2.3:o:zte:zxhn_f670_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxhn_f670:-:*:*:*:*:*:*:*']",0,0
CVE-2019-3418,ZTE,0.00054,5.4,0.0,1.0,0.0,1.0,1,2019-08-15,1.0,2019-02-01,,,1.0,"All versions up to V1.1.10P3T18 of ZTE ZXHN F670 product are impacted by cross-site scripting vulnerability (XSS). Due to incomplete input validation, an authorized user can exploit this vulnerability to execute malicious scripts.",CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,LOW,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.3,2.7,['CWE-79'],"['cpe:2.3:o:zte:zxhn_f670_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxhn_f670:-:*:*:*:*:*:*:*']",0,0
CVE-2019-3420,ZTE,0.0012,6.5,0.0,1.0,0.0,1.0,1,2019-11-13,1.0,2019-11-12,,,1.0,All versions up to V2.5.0_EG1T5_TED of ZTE ZXHN H108N product are impacted by an information leak vulnerability. An attacker could exploit the vulnerability to obtain sensitive information and perform unauthorized operations.,CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,2.8,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:zte:zxhn_h108n_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxhn_h108n:-:*:*:*:*:*:*:*']",0,0
CVE-2019-3422,ZTE,0.01086,6.2,0.0,1.0,0.0,1.0,1,2019-11-07,0.0,,1.0,2019-11-05,,"The Sec Consult Security Lab reported an information disclosure vulnerability in MF910S product to ZTE PSIRT in October 2019. Through the analysis of related product team, the information disclosure vulnerability is confirmed. The MF910S product's one-click upgrade tool can obtain the Telnet remote login password in the reverse way. If Telnet is opened, the attacker can remotely log in to the device through the cracked password, resulting in information leakage. The MF910S was end of service on October 23, 2019, ZTE recommends users to choose new products for the purpose of better security.",CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,LOCAL,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,2.5,3.6,['CWE-200'],"['cpe:2.3:h:zte:mf910s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:mf910s_firmware:-:*:*:*:*:*:*:*']",0,0
CVE-2019-3423,ZTE,0.00096,5.3,0.0,1.0,0.0,1.0,1,2019-11-18,1.0,2019-11-15,,,1.0,"permission and access control vulnerability, which exists in V2.1.14 and below versions of C520V21 smart camera devices. An attacker can construct a URL for directory traversal and access to other unauthorized files or resources.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,LOW,NONE,NONE,MEDIUM,3.9,1.4,['CWE-22'],"['cpe:2.3:h:ztehome:c520v21:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ztehome:c520v21_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2020-6863,ZTE,0.001,6.5,0.0,1.0,0.0,1.0,1,2020-02-27,1.0,2020-02-27,,,1.0,ZTE E8820V3 router product is impacted by a permission and access control vulnerability. Attackers could use this vulnerability to tamper with DDNS parameters and send DoS attacks on the specified URL.,CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.8,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:zte:e8820v3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:e8820v3:-:*:*:*:*:*:*:*']",0,0
CVE-2020-6868,ZTE,0.001,6.5,0.0,1.0,0.0,1.0,1,2020-06-01,1.0,2020-05-08,,,1.0,"There is an input validation vulnerability in a PON terminal product of ZTE, which supports the creation of WAN connections through WEB management pages. The front-end limits the length of the WAN connection name that is created, but the HTTP proxy is available to be used to bypass the limitation. An attacker can exploit the vulnerability to tamper with the parameter value. This affects: ZTE F680 V9.0.10P1N6",CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,HIGH,NONE,MEDIUM,2.8,3.6,['CWE-20'],"['cpe:2.3:h:zte:f680:-:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:f680_firmware:zxhn_f680v9.0.10p1n6:*:*:*:*:*:*:*']",0,0
CVE-2020-6872,ZTE,0.00078,6.1,0.0,1.0,0.0,0.0,1,2020-07-20,1.0,2020-07-18,,,1.0,"The server management software module of ZTE has a storage XSS vulnerability. The attacker inserts some attack codes through the foreground login page, which will cause the user to execute the predefined malicious script in the browser. This affects .",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:zte:r8500g4_firmware:03.05.0020:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:r8500g4_firmware:03.05.0400:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:r8500g4_firmware:03.06.0100:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:r8500g4_firmware:03.07.0101:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:r8500g4_firmware:03.07.0103:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:r8500g4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:r5500g4_firmware:03.06.0100:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:r5500g4_firmware:03.07.0100:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:r5500g4_firmware:03.07.0200:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:r5500g4_firmware:03.08.0100:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:r5500g4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:r5300g4_firmware:03.04.0020:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:r5300g4_firmware:03.05.0040:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:r5300g4_firmware:03.05.0043:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:r5300g4_firmware:03.05.0044:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:r5300g4_firmware:03.05.0045:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:r5300g4_firmware:03.05.0046:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:r5300g4_firmware:03.05.0047:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:r5300g4_firmware:03.07.0100:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:r5300g4_firmware:03.07.0108:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:r5300g4_firmware:03.07.0200:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:r5300g4_firmware:03.07.0300:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:r5300g4_firmware:03.08.0100:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:r5300g4:-:*:*:*:*:*:*:*']",0,0
CVE-2020-6882,ZTE,0.00456,7.5,0.0,1.0,0.0,1.0,1,2020-12-21,1.0,2021-07-02,,,0.0,"ZTE E8810/E8820/E8822 series routers have an information leak vulnerability, which is caused by hard-coded MQTT service access credentials on the device. The remote attacker could use this credential to connect to the MQTT server, so as to obtain information about other devices by sending specific topics. This affects:",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-798'],"['cpe:2.3:o:zte:zxhn_e8810_firmware:1.0.26:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:zxhn_e8810_firmware:2.0.1:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxhn_e8810:-:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:zxhn_e8820_firmware:1.1.3:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:zxhn_e8820_firmware:2.0.13:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxhn_e8820:-:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:zxhn_e8822_firmware:2.0.13:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxhn_e8822:-:*:*:*:*:*:*:*']",0,0
CVE-2021-21740,ZTE,0.00058,2.4,0.0,1.0,0.0,1.0,1,2021-08-09,1.0,2021-08-04,,,1.0,"There is an information leak vulnerability in the digital media player (DMS) of ZTE's residential gateway product. The attacker could insert the USB disk with the symbolic link into the residential gateway, and access unauthorized directory information through the symbolic link, causing information leak.",CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,PHYSICAL,LOW,NONE,NONE,UNCHANGED,LOW,NONE,NONE,LOW,0.9,1.4,['CWE-59'],"['cpe:2.3:h:zte:zxhn_h2640:-:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:zxhn_h2640_firmware:10.0.0c6_ty:*:*:*:*:*:*:*']",0,0
CVE-2021-21741,ZTE,0.00837,9.8,0.0,0.0,0.0,1.0,1,2021-08-30,1.0,2021-08-30,,,1.0,"There is a command execution vulnerability in a ZTE conference management system. As some services are enabled by default, the attacker could exploit this vulnerability to execute arbitrary commands by sending specific serialization command.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-502'],"['cpe:2.3:o:zte:zxv10_m910_firmware:1.2.16.01u01.01:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:zxv10_m910_firmware:1.2.19.01u01.01:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:zxv10_m910_firmware:1.2.20.01u01.01:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:zxv10_m910_firmware:1.2.21.01.04:p01:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxv10_m910:*:*:*:*:*:*:*:*']",0,0
CVE-2021-21743,ZTE,0.00315,4.3,0.0,0.0,0.0,1.0,1,2021-10-20,1.0,2021-10-15,,,1.0,ZTE MF971R product has a CRLF injection vulnerability. An attacker could exploit the vulnerability to modify the HTTP response header information through a specially crafted HTTP request.,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,NONE,LOW,NONE,MEDIUM,2.8,1.4,['CWE-74'],"['cpe:2.3:h:zte:mf971r:*:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:mf971r_firmware:v1.0.0b05:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:mf971r:*:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:mf971r_firmware:1v1.0.0b06:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:mf971r:*:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:mf971r_firmware:2v1.0.0b03:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:mf971r:*:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:mf971r_firmware:s2v1.0.0b03:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:mf971r:*:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:mf971r_firmware:sv1.0.0b05:*:*:*:*:*:*:*']",0,0
CVE-2021-21746,ZTE,0.00078,6.1,0.0,0.0,0.0,1.0,1,2021-10-20,1.0,2021-10-15,,,1.0,ZTE MF971R product has reflective XSS vulnerability. An attacker could use the vulnerability to obtain cookie information.,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:h:zte:mf971r:*:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:mf971r_firmware:v1.0.0b05:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:mf971r:*:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:mf971r_firmware:1v1.0.0b06:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:mf971r:*:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:mf971r_firmware:2v1.0.0b03:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:mf971r:*:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:mf971r_firmware:s2v1.0.0b03:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:mf971r_firmware:sv1.0.0b05:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:mf971r:*:*:*:*:*:*:*:*']",0,0
CVE-2021-21747,ZTE,0.00078,6.1,0.0,0.0,0.0,1.0,1,2021-10-20,1.0,2021-10-15,,,1.0,ZTE MF971R product has reflective XSS vulnerability. An attacker could use the vulnerability to obtain cookie information.,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:zte:mf971r_firmware:v1.0.0b05:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:mf971r:*:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:mf971r_firmware:1v1.0.0b06:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:mf971r:*:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:mf971r_firmware:2v1.0.0b03:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:mf971r:*:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:mf971r_firmware:s2v1.0.0b03:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:mf971r:*:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:mf971r_firmware:sv1.0.0b05:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:mf971r:*:*:*:*:*:*:*:*']",0,0
CVE-2022-23139,ZTE,0.00087,8.8,0.0,1.0,0.0,1.0,1,2022-05-12,1.0,2022-05-12,,,1.0,"ZTE's ZXMP M721 product has a permission and access control vulnerability. Since the folder permission viewed by sftp is 666, which is inconsistent with the actual permission. It’s easy for?users to?ignore the modification?of?the file permission configuration, so that low-authority accounts could actually obtain higher operating permissions on key files.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-863'],"['cpe:2.3:o:zte:zxmp_m721_firmware:5.10.030.006:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxmp_m721:-:*:*:*:*:*:*:*']",0,0
CVE-2018-7364,ZTE,0.01786,9.8,0.0,0.0,1.0,0.0,0,2018-12-07,1.0,2018-12-07,,,1.0,"All versions up to ZXINOS-RESV1.01.43 of the ZTE ZXIN10 product European region are impacted by improper access control vulnerability. Due to improper access control to devcomm process, an unauthorized remote attacker can exploit this vulnerability to execute arbitrary code with root privileges.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,"['NVD-CWE-Other', 'CWE-284']",['cpe:2.3:a:zte:zxin10:*:*:*:*:*:*:*:*'],0,0
CVE-2018-7365,ZTE,0.00104,7.2,0.0,0.0,1.0,0.0,0,2018-12-20,1.0,2018-12-19,,,1.0,"All versions up to ZXCLOUD iRAI V5.01.05 of the ZTE uSmartView product are impacted by untrusted search path vulnerability, which may allow an unauthorized user to perform unauthorized operations.",CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.2,5.9,['CWE-426'],"['cpe:2.3:a:zte:zxcloud_irai:*:*:*:*:*:*:*:*', 'cpe:2.3:a:zte:usmartview:-:*:*:*:*:*:*:*']",0,0
CVE-2018-7366,ZTE,0.00118,6.8,0.0,1.0,0.0,1.0,0,2018-12-28,1.0,2018-12-26,,,1.0,"ZTE ZXV10 B860AV2.1 product ChinaMobile branch with the ICNT versions up to V1.3.3, the BESTV versions up to V1.2.2, the WASU versions up to V1.1.7 and the MGTV versions up to V1.4.6 have an authentication bypass vulnerability, which may allows an unauthorized user to perform unauthorized operations.",CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,PHYSICAL,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.9,5.9,['CWE-863'],"['cpe:2.3:o:zte:zxv10_b860av2.1_chinamobile_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxv10_b860av2.1_chinamobile:-:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:zxv10_b860av2.1_chinamobile_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxv10_b860av2.1_chinamobile:-:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:zxv10_b860av2.1_chinamobile_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxv10_b860av2.1_chinamobile:-:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxv10_b860av2.1_chinamobile:-:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:zxv10_b860av2.1_chinamobile_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2019-3419,ZTE,0.00075,5.7,0.0,1.0,0.0,1.0,0,2019-10-31,1.0,2019-09-29,,,1.0,A security vulnerability exists in a management port in the version of ZTE's ZXMP M721V3.10P01B10_M2NCP. An attacker could exploit this vulnerability to build a link to the device and send specific packets to cause a denial of service.,CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,ADJACENT_NETWORK,LOW,LOW,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.1,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:zte:zxmp_m721_dx_firmware:zxmp_m721v3.10p01b10_m2ncp:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxmp_m721_dx:-:*:*:*:*:*:*:*']",0,0
CVE-2019-3425,ZTE,0.00236,8.8,0.0,1.0,0.0,1.0,0,2019-11-08,1.0,2019-10-31,,,1.0,"The 9000EV5.0R1B12 version, and all earlier versions of ZTE product ZXUPN-9000E are impacted by vulnerability of permission and access control. An attacker could exploit this vulnerability to directly reset or change passwords of other accounts.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-732'],"['cpe:2.3:o:zte:zxupn-9000e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxupn-9000e:-:*:*:*:*:*:*:*']",0,0
CVE-2019-3426,ZTE,0.00199,8.8,0.0,1.0,0.0,1.0,0,2019-11-08,1.0,2019-10-31,,,1.0,"The 9000EV5.0R1B12 version, and all earlier versions of ZTE product ZXUPN-9000E are impacted by the input validation vulnerability. An attacker could exploit this vulnerability for unauthorized operations.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-20'],"['cpe:2.3:o:zte:zxupn-9000e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxupn-9000e:-:*:*:*:*:*:*:*']",0,0
CVE-2019-3429,ZTE,0.00084,5.3,0.0,0.0,1.0,0.0,0,2019-12-23,1.0,2019-12-18,,,1.0,"All versions up to V4.01.01.02 of ZTE ZXCLOUD GoldenData VAP product have a file reading vulnerability. Attackers could obtain log file information without authorization, causing the disclosure of sensitive information.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,LOW,NONE,NONE,MEDIUM,3.9,1.4,['CWE-532'],['cpe:2.3:a:zte:zxcloud_goldendata_vap:*:*:*:*:*:*:*:*'],0,0
CVE-2019-3431,ZTE,0.0015,9.8,0.0,0.0,1.0,0.0,0,2019-12-23,1.0,2019-12-18,,,1.0,All versions up to V4.01.01.02 of ZTE ZXCLOUD GoldenData VAP product have encryption problems vulnerability. Attackers could sniff unencrypted account and password through the network for front-end system access.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-311'],['cpe:2.3:a:zte:zxcloud_goldendata_vap:*:*:*:*:*:*:*:*'],0,0
CVE-2020-6866,ZTE,0.00081,4.9,0.0,1.0,0.0,1.0,0,2020-04-30,1.0,2020-04-23,,,1.0,A ZTE product is impacted by a resource management error vulnerability. An attacker could exploit this vulnerability to cause a denial of service by issuing a specific command. This affects: ZXCTN 6500 version V2.10.00R3B87.,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,1.2,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:zte:zxctn_6500_firmware:2.10.00r3b87:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxctn_6500:-:*:*:*:*:*:*:*']",0,0
CVE-2020-6869,ZTE,0.00065,8.1,0.0,0.0,1.0,0.0,0,2020-06-17,1.0,2020-06-17,,,1.0,All versions up to 10.06 of ZTEMarket APK are impacted by an information leak vulnerability. Due to Activity Component exposure users can exploit this vulnerability to get the private cookie and execute silent installation.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,NONE,HIGH,2.8,5.2,['NVD-CWE-noinfo'],['cpe:2.3:a:zte:ztemarket_apk:*:*:*:*:*:*:*:*'],0,0
CVE-2020-6873,ZTE,0.00169,5.3,0.0,1.0,0.0,0.0,0,2020-09-01,1.0,2020-08-17,,,1.0,"A ZTE product has a DoS vulnerability. Because the equipment couldn’t distinguish the attack packets and normal packets with valid http links, the remote attackers could use this vulnerability to cause the equipment WEB/TELNET module denial of service and make the equipment be out of management. This affects: ZXR10 2800-4_ALMPUFB(LOW), all versions up to V3.00.40.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,LOW,MEDIUM,3.9,1.4,['NVD-CWE-noinfo'],"['cpe:2.3:o:zte:zxr10_2800-4_almpufb\\(low\\)_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxr10_2800-4_almpufb\\(low\\):-:*:*:*:*:*:*:*']",0,0
CVE-2020-6874,ZTE,0.00516,9.1,0.0,1.0,0.0,1.0,0,2020-09-01,1.0,2020-08-25,,,1.0,"A ZTE product is impacted by the cryptographic issues vulnerability. The encryption algorithm is not properly used, so remote attackers could use this vulnerability for account credential enumeration attack or brute-force attack for password guessing. This affects: ZXIPTV, ZXIPTV-WEB-PV5.09.08.04.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,NONE,CRITICAL,3.9,5.2,['CWE-327'],"['cpe:2.3:o:zte:zxiptv_firmware:zxiptv-web-pv5.09.08.04:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxiptv:-:*:*:*:*:*:*:*']",0,0
CVE-2020-6875,ZTE,0.00263,9.8,0.0,1.0,0.0,1.0,0,2020-10-05,1.0,2020-09-24,,,1.0,"A ZTE product is impacted by the improper access control vulnerability. Due to lack of an authentication protection mechanism in the program, attackers could use this vulnerability to gain access right through brute-force attacks. This affects: ",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-306'],"['cpe:2.3:h:zte:zxone_19700_snpe:-:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:zxone_19700_snpe_firmware:zxone8700v1.40r2b13_snpe:*:*:*:*:*:*:*']",0,0
CVE-2020-6876,ZTE,0.00066,5.4,0.0,0.0,1.0,0.0,0,2020-10-26,1.0,2020-10-26,,,1.0,"A ZTE product is impacted by an XSS vulnerability. The vulnerability is caused by the lack of correct verification of client data in the WEB module. By inserting malicious scripts into the web module, a remote attacker could trigger an XSS attack when the user browses the web page. Then the attacker could use the vulnerability to steal user cookies or destroy the page structure. This affects: eVDC ZXCLOUD-iROSV6.03.04",CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,LOW,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.3,2.7,['CWE-79'],['cpe:2.3:a:zte:evdc:zxcloud-irosv6.03.04:*:*:*:*:*:*:*'],0,0
CVE-2020-6877,ZTE,0.00104,8.8,0.0,1.0,0.0,1.0,0,2020-11-05,1.0,2020-11-05,,,1.0,A ZTE product is impacted by an information leak vulnerability. An attacker could use this vulnerability to obtain the authentication password of the handheld terminal and access the device illegally for operation. This affects: ZXA10 eODN V2.3P2T1,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:zte:zxa10_eodn_firmware:2.3p2t1:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxa10_eodn:-:*:*:*:*:*:*:*']",0,0
CVE-2020-6879,ZTE,0.00075,3.5,0.0,1.0,0.0,1.0,0,2020-11-19,1.0,2020-11-13,,,1.0,"Some ZTE devices have input verification vulnerabilities. The devices support configuring a static prefix through the web management page. The restriction of the front-end code can be bypassed by constructing a POST request message and sending the request to the creation of a static routing rule configuration interface. The WEB service backend fails to effectively verify the abnormal input. As a result, the attacker can successfully use the vulnerability to tamper parameter values. This affects: ZXHN Z500 V1.0.0.2B1.1000 and ZXHN F670L V1.1.10P1N2E. This is fixed in ZXHN Z500 V1.0.1.1B1.1000 and ZXHN F670L V1.1.10P2N2.",CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N,ADJACENT_NETWORK,LOW,LOW,NONE,UNCHANGED,NONE,LOW,NONE,LOW,2.1,1.4,['CWE-20'],"['cpe:2.3:h:zte:zxhn_z500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:zxhn_z500_firmware:v1.0.0.2b1.1000:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxhn_f670l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:zxhn_f670l_firmware:v1.1.10p1n2e:*:*:*:*:*:*:*']",0,0
CVE-2020-6881,ZTE,0.00206,7.5,0.0,1.0,0.0,1.0,0,2020-12-21,1.0,2021-07-02,,,0.0,"ZTE E8810/E8820/E8822 series routers have an MQTT DoS vulnerability, which is caused by the failure of the device to verify the validity of abnormal messages. A remote attacker could connect to the MQTT server and send an MQTT exception message to the specified device, which will cause the device to deny service. This affects:",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-346'],"['cpe:2.3:o:zte:zxhn_e8810_firmware:1.0.26:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:zxhn_e8810_firmware:2.0.1:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxhn_e8810:-:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:zxhn_e8820_firmware:1.1.3:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:zxhn_e8820_firmware:2.0.13:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxhn_e8820:-:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:zxhn_e8822_firmware:2.0.13:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxhn_e8822:-:*:*:*:*:*:*:*']",0,0
CVE-2021-21739,ZTE,0.00058,4.6,0.0,1.0,0.0,1.0,0,2021-08-05,1.0,2021-07-28,,,1.0,"A ZTE's product of the transport network access layer has a security vulnerability. Because the system does not sufficiently verify the data reliability, attackers could replace an authenticated optical module on the equipment with an unauthenticated one, bypassing system authentication and detection, thus affecting signal transmission. This affects: ",CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N,PHYSICAL,LOW,NONE,NONE,UNCHANGED,NONE,HIGH,NONE,MEDIUM,0.9,3.6,['CWE-345'],"['cpe:2.3:o:zte:zxctn_6120h_firmware:5.10.00b24:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxctn_6120h:-:*:*:*:*:*:*:*']",0,0
CVE-2021-21742,ZTE,0.00065,5.5,0.0,0.0,1.0,0.0,0,2021-09-25,1.0,2021-09-24,,,1.0,"There is an information leak vulnerability in the message service app of a ZTE mobile phone. Due to improper parameter settings, attackers could use this vulnerability to obtain some sensitive information of users by accessing specific pages.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.8,3.6,['NVD-CWE-Other'],['cpe:2.3:a:zte:axon_30_pro_message_service:5.3.1.2103091059:*:*:*:*:*:*:*'],0,0
CVE-2022-23135,ZTE,0.00127,6.5,0.0,1.0,0.0,1.0,0,2022-02-24,1.0,2022-02-23,,,1.0,"There is a directory traversal vulnerability in some home gateway products of ZTE. Due to the lack of verification of user modified destination path, an attacker with specific permissions could modify the FTP access path to access and modify the system path contents without authorization, which will cause information leak and affect device operation.",CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,NONE,HIGH,MEDIUM,1.2,5.2,['CWE-22'],"['cpe:2.3:o:zte:zxhn_f677_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxhn_f677:-:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:zxhn_f477_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxhn_f477:-:*:*:*:*:*:*:*']",0,0
CVE-2022-23136,ZTE,0.00054,5.4,0.0,1.0,0.0,1.0,0,2022-03-30,1.0,2022-03-30,,,1.0,There is a stored XSS vulnerability in ZTE home gateway product. An attacker could modify the gateway name by inserting special characters and trigger an XSS attack when the user views the current topology of the device through the management page.,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,LOW,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.3,2.7,['CWE-79'],"['cpe:2.3:o:zte:zxhn_f680_firmware:6.0.10p3n20:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxhn_f680:-:*:*:*:*:*:*:*']",0,0
CVE-2022-23137,ZTE,0.00072,6.1,0.0,1.0,0.0,1.0,0,2022-05-11,1.0,2022-05-10,,,1.0,"ZTE's ZXCDN product has a reflective XSS vulnerability. The attacker could modify the parameters in the content clearing request url, and when a user clicks the url, an XSS attack will be triggered.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:zte:zxcdn_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxcdn:-:*:*:*:*:*:*:*']",0,0
CVE-2022-23138,ZTE,0.0015,7.5,0.0,1.0,0.0,1.0,0,2022-06-09,1.0,2022-06-09,,,1.0,"ZTE's MF297D product has cryptographic issues vulnerability. Due to the use of weak random values, the security of the device is reduced, and it may face the risk of attack.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-330'],"['cpe:2.3:o:zte:mf297d_firmware:mf297d_nordic1_b05:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:mf297d:-:*:*:*:*:*:*:*']",0,0
CVE-2022-23142,ZTE,0.00079,5.3,0.0,1.0,0.0,1.0,0,2022-07-18,1.0,2022-07-18,,,1.0,"ZXEN CG200 has a DoS vulnerability. An attacker could construct and send a large number of HTTP GET requests in a short time, which can make the product management websites not accessible.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,LOW,MEDIUM,3.9,1.4,['NVD-CWE-noinfo'],"['cpe:2.3:o:zte:zxen_cg200_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxen_cg200:-:*:*:*:*:*:*:*']",0,0
CVE-2022-23144,ZTE,0.00108,9.1,0.0,1.0,0.0,1.0,0,2022-09-23,1.0,2022-09-19,,,1.0,"There is a broken access control vulnerability in ZTE ZXvSTB product. Due to improper permission control, attackers could use this vulnerability to delete the default application type, which affects normal use of system.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,HIGH,HIGH,CRITICAL,3.9,5.2,['NVD-CWE-Other'],"['cpe:2.3:o:zte:zxa10_b76hv3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxa10_b76hv3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:zxa10_b766v2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxa10_b766v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:zxa10_b800v2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxa10_b800v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:zxa10_b860av2.1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxa10_b860av2.1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:zxa10_b860h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxa10_b860h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:zxa10_b866v2-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxa10_b866v2-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:zxa10_b866v5-w10_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxa10_b866v5-w10:-:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:zxa10_b960gv1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxa10_b960gv1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:zxa10_b710c-a12_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxa10_b710c-a12:-:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:zxa10_b710s2-a19_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxa10_b710s2-a19:-:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:zxa10_b836ct-a15_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxa10_b836ct-a15:-:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:zxa10_s100v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxa10_s100v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:zxa10_s200a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxa10_s200a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:zxa10_s200t_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxa10_s200t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:zte:zxa10_b700v7_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxa10_b700v7:-:*:*:*:*:*:*:*']",0,0
CVE-2017-11344,Asus,0.01835,7.8,0.0,1.0,0.0,1.0,1,2017-07-17,0.0,,0.0,,,"Global buffer overflow in networkmap in Asuswrt-Merlin firmware for ASUS devices and ASUS firmware for ASUS RT-AC5300, RT_AC1900P, RT-AC68U, RT-AC68P, RT-AC88U, RT-AC66U, RT-AC66U_B1, RT-AC58U, RT-AC56U, RT-AC55U, RT-AC52U, RT-AC51U, RT-N18U, RT-N66U, RT-N56U, RT-AC3200, RT-AC3100, RT_AC1200GU, RT_AC1200G, RT-AC1200, RT-AC53, RT-N12HP, RT-N12HP_B1, RT-N12D1, RT-N12+, RT_N12+_PRO, RT-N16, and RT-N300 devices allows remote attackers to write shellcode at any address in the heap; this can be used to execute arbitrary code on the router by hosting a crafted device description XML document at a URL specified within a Location header in an SSDP response.",CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-119'],"['cpe:2.3:h:asuswrt-merlin_project:rt-ac5300:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac5300_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt_ac1900p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt_ac1900p_:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac68u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac68u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac68p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac68p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac88u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac88u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac66u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac66u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac66u_b1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac66u_b1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac58u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac58u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac56u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac56u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac55u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac55u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac52u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac52u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac51u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac51u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-n18u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-n18u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-n66u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-n66u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-n56u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-n56u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac3200_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac3200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac3100_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac3100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt_ac1200gu_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt_ac1200gu:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt_ac1200g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt_ac1200g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac1200_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac1200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac53_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac53:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-n12hp_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-n12hp:-:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-n12hp_b1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-n12hp_b1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-n12d1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-n12d1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-n12\\+_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-n12\\+:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt_n12\\+_pro_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt_n12\\+_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-n16_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-n16:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-n300_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-n300:-:*:*:*:*:*:*:*']",0,0
CVE-2017-11345,Asus,0.01835,7.8,0.0,1.0,0.0,1.0,1,2017-07-17,0.0,,0.0,,,"Stack buffer overflow in networkmap in Asuswrt-Merlin firmware for ASUS devices and ASUS firmware for ASUS RT-AC5300, RT_AC1900P, RT-AC68U, RT-AC68P, RT-AC88U, RT-AC66U, RT-AC66U_B1, RT-AC58U, RT-AC56U, RT-AC55U, RT-AC52U, RT-AC51U, RT-N18U, RT-N66U, RT-N56U, RT-AC3200, RT-AC3100, RT_AC1200GU, RT_AC1200G, RT-AC1200, RT-AC53, RT-N12HP, RT-N12HP_B1, RT-N12D1, RT-N12+, RT_N12+_PRO, RT-N16, and RT-N300 devices allows remote attackers to execute arbitrary code on the router by hosting a crafted device description XML document (that includes a serviceType element) at a URL specified within a Location header in an SSDP response.",CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-119'],"['cpe:2.3:o:asuswrt-merlin_project:rt-ac5300_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac5300:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt_ac1900p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt_ac1900p_:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac68u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac68u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac68p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac68p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac88u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac88u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac66u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac66u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac66u_b1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac66u_b1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac58u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac58u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac56u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac56u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac55u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac55u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac52u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac52u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac51u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac51u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-n18u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-n18u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-n66u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-n66u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-n56u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-n56u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac3200_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac3200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac3100_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac3100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt_ac1200gu_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt_ac1200gu:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt_ac1200g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt_ac1200g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac1200_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac1200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac53_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac53:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-n12hp_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-n12hp:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-n12hp_b1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-n12hp_b1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-n12d1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-n12d1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-n12\\+_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-n12\\+:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt_n12\\+_pro_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt_n12\\+_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-n16_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-n16:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-n300_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-n300:-:*:*:*:*:*:*:*']",0,0
CVE-2017-11420,Asus,0.03838,9.8,0.0,1.0,0.0,1.0,1,2017-07-18,0.0,,0.0,,,"Stack-based buffer overflow in ASUS_Discovery.c in networkmap in Asuswrt-Merlin firmware for ASUS devices and ASUS firmware for ASUS RT-AC5300, RT_AC1900P, RT-AC68U, RT-AC68P, RT-AC88U, RT-AC66U, RT-AC66U_B1, RT-AC58U, RT-AC56U, RT-AC55U, RT-AC52U, RT-AC51U, RT-N18U, RT-N66U, RT-N56U, RT-AC3200, RT-AC3100, RT_AC1200GU, RT_AC1200G, RT-AC1200, RT-AC53, RT-N12HP, RT-N12HP_B1, RT-N12D1, RT-N12+, RT_N12+_PRO, RT-N16, and RT-N300 devices allows remote attackers to execute arbitrary code via long device information that is mishandled during a strcat to a device list.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-119'],"['cpe:2.3:o:asuswrt-merlin_project:rt-ac5300_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac5300:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt_ac1900p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt_ac1900p_:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac68u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac68u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac68p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac68p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac88u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac88u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac66u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac66u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac66u_b1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac66u_b1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac58u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac58u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac56u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac56u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac55u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac55u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac52u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac52u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac51u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac51u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-n18u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-n18u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-n66u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-n66u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-n56u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-n56u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac3200_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac3200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac3100_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac3100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt_ac1200gu_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt_ac1200gu:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt_ac1200g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt_ac1200g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac1200_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac1200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac53_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac53:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-n12hp_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-n12hp:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-n12hp_b1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-n12hp_b1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-n12d1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-n12d1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-n12\\+_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-n12\\+:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt_n12\\+_pro_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt_n12\\+_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-n16_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-n16:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-n300_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-n300:-:*:*:*:*:*:*:*']",0,0
CVE-2017-12590,Asus,0.00088,6.1,0.0,1.0,0.0,0.0,1,2018-03-16,1.0,2018-03-16,,,1.0,"ASUS RT-N14UHP devices before 3.0.0.4.380.8015 have a reflected XSS vulnerability in the ""flag"" parameter.",CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:asus:rt-n14uhp_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-n14uhp:-:*:*:*:*:*:*:*']",0,0
CVE-2017-12754,Asus,0.00783,8.8,0.0,1.0,0.0,1.0,1,2017-08-09,0.0,,0.0,,,"Stack buffer overflow in httpd in Asuswrt-Merlin firmware 380.67_0RT-AC5300 and earlier for ASUS devices and ASUS firmware for ASUS RT-AC5300, RT_AC1900P, RT-AC68U, RT-AC68P, RT-AC88U, RT-AC66U, RT-AC66U_B1, RT-AC58U, RT-AC56U, RT-AC55U, RT-AC52U, RT-AC51U, RT-N18U, RT-N66U, RT-N56U, RT-AC3200, RT-AC3100, RT_AC1200GU, RT_AC1200G, RT-AC1200, RT-AC53, RT-N12HP, RT-N12HP_B1, RT-N12D1, RT-N12+, RT_N12+_PRO, RT-N16, and RT-N300 devices allows remote attackers to execute arbitrary code on the router by sending a crafted http GET request packet that includes a long delete_offline_client parameter in the url.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-119'],"['cpe:2.3:o:asuswrt-merlin:asuswrt-merlin:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin:rt-ac1200:-:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin:rt-ac3100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin:rt-ac3200:-:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin:rt-ac51u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin:rt-ac52u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin:rt-ac53:-:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin:rt-ac5300:-:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin:rt-ac55u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin:rt-ac56u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin:rt-ac58u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin:rt-ac66u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin:rt-ac66u_b1:-:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin:rt-ac68p:-:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin:rt-ac68u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin:rt-ac88u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin:rt-n12\\+:-:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin:rt-n12d1:-:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin:rt-n12hp:-:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin:rt-n12hp_b1:-:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin:rt-n16:-:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin:rt-n18u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin:rt-n300:-:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin:rt-n56u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin:rt-n66u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin:rt_ac1200g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin:rt_ac1200gu:-:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin:rt_ac1900p:-:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin:rt_n12\\+_pro:-:*:*:*:*:*:*:*']",0,0
CVE-2017-15656,Asus,0.00119,8.8,0.0,0.0,0.0,1.0,1,2018-01-31,0.0,,1.0,2017-09-18,,Password are stored in plaintext in nvram in the HTTPd server in all current versions (<= 3.0.0.4.380.7743) of Asus asuswrt.,CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-522'],['cpe:2.3:o:asus:asuswrt:*:*:*:*:*:*:*:*'],0,0
CVE-2017-5891,Asus,0.00071,8.8,0.0,1.0,0.0,1.0,1,2017-05-10,1.0,2017-03-31,,,1.0,ASUS RT-AC* and RT-N* devices with firmware before 3.0.0.4.380.7378 have Login Page CSRF and Save Settings CSRF.,CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-352'],"['cpe:2.3:o:asus:rt-ac1750_firmware:3.0.0.4.380.7266:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ac1750:-:*:*:*:*:*:*:*']",0,0
CVE-2017-8877,Asus,0.00065,6.5,0.0,1.0,0.0,1.0,1,2017-05-10,1.0,2017-03-31,,,1.0,ASUS RT-AC* and RT-N* devices with firmware through 3.0.0.4.380.7378 allow JSONP Information Disclosure such as the SSID.,CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,2.8,3.6,['CWE-200'],"['cpe:2.3:o:asus:rt-ac1750_firmware:3.0.0.4.380.7266:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ac1750:-:*:*:*:*:*:*:*']",0,0
CVE-2018-14980,Asus,0.00042,7.1,0.0,1.0,0.0,1.0,1,2019-04-25,0.0,,0.0,,,"The ASUS ZenFone 3 Max Android device with a build fingerprint of asus/US_Phone/ASUS_X008_1:7.0/NRD90M/US_Phone-14.14.1711.92-20171208:user/release-keys contains the android framework (i.e., system_server) with a package name of android (versionCode=24, versionName=7.0) that has been modified by ASUS or another entity in the supply chain. The system_server process in the core android package has an exported broadcast receiver that allows any app co-located on the device to programmatically initiate the taking of a screenshot and have the resulting screenshot be written to external storage (i.e., sdcard). The taking of a screenshot is not transparent to the user; the device has a screen animation as the screenshot is taken and there is a notification indicating that a screenshot occurred. If the attacking app also requests the EXPAND_STATUS_BAR permission, it can wake the device up using certain techniques and expand the status bar to take a screenshot of the user's notifications even if the device has an active screen lock. The notifications may contain sensitive data such as text messages used in two-factor authentication. The system_server process that provides this capability cannot be disabled, as it is part of the Android framework. The notification can be removed by a local Denial of Service (DoS) attack to reboot the device.",CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,NONE,HIGH,1.8,5.2,['CWE-732'],"['cpe:2.3:o:asus:zenfone_3_max_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:zenfone_3_max:-:*:*:*:*:*:*:*']",0,0
CVE-2018-15887,Asus,0.07361,8.8,0.0,1.0,0.0,1.0,1,2018-08-27,0.0,,0.0,,,"Main_Analysis_Content.asp in ASUS DSL-N12E_C1 1.1.2.3_345 is prone to Authenticated Remote Command Execution, which allows a remote attacker to execute arbitrary OS commands via service parameters, such as shell metacharacters in the destIP parameter of a cmdMethod=ping request.",CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-78'],"['cpe:2.3:o:asus:dsl-n12e_c1_firmware:1.1.2.3_345:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:dsl-n12e_c1:-:*:*:*:*:*:*:*']",0,0
CVE-2018-18320,Asus,0.0077,9.8,0.0,1.0,0.0,1.0,1,2018-10-15,0.0,,0.0,,,"An issue was discovered in the Merlin.PHP component 0.6.6 for Asuswrt-Merlin devices. An attacker can execute arbitrary commands because exec.php has a popen call. NOTE: the vendor indicates that Merlin.PHP is designed only for use on a trusted intranet network, and intentionally allows remote code execution",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:asuswrt-merlin_project:rt-ac5300_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac5300:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt_ac1900p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt_ac1900p_:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac68u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac68u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac68p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac68p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac88u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac88u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac66u_b1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac66u_b1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac56u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac56u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac3200_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac3200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac68uf_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac68uf:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac87_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac87:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac3100_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac3100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac1900_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac1900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac86u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac86u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asuswrt-merlin_project:rt-ac2900_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asuswrt-merlin_project:rt-ac2900:-:*:*:*:*:*:*:*']",0,0
CVE-2018-6000,Asus,0.08998,9.8,1.0,0.0,0.0,1.0,1,2018-01-22,1.0,2018-01-26,,,0.0,"An issue was discovered in AsusWRT before 3.0.0.4.384_10007. The do_vpnupload_post function in router/httpd/web.c in vpnupload.cgi provides functionality for setting NVRAM configuration values, which allows attackers to set the admin password and launch an SSH daemon (or enable infosvr command mode), and consequently obtain remote administrative access, via a crafted request. This is available to unauthenticated attackers in conjunction with CVE-2018-5999.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-862'],['cpe:2.3:o:asus:asuswrt:*:*:*:*:*:*:*:*'],2,1
CVE-2018-8878,Asus,0.00162,5.3,0.0,0.0,0.0,1.0,1,2020-02-27,0.0,,0.0,,,Information disclosure in Asuswrt-Merlin firmware for ASUS devices older than 384.4 and ASUS firmware before 3.0.0.4.382.50470 for devices allows remote attackers to acquire information on internal network devices' hostnames and MAC addresses by reading the custom_id variable on the blocking.asp page.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,LOW,NONE,NONE,MEDIUM,3.9,1.4,['CWE-200'],"['cpe:2.3:o:asuswrt-merlin:asuswrt-merlin:*:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:asus_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2018-8879,Asus,0.02197,9.8,0.0,1.0,0.0,1.0,1,2019-11-21,0.0,,0.0,,,"Stack-based buffer overflow in Asuswrt-Merlin firmware for ASUS devices older than 384.4 and ASUS firmware before 3.0.0.4.382.50470 for devices allows remote attackers to execute arbitrary code by providing a long string to the blocking.asp page via a GET or POST request. Vulnerable parameters are flag, mac, and cat_id.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:h:asus:rt-ac66u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ac66u_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2019-15392,Asus,0.00044,5.5,0.0,1.0,0.0,1.0,1,2019-11-14,0.0,,0.0,,,"The Asus ZenFone 4 Selfie Android device with a build fingerprint of Android/sdm660_64/sdm660_64:8.1.0/OPM1/14.2016.1802.247-20180419:user/release-keys contains a pre-installed app with a package name of com.log.logservice app (versionCode=1, versionName=1) that allows any app co-located on the device to modify a system property through an exported interface without proper authorization.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N,LOCAL,LOW,LOW,NONE,UNCHANGED,NONE,HIGH,NONE,MEDIUM,1.8,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:asus:zenfone_4_selfie_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:zenfone_4_selfie:-:*:*:*:*:*:*:*']",0,0
CVE-2019-15404,Asus,0.00044,7.8,0.0,1.0,0.0,1.0,1,2019-11-14,0.0,,0.0,,,"The Asus ZenFone Max 4 Android device with a build fingerprint of asus/WW_Phone/ASUS_X00HD_4:7.1.1/NMF26F/14.2016.1712.367-20171225:user/release-keys contains a pre-installed app with a package name of com.asus.loguploaderproxy app (versionCode=1570000020, versionName=7.0.0.4_170901) that allows other pre-installed apps to perform command execution via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:asus:zenfone_4_max_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:zenfone_4_max:-:*:*:*:*:*:*:*']",0,0
CVE-2020-15499,Asus,0.00078,6.1,0.0,1.0,0.0,1.0,1,2020-08-26,1.0,2020-10-07,,,0.0,An issue was discovered on ASUS RT-AC1900P routers before 3.0.0.4.385_20253. They allow XSS via spoofed Release Notes on the Firmware Upgrade page.,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:asus:rt-ac1900p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ac1900p:-:*:*:*:*:*:*:*']",0,0
CVE-2021-3128,Asus,0.01238,7.5,0.0,1.0,0.0,1.0,1,2021-04-12,0.0,,0.0,,,"In ASUS RT-AX3000, ZenWiFi AX (XT8), RT-AX88U, and other ASUS routers with firmware < 3.0.0.4.386.42095 or < 9.0.0.4.386.41994, when IPv6 is used, a routing loop can occur that generates excessive network traffic between an affected device and its upstream ISP's router. This occurs when a link prefix route points to a point-to-point link, a destination IPv6 address belongs to the prefix and is not a local IPv6 address, and a router advertisement is received with at least one global unique IPv6 prefix for which the on-link flag is set.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-834'],"['cpe:2.3:h:asus:zenwifi_ax_\\(xt8\\):-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:zenwifi_ax_\\(xt8\\)_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:zenwifi_ax_\\(xt8\\):-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:zenwifi_ax_\\(xt8\\)_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ax3000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ax3000_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ax3000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ax3000_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ax55:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ax55_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ax55:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ax55_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ax56u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ax56u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ax56u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ax56u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ax58u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ax58u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ax58u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ax58u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ax68u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ax68u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ax68u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ax68u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ax82u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ax82u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ax82u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ax82u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ax86u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ax86u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ax86u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ax86u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ax88u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ax88u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ax88u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ax88u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ac66u_b1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ac66u_b1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ac66u_b1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ac66u_b1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ac1750_b1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ac1750_b1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ac1750_b1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ac1750_b1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ac1900_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ac1900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ac1900_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ac1900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ac1900p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ac1900p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ac1900p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ac1900p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ac1900u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ac1900u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ac1900u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ac1900u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ac2900_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ac2900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ac2900_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ac2900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ac3100_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ac3100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ac3100_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ac3100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ac5300_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ac5300:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ac5300_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ac5300:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ac58u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ac58u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ac58u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ac58u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ac65u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ac65u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ac65u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ac65u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ac68p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ac68p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ac68p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ac68p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ac68r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ac68r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ac68r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ac68r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ac68rw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ac68rw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ac68rw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ac68rw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ac68u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ac68u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ac68u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ac68u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ac68w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ac68w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ac68w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ac68w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ac85u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ac85u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ac85u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ac85u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ac86u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ac86u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ac86u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ac86u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ac88u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ac88u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ac88u_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ac88u:-:*:*:*:*:*:*:*']",0,0
CVE-2021-41289,Asus,0.00042,6.3,0.0,1.0,0.0,1.0,1,2021-11-15,1.0,2021-11-15,,,1.0,"ASUS P453UJ contains the Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability. With a general user’s permission, local attackers can modify the BIOS by replacing or filling in the content of the designated Memory DataBuffer, which causing a failure of integrity verification and further resulting in a failure to boot.",CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H,LOCAL,HIGH,LOW,NONE,UNCHANGED,NONE,HIGH,HIGH,MEDIUM,1.0,5.2,['CWE-119'],"['cpe:2.3:h:asus:p453uj:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:p453uj_bios:311:*:*:*:*:*:*:*']",0,0
CVE-2021-46247,Asus,0.003,7.5,0.0,1.0,0.0,1.0,1,2022-02-17,0.0,,0.0,,,The use of a hard-coded cryptographic key significantly increases the possibility encrypted data may be recovered from ASUS CMAX6000 v1.02.00.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-798'],"['cpe:2.3:h:asus:cmax6000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:cmax6000_firmware:1.02.00:*:*:*:*:*:*:*']",0,0
CVE-2022-22054,Asus,0.00069,6.5,0.0,1.0,0.0,1.0,1,2022-01-14,1.0,2022-01-14,,,1.0,"ASUS RT-AX56U’s login function contains a path traversal vulnerability due to its inadequate filtering for special characters in URL parameters, which allows an unauthenticated local area network attacker to access restricted system paths and download arbitrary files.",CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,2.8,3.6,['CWE-22'],"['cpe:2.3:o:asus:rt-ax56u_firmware:3.0.0.4.386.44266:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ax56u:-:*:*:*:*:*:*:*']",0,0
CVE-2022-23970,Asus,0.00051,8.1,0.0,1.0,0.0,1.0,1,2022-04-07,1.0,2022-03-02,,,1.0,"ASUS RT-AX56U’s update_json function has a path traversal vulnerability due to insufficient filtering for special characters in the URL parameter. An unauthenticated LAN attacker can overwrite a system file by uploading another file with the same file name, which results in service disruption.",CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,HIGH,HIGH,HIGH,2.8,5.2,['CWE-22'],"['cpe:2.3:o:asus:rt-ax56u_firmware:3.0.0.4.386.45898:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-ax56u:-:*:*:*:*:*:*:*']",0,0
CVE-2022-26672,Asus,0.00435,9.8,0.0,0.0,1.0,0.0,1,2022-04-22,1.0,2022-04-22,,,1.0,"ASUS WebStorage has a hardcoded API Token in the APP source code. An unauthenticated remote attacker can use this token to establish connections with the server and carry out login attempts to general user accounts. A successful login to a general user account allows the attacker to access, modify or delete this user account information.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-798'],['cpe:2.3:a:asus:webstorage:*:*:*:*:*:android:*:*'],0,0
CVE-2022-26673,Asus,0.00066,5.4,0.0,1.0,0.0,1.0,1,2022-04-22,1.0,2022-04-22,,,1.0,ASUS RT-AX88U has insufficient filtering for special characters in the HTTP header parameter. A remote attacker with general user privilege can exploit this vulnerability to inject JavaScript and perform Stored Cross-Site Scripting (XSS) attacks.,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,LOW,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.3,2.7,['CWE-79'],"['cpe:2.3:h:asus:rt-ax88u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-ax88u_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2022-32988,Asus,0.00077,5.4,0.0,1.0,0.0,1.0,1,2022-07-01,0.0,,0.0,,,"Cross Site Scripting (XSS) vulnerability in router Asus DSL-N14U-B1 1.1.2.3_805 via the ""*list"" parameters (e.g. filter_lwlist, keyword_rulelist, etc) in every "".asp"" page containing a list of stored strings. The following asp files are affected: (1) cgi-bin/APP_Installation.asp, (2) cgi-bin/Advanced_ACL_Content.asp, (3) cgi-bin/Advanced_ADSL_Content.asp, (4) cgi-bin/Advanced_ASUSDDNS_Content.asp, (5) cgi-bin/Advanced_AiDisk_ftp.asp, (6) cgi-bin/Advanced_AiDisk_samba.asp, (7) cgi-bin/Advanced_DSL_Content.asp, (8) cgi-bin/Advanced_Firewall_Content.asp, (9) cgi-bin/Advanced_FirmwareUpgrade_Content.asp, (10) cgi-bin/Advanced_GWStaticRoute_Content.asp, (11) cgi-bin/Advanced_IPTV_Content.asp, (12) cgi-bin/Advanced_IPv6_Content.asp, (13) cgi-bin/Advanced_KeywordFilter_Content.asp, (14) cgi-bin/Advanced_LAN_Content.asp, (15) cgi-bin/Advanced_Modem_Content.asp, (16) cgi-bin/Advanced_PortTrigger_Content.asp, (17) cgi-bin/Advanced_QOSUserPrio_Content.asp, (18) cgi-bin/Advanced_QOSUserRules_Content.asp, (19) cgi-bin/Advanced_SettingBackup_Content.asp, (20) cgi-bin/Advanced_System_Content.asp, (21) cgi-bin/Advanced_URLFilter_Content.asp, (22) cgi-bin/Advanced_VPN_PPTP.asp, (23) cgi-bin/Advanced_VirtualServer_Content.asp, (24) cgi-bin/Advanced_WANPort_Content.asp, (25) cgi-bin/Advanced_WAdvanced_Content.asp, (26) cgi-bin/Advanced_WMode_Content.asp, (27) cgi-bin/Advanced_WWPS_Content.asp, (28) cgi-bin/Advanced_Wireless_Content.asp, (29) cgi-bin/Bandwidth_Limiter.asp, (30) cgi-bin/Guest_network.asp, (31) cgi-bin/Main_AccessLog_Content.asp, (32) cgi-bin/Main_AdslStatus_Content.asp, (33) cgi-bin/Main_Spectrum_Content.asp, (34) cgi-bin/Main_WebHistory_Content.asp, (35) cgi-bin/ParentalControl.asp, (36) cgi-bin/QIS_wizard.asp, (37) cgi-bin/QoS_EZQoS.asp, (38) cgi-bin/aidisk.asp, (39) cgi-bin/aidisk/Aidisk-1.asp, (40) cgi-bin/aidisk/Aidisk-2.asp, (41) cgi-bin/aidisk/Aidisk-3.asp, (42) cgi-bin/aidisk/Aidisk-4.asp, (43) cgi-bin/blocking.asp, (44) cgi-bin/cloud_main.asp, (45) cgi-bin/cloud_router_sync.asp, (46) cgi-bin/cloud_settings.asp, (47) cgi-bin/cloud_sync.asp, (48) cgi-bin/device-map/DSL_dashboard.asp, (49) cgi-bin/device-map/clients.asp, (50) cgi-bin/device-map/disk.asp, (51) cgi-bin/device-map/internet.asp, (52) cgi-bin/error_page.asp, (53) cgi-bin/index.asp, (54) cgi-bin/index2.asp, (55) cgi-bin/qis/QIS_PTM_manual_setting.asp, (56) cgi-bin/qis/QIS_admin_pass.asp, (57) cgi-bin/qis/QIS_annex_setting.asp, (58) cgi-bin/qis/QIS_bridge_cfg_tmp.asp, (59) cgi-bin/qis/QIS_detect.asp, (60) cgi-bin/qis/QIS_finish.asp, (61) cgi-bin/qis/QIS_ipoa_cfg_tmp.asp, (62) cgi-bin/qis/QIS_manual_setting.asp, (63) cgi-bin/qis/QIS_mer_cfg.asp, (64) cgi-bin/qis/QIS_mer_cfg_tmp.asp, (65) cgi-bin/qis/QIS_ppp_cfg.asp, (66) cgi-bin/qis/QIS_ppp_cfg_tmp.asp, (67) cgi-bin/qis/QIS_wireless.asp, (68) cgi-bin/query_wan_status.asp, (69) cgi-bin/query_wan_status2.asp, and (70) cgi-bin/start_apply.asp.",CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,LOW,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.3,2.7,['CWE-79'],"['cpe:2.3:o:asus:dsl-n14u-b1_firmware:1.1.2.3_805:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:dsl-n14u-b1:-:*:*:*:*:*:*:*']",0,0
CVE-2019-10709,Asus,0.1771,9.8,1.0,0.0,1.0,0.0,0,2019-09-04,1.0,2019-08-29,,,1.0,"AsusPTPFilter.sys on Asus Precision TouchPad 11.0.0.25 hardware has a Pool Overflow associated with the \\.\AsusTP device, leading to a DoS or potentially privilege escalation via a crafted DeviceIoControl call.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-264'],['cpe:2.3:a:asus:precision_touchpad:11.0.0.25:*:*:*:*:*:*:*'],1,0
CVE-2019-15405,Asus,0.00044,7.8,0.0,1.0,0.0,1.0,0,2019-11-14,0.0,,0.0,,,"The Asus ASUS_X00K_1 Android device with a build fingerprint of asus/CN_X00K/ASUS_X00K_1:7.0/NRD90M/CN_X00K-14.01.1711.27-20180420:user/release-keys contains a pre-installed app with a package name of com.asus.loguploaderproxy app (versionCode=1570000015, versionName=7.0.0.3_161222) that allows other pre-installed apps to perform command execution via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-610'],"['cpe:2.3:o:asus:pegasus_4a_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:pegasus_4a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:pegasus_4_max_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:pegasus_4_max:-:*:*:*:*:*:*:*']",0,0
CVE-2019-17603,Asus,0.00042,7.8,0.0,0.0,1.0,0.0,0,2020-06-02,1.0,2020-01-10,,,1.0,"Ene.sys in Asus Aura Sync through 1.07.71 does not properly validate input to IOCTL 0x80102044, 0x80102050, and 0x80102054, which allows local users to cause a denial of service (system crash) or gain privileges via IOCTL requests using crafted kernel addresses that trigger memory corruption.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-787'],['cpe:2.3:a:asus:aura_sync:*:*:*:*:*:*:*:*'],0,0
CVE-2019-19235,Asus,0.00054,7.0,0.0,0.0,1.0,0.0,0,2019-12-18,1.0,2021-12-30,,,0.0,"AsLdrSrv.exe in ASUS ATK Package before V1.0.0061 (for Windows 10 notebook PCs) could lead to unsigned code execution with no additional execution. The user must put an application at a particular path, with a particular file name.",CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,HIGH,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.0,5.9,['CWE-427'],"['cpe:2.3:a:asus:atk_package:*:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*']",0,0
CVE-2020-15009,Asus,0.00296,7.8,0.0,0.0,1.0,0.0,0,2020-07-20,1.0,2020-10-07,,,0.0,"AsusScreenXpertServicec.exe and ScreenXpertUpgradeServiceManager.exe in ScreenPad2_Upgrade_Tool.msi V1.0.3 for ASUS PCs with ScreenPad 1.0 (UX450FDX, UX550GDX and UX550GEX) could lead to unsigned code execution with no additional restrictions when a user puts an application at a particular path with a particular file name.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-426'],['cpe:2.3:a:asus:screenpad2_upgrade_tool:1.0.3:*:*:*:*:*:*:*'],0,0
CVE-2020-23648,Asus,0.0008,7.5,0.0,1.0,0.0,1.0,0,2022-10-19,0.0,,0.0,,,"Asus RT-N12E 2.0.0.39 is affected by an incorrect access control vulnerability. Through system.asp / start_apply.htm, an attacker can change the administrator password without any authentication.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,HIGH,NONE,HIGH,3.9,3.6,['CWE-306'],"['cpe:2.3:h:asus:rt-n12e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rt-n12e_firmware:2.0.0.39:*:*:*:*:*:*:*']",0,0
CVE-2021-27403,Asus,0.00087,6.1,0.0,1.0,0.0,1.0,0,2021-02-19,0.0,,0.0,,,Askey RTF8115VW BR_SV_g11.11_RTF_TEF001_V6.54_V014 devices allow cgi-bin/te_acceso_router.cgi curWebPage XSS.,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:asus:askey_rtf8115vw_firmware:br_sv_g11.11_rtf_tef001_v6.54_v014:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:askey_rtf8115vw:-:*:*:*:*:*:*:*']",0,0
CVE-2021-27404,Asus,0.00105,6.1,0.0,1.0,0.0,1.0,0,2021-02-19,0.0,,0.0,,,Askey RTF8115VW BR_SV_g11.11_RTF_TEF001_V6.54_V014 devices allow injection of a Host HTTP header.,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-601'],"['cpe:2.3:o:asus:askey_rtf8115vw_firmware:br_sv_g11.11_rtf_tef001_v6.54_v014:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:askey_rtf8115vw:-:*:*:*:*:*:*:*']",0,0
CVE-2021-28181,Asus,0.00348,4.9,0.0,1.0,0.0,1.0,0,2021-04-06,1.0,2021-03-29,,,1.0,"The specific function in ASUS BMC’s firmware Web management page (Remote video configuration setting) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service.",CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,1.2,3.6,['CWE-120'],"['cpe:2.3:o:asus:z10pr-d16_firmware:1.14.51:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:z10pr-d16:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:asmb8-ikvm_firmware:1.14.51:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:asmb8-ikvm:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:z10pe-d16_ws_firmware:1.14.2:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:z10pe-d16_ws:-:*:*:*:*:*:*:*']",0,0
CVE-2021-28183,Asus,0.00348,4.9,0.0,1.0,0.0,1.0,0,2021-04-06,1.0,2021-03-29,,,1.0,"The specific function in ASUS BMC’s firmware Web management page (Web License configuration setting) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service.",CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,1.2,3.6,['CWE-120'],"['cpe:2.3:o:asus:z10pr-d16_firmware:1.14.51:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:z10pr-d16:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:asmb8-ikvm_firmware:1.14.51:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:asmb8-ikvm:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:z10pe-d16_ws_firmware:1.14.2:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:z10pe-d16_ws:-:*:*:*:*:*:*:*']",0,0
CVE-2021-28184,Asus,0.00348,4.9,0.0,1.0,0.0,1.0,0,2021-04-06,1.0,2021-03-29,,,1.0,"The Active Directory configuration function in ASUS BMC’s firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service.",CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,1.2,3.6,['CWE-120'],"['cpe:2.3:o:asus:z10pr-d16_firmware:1.14.51:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:z10pr-d16:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:asmb8-ikvm_firmware:1.14.51:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:asmb8-ikvm:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:z10pe-d16_ws_firmware:1.14.2:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:z10pe-d16_ws:-:*:*:*:*:*:*:*']",0,0
CVE-2021-28186,Asus,0.00348,4.9,0.0,1.0,0.0,1.0,0,2021-04-06,1.0,2021-03-29,,,1.0,"The specific function in ASUS BMC’s firmware Web management page (ActiveX configuration-2 acquisition) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service.",CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,1.2,3.6,['CWE-120'],"['cpe:2.3:o:asus:z10pr-d16_firmware:1.14.51:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:z10pr-d16:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:asmb8-ikvm_firmware:1.14.51:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:asmb8-ikvm:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:z10pe-d16_ws_firmware:1.14.2:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:z10pe-d16_ws:-:*:*:*:*:*:*:*']",0,0
CVE-2021-28188,Asus,0.00348,4.9,0.0,1.0,0.0,1.0,0,2021-04-06,1.0,2021-03-29,,,1.0,"The specific function in ASUS BMC’s firmware Web management page (Modify user’s information function) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service.",CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,1.2,3.6,['CWE-120'],"['cpe:2.3:o:asus:z10pr-d16_firmware:1.14.51:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:z10pr-d16:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:asmb8-ikvm_firmware:1.14.51:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:asmb8-ikvm:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:z10pe-d16_ws_firmware:1.14.2:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:z10pe-d16_ws:-:*:*:*:*:*:*:*']",0,0
CVE-2021-28192,Asus,0.00348,4.9,0.0,1.0,0.0,1.0,0,2021-04-06,1.0,2021-03-29,,,1.0,"The specific function in ASUS BMC’s firmware Web management page (Remote video storage function) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service.",CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,1.2,3.6,['CWE-120'],"['cpe:2.3:o:asus:asmb9-ikvm_firmware:1.11.12:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:asmb9-ikvm:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs720a-e9-rs24-e_firmware:1.10.3:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs720a-e9-rs24-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs700a-e9-rs4_firmware:1.10.0:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs700a-e9-rs4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs700-e9-rs4_firmware:1.09:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs700-e9-rs4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:esc4000_g4x_firmware:1.11.6:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:esc4000_g4x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs700-e9-rs12_firmware:1.11.5:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs700-e9-rs12:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs100-e10-pi2_firmware:1.13.6:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs100-e10-pi2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs300-e10-ps4_firmware:1.13.6:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs300-e10-ps4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs300-e10-rs4_firmware:1.13.6:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs300-e10-rs4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs500a-e9-ps4_firmware:1.14.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs500a-e9-ps4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs500a-e9-rs4_firmware:1.14.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs500a-e9-rs4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs500a-e9_rs4_u_firmware:1.14.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs500a-e9_rs4_u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:e700_g4_firmware:1.14.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:e700_g4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:ws_c422_pro\\/se_firmware:1.14.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:ws_c422_pro\\/se:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:ws_x299_pro\\/se_firmware:1.14.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:ws_x299_pro\\/se:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:z11pa-u12_firmware:1.15.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:z11pa-u12:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:z11pa-u12\\/10g-2s_firmware:1.15.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:z11pa-u12\\/10g-2s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:knpa-u16_firmware:1.13.4:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:knpa-u16:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:esc4000_dhd_g4_firmware:1.13.7:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:esc4000_dhd_g4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:esc4000_g4_firmware:1.15.2:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:esc4000_g4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs720q-e9-rs24-s_firmware:1.15.0:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs720q-e9-rs24-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs720q-e9-rs8_firmware:1.15.0:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs720q-e9-rs8:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs720q-e9-rs8-s_firmware:1.15.0:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs720q-e9-rs8-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:z11pa-d8_firmware:1.14.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:z11pa-d8:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:z11pa-d8c_firmware:1.14.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:z11pa-d8c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs720-e9-rs24-u_firmware:1.14.3:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs720-e9-rs24-u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs720-e9-rs8-g_firmware:1.15.2:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs720-e9-rs8-g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs500-e9-ps4_firmware:1.15.4:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs500-e9-ps4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:pro_e800_g4_firmware:1.14.2:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:pro_e800_g4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs500-e9-rs4_firmware:1.15.4:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs500-e9-rs4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs500-e9-rs4-u_firmware:1.15.4:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs500-e9-rs4-u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs520-e9-rs12-e_firmware:1.15.3:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs520-e9-rs12-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs520-e9-rs8_firmware:1.15.3:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs520-e9-rs8:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:esc8000_g4_firmware:1.15.4:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:esc8000_g4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:esc8000_g4\\/10g_firmware:1.15.4:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:esc8000_g4\\/10g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs720-e9-rs12-e_firmware:1.15.2:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs720-e9-rs12-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:ws_c621e_sage_firmware:1.15.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:ws_c621e_sage:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs500a-e10-ps4_firmware:1.15.2:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs500a-e10-ps4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs500a-e10-rs4_firmware:1.15.2:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs500a-e10-rs4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs700a-e9-rs12v2_firmware:1.15.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs700a-e9-rs12v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs700a-e9-rs4v2_firmware:1.15.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs700a-e9-rs4v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs720a-e9-rs12v2_firmware:1.15.2:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs720a-e9-rs12v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs720a-e9-rs24v2_firmware:1.15.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs720a-e9-rs24v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:z11pr-d16_firmware:1.15.3:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:z11pr-d16:-:*:*:*:*:*:*:*']",0,0
CVE-2021-28200,Asus,0.00348,4.9,0.0,1.0,0.0,1.0,0,2021-04-06,1.0,2021-03-29,,,1.0,"The CD media configuration function in ASUS BMC’s firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service.",CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,1.2,3.6,['CWE-120'],"['cpe:2.3:o:asus:asmb9-ikvm_firmware:1.11.12:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:asmb9-ikvm:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs720a-e9-rs24-e_firmware:1.10.3:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs720a-e9-rs24-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs700a-e9-rs4_firmware:1.10.0:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs700a-e9-rs4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs700-e9-rs4_firmware:1.09:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs700-e9-rs4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:esc4000_g4x_firmware:1.11.6:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:esc4000_g4x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs700-e9-rs12_firmware:1.11.5:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs700-e9-rs12:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs100-e10-pi2_firmware:1.13.6:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs100-e10-pi2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs300-e10-ps4_firmware:1.13.6:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs300-e10-ps4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs300-e10-rs4_firmware:1.13.6:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs300-e10-rs4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs500a-e9-ps4_firmware:1.14.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs500a-e9-ps4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs500a-e9-rs4_firmware:1.14.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs500a-e9-rs4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs500a-e9_rs4_u_firmware:1.14.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs500a-e9_rs4_u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:e700_g4_firmware:1.14.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:e700_g4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:ws_c422_pro\\/se_firmware:1.14.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:ws_c422_pro\\/se:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:ws_x299_pro\\/se_firmware:1.14.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:ws_x299_pro\\/se:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:z11pa-u12_firmware:1.15.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:z11pa-u12:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:z11pa-u12\\/10g-2s_firmware:1.15.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:z11pa-u12\\/10g-2s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:knpa-u16_firmware:1.13.4:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:knpa-u16:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:esc4000_dhd_g4_firmware:1.13.7:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:esc4000_dhd_g4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:esc4000_g4_firmware:1.15.2:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:esc4000_g4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs720q-e9-rs24-s_firmware:1.15.0:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs720q-e9-rs24-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs720q-e9-rs8_firmware:1.15.0:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs720q-e9-rs8:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs720q-e9-rs8-s_firmware:1.15.0:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs720q-e9-rs8-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:z11pa-d8_firmware:1.14.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:z11pa-d8:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:z11pa-d8c_firmware:1.14.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:z11pa-d8c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs720-e9-rs24-u_firmware:1.14.3:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs720-e9-rs24-u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs720-e9-rs8-g_firmware:1.15.2:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs720-e9-rs8-g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs500-e9-ps4_firmware:1.15.4:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs500-e9-ps4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:pro_e800_g4_firmware:1.14.2:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:pro_e800_g4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs500-e9-rs4_firmware:1.15.4:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs500-e9-rs4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs500-e9-rs4-u_firmware:1.15.4:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs500-e9-rs4-u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs520-e9-rs12-e_firmware:1.15.3:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs520-e9-rs12-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs520-e9-rs8_firmware:1.15.3:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs520-e9-rs8:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:esc8000_g4_firmware:1.15.4:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:esc8000_g4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:esc8000_g4\\/10g_firmware:1.15.4:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:esc8000_g4\\/10g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs720-e9-rs12-e_firmware:1.15.2:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs720-e9-rs12-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:ws_c621e_sage_firmware:1.15.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:ws_c621e_sage:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs500a-e10-ps4_firmware:1.15.2:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs500a-e10-ps4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs500a-e10-rs4_firmware:1.15.2:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs500a-e10-rs4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs700a-e9-rs12v2_firmware:1.15.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs700a-e9-rs12v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs700a-e9-rs4v2_firmware:1.15.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs700a-e9-rs4v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs720a-e9-rs12v2_firmware:1.15.2:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs720a-e9-rs12v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs720a-e9-rs24v2_firmware:1.15.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs720a-e9-rs24v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:z11pr-d16_firmware:1.15.3:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:z11pr-d16:-:*:*:*:*:*:*:*']",0,0
CVE-2021-28202,Asus,0.00348,4.9,0.0,1.0,0.0,1.0,0,2021-04-06,1.0,2021-03-29,,,1.0,"The Service configuration-2 function in ASUS BMC’s firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service.",CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,1.2,3.6,['CWE-120'],"['cpe:2.3:o:asus:asmb9-ikvm_firmware:1.11.12:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:asmb9-ikvm:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs720a-e9-rs24-e_firmware:1.10.3:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs720a-e9-rs24-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs700a-e9-rs4_firmware:1.10.0:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs700a-e9-rs4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs700-e9-rs4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs700-e9-rs4_firmware:1.09:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:esc4000_g4x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:esc4000_g4x_firmware:1.11.6:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs700-e9-rs12:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs700-e9-rs12_firmware:1.11.5:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs100-e10-pi2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs100-e10-pi2_firmware:1.13.6:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs300-e10-ps4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs300-e10-ps4_firmware:1.13.6:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs300-e10-rs4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs300-e10-rs4_firmware:1.13.6:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs500a-e9-ps4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs500a-e9-ps4_firmware:1.14.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs500a-e9-rs4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs500a-e9-rs4_firmware:1.14.1:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs500a-e9_rs4_u_firmware:1.14.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs500a-e9_rs4_u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:e700_g4_firmware:1.14.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:e700_g4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:ws_c422_pro\\/se_firmware:1.14.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:ws_c422_pro\\/se:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:ws_x299_pro\\/se_firmware:1.14.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:ws_x299_pro\\/se:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:z11pa-u12_firmware:1.15.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:z11pa-u12:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:z11pa-u12\\/10g-2s_firmware:1.15.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:z11pa-u12\\/10g-2s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:knpa-u16_firmware:1.13.4:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:knpa-u16:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:esc4000_dhd_g4_firmware:1.13.7:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:esc4000_dhd_g4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:esc4000_g4_firmware:1.15.2:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:esc4000_g4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs720q-e9-rs24-s_firmware:1.15.0:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs720q-e9-rs24-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs720q-e9-rs8_firmware:1.15.0:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs720q-e9-rs8:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs720q-e9-rs8-s_firmware:1.15.0:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs720q-e9-rs8-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:z11pa-d8_firmware:1.14.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:z11pa-d8:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:z11pa-d8c_firmware:1.14.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:z11pa-d8c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs720-e9-rs24-u_firmware:1.14.3:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs720-e9-rs24-u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs720-e9-rs8-g_firmware:1.15.2:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs720-e9-rs8-g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs500-e9-ps4_firmware:1.15.4:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs500-e9-ps4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:pro_e800_g4_firmware:1.14.2:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:pro_e800_g4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs500-e9-rs4_firmware:1.15.4:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs500-e9-rs4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs500-e9-rs4-u_firmware:1.15.4:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs500-e9-rs4-u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs520-e9-rs12-e_firmware:1.15.3:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs520-e9-rs12-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs520-e9-rs8_firmware:1.15.3:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs520-e9-rs8:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:esc8000_g4_firmware:1.15.4:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:esc8000_g4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:esc8000_g4\\/10g_firmware:1.15.4:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:esc8000_g4\\/10g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs720-e9-rs12-e_firmware:1.15.2:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs720-e9-rs12-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:ws_c621e_sage_firmware:1.15.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:ws_c621e_sage:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs500a-e10-ps4_firmware:1.15.2:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs500a-e10-ps4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs500a-e10-rs4_firmware:1.15.2:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs500a-e10-rs4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs700a-e9-rs12v2_firmware:1.15.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs700a-e9-rs12v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs700a-e9-rs4v2_firmware:1.15.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs700a-e9-rs4v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs720a-e9-rs12v2_firmware:1.15.2:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs720a-e9-rs12v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs720a-e9-rs24v2_firmware:1.15.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs720a-e9-rs24v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:z11pr-d16_firmware:1.15.3:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:z11pr-d16:-:*:*:*:*:*:*:*']",0,0
CVE-2021-28205,Asus,0.00207,4.9,0.0,1.0,0.0,1.0,0,2021-04-06,1.0,2021-03-29,,,1.0,"The specific function in ASUS BMC’s firmware Web management page (Delete SOL video file function) does not filter the specific parameter. As obtaining the administrator permission, remote attackers can use the means of path traversal to access system files.",CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.2,3.6,['CWE-22'],"['cpe:2.3:o:asus:z10pr-d16_firmware:1.14.51:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:z10pr-d16:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:asmb8-ikvm_firmware:1.14.51:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:asmb8-ikvm:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:z10pe-d16_ws_firmware:1.14.2:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:z10pe-d16_ws:-:*:*:*:*:*:*:*']",0,0
CVE-2021-28208,Asus,0.00207,4.9,0.0,1.0,0.0,1.0,0,2021-04-06,1.0,2021-03-29,,,1.0,"The specific function in ASUS BMC’s firmware Web management page (Get video file function) does not filter the specific parameter. As obtaining the administrator permission, remote attackers can use the means of path traversal to access system files.",CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.2,3.6,['CWE-22'],"['cpe:2.3:o:asus:asmb9-ikvm_firmware:1.11.12:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:asmb9-ikvm:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs720a-e9-rs24-e_firmware:1.10.3:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs720a-e9-rs24-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs700a-e9-rs4_firmware:1.10.0:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs700a-e9-rs4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs700-e9-rs4_firmware:1.09:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs700-e9-rs4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:esc4000_g4x_firmware:1.11.6:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:esc4000_g4x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs700-e9-rs12_firmware:1.11.5:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs700-e9-rs12:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs100-e10-pi2_firmware:1.13.6:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs100-e10-pi2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs300-e10-ps4_firmware:1.13.6:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs300-e10-ps4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs300-e10-rs4_firmware:1.13.6:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs300-e10-rs4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs500a-e9-ps4_firmware:1.14.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs500a-e9-ps4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs500a-e9-rs4_firmware:1.14.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs500a-e9-rs4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs500a-e9_rs4_u_firmware:1.14.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs500a-e9_rs4_u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:e700_g4_firmware:1.14.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:e700_g4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:ws_c422_pro\\/se_firmware:1.14.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:ws_c422_pro\\/se:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:ws_x299_pro\\/se_firmware:1.14.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:ws_x299_pro\\/se:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:z11pa-u12_firmware:1.15.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:z11pa-u12:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:z11pa-u12\\/10g-2s_firmware:1.15.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:z11pa-u12\\/10g-2s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:knpa-u16_firmware:1.13.4:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:knpa-u16:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:esc4000_dhd_g4_firmware:1.13.7:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:esc4000_dhd_g4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:esc4000_g4_firmware:1.15.2:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:esc4000_g4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs720q-e9-rs24-s_firmware:1.15.0:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs720q-e9-rs24-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs720q-e9-rs8_firmware:1.15.0:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs720q-e9-rs8:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs720q-e9-rs8-s_firmware:1.15.0:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs720q-e9-rs8-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:z11pa-d8_firmware:1.14.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:z11pa-d8:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:z11pa-d8c_firmware:1.14.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:z11pa-d8c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs720-e9-rs24-u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs720-e9-rs24-u_firmware:1.14.3:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs720-e9-rs8-g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs720-e9-rs8-g_firmware:1.15.2:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs500-e9-ps4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs500-e9-ps4_firmware:1.15.4:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:pro_e800_g4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:pro_e800_g4_firmware:1.14.2:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs500-e9-rs4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs500-e9-rs4_firmware:1.15.4:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs500-e9-rs4-u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs500-e9-rs4-u_firmware:1.15.4:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs520-e9-rs12-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs520-e9-rs12-e_firmware:1.15.3:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs520-e9-rs8:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs520-e9-rs8_firmware:1.15.3:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:esc8000_g4_firmware:1.15.4:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:esc8000_g4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:esc8000_g4\\/10g_firmware:1.15.4:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:esc8000_g4\\/10g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs720-e9-rs12-e_firmware:1.15.2:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs720-e9-rs12-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:ws_c621e_sage_firmware:1.15.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:ws_c621e_sage:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs500a-e10-ps4_firmware:1.15.2:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs500a-e10-ps4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs500a-e10-rs4_firmware:1.15.2:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs500a-e10-rs4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs700a-e9-rs12v2_firmware:1.15.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs700a-e9-rs12v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs700a-e9-rs4v2_firmware:1.15.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs700a-e9-rs4v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs720a-e9-rs12v2_firmware:1.15.2:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs720a-e9-rs12v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs720a-e9-rs24v2_firmware:1.15.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs720a-e9-rs24v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:z11pr-d16_firmware:1.15.3:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:z11pr-d16:-:*:*:*:*:*:*:*']",0,0
CVE-2021-28209,Asus,0.00207,4.9,0.0,1.0,0.0,1.0,0,2021-04-06,1.0,2021-03-29,,,1.0,"The specific function in ASUS BMC’s firmware Web management page (Delete video file function) does not filter the specific parameter. As obtaining the administrator permission, remote attackers can use the means of path traversal to access system files.",CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.2,3.6,['CWE-22'],"['cpe:2.3:o:asus:asmb9-ikvm_firmware:1.11.12:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:asmb9-ikvm:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs720a-e9-rs24-e_firmware:1.10.3:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs720a-e9-rs24-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs700a-e9-rs4_firmware:1.10.0:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs700a-e9-rs4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs700-e9-rs4_firmware:1.09:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs700-e9-rs4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:esc4000_g4x_firmware:1.11.6:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:esc4000_g4x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs700-e9-rs12_firmware:1.11.5:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs700-e9-rs12:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs100-e10-pi2_firmware:1.13.6:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs100-e10-pi2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs300-e10-ps4_firmware:1.13.6:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs300-e10-ps4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs300-e10-rs4_firmware:1.13.6:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs300-e10-rs4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs500a-e9-ps4_firmware:1.14.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs500a-e9-ps4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs500a-e9-rs4_firmware:1.14.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs500a-e9-rs4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs500a-e9_rs4_u_firmware:1.14.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs500a-e9_rs4_u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:e700_g4_firmware:1.14.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:e700_g4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:ws_c422_pro\\/se_firmware:1.14.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:ws_c422_pro\\/se:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:ws_x299_pro\\/se_firmware:1.14.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:ws_x299_pro\\/se:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:z11pa-u12_firmware:1.15.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:z11pa-u12:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:z11pa-u12\\/10g-2s_firmware:1.15.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:z11pa-u12\\/10g-2s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:knpa-u16_firmware:1.13.4:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:knpa-u16:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:esc4000_dhd_g4_firmware:1.13.7:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:esc4000_dhd_g4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:esc4000_g4_firmware:1.15.2:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:esc4000_g4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs720q-e9-rs24-s_firmware:1.15.0:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs720q-e9-rs24-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs720q-e9-rs8_firmware:1.15.0:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs720q-e9-rs8:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs720q-e9-rs8-s_firmware:1.15.0:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs720q-e9-rs8-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:z11pa-d8_firmware:1.14.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:z11pa-d8:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:z11pa-d8c_firmware:1.14.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:z11pa-d8c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs720-e9-rs24-u_firmware:1.14.3:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs720-e9-rs24-u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs720-e9-rs8-g_firmware:1.15.2:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs720-e9-rs8-g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs500-e9-ps4_firmware:1.15.4:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs500-e9-ps4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:pro_e800_g4_firmware:1.14.2:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:pro_e800_g4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs500-e9-rs4_firmware:1.15.4:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs500-e9-rs4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs500-e9-rs4-u_firmware:1.15.4:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs500-e9-rs4-u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs520-e9-rs12-e_firmware:1.15.3:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs520-e9-rs12-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs520-e9-rs8_firmware:1.15.3:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs520-e9-rs8:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:esc8000_g4_firmware:1.15.4:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:esc8000_g4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:esc8000_g4\\/10g_firmware:1.15.4:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:esc8000_g4\\/10g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs720-e9-rs12-e_firmware:1.15.2:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs720-e9-rs12-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:ws_c621e_sage_firmware:1.15.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:ws_c621e_sage:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs500a-e10-ps4_firmware:1.15.2:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs500a-e10-ps4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs500a-e10-rs4_firmware:1.15.2:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs500a-e10-rs4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs700a-e9-rs12v2_firmware:1.15.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs700a-e9-rs12v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs700a-e9-rs4v2_firmware:1.15.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs700a-e9-rs4v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs720a-e9-rs12v2_firmware:1.15.2:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs720a-e9-rs12v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:rs720a-e9-rs24v2_firmware:1.15.1:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rs720a-e9-rs24v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:asus:z11pr-d16_firmware:1.15.3:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:z11pr-d16:-:*:*:*:*:*:*:*']",0,0
CVE-2021-40981,Asus,0.00042,7.3,0.0,0.0,1.0,0.0,0,2021-09-27,1.0,2021-09-24,,,1.0,ASUS ROG Armoury Crate Lite before 4.2.10 allows local users to gain privileges by placing a Trojan horse file in the publicly writable %PROGRAMDATA%\ASUS\GamingCenterLib directory.,CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.3,5.9,['CWE-427'],['cpe:2.3:a:asus:armoury_crate_lite_service:*:*:*:*:*:*:*:*'],0,0
CVE-2021-42055,Asus,0.0007,6.8,0.0,1.0,0.0,1.0,0,2021-10-18,1.0,2021-10-15,,,1.0,ASUSTek ZenBook Pro Due 15 UX582 laptop firmware through 203 has Insecure Permissions that allow attacks by a physically proximate attacker.,CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,PHYSICAL,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.9,5.9,['CWE-276'],"['cpe:2.3:o:asus:ux582lr_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:ux582lr:-:*:*:*:*:*:*:*']",0,0
CVE-2022-22814,Asus,0.00201,9.8,0.0,0.0,1.0,0.0,0,2022-03-10,0.0,,0.0,,,The System Diagnosis service of MyASUS before 3.1.2.0 allows privilege escalation.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['NVD-CWE-noinfo'],['cpe:2.3:a:asus:myasus:*:*:*:*:*:*:*:*'],0,0
CVE-2022-35899,Asus,0.00045,7.8,1.0,0.0,1.0,0.0,0,2022-07-21,1.0,2022-07-19,,,1.0,There is an unquoted service path in ASUSTeK Aura Ready Game SDK service (GameSDK.exe) 1.0.0.4. This might allow a local user to escalate privileges by creating a %PROGRAMFILES(X86)%\ASUS\GameSDK.exe file.,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-428'],"['cpe:2.3:a:asus:aura_ready_game_software_development_kit:1.0.0.4:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*']",1,0
CVE-2022-36439,Asus,0.00042,6.0,0.0,0.0,1.0,0.0,0,2022-10-18,0.0,,0.0,,,"AsusSoftwareManager.exe in ASUS System Control Interface on ASUS personal computers (running Windows) allows a local user to write into the Temp directory and delete another more privileged file via SYSTEM privileges. This affects ASUS System Control Interface 3 before 3.1.5.0, AsusSoftwareManger.exe before 1.0.53.0, and AsusLiveUpdate.dll before 1.0.45.0.",CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H,LOCAL,LOW,HIGH,NONE,UNCHANGED,NONE,HIGH,HIGH,MEDIUM,0.8,5.2,['NVD-CWE-noinfo'],"['cpe:2.3:a:asus:asusliveupdate:*:*:*:*:*:*:*:*', 'cpe:2.3:a:asus:asussoftwaremanger:*:*:*:*:*:*:*:*', 'cpe:2.3:a:asus:system_control_interface:*:*:*:*:*:*:*:*']",0,0
CVE-2022-38699,Asus,0.00044,5.9,0.0,0.0,1.0,0.0,0,2022-09-28,1.0,2022-09-15,,,1.0,"Armoury Crate Service’s logging function has insufficient validation to check if the log file is a symbolic link. A physical attacker with general user privilege can modify the log file property to a symbolic link that points to arbitrary system file, causing the logging function to overwrite the system file and disrupt the system.",CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H,PHYSICAL,LOW,LOW,NONE,UNCHANGED,NONE,HIGH,HIGH,MEDIUM,0.7,5.2,['CWE-59'],['cpe:2.3:a:asus:armoury_crate_service:*:*:*:*:*:*:*:*'],0,0
CVE-2017-11649,DrayTek,0.00202,8.8,0.0,1.0,0.0,1.0,1,2018-03-07,0.0,,0.0,,,Cross-site request forgery (CSRF) vulnerability in DrayTek Vigor AP910C devices with firmware 1.2.0_RC3 build r6594 allows remote attackers to hijack the authentication of unspecified users for requests that enable SNMP on the remote device via vectors involving goform/setSnmp.,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-352'],"['cpe:2.3:o:draytek:vigorap_910c_firmware:1.2.0:rc3:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigorap_910c:-:*:*:*:*:*:*:*']",0,0
CVE-2017-11650,DrayTek,0.00501,6.1,0.0,1.0,0.0,1.0,1,2018-03-07,0.0,,0.0,,,Cross-site scripting (XSS) vulnerability in DrayTek Vigor AP910C devices with firmware 1.2.0_RC3 build r6594 allows remote attackers to inject arbitrary web script or HTML via vectors involving home.asp.,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:draytek:vigorap_910c_firmware:1.2.0:rc3:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigorap_910c:-:*:*:*:*:*:*:*']",0,0
CVE-2019-16533,DrayTek,0.00084,6.1,0.0,1.0,0.0,0.0,1,2019-09-20,1.0,2018-05-18,,,1.0,"On DrayTek Vigor2925 devices with firmware 3.8.4.3, Incorrect Access Control exists in loginset.htm, and can be used to trigger XSS. NOTE: this is an end-of-life product.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:draytek:vigor2925_firmware:3.8.4.3:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor_2925:-:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor_2925n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2925ac:-:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2925fn:-:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2925n-plus:-:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2925vac:-:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2925vn-plus:-:*:*:*:*:*:*:*']",0,0
CVE-2019-16534,DrayTek,0.00084,6.1,0.0,1.0,0.0,0.0,1,2019-09-20,1.0,2018-05-18,,,1.0,"On DrayTek Vigor2925 devices with firmware 3.8.4.3, XSS exists via a crafted WAN name on the General Setup screen. NOTE: this is an end-of-life product.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:draytek:vigor2925_firmware:3.8.4.3:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor_2925:-:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor_2925n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2925ac:-:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2925fn:-:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2925n-plus:-:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2925vac:-:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2925vn-plus:-:*:*:*:*:*:*:*']",0,0
CVE-2020-10823,DrayTek,0.03592,9.8,0.0,1.0,0.0,1.0,1,2020-03-26,1.0,2020-02-06,,,1.0,"A stack-based buffer overflow in /cgi-bin/activate.cgi through var parameter on Draytek Vigor3900, Vigor2960, and Vigor300B devices before 1.5.1 allows remote attackers to achieve code execution via a remote HTTP request (issue 1 of 3).",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:h:draytek:vigor300b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor300b_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor3900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor3900_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2960:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2960_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2020-10824,DrayTek,0.03592,9.8,0.0,1.0,0.0,1.0,1,2020-03-26,1.0,2020-02-06,,,1.0,"A stack-based buffer overflow in /cgi-bin/activate.cgi through ticket parameter on Draytek Vigor3900, Vigor2960, and Vigor300B devices before 1.5.1 allows remote attackers to achieve code execution via a remote HTTP request (issue 2 of 3).",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:o:draytek:vigor300b_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor300b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor3900_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor3900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2960_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2960:-:*:*:*:*:*:*:*']",0,0
CVE-2020-10825,DrayTek,0.03592,9.8,0.0,1.0,0.0,1.0,1,2020-03-26,1.0,2020-02-06,,,1.0,"A stack-based buffer overflow in /cgi-bin/activate.cgi while base64 decoding ticket parameter on Draytek Vigor3900, Vigor2960, and Vigor300B devices before 1.5.1 allows remote attackers to achieve code execution via a remote HTTP request (issue 3 of 3).",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:o:draytek:vigor300b_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor300b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor3900_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor3900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2960_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2960:-:*:*:*:*:*:*:*']",0,0
CVE-2020-10826,DrayTek,0.00368,9.8,0.0,1.0,0.0,1.0,1,2020-03-26,1.0,2020-02-06,,,1.0,"/cgi-bin/activate.cgi on Draytek Vigor3900, Vigor2960, and Vigor300B devices before 1.5.1 allows remote attackers to achieve command injection via a remote HTTP request in DEBUG mode.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-77'],"['cpe:2.3:o:draytek:vigor300b_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor300b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor3900_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor3900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2960_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2960:-:*:*:*:*:*:*:*']",0,0
CVE-2020-10827,DrayTek,0.03592,9.8,0.0,1.0,0.0,1.0,1,2020-03-26,1.0,2020-02-06,,,1.0,"A stack-based buffer overflow in apmd on Draytek Vigor3900, Vigor2960, and Vigor300B devices before 1.5.1 allows remote attackers to achieve code execution via a remote HTTP request.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:o:draytek:vigor300b_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor300b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor3900_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor3900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2960_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2960:-:*:*:*:*:*:*:*']",0,0
CVE-2020-10828,DrayTek,0.03592,9.8,0.0,1.0,0.0,1.0,1,2020-03-26,1.0,2020-02-06,,,1.0,"A stack-based buffer overflow in cvmd on Draytek Vigor3900, Vigor2960, and Vigor300B devices before 1.5.1 allows remote attackers to achieve code execution via a remote HTTP request.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:o:draytek:vigor300b_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor300b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor3900_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor3900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2960_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2960:-:*:*:*:*:*:*:*']",0,0
CVE-2020-14472,DrayTek,0.01128,9.8,0.0,1.0,0.0,1.0,1,2020-06-24,1.0,2020-06-17,,,1.0,"On Draytek Vigor3900, Vigor2960, and Vigor 300B devices before 1.5.1.1, there are some command-injection vulnerabilities in the mainfunction.cgi file.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-77'],"['cpe:2.3:h:draytek:vigor300b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor300b_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2960:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2960_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor3900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor3900_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2020-14473,DrayTek,0.00426,9.8,0.0,1.0,0.0,1.0,1,2020-06-24,1.0,2020-06-17,,,1.0,"Stack-based buffer overflow vulnerability in Vigor3900, Vigor2960, and Vigor300B with firmware before 1.5.1.1.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:o:draytek:vigor300b_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor300b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2960_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2960:-:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor3900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor3900_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2020-14993,DrayTek,0.10501,9.8,0.0,1.0,0.0,1.0,1,2020-06-23,1.0,2020-06-17,,,1.0,"A stack-based buffer overflow on DrayTek Vigor2960, Vigor3900, and Vigor300B devices before 1.5.1.1 allows remote attackers to execute arbitrary code via the formuserphonenumber parameter in an authusersms action to mainfunction.cgi.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:o:draytek:vigor300b_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor300b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2960_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2960:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor3900_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor3900:-:*:*:*:*:*:*:*']",0,0
CVE-2020-15415,DrayTek,0.93019,9.8,0.0,1.0,0.0,1.0,1,2020-06-30,1.0,2020-06-17,,,1.0,"On DrayTek Vigor3900, Vigor2960, and Vigor300B devices before 1.5.1, cgi-bin/mainfunction.cgi/cvmcfgupload allows remote command execution via shell metacharacters in a filename when the text/x-python-script content type is used, a different issue than CVE-2020-14472.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-78'],"['cpe:2.3:o:draytek:vigor3900_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor3900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2960_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2960:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor300b_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor300b:-:*:*:*:*:*:*:*']",0,0
CVE-2020-19664,DrayTek,0.05147,8.8,0.0,1.0,0.0,1.0,1,2020-12-31,1.0,2020-06-17,,,1.0,DrayTek Vigor2960 1.5.1 allows remote command execution via shell metacharacters in a toLogin2FA action to mainfunction.cgi.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-78'],"['cpe:2.3:o:draytek:vigor2960_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2960:-:*:*:*:*:*:*:*']",0,0
CVE-2020-28968,DrayTek,0.00058,5.4,0.0,1.0,0.0,1.0,1,2021-10-22,0.0,,0.0,,,Draytek VigorAP 1000C contains a stored cross-site scripting (XSS) vulnerability in the RADIUS Setting - RADIUS Server Configuration module. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the username input field.,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,LOW,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.3,2.7,['CWE-79'],"['cpe:2.3:o:draytek:vigorap_1000c_firmware:1.3.2:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigorap_1000c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigorap_700_firmware:1.11:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigorap_700:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigorap_710_firmware:1.2.5:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigorap_710:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigorap_800_firmware:1.1.4:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigorap_800:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigorap_802_firmware:1.3.2:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigorap_802:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigorap_810_firmware:1.2.5:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigorap_810:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigorap_900_firmware:1.2.0:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigorap_900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigorap_902_firmware:1.2.5:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigorap_902:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigorap_903_firmware:1.3.1:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigorap_903:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigorap_910c_firmware:1.2.5:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigorap_910c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigorap_912c_firmware:1.3.2:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigorap_912c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigorap_918r_firmware:1.3.2:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigorap_918r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigorap_920r_firmware:1.3.0:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigorap_920r:-:*:*:*:*:*:*:*']",0,0
CVE-2020-3932,DrayTek,0.00168,7.5,0.0,1.0,0.0,1.0,1,2020-04-15,1.0,2020-04-15,,,1.0,"A vulnerable SNMP in Draytek VigorAP910C cannot be disabled, which may cause information leakage.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:draytek:vigorap_910c_firmware:1.3.1:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigorap_910c:-:*:*:*:*:*:*:*']",0,0
CVE-2020-8515,DrayTek,0.97276,9.8,1.0,1.0,0.0,1.0,1,2020-02-01,1.0,2020-02-06,,,0.0,"DrayTek Vigor2960 1.3.1_Beta, Vigor3900 1.4.4_Beta, and Vigor300B 1.3.3_Beta, 1.4.2.1_Beta, and 1.4.4_Beta devices allow remote code execution as root (without authentication) via shell metacharacters to the cgi-bin/mainfunction.cgi URI. This issue has been fixed in Vigor3900/2960/300B v1.5.1.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-78'],"['cpe:2.3:o:draytek:vigor2960_firmware:1.3.1:beta:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2960:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor300b_firmware:1.3.3:beta:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor300b_firmware:1.4.2.1:beta:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor300b_firmware:1.4.4:beta:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor300b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor3900_firmware:1.4.4:beta:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor3900:-:*:*:*:*:*:*:*']",1,0
CVE-2021-42911,DrayTek,0.00755,9.8,0.0,1.0,0.0,1.0,1,2022-03-29,0.0,,0.0,,,"A Format String vulnerability exists in DrayTek Vigor 2960 <= 1.5.1.3, DrayTek Vigor 3900 <= 1.5.1.3, and DrayTek Vigor 300B <= 1.5.1.3 in the mainfunction.cgi file via a crafted HTTP message containing malformed QUERY STRING, which could let a remote malicious user execute arbitrary code.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-134'],"['cpe:2.3:o:draytek:vigor2960_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2960:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor3900_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor3900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor300b_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor300b:-:*:*:*:*:*:*:*']",0,0
CVE-2021-43118,DrayTek,0.00345,9.8,0.0,1.0,0.0,1.0,1,2022-03-29,0.0,,0.0,,,"A Remote Command Injection vulnerability exists in DrayTek Vigor 2960 1.5.1.3, DrayTek Vigor 3900 1.5.1.3, and DrayTek Vigor 300B 1.5.1.3 via a crafted HTTP message containing malformed QUERY STRING in mainfunction.cgi, which could let a remote malicious user execute arbitrary code.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-77'],"['cpe:2.3:o:draytek:vigor2960_firmware:1.5.1.3:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2960:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor3900_firmware:1.5.1.3:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor3900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor300b_firmware:1.5.1.3:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor300b:-:*:*:*:*:*:*:*']",0,0
CVE-2021-20123,DrayTek,0.49447,7.5,0.0,0.0,1.0,0.0,0,2021-10-13,1.0,2021-10-07,,,1.0,A local file inclusion vulnerability exists in Draytek VigorConnect 1.6.0-B3 in the file download functionality of the DownloadFileServlet endpoint. An unauthenticated attacker could leverage this vulnerability to download arbitrary files from the underlying operating system with root privileges.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-22'],['cpe:2.3:a:draytek:vigorconnect:1.6.0:beta3:*:*:*:*:*:*'],0,0
CVE-2021-20124,DrayTek,0.49184,7.5,0.0,0.0,1.0,0.0,0,2021-10-13,1.0,2021-10-07,,,1.0,A local file inclusion vulnerability exists in Draytek VigorConnect 1.6.0-B3 in the file download functionality of the WebServlet endpoint. An unauthenticated attacker could leverage this vulnerability to download arbitrary files from the underlying operating system with root privileges.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-22'],['cpe:2.3:a:draytek:vigorconnect:1.6.0:beta3:*:*:*:*:*:*'],0,0
CVE-2021-20125,DrayTek,0.00651,9.8,0.0,0.0,1.0,0.0,0,2021-10-13,1.0,2021-10-07,,,1.0,An arbitrary file upload and directory traversal vulnerability exists in the file upload functionality of DownloadFileServlet in Draytek VigorConnect 1.6.0-B3. An unauthenticated attacker could leverage this vulnerability to upload files to any location on the target operating system with root privileges.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-22'],['cpe:2.3:a:draytek:vigorconnect:1.6.0:beta3:*:*:*:*:*:*'],0,0
CVE-2021-20126,DrayTek,0.00105,8.8,0.0,0.0,1.0,0.0,0,2021-10-13,1.0,2021-10-07,,,1.0,"Draytek VigorConnect 1.6.0-B3 lacks cross-site request forgery protections and does not sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-352'],['cpe:2.3:a:draytek:vigorconnect:1.6.0:beta3:*:*:*:*:*:*'],0,0
CVE-2021-20127,DrayTek,0.00079,8.1,0.0,0.0,1.0,0.0,0,2021-10-13,1.0,2021-10-07,,,1.0,An arbitrary file deletion vulnerability exists in the file delete functionality of the Html5Servlet endpoint of Draytek VigorConnect 1.6.0-B3. This allows an authenticated user to arbitrarily delete files in any location on the target operating system with root privileges.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,NONE,HIGH,HIGH,HIGH,2.8,5.2,['NVD-CWE-noinfo'],['cpe:2.3:a:draytek:vigorconnect:1.6.0:beta3:*:*:*:*:*:*'],0,0
CVE-2021-20128,DrayTek,0.00058,5.4,0.0,0.0,1.0,0.0,0,2021-10-13,1.0,2021-10-07,,,1.0,"The Profile Name field in the floor plan (Network Menu) page in Draytek VigorConnect 1.6.0-B3 was found to be vulnerable to stored XSS, as user input is not properly sanitized.",CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,LOW,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.3,2.7,['CWE-79'],['cpe:2.3:a:draytek:vigorconnect:1.6.0:beta3:*:*:*:*:*:*'],0,0
CVE-2021-20129,DrayTek,0.00406,7.5,0.0,0.0,1.0,0.0,0,2021-10-13,1.0,2021-10-07,,,1.0,"An information disclosure vulnerability exists in Draytek VigorConnect 1.6.0-B3, allowing an unauthenticated attacker to export system logs.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-532'],['cpe:2.3:a:draytek:vigorconnect:1.6.0:beta3:*:*:*:*:*:*'],0,0
CVE-2022-32548,DrayTek,0.00182,9.8,0.0,1.0,0.0,1.0,0,2022-08-29,1.0,2022-08-04,,,1.0,An issue was discovered on certain DrayTek Vigor routers before July 2022 such as the Vigor3910 before 4.3.1.1. /cgi-bin/wlogin.cgi has a buffer overflow via the username or password to the aa or ab field.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-120'],"['cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor1000b_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor1000b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2962_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2962:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2962p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2962p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2927_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2927:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2927ax_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2927ax:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2927ac_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2927ac:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2927vac_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2927vac:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2927l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2927l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2927lac_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2927lac:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2915_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2915:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2915ac_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2915ac:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2952_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2952:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2952p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2952p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor3220_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor3220:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2926_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2926:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2926n_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2926n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2926ac_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2926ac:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2926vac_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2926vac:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2926l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2926l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2926ln_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2926ln:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2926lac_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2926lac:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2862_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2862:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2862n_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2862n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2862ac_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2862ac:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2862vac_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2862vac:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2862b_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2862b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2862bn_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2862bn:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2862l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2862l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2862ln_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2862ln:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2862lac_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2862lac:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2620l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2620l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2620ln_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2620ln:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigorlte_200n_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigorlte_200n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2133_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2133:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2133n_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2133n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2133ac_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2133ac:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2133vac_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2133vac:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2133fvac_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2133fvac:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2762_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2762:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2762n_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2762n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2762ac_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2762ac:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2762vac_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2762vac:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor165_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor165:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor166_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor166:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2135_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2135:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2135ac_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2135ac:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2135vac_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2135vac:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2135fvac_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2135fvac:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2765_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2765:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2765ac_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2765ac:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2765vac_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2765vac:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2766_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2766:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2766ac_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2766ac:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2766vac_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2766vac:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2832_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2832:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2865_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2865:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2865ax_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2865ax:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2865ac_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2865ac:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2865vac_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2865vac:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2865l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2865l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2865lac_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2865lac:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2866_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2866:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2866ax_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2866ax:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2866ac_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2866ac:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2866vac_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2866vac:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2866l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2866l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:draytek:vigor2866lac_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:draytek:vigor2866lac:-:*:*:*:*:*:*:*']",0,0
CVE-2017-12077,Synology,0.00062,4.9,0.0,0.0,1.0,0.0,1,2017-08-28,1.0,2017-08-28,,,1.0,"Uncontrolled Resource Consumption vulnerability in SYNO.Core.PortForwarding.Rules in Synology Router Manager (SRM) before 1.1.4-6509 allows remote authenticated attacker to exhaust the memory resources of the machine, causing a denial of service attack.",CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,1.2,3.6,['CWE-400'],['cpe:2.3:a:synology:router_manager:*:*:*:*:*:*:*:*'],0,0
CVE-2017-12078,Synology,0.00063,7.2,0.0,0.0,1.0,0.0,1,2018-06-08,1.0,2018-06-28,,,0.0,Command injection vulnerability in EZ-Internet in Synology Router Manager (SRM) before 1.1.6-6931 allows remote authenticated users to execute arbitrary command via the username parameter.,CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.2,5.9,['CWE-77'],['cpe:2.3:a:synology:router_manager:*:*:*:*:*:*:*:*'],0,0
CVE-2017-14491,Synology,0.30287,9.8,1.0,0.0,1.0,0.0,1,2017-10-04,1.0,2018-01-12,,,0.0,Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:a:thekelleys:dnsmasq:*:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:7.1:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*', 'cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*', 'cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*', 'cpe:2.3:a:suse:linux_enterprise_point_of_sale:11:sp3:*:*:*:*:*:*', 'cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*', 'cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*', 'cpe:2.3:o:suse:linux_enterprise_server:12:*:*:*:ltss:*:*:*', 'cpe:2.3:o:nvidia:linux_for_tegra:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:jetson_tk1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nvidia:linux_for_tegra:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nvidia:jetson_tx1:-:*:*:*:*:*:*:*', 'cpe:2.3:a:nvidia:geforce_experience:*:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:honor_v9_play_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:honor_v9_play:-:*:*:*:*:*:*:*', 'cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:ruggedcom_rm1224_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:ruggedcom_rm1224:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_m-800_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_m-800:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_s615_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_s615:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:scalance_w1750d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:scalance_w1750d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:diskstation_manager:5.2:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:diskstation_manager:6.0:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:diskstation_manager:6.1:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:router_manager:1.1:*:*:*:*:*:*:*']",1,1
CVE-2017-15895,Synology,0.00062,6.5,0.0,0.0,1.0,0.0,1,2017-12-08,1.0,2017-12-08,,,1.0,Directory traversal vulnerability in the SYNO.FileStation.Extract in Synology Router Manager (SRM) before 1.1.5-6542-4 allows remote authenticated users to write arbitrary files via the dest_folder_path parameter.,CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N,NETWORK,LOW,LOW,NONE,UNCHANGED,NONE,HIGH,NONE,MEDIUM,2.8,3.6,['CWE-22'],['cpe:2.3:a:synology:router_manager:*:*:*:*:*:*:*:*'],0,0
CVE-2018-13287,Synology,0.00059,6.5,0.0,0.0,1.0,0.0,1,2019-04-01,1.0,2019-04-01,,,1.0,Incorrect default permissions vulnerability in synouser.conf in Synology Router Manager (SRM) before 1.1.7-6941-1 allows remote authenticated users to obtain sensitive information via the world readable configuration.,CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,2.8,3.6,['CWE-276'],['cpe:2.3:a:synology:router_manager:*:*:*:*:*:*:*:*'],0,0
CVE-2018-13289,Synology,0.00133,5.3,0.0,0.0,1.0,0.0,1,2019-04-01,1.0,2019-04-01,,,1.0,Information exposure vulnerability in SYNO.FolderSharing.List in Synology Router Manager (SRM) before 1.1.7-6941-2 allows remote attackers to obtain sensitive information via the (1) folder_path or (2) real_path parameter.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,LOW,NONE,NONE,MEDIUM,3.9,1.4,['CWE-200'],['cpe:2.3:a:synology:router_manager:*:*:*:*:*:*:*:*'],0,0
CVE-2018-13292,Synology,0.00054,4.3,0.0,0.0,1.0,0.0,1,2019-04-01,1.0,2019-04-01,,,1.0,Information exposure vulnerability in /usr/syno/etc/mount.conf in Synology Router Manager (SRM) before 1.1.7-6941-2 allows remote authenticated users to obtain sensitive information via the world readable configuration.,CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N,NETWORK,LOW,LOW,NONE,UNCHANGED,LOW,NONE,NONE,MEDIUM,2.8,1.4,['CWE-200'],['cpe:2.3:a:synology:router_manager:*:*:*:*:*:*:*:*'],0,0
CVE-2018-7184,Synology,0.02857,7.5,0.0,0.0,1.0,1.0,1,2018-03-06,1.0,2018-04-10,,,0.0,"ntpd in ntp 4.2.8p4 before 4.2.8p11 drops bad packets before updating the ""received"" timestamp, which allows remote attackers to cause a denial of service (disruption) by sending a packet with a zero-origin timestamp causing the association to reset and setting the contents of the packet as the most recent timestamp. This issue is a result of an incomplete fix for CVE-2015-7704.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:a:ntp:ntp:4.2.8:p10:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p4:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p5:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p6:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p7:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p8:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p9:*:*:*:*:*:*', 'cpe:2.3:a:synology:diskstation_manager:5.2:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:diskstation_manager:6.0:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:diskstation_manager:6.1:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:router_manager:1.1:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:virtual_diskstation_manager:-:*:*:*:*:*:*:*', 'cpe:2.3:o:synology:vs960hd_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:o:slackware:slackware_linux:14.0:*:*:*:*:*:*:*', 'cpe:2.3:o:slackware:slackware_linux:14.1:*:*:*:*:*:*:*', 'cpe:2.3:o:slackware:slackware_linux:14.2:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*', 'cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*']",0,0
CVE-2018-8918,Synology,0.00054,5.4,0.0,0.0,1.0,0.0,1,2018-12-24,1.0,2018-05-24,,,1.0,Cross-site scripting (XSS) vulnerability in info.cgi in Synology Router Manager (SRM) before 1.1.7-6941 allows remote attackers to inject arbitrary web script or HTML via the host parameter.,CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,LOW,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.3,2.7,['CWE-79'],['cpe:2.3:a:synology:router_manager:*:*:*:*:*:*:*:*'],0,0
CVE-2019-11823,Synology,0.00146,7.5,0.0,0.0,1.0,0.0,1,2020-05-04,1.0,2020-06-18,,,0.0,CRLF injection vulnerability in Network Center in Synology Router Manager (SRM) before 1.2.3-8017-2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-125'],['cpe:2.3:a:synology:router_manager:*:*:*:*:*:*:*:*'],0,0
CVE-2019-14907,Synology,0.00598,6.5,0.0,0.0,1.0,0.0,1,2020-01-21,1.0,2021-05-24,,,0.0,"All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11.x before 4.11.5 have an issue where if it is set with ""log level = 3"" (or above) then the string obtained from the client, after a failed character conversion, is printed. Such strings can be provided during the NTLMSSP authentication exchange. In the Samba AD DC in particular, this may cause a long-lived process(such as the RPC server) to terminate. (In the file server case, the most likely target, smbd, operates as process-per-client and so a crash there is harmless).",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.8,3.6,['CWE-125'],"['cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*', 'cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*', 'cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:storage:3.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:directory_server:-:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:diskstation_manager:6.2:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:router_manager:1.2:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*']",0,0
CVE-2019-19344,Synology,0.00379,6.5,0.0,0.0,1.0,0.0,1,2020-01-21,1.0,2021-05-24,,,0.0,"There is a use-after-free issue in all samba 4.9.x versions before 4.9.18, all samba 4.10.x versions before 4.10.12 and all samba 4.11.x versions before 4.11.5, essentially due to a call to realloc() while other local variables still point at the original buffer.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.8,3.6,['CWE-416'],"['cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*', 'cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*', 'cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:directory_server:-:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:diskstation_manager:6.2:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:router_manager:1.2:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*']",0,0
CVE-2019-3870,Synology,0.0019,6.1,0.0,1.0,1.0,1.0,1,2019-04-09,1.0,2020-10-28,,,0.0,"A vulnerability was found in Samba from version (including) 4.9 to versions before 4.9.6 and 4.10.2. During the creation of a new Samba AD DC, files are created in a private subdirectory of the install location. This directory is typically mode 0700, that is owner (root) only access. However in some upgraded installations it will have other permissions, such as 0755, because this was the default before Samba 4.8. Within this directory, files are created with mode 0666, which is world-writable, including a sample krb5.conf, and the list of DNS names and servicePrincipalName values to update.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,NONE,LOW,HIGH,MEDIUM,1.8,4.2,['CWE-276'],"['cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*', 'cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:directory_server:-:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:diskstation_manager:5.2:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:diskstation_manager:6.1:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:diskstation_manager:6.2:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:router_manager:1.2:*:*:*:*:*:*:*', 'cpe:2.3:o:synology:skynas_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:synology:skynas:-:*:*:*:*:*:*:*', 'cpe:2.3:o:synology:vs960hd_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*']",0,0
CVE-2019-9494,Synology,0.00843,5.9,0.0,0.0,1.0,0.0,1,2019-04-17,1.0,2020-06-18,,,0.0,The implementations of SAE in hostapd and wpa_supplicant are vulnerable to side channel attacks as a result of observable timing differences and cache access patterns. An attacker may be able to gain leaked information from a side channel attack that can be used for full password recovery. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.7 are affected.,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,HIGH,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,2.2,3.6,"['CWE-203', 'CWE-208']","['cpe:2.3:a:w1.fi:hostapd:*:*:*:*:*:*:*:*', 'cpe:2.3:a:w1.fi:wpa_supplicant:*:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*', 'cpe:2.3:a:opensuse:backports_sle:15.0:-:*:*:*:*:*:*', 'cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:radius_server:3.0:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:router_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:o:freebsd:freebsd:11.2:-:*:*:*:*:*:*', 'cpe:2.3:o:freebsd:freebsd:11.2:p2:*:*:*:*:*:*', 'cpe:2.3:o:freebsd:freebsd:11.2:p3:*:*:*:*:*:*', 'cpe:2.3:o:freebsd:freebsd:11.2:p4:*:*:*:*:*:*', 'cpe:2.3:o:freebsd:freebsd:11.2:p5:*:*:*:*:*:*', 'cpe:2.3:o:freebsd:freebsd:11.2:p6:*:*:*:*:*:*', 'cpe:2.3:o:freebsd:freebsd:11.2:p7:*:*:*:*:*:*', 'cpe:2.3:o:freebsd:freebsd:11.2:p8:*:*:*:*:*:*', 'cpe:2.3:o:freebsd:freebsd:11.2:p9:*:*:*:*:*:*', 'cpe:2.3:o:freebsd:freebsd:11.2:rc3:*:*:*:*:*:*', 'cpe:2.3:o:freebsd:freebsd:12.0:-:*:*:*:*:*:*', 'cpe:2.3:o:freebsd:freebsd:12.0:p1:*:*:*:*:*:*', 'cpe:2.3:o:freebsd:freebsd:12.0:p2:*:*:*:*:*:*', 'cpe:2.3:o:freebsd:freebsd:12.0:p3:*:*:*:*:*:*']",0,0
CVE-2019-9502,Synology,0.0018,8.8,0.0,0.0,1.0,0.0,1,2020-02-03,1.0,2019-04-23,,,1.0,"The Broadcom wl WiFi driver is vulnerable to a heap buffer overflow. If the vendor information element data length is larger than 164 bytes, a heap buffer overflow is triggered in wlc_wpa_plumb_gtk. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.",CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,"['CWE-787', 'CWE-122']","['cpe:2.3:a:synology:router_manager:1.2:*:*:*:*:*:*:*', 'cpe:2.3:o:broadcom:bcm4339_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:broadcom:bcm4339:-:*:*:*:*:*:*:*']",0,0
CVE-2019-9513,Synology,0.04253,7.5,0.0,1.0,1.0,1.0,1,2019-08-13,1.0,2020-10-15,,,0.0,"Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,"['NVD-CWE-Other', 'CWE-400']","['cpe:2.3:a:apple:swiftnio:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:diskstation_manager:6.2:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*', 'cpe:2.3:o:synology:vs960hd_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:openshift_service_mesh:1.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:graalvm:19.2.0:*:*:*:enterprise:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:enterprise_communications_broker:3.2.0:*:*:*:*:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*']",0,0
CVE-2019-9514,Synology,0.7923,7.5,0.0,1.0,1.0,1.0,1,2019-08-13,1.0,2020-10-15,,,0.0,"Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,"['CWE-770', 'CWE-400']","['cpe:2.3:a:apple:swiftnio:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:diskstation_manager:6.2:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*', 'cpe:2.3:o:synology:vs960hd_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:developer_tools:1.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:openshift_container_platform:3.9:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:openshift_container_platform:3.10:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:openshift_container_platform:4.2:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:openshift_service_mesh:1.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:openstack:14:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:single_sign-on:7.3:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:graalvm:19.2.0:*:*:*:enterprise:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:cloud_insights:-:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:trident:-:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*']",0,0
CVE-2019-9515,Synology,0.03886,7.5,0.0,1.0,1.0,1.0,1,2019-08-13,1.0,2020-10-15,,,0.0,"Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,"['CWE-770', 'CWE-400']","['cpe:2.3:a:apple:swiftnio:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:diskstation_manager:6.2:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*', 'cpe:2.3:o:synology:vs960hd_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:openshift_service_mesh:1.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:openstack:14:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:single_sign-on:7.3:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:graalvm:19.2.0:*:*:*:enterprise:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*']",0,0
CVE-2019-9516,Synology,0.00702,6.5,0.0,1.0,1.0,1.0,1,2019-08-13,1.0,2020-10-15,,,0.0,"Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.8,3.6,"['CWE-770', 'CWE-400']","['cpe:2.3:a:apple:swiftnio:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:diskstation_manager:6.2:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*', 'cpe:2.3:o:synology:vs960hd_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:openshift_service_mesh:1.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:graalvm:19.2.0:*:*:*:enterprise:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*']",0,0
CVE-2019-9518,Synology,0.01188,7.5,0.0,1.0,1.0,1.0,1,2019-08-13,1.0,2020-10-15,,,0.0,"Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,"['CWE-770', 'CWE-400']","['cpe:2.3:a:apple:swiftnio:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:diskstation_manager:6.2:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*', 'cpe:2.3:o:synology:vs960hd_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:openshift_service_mesh:1.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:graalvm:19.2.0:*:*:*:enterprise:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*']",0,0
CVE-2020-27649,Synology,0.00089,9.0,0.0,0.0,1.0,0.0,1,2020-10-29,1.0,2020-10-29,,,1.0,Improper certificate validation vulnerability in OpenVPN client in Synology Router Manager (SRM) before 1.2.4-8081 allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H,NETWORK,HIGH,NONE,NONE,CHANGED,HIGH,HIGH,HIGH,CRITICAL,2.2,6.0,['CWE-295'],['cpe:2.3:a:synology:router_manager:*:*:*:*:*:*:*:*'],0,0
CVE-2020-27651,Synology,0.00165,8.1,0.0,0.0,1.0,0.0,1,2020-10-29,1.0,2020-10-29,,,1.0,"Synology Router Manager (SRM) before 1.2.4-8081 does not set the Secure flag for the session cookie in an HTTPS session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an HTTP session.",CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,HIGH,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.2,5.9,"['CWE-311', 'CWE-614']",['cpe:2.3:a:synology:router_manager:*:*:*:*:*:*:*:*'],0,0
CVE-2020-27653,Synology,0.00116,8.3,0.0,0.0,1.0,0.0,1,2020-10-29,1.0,2020-10-29,,,1.0,Algorithm downgrade vulnerability in QuickConnect in Synology Router Manager (SRM) before 1.2.4-8081 allows man-in-the-middle attackers to spoof servers and obtain sensitive information via unspecified vectors.,CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H,NETWORK,HIGH,NONE,REQUIRED,CHANGED,HIGH,HIGH,HIGH,HIGH,1.6,6.0,['CWE-327'],"['cpe:2.3:a:synology:diskstation_manager:6.2.3_25426:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:router_manager:*:*:*:*:*:*:*:*']",0,0
CVE-2020-27658,Synology,0.00258,6.1,0.0,0.0,1.0,0.0,1,2020-10-29,1.0,2020-10-29,,,1.0,"Synology Router Manager (SRM) before 1.2.4-8081 does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,"['CWE-732', 'CWE-1004']",['cpe:2.3:a:synology:router_manager:*:*:*:*:*:*:*:*'],0,0
CVE-2020-8622,Synology,0.00408,6.5,0.0,0.0,1.0,0.0,1,2020-08-21,1.0,2021-02-23,,,0.0,"In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering an assertion failure, causing the server to exit. Alternately, an off-path attacker would have to correctly guess when a TSIG-signed request was sent, along with other characteristics of the packet and message, and spoof a truncated response to trigger an assertion failure, causing the server to exit.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.8,3.6,['CWE-617'],"['cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*', 'cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*', 'cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*', 'cpe:2.3:a:isc:bind:9.9.3:s1:*:*:supported_preview:*:*:*', 'cpe:2.3:a:isc:bind:9.11.21:s1:*:*:supported_preview:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*', 'cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:dns_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*']",0,0
CVE-2017-11150,Synology,0.00088,7.8,0.0,0.0,1.0,0.0,0,2017-08-14,1.0,2017-08-11,,,1.0,Command injection vulnerability in Document.php in Synology Office 2.2.0-1502 and 2.2.1-1506 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the crafted file name of RTF documents.,CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-78'],"['cpe:2.3:a:synology:office:2.2.0-1502:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:office:2.2.1-1506:*:*:*:*:*:*:*']",0,0
CVE-2017-11155,Synology,0.45775,7.5,1.0,0.0,1.0,0.0,0,2017-08-08,1.0,2017-08-08,,,1.0,An information exposure vulnerability in index.php in Synology Photo Station before 6.7.3-3432 and 6.3-2967 allows remote attackers to obtain sensitive system information via unspecified vectors.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,"['CWE-200', 'CWE-205']","['cpe:2.3:a:synology:photo_station:*:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:photo_station:6.3-2967:*:*:*:*:*:*:*']",1,1
CVE-2017-11157,Synology,0.00062,7.8,0.0,0.0,1.0,0.0,0,2017-08-30,1.0,2018-08-30,,,0.0,"Multiple untrusted search path vulnerabilities in the installer in Synology Cloud Station Backup before 4.2.5-4396 on Windows allow local attackers to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse (1) shfolder.dll, (2) ntmarta.dll, (3) secur32.dll or (4) dwmapi.dll file in the current working directory.",CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-426'],"['cpe:2.3:a:synology:cloud_station_backup:*:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*']",0,0
CVE-2017-11158,Synology,0.00062,7.8,0.0,0.0,1.0,0.0,0,2017-08-31,1.0,2017-08-30,,,1.0,"Multiple untrusted search path vulnerabilities in the installer in Synology Cloud Station Drive before 4.2.5-4396 on Windows allow local attackers to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse (1) shfolder.dll, (2) ntmarta.dll, (3) secur32.dll or (4) dwmapi.dll file in the current working directory.",CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,"['CWE-426', 'CWE-427']","['cpe:2.3:a:synology:cloud_station_drive:*:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*']",0,0
CVE-2017-12072,Synology,0.00054,5.4,0.0,0.0,1.0,0.0,0,2017-12-20,1.0,2017-12-20,,,1.0,Cross-site scripting (XSS) vulnerability in PixlrEditorHandler.php in Synology Photo Station before 6.8.0-3456 allows remote authenticated users to inject arbitrary web scripts or HTML via the id parameter.,CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,LOW,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.3,2.7,['CWE-79'],['cpe:2.3:a:synology:photo_station:*:*:*:*:*:*:*:*'],0,0
CVE-2017-12076,Synology,0.00062,4.9,0.0,0.0,1.0,0.0,0,2017-08-28,1.0,2017-08-28,,,1.0,"Uncontrolled Resource Consumption vulnerability in SYNO.Core.PortForwarding.Rules in Synology DiskStation (DSM) before 6.1.1-15088 allows remote authenticated attacker to exhaust the memory resources of the machine, causing a denial of service attack.",CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,1.2,3.6,['CWE-400'],"['cpe:2.3:a:synology:diskstation_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:diskstation_manager:6.1.1:*:*:*:*:*:*:*']",0,0
CVE-2017-12080,Synology,0.00151,5.3,0.0,0.0,1.0,0.0,0,2017-12-04,1.0,2017-12-04,,,1.0,An information exposure vulnerability in default HTTP configuration file in Synology Photo Station before 6.8.1-3458 and before 6.3-2970 allows remote attackers to obtain sensitive system information via .htaccess file.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,LOW,NONE,NONE,MEDIUM,3.9,1.4,['CWE-200'],"['cpe:2.3:a:synology:photo_station:*:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:photo_station:*:*:*:*:*:*:*:*']",0,0
CVE-2017-15888,Synology,0.00054,5.4,0.0,0.0,1.0,0.0,0,2017-10-30,1.0,2017-10-30,,,1.0,Cross-site scripting (XSS) vulnerability in Custom Internet Radio List in Synology Audio Station before 6.3.0-3260 allows remote authenticated attackers to inject arbitrary web script or HTML via the NAME parameter.,CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,LOW,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.3,2.7,['CWE-79'],['cpe:2.3:a:synology:audio_station:*:*:*:*:*:*:*:*'],0,0
CVE-2017-15894,Synology,0.00062,6.5,0.0,0.0,1.0,0.0,0,2017-12-08,1.0,2017-12-08,,,1.0,Directory traversal vulnerability in the SYNO.FileStation.Extract in Synology DiskStation Manager (DSM) 6.0.x before 6.0.3-8754-3 and before 5.2-5967-6 allows remote authenticated users to write arbitrary files via the dest_folder_path parameter.,CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N,NETWORK,LOW,LOW,NONE,UNCHANGED,NONE,HIGH,NONE,MEDIUM,2.8,3.6,['CWE-22'],"['cpe:2.3:a:synology:diskstation_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:diskstation_manager:*:*:*:*:*:*:*:*']",0,0
CVE-2017-16766,Synology,0.0009,6.5,0.0,0.0,1.0,0.0,0,2017-12-22,1.0,2017-12-22,,,1.0,An improper access control vulnerability in synodsmnotify in Synology DiskStation Manager (DSM) before 6.1.4-15217 and before 6.0.3-8754-6 allows local users to inject arbitrary web script or HTML via the -fn option.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,LOW,LOW,NONE,MEDIUM,3.9,2.5,"['CWE-74', 'CWE-284']","['cpe:2.3:a:synology:diskstation_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:diskstation_manager:*:*:*:*:*:*:*:*']",0,0
CVE-2017-16768,Synology,0.00054,4.8,0.0,0.0,1.0,0.0,0,2017-12-27,1.0,2017-12-27,,,1.0,Cross-site scripting (XSS) vulnerability in User Policy editor in Synology MailPlus Server before 1.4.0-0415 allows remote authenticated users to inject arbitrary HTML via the name parameter.,CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,HIGH,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,1.7,2.7,['CWE-79'],['cpe:2.3:a:synology:mailplus_server:*:*:*:*:*:*:*:*'],0,0
CVE-2017-16771,Synology,0.00126,6.1,0.0,0.0,1.0,0.0,0,2018-03-22,1.0,2018-03-22,,,1.0,Cross-site scripting (XSS) vulnerability in Log Viewer in Synology Photo Station before 6.8.3-3463 and before 6.3-2971 allows remote attackers to inject arbitrary web script or HTML via the username parameter.,CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:a:synology:photo_station:*:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:photo_station:*:*:*:*:*:*:*:*']",0,0
CVE-2017-16772,Synology,0.00065,8.8,0.0,0.0,1.0,0.0,0,2018-03-22,1.0,2018-03-22,,,1.0,Improper input validation vulnerability in SYNOPHOTO_Flickr_MultiUpload in Synology Photo Station before 6.8.3-3463 and before 6.3-2971 allows remote authenticated users to execute arbitrary codes via the prog_id parameter.,CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,"['CWE-20', 'CWE-434']","['cpe:2.3:a:synology:photo_station:*:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:photo_station:*:*:*:*:*:*:*:*']",0,0
CVE-2017-16773,Synology,0.00063,8.8,0.0,0.0,1.0,0.0,0,2018-07-05,1.0,2018-07-05,,,1.0,Improper authorization vulnerability in Highlight Preview in Synology Universal Search before 1.0.5-0135 allows remote authenticated users to bypass permission checks for directories in POSIX mode.,CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,"['CWE-863', 'CWE-285']",['cpe:2.3:a:synology:universal_search:*:*:*:*:*:*:*:*'],0,0
CVE-2017-16774,Synology,0.00054,5.4,0.0,0.0,1.0,0.0,0,2019-04-01,1.0,2019-03-31,,,1.0,Cross-site scripting (XSS) vulnerability in SYNO.Core.PersonalNotification.Event in Synology DiskStation Manager (DSM) before 6.1.4-15217-3 allows remote authenticated users to inject arbitrary web script or HTML via the package parameter.,CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,LOW,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.3,2.7,['CWE-79'],['cpe:2.3:a:synology:diskstation_manager:*:*:*:*:*:*:*:*'],0,0
CVE-2018-8911,Synology,0.00054,5.4,0.0,0.0,1.0,0.0,0,2018-05-09,1.0,2018-05-08,,,1.0,Cross-site scripting (XSS) vulnerability in Attachment Preview in Synology Note Station before 2.5.1-0844 allows remote authenticated users to inject arbitrary web script or HTML via malicious attachments.,CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,LOW,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.3,2.7,['CWE-79'],['cpe:2.3:a:synology:note_station:*:*:*:*:*:*:*:*'],0,0
CVE-2018-8922,Synology,0.00055,6.5,0.0,0.0,1.0,0.0,0,2018-06-01,1.0,2018-06-01,,,1.0,Improper access control vulnerability in Synology Drive before 1.0.2-10275 allows remote authenticated users to access non-shared files or folders via unspecified vectors.,CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,2.8,3.6,"['NVD-CWE-noinfo', 'CWE-284']",['cpe:2.3:a:synology:drive:1.0.2-10275:*:*:*:*:*:*:*'],0,0
CVE-2018-8925,Synology,0.00064,8.8,0.0,0.0,1.0,0.0,0,2018-06-08,1.0,2018-06-08,,,1.0,"Cross-site request forgery (CSRF) vulnerability in admin/user.php in Synology Photo Station before 6.8.5-3471 and before 6.3-2975 allows remote attackers to hijack the authentication of administrators via the (1) username, (2) password, (3) admin, (4) action, (5) uid, or (6) modify_admin parameter.",CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-352'],"['cpe:2.3:a:synology:photo_station:*:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:photo_station:*:*:*:*:*:*:*:*']",0,0
CVE-2019-11820,Synology,0.00042,5.5,0.0,0.0,1.0,0.0,0,2019-05-09,1.0,2019-05-09,,,1.0,Information exposure through process environment vulnerability in Synology Calendar before 2.3.3-0620 allows local users to obtain credentials via cmdline.,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.8,3.6,['CWE-522'],['cpe:2.3:a:synology:calendar:*:*:*:*:*:*:*:*'],0,0
CVE-2019-11821,Synology,0.00074,9.8,0.0,0.0,1.0,0.0,0,2019-06-30,1.0,2019-06-30,,,1.0,SQL injection vulnerability in synophoto_csPhotoDB.php in Synology Photo Station before 6.8.11-3489 and before 6.3-2977 allows remote attackers to execute arbitrary SQL command via the type parameter.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-89'],"['cpe:2.3:a:synology:photo_station:*:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:photo_station:*:*:*:*:*:*:*:*']",0,0
CVE-2019-11826,Synology,0.00068,8.8,0.0,0.0,1.0,0.0,0,2019-06-30,1.0,2019-06-30,,,1.0,Relative path traversal vulnerability in SYNO.PhotoTeam.Upload.Item in Synology Moments before 1.3.0-0691 allows remote authenticated users to upload arbitrary files via the name parameter.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,"['CWE-22', 'CWE-23']",['cpe:2.3:a:synology:moments:*:*:*:*:*:*:*:*'],0,0
CVE-2019-11828,Synology,0.00054,5.4,0.0,0.0,1.0,0.0,0,2019-06-30,1.0,2019-06-30,,,1.0,Cross-site scripting (XSS) vulnerability in Chart in Synology Office before 3.1.4-2771 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,LOW,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.3,2.7,['CWE-79'],['cpe:2.3:a:synology:office:*:*:*:*:*:*:*:*'],0,0
CVE-2020-1472,Synology,0.52411,10.0,1.0,0.0,1.0,0.0,0,2020-08-17,1.0,2020-09-17,,,0.0,"An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted application on a device on the network.
To exploit the vulnerability, an unauthenticated attacker would be required to use MS-NRPC to connect to a domain controller to obtain domain administrator access.
Microsoft is addressing the vulnerability in a phased two-part rollout. These updates address the vulnerability by modifying how Netlogon handles the usage of Netlogon secure channels.
For guidelines on how to manage the changes required for this vulnerability and more information on the phased rollout, see How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 (updated September 28, 2020).
When the second phase of Windows updates become available in Q1 2021, customers will be notified via a revision to this security vulnerability. If you wish to be notified when these updates are released, we recommend that you register for the security notifications mailer to be alerted of content changes to this advisory. See Microsoft Technical Security Notifications.
",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.8,3.6,['CWE-330'],"['cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2004:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*', 'cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_server_20h2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*', 'cpe:2.3:a:synology:directory_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*', 'cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*', 'cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*']",2,0
CVE-2020-27660,Synology,0.00335,9.8,0.0,0.0,1.0,0.0,0,2020-11-30,1.0,2020-12-28,,,0.0,SQL injection vulnerability in request.cgi in Synology SafeAccess before 1.2.3-0234 allows remote attackers to execute arbitrary SQL commands via the domain parameter.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-89'],['cpe:2.3:a:synology:safeaccess:*:*:*:*:*:*:*:*'],0,0
CVE-2020-8621,Synology,0.01108,7.5,0.0,0.0,1.0,0.0,0,2020-08-21,1.0,2021-02-23,,,0.0,"In BIND 9.14.0 -> 9.16.5, 9.17.0 -> 9.17.3, If a server is configured with both QNAME minimization and 'forward first' then an attacker who can send queries to it may be able to trigger the condition that will cause the server to crash. Servers that 'forward only' are not affected.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-617'],"['cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*', 'cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*', 'cpe:2.3:a:synology:dns_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*']",0,0
CVE-2021-43925,Synology,0.00077,9.8,0.0,0.0,1.0,0.0,0,2022-02-07,1.0,2022-11-09,,,0.0,Improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability in Log Management functionality in Synology DiskStation Manager (DSM) before 7.0.1-42218-2 allows remote attackers to inject SQL commands via unspecified vectors.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-89'],"['cpe:2.3:a:synology:diskstation_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:diskstation_manager:*:*:*:*:*:*:*:*']",0,0
CVE-2022-22680,Synology,0.0012,7.5,0.0,0.0,1.0,0.0,0,2022-02-07,1.0,2022-11-09,,,0.0,Exposure of sensitive information to an unauthorized actor vulnerability in Web Server in Synology DiskStation Manager (DSM) before 7.0.1-42218-2 allows remote attackers to obtain sensitive information via unspecified vectors.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,"['NVD-CWE-noinfo', 'CWE-200']","['cpe:2.3:a:synology:diskstation_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:diskstation_manager:*:*:*:*:*:*:*:*']",0,0
CVE-2022-22683,Synology,0.00137,9.8,0.0,0.0,1.0,0.0,0,2022-07-28,1.0,2022-07-28,,,1.0,Buffer copy without checking size of input ('Classic Buffer Overflow') vulnerability in cgi component in Synology Media Server before 1.8.1-2876 allows remote attackers to execute arbitrary code via unspecified vectors.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-120'],"['cpe:2.3:a:synology:media_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:diskstation_manager:6.2:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:media_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:router_manager:1.2:*:*:*:*:*:*:*']",0,0
CVE-2022-27610,Synology,0.00062,8.1,0.0,0.0,1.0,0.0,0,2022-07-27,1.0,2022-07-27,,,1.0,Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in webapi component in Synology DiskStation Manager (DSM) before 6.2.3-25423 allows remote authenticated users to delete arbitrary files via unspecified vectors.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,NONE,HIGH,HIGH,HIGH,2.8,5.2,['CWE-22'],['cpe:2.3:a:synology:diskstation_manager:*:*:*:*:*:*:*:*'],0,0
CVE-2022-27612,Synology,0.00077,9.8,0.0,0.0,1.0,0.0,0,2022-07-28,1.0,2022-07-28,,,1.0,Buffer copy without checking size of input ('Classic Buffer Overflow') vulnerability in cgi component in Synology Audio Station before 6.5.4-3367 allows remote attackers to execute arbitrary commands via unspecified vectors.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-120'],['cpe:2.3:a:synology:audio_station:*:*:*:*:*:*:*:*'],0,0
CVE-2022-27614,Synology,0.0012,7.5,0.0,0.0,1.0,0.0,0,2022-07-28,1.0,2022-07-28,,,1.0,Exposure of sensitive information to an unauthorized actor vulnerability in web server in Synology Media Server before 1.8.1-2876 allows remote attackers to obtain sensitive information via unspecified vectors.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-200'],"['cpe:2.3:a:synology:media_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:diskstation_manager:6.2:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:media_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:router_manager:1.2:*:*:*:*:*:*:*']",0,0
CVE-2022-27615,Synology,0.00062,8.1,0.0,0.0,1.0,0.0,0,2022-07-28,1.0,2022-07-28,,,1.0,Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in cgi component in Synology DNS Server before 2.2.2-5027 allows remote authenticated users to delete arbitrary files via unspecified vectors.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,NONE,HIGH,HIGH,HIGH,2.8,5.2,['CWE-22'],['cpe:2.3:a:synology:dns_server:*:*:*:*:*:*:*:*'],0,0
CVE-2022-27616,Synology,0.0007,7.2,0.0,0.0,1.0,0.0,0,2022-08-03,1.0,2022-08-03,,,1.0,Improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability in webapi component in Synology DiskStation Manager (DSM) before 7.0.1-42218-3 allows remote authenticated users to execute arbitrary commands via unspecified vectors.,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.2,5.9,['CWE-78'],"['cpe:2.3:a:synology:diskstation_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:diskstation_manager:*:*:*:*:*:*:*:*']",0,0
CVE-2022-27620,Synology,0.00068,4.9,0.0,0.0,1.0,0.0,0,2022-08-03,1.0,2022-08-03,,,1.0,Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in webapi component in Synology SSO Server before 2.2.3-0331 allows remote authenticated users to read arbitrary files via unspecified vectors.,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.2,3.6,['CWE-22'],"['cpe:2.3:a:synology:sso_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:diskstation_manager:6.2:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:diskstation_manager:7.0:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:diskstation_manager:7.1:*:*:*:*:*:*:*']",0,0
CVE-2022-27625,Synology,0.00109,9.8,0.0,1.0,1.0,0.0,0,2022-10-20,1.0,2022-10-20,,,1.0,"A vulnerability regarding improper restriction of operations within the bounds of a memory buffer is found in the message processing functionality of Out-of-Band (OOB) Management. This allows remote attackers to execute arbitrary commands via unspecified vectors. The following models with Synology DiskStation Manager (DSM) versions before 7.1.1-42962-2 may be affected: DS3622xs+, FS3410, and HD6500.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-119'],"['cpe:2.3:a:synology:diskstation_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:h:synology:ds3622xs\\+:-:*:*:*:*:*:*:*', 'cpe:2.3:h:synology:fs3410:-:*:*:*:*:*:*:*', 'cpe:2.3:h:synology:hd6500:-:*:*:*:*:*:*:*']",0,0
CVE-2017-12413,Axis Communications,0.0013,6.1,0.0,1.0,0.0,1.0,1,2017-08-04,0.0,,0.0,,,"AXIS 2100 devices 2.43 have XSS via the URI, possibly related to admin/admin.shtml.",CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:axis:2100_network_camera_firmware:2.43:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:2100_network_camera:-:*:*:*:*:*:*:*']",0,0
CVE-2017-15885,Axis Communications,0.00125,6.1,0.0,1.0,0.0,1.0,1,2017-10-25,0.0,,0.0,,,Reflected XSS in the web administration portal on the Axis 2100 Network Camera 2.03 allows an attacker to execute arbitrary JavaScript via the conf_Layout_OwnTitle parameter to view/view.shtml. NOTE: this might overlap CVE-2007-5214.,CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:axis:2100_network_camera_firmware:2.03:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:2100_network_camera:-:*:*:*:*:*:*:*']",0,0
CVE-2018-10658,Axis Communications,0.00408,7.5,0.0,1.0,0.0,1.0,1,2018-06-26,1.0,2018-06-30,,,0.0,There was a Memory Corruption issue discovered in multiple models of Axis IP Cameras which causes a denial of service (crash). The crash arises from code inside libdbus-send.so shared object or similar.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-119'],"['cpe:2.3:h:axis:a1001:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:a1001_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:a8004-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:a8004-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:a8105-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:a8105-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:a9161:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:a9161_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:a9188:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:a9188_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:a9188-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:a9188-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:c1004-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:c1004-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:c2005:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:c2005_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:c3003-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:c3003-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:c8033_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:c8033:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_bullet_le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_bullet_le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_c360_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_c360:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_cube_l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_cube_l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_cube_lw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_cube_lw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_dome_v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_dome_v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_dome_wv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_dome_wv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_eye_l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_eye_l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_eye_lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_eye_lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_recorder_4ch_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_recorder_4ch:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_recorder_8ch_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_recorder_8ch:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:d2050-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:d2050-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:f34_main_unit_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:f34_main_unit:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:f41_main_unit_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:f41_main_unit:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:f44_dual_audio_input_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:f44_dual_audio_input:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:f44_main_unit_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:f44_main_unit:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:fa54_main_unit_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:fa54_main_unit:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1004-w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1004-w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1013_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1013:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1014_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1014:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1025_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1025:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1033-w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1033-w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1034-w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1034-w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1045-lw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1045-lw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1054_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1054:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1065-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1065-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1065-lw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1065-lw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1103_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1103:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1104_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1104:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1113_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1113:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1113-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1113-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1114_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1114:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1114-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1114-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1124_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1124:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1124-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1124-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1125_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1125:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1125-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1125-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1143-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1143-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1144-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1144-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1145_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1145:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1145-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1145-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m2014-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m2014-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m2025-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m2025-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m2026-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m2026-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m2026-le_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m2026-le_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3004-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3004-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3005-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3005-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3006-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3006-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3007-p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3007-p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3007-pv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3007-pv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3014_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3014:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3015_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3015:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3016_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3016:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3024-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3024-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3025-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3025-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3026-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3026-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3027-pve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3027-pve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3037-pve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3037-pve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3044-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3044-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3044-wv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3044-wv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3045-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3045-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3045-wv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3045-wv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3046-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3046-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3046-v_1.8mm_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3046-v_1.8mm:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3047-p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3047-p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3048-p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3048-p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3104-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3104-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3104-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3104-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3105-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3105-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3105-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3105-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3106-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3106-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3106-l_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3106-l_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3106-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3106-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3106-lve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3106-lve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3113-r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3113-r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3113-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3113-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3114-r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3114-r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3114-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3114-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3203_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3203:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3203-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3203-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3204_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3204:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3204-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3204-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5013_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5013:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5013-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5013-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5014_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5014:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5014-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5014-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5054_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5054:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5055_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5055:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5065_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5065:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5525-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5525-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m7010_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m7010:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m7011_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m7011:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m7014_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m7014:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m7016_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m7016:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1125-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1125-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1125-zl_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1125-zl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1126-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1126-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1126-zl_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1126-zl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1204_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1204:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1214_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1214:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1214-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1214-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1224-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1224-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1244_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1244:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1245_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1245:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1254_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1254:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1264_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1264:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1265_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1265:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1275_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1275:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1280_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1280:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1290_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1290:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1325-z_firmware:7.10.1.1:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1325-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1343_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1343:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1343-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1343-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1344_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1344:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1344-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1344-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1346_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1346:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1346-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1346-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1347_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1347:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1347-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1347-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1353_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1353:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1353-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1353-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1354_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1354:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1354-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1354-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1355_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1355:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1355-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1355-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1357_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1357:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1357-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1357-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1364_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1364:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1364-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1364-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1365_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1365:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1365_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1365_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1365-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1365-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1365-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1365-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1367_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1367:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1367-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1367-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1368-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1368-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1405-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1405-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1405-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1405-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1405-le_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1405-le_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1425-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1425-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1425-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1425-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1425-le_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1425-le_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1427-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1427-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1427-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1427-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1428-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1428-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1435-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1435-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1435-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1435-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1447-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1447-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1448-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1448-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3114-i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3114-i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3114-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3114-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3115-i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3115-i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3115-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3115-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3125-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3125-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3214-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3214-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3214-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3214-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3215-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3215-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3215-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3215-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3224-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3224-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3224-lv_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3224-lv_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3224-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3224-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3224-lve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3224-lve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3224-v_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3224-v_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3224-ve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3224-ve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3225-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3225-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3225-lv_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3225-lv_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3225-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3225-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3225-lve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3225-lve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3225-v_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3225-v_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3225-ve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3225-ve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3227-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3227-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3227-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3227-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3228-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3228-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3228-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3228-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3301_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3301:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3301-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3301-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3304_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3304:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3304-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3304-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3314-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3314-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3314-zl_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3314-zl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3315-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3315-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3315-zl_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3315-zl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3343_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3343:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3343-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3343-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3343-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3343-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3344_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3344:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3344-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3344-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3344-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3344-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3346_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3346:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3346-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3346-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3346-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3346-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3353_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3353:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3354_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3354:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3363-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3363-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3363-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3363-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3364-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3364-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3364-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3364-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3364-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3364-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3364-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3364-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3365-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3365-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3365-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3365-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3367-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3367-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3367-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3367-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3374-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3374-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3374-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3374-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3375-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3375-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3375-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3375-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3375-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3375-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3375-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3375-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3384-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3384-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3384-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3384-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3705-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3705-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3706-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3706-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3707-pe_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3707-pe:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3904-r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3904-r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3904-r_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3904-r_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3905-r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3905-r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3905-r_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3905-r_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3905-re_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3905-re:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3915-r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3915-r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3915-r_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3915-r_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5414-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5414-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5415-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5415-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5512_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5512:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5512-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5512-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5514_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5514:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5514-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5514-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5515_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5515:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5515-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5515-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5522_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5522:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5522-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5522-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5532_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5532:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5532-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5532-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5534_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5534:-:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5534-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5534-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5544:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5544_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5624-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5624-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5624-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5624-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5635-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5635-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5635-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5635-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5635-ze:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5635-ze_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p7210:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p7210_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p7214_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p7214:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p7216_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p7216:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p7224_blade_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p7224_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p8513_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p8513:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p8514_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p8514:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p8524_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p8524:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1602_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1602:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1602-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1602-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1604_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1604:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1604-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1604-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1605-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1605-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1614_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1614:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1614-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1614-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1615_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1615:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1615_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1615_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1615-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1615-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1615-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1615-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1635_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1635:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1635-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1635-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1635-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1635-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1645_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1645:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1647_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1647:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1659_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1659:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1755_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1755:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1755-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1755-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1765-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1765-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1765-le_pt_mount_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1765-le_pt_mount:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1775_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1775:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1775-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1775-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1910_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1910:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1910-e_firmware:5.51.5:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1910-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1921_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1921:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1921-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1921-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1922_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1922:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1922-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1922-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1931-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1931-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1931-e_pt_mount_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1931-e_pt_mount:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1932-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1932-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1932-e_pt_mount_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1932-e_pt_mount:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1941-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1941-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1941-e_pt_mount_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1941-e_pt_mount:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1942-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1942-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1942-e_pt_mount_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1942-e_pt_mount:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q2901-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q2901-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q2901-e_pt_mount_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q2901-e_pt_mount:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3504-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3504-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3504-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3504-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3505-sve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3505-sve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3505-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3505-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3505-v_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3505-v_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3505-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3505-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3505-ve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3505-ve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3515-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3515-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3515-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3515-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3517-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3517-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3517-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3517-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3615-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3615-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3617-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3617-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3708-pve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3708-pve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3709-pve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3709-pve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6000-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6000-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6000-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6000-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6032_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6032:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6032-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6032-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6032-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6032-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6034_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6034:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6034-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6034-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6034-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6034-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6035_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6035:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6035-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6035-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6035-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6035-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6042_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6042:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6042-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6042-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6042-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6042-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6042-s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6042-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6044_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6044:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6044-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6044-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6044-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6044-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6044-s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6044-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045-c_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045-c_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045-s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045-s_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045-s_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6052_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6052:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6052-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6052-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6054_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6054:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6054_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6054_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6054-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6054-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6054-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6054-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6055_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6055:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6055-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6055-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6055-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6055-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6055-s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6055-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6114-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6114-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6115-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6115-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6124-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6124-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6125-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6125-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6128-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6128-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6155-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6155-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7401_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7401:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7404_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7404:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7406_blade_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7406_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7411_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7411:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7414_blade_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7414_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7424-r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7424-r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7424-r_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7424-r_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7436_blade_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7436_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8414-lvs_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8414-lvs:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8631-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8631-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8632-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8632-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8641-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8641-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8642-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8642-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8655-zle_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8655-zle:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8665-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8665-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8665-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8665-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8675-ze_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8675-ze:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8685-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8685-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8685-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8685-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8721-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8721-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8722-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8722-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8741-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8741-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8741-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8741-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8742-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8742-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8742-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8742-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8742-e_zoom_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8742-e_zoom:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8742-le_zoom_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8742-le_zoom:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:v5914_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:v5914:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:v5915_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:v5915:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:xf40-q1765_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:xf40-q1765:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:xf40-q2901_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:xf40-q2901:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:xf60-q2901_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:xf60-q2901:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:xp40-q1765_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:xp40-q1765:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:xp40-q1942_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:xp40-q1942:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:xp60-q1765_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:xp60-q1765:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:d201-s_xpt_q6055_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:d201-s_xpt_q6055:-:*:*:*:*:*:*:*']",0,0
CVE-2018-10659,Axis Communications,0.00641,7.5,0.0,1.0,0.0,1.0,1,2018-06-26,1.0,2018-06-30,,,0.0,There was a Memory Corruption issue discovered in multiple models of Axis IP Cameras which allows remote attackers to cause a denial of service (crash) by sending a crafted command which will result in a code path that calls the UND undefined ARM instruction.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-119'],"['cpe:2.3:o:axis:a1001_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:a1001:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:a8004-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:a8004-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:a8105-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:a8105-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:a9161_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:a9161:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:a9188_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:a9188:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:a9188-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:a9188-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:c1004-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:c1004-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:c2005_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:c2005:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:c3003-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:c3003-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:c8033_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:c8033:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_bullet_le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_bullet_le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_c360_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_c360:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_cube_l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_cube_l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_cube_lw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_cube_lw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_dome_v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_dome_v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_dome_wv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_dome_wv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_eye_l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_eye_l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_eye_lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_eye_lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_recorder_4ch_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_recorder_4ch:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_recorder_8ch_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_recorder_8ch:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:d2050-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:d2050-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:f34_main_unit_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:f34_main_unit:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:f41_main_unit_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:f41_main_unit:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:f44_dual_audio_input_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:f44_dual_audio_input:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:f44_main_unit_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:f44_main_unit:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:fa54_main_unit_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:fa54_main_unit:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1004-w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1004-w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1013_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1013:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1014_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1014:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1025_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1025:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1033-w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1033-w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1034-w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1034-w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1045-lw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1045-lw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1054_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1054:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1065-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1065-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1065-lw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1065-lw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1103_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1103:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1104_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1104:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1113_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1113:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1113-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1113-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1114_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1114:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1114-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1114-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1124_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1124:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1124-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1124-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1125_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1125:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1125-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1125-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1143-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1143-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1144-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1144-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1145_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1145:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1145-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1145-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m2014-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m2014-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m2025-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m2025-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m2026-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m2026-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m2026-le_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m2026-le_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3004-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3004-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3005-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3005-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3006-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3006-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3007-p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3007-p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3007-pv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3007-pv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3014_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3014:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3015_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3015:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3016_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3016:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3024-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3024-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3025-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3025-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3026-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3026-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3027-pve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3027-pve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3037-pve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3037-pve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3044-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3044-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3044-wv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3044-wv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3045-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3045-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3045-wv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3045-wv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3046-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3046-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3046-v_1.8mm_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3046-v_1.8mm:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3047-p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3047-p:-:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3048-p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3048-p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3104-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3104-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3104-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3104-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3105-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3105-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3105-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3105-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3106-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3106-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3106-l_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3106-l_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3106-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3106-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3106-lve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3106-lve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3113-r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3113-r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3113-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3113-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3114-r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3114-r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3114-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3114-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3203_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3203:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3203-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3203-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3204_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3204:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3204-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3204-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5013_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5013:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5013-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5013-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5014_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5014:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5014-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5014-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5054_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5054:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5055_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5055:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5065_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5065:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5525-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5525-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m7010_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m7010:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m7011_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m7011:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m7014_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m7014:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m7016_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m7016:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1125-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1125-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1125-zl_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1125-zl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1126-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1126-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1126-zl_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1126-zl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1204_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1204:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1214_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1214:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1214-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1214-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1224-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1224-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1244_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1244:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1245_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1245:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1254_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1254:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1264_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1264:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1265_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1265:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1275_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1275:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1280_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1280:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1290_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1290:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1325-z_firmware:7.10.1.1:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1325-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1343_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1343:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1343-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1343-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1344_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1344:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1344-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1344-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1346_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1346:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1346-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1346-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1347_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1347:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1347-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1347-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1353_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1353:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1353-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1353-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1354_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1354:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1354-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1354-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1355_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1355:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1355-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1355-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1357_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1357:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1357-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1357-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1364_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1364:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1364-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1364-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1365_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1365:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1365_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1365_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1365-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1365-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1365-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1365-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1367_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1367:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1367-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1367-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1368-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1368-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1405-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1405-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1405-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1405-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1405-le_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1405-le_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1425-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1425-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1425-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1425-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1425-le_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1425-le_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1427-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1427-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1427-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1427-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1428-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1428-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1435-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1435-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1435-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1435-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1447-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1447-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1448-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1448-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3114-i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3114-i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3114-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3114-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3115-i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3115-i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3115-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3115-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3125-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3125-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3214-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3214-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3214-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3214-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3215-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3215-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3215-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3215-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3224-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3224-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3224-lv_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3224-lv_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3224-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3224-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3224-lve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3224-lve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3224-v_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3224-v_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3224-ve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3224-ve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3225-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3225-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3225-lv_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3225-lv_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3225-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3225-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3225-lve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3225-lve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3225-v_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3225-v_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3225-ve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3225-ve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3227-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3227-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3227-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3227-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3228-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3228-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3228-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3228-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3301_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3301:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3301-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3301-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3304_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3304:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3304-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3304-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3314-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3314-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3314-zl_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3314-zl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3315-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3315-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3315-zl_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3315-zl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3343_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3343:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3343-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3343-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3343-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3343-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3344_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3344:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3344-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3344-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3344-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3344-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3346_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3346:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3346-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3346-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3346-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3346-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3353_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3353:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3354_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3354:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3363-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3363-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3363-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3363-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3364-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3364-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3364-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3364-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3364-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3364-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3364-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3364-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3365-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3365-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3365-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3365-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3367-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3367-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3367-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3367-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3374-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3374-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3374-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3374-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3375-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3375-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3375-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3375-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3375-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3375-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3375-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3375-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3384-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3384-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3384-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3384-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3705-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3705-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3706-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3706-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3707-pe_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3707-pe:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3904-r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3904-r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3904-r_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3904-r_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3905-r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3905-r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3905-r_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3905-r_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3905-re_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3905-re:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3915-r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3915-r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3915-r_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3915-r_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5414-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5414-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5415-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5415-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5512_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5512:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5512-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5512-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5514_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5514:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5514-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5514-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5515_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5515:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5515-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5515-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5522_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5522:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5522-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5522-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5532_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5532:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5532-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5532-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5534_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5534:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5534-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5534-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5544_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5544:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5624-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5624-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5624-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5624-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5635-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5635-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5635-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5635-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5635-ze_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5635-ze:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p7210_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p7210:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p7214_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p7214:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p7216_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p7216:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p7224_blade_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p7224_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p8513_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p8513:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p8514_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p8514:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p8524_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p8524:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1602_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1602:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1602-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1602-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1604_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1604:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1604-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1604-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1605-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1605-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1614_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1614:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1614-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1614-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1615_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1615:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1615_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1615_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1615-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1615-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1615-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1615-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1635_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1635:-:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1635-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1635-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1635-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1635-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1645:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1645_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1647:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1647_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1659:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1659_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1755:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1755_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1755-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1755-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1765-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1765-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1765-le_pt_mount_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1765-le_pt_mount:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1775_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1775:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1775-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1775-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1910_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1910:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1910-e_firmware:5.51.5:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1910-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1921_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1921:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1921-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1921-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1922_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1922:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1922-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1922-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1931-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1931-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1931-e_pt_mount_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1931-e_pt_mount:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1932-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1932-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1932-e_pt_mount_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1932-e_pt_mount:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1941-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1941-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1941-e_pt_mount_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1941-e_pt_mount:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1942-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1942-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1942-e_pt_mount_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1942-e_pt_mount:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q2901-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q2901-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q2901-e_pt_mount_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q2901-e_pt_mount:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3504-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3504-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3504-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3504-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3505-sve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3505-sve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3505-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3505-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3505-v_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3505-v_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3505-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3505-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3505-ve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3505-ve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3515-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3515-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3515-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3515-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3517-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3517-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3517-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3517-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3615-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3615-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3617-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3617-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3708-pve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3708-pve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3709-pve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3709-pve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6000-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6000-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6000-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6000-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6032_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6032:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6032-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6032-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6032-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6032-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6034_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6034:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6034-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6034-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6034-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6034-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6035_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6035:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6035-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6035-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6035-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6035-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6042_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6042:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6042-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6042-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6042-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6042-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6042-s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6042-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6044_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6044:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6044-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6044-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6044-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6044-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6044-s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6044-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045-c_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045-c_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045-s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045-s_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045-s_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6052_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6052:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6052-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6052-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6054_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6054:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6054_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6054_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6054-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6054-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6054-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6054-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6055_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6055:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6055-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6055-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6055-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6055-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6055-s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6055-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6114-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6114-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6115-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6115-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6124-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6124-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6125-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6125-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6128-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6128-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6155-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6155-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7401_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7401:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7404_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7404:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7406_blade_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7406_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7411_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7411:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7414_blade_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7414_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7424-r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7424-r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7424-r_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7424-r_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7436_blade_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7436_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8414-lvs_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8414-lvs:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8631-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8631-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8632-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8632-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8641-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8641-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8642-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8642-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8655-zle_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8655-zle:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8665-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8665-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8665-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8665-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8675-ze_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8675-ze:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8685-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8685-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8685-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8685-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8721-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8721-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8722-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8722-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8741-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8741-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8741-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8741-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8742-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8742-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8742-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8742-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8742-e_zoom_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8742-e_zoom:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8742-le_zoom_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8742-le_zoom:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:v5914_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:v5914:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:v5915_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:v5915:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:xf40-q1765_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:xf40-q1765:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:xf40-q2901_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:xf40-q2901:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:xf60-q2901_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:xf60-q2901:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:xp40-q1765_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:xp40-q1765:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:xp40-q1942_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:xp40-q1942:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:xp60-q1765_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:xp60-q1765:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:d201-s_xpt_q6055_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:d201-s_xpt_q6055:-:*:*:*:*:*:*:*']",0,0
CVE-2018-10660,Axis Communications,0.09171,9.8,1.0,1.0,0.0,1.0,1,2018-06-26,1.0,2018-06-30,,,0.0,An issue was discovered in multiple models of Axis IP Cameras. There is Shell Command Injection.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-78'],"['cpe:2.3:o:axis:a1001_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:a1001:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:a8004-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:a8004-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:a8105-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:a8105-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:a9161_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:a9161:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:a9188_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:a9188:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:a9188-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:a9188-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:c1004-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:c1004-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:c2005_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:c2005:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:c3003-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:c3003-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:c8033_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:c8033:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_bullet_le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_bullet_le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_c360_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_c360:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_cube_l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_cube_l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_cube_lw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_cube_lw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_dome_v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_dome_v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_dome_wv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_dome_wv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_eye_l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_eye_l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_eye_lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_eye_lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_recorder_4ch_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_recorder_4ch:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_recorder_8ch_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_recorder_8ch:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:d2050-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:d2050-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:f34_main_unit_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:f34_main_unit:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:f41_main_unit_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:f41_main_unit:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:f44_dual_audio_input_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:f44_dual_audio_input:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:f44_main_unit_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:f44_main_unit:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:fa54_main_unit_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:fa54_main_unit:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1004-w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1004-w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1013_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1013:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1014_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1014:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1025_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1025:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1033-w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1033-w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1034-w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1034-w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1045-lw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1045-lw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1054_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1054:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1065-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1065-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1065-lw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1065-lw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1103_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1103:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1104_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1104:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1113_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1113:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1113-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1113-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1114_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1114:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1114-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1114-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1124_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1124:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1124-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1124-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1125_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1125:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1125-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1125-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1143-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1143-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1144-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1144-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1145_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1145:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1145-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1145-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m2014-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m2014-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m2025-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m2025-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m2026-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m2026-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m2026-le_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m2026-le_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3004-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3004-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3005-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3005-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3006-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3006-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3007-p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3007-p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3007-pv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3007-pv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3014_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3014:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3015_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3015:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3016_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3016:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3024-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3024-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3025-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3025-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3026-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3026-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3027-pve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3027-pve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3037-pve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3037-pve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3044-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3044-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3044-wv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3044-wv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3045-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3045-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3045-wv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3045-wv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3046-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3046-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3046-v_1.8mm_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3046-v_1.8mm:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3047-p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3047-p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3048-p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3048-p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3104-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3104-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3104-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3104-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3105-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3105-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3105-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3105-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3106-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3106-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3106-l_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3106-l_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3106-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3106-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3106-lve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3106-lve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3113-r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3113-r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3113-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3113-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3114-r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3114-r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3114-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3114-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3203_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3203:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3203-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3203-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3204_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3204:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3204-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3204-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5013_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5013:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5013-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5013-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5014_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5014:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5014-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5014-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5054_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5054:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5055_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5055:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5065_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5065:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5525-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5525-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m7010_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m7010:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m7011_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m7011:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m7014_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m7014:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m7016_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m7016:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1125-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1125-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1125-zl_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1125-zl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1126-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1126-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1126-zl_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1126-zl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1204_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1204:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1214_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1214:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1214-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1214-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1224-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1224-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1244_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1244:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1245_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1245:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1254_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1254:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1264_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1264:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1265_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1265:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1275_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1275:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1280_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1280:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1290_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1290:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1325-z_firmware:7.10.1.1:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1325-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1343_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1343:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1343-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1343-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1344_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1344:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1344-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1344-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1346_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1346:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1346-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1346-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1347_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1347:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1347-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1347-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1353_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1353:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1353-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1353-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1354_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1354:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1354-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1354-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1355_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1355:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1355-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1355-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1357_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1357:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1357-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1357-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1364_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1364:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1364-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1364-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1365_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1365:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1365_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1365_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1365-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1365-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1365-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1365-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1367_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1367:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1367-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1367-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1368-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1368-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1405-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1405-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1405-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1405-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1405-le_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1405-le_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1425-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1425-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1425-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1425-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1425-le_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1425-le_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1427-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1427-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1427-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1427-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1428-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1428-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1435-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1435-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1435-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1435-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1447-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1447-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1448-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1448-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3114-i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3114-i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3114-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3114-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3115-i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3115-i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3115-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3115-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3125-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3125-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3214-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3214-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3214-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3214-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3215-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3215-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3215-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3215-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3224-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3224-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3224-lv_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3224-lv_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3224-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3224-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3224-lve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3224-lve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3224-v_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3224-v_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3224-ve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3224-ve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3225-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3225-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3225-lv_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3225-lv_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3225-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3225-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3225-lve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3225-lve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3225-v_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3225-v_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3225-ve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3225-ve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3227-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3227-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3227-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3227-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3228-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3228-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3228-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3228-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3301_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3301:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3301-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3301-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3304_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3304:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3304-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3304-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3314-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3314-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3314-zl_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3314-zl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3315-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3315-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3315-zl_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3315-zl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3343_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3343:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3343-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3343-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3343-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3343-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3344_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3344:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3344-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3344-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3344-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3344-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3346_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3346:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3346-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3346-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3346-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3346-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3353_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3353:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3354_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3354:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3363-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3363-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3363-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3363-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3364-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3364-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3364-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3364-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3364-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3364-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3364-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3364-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3365-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3365-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3365-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3365-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3367-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3367-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3367-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3367-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3374-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3374-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3374-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3374-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3375-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3375-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3375-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3375-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3375-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3375-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3375-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3375-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3384-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3384-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3384-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3384-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3705-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3705-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3706-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3706-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3707-pe_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3707-pe:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3904-r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3904-r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3904-r_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3904-r_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3905-r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3905-r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3905-r_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3905-r_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3905-re_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3905-re:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3915-r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3915-r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3915-r_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3915-r_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5414-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5414-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5415-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5415-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5512_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5512:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5512-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5512-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5514_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5514:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5514-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5514-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5515_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5515:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5515-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5515-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5522_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5522:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5522-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5522-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5532_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5532:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5532-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5532-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5534_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5534:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5534-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5534-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5544_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5544:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5624-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5624-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5624-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5624-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5635-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5635-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5635-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5635-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5635-ze_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5635-ze:-:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p7210:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p7210_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p7214:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p7214_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p7216:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p7216_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p7224_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p7224_blade_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p8513:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p8513_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p8514:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p8514_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p8524:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p8524_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1602:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1602_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1602-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1602-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1604_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1604:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1604-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1604-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1605-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1605-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1614_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1614:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1614-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1614-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1615_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1615:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1615_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1615_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1615-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1615-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1615-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1615-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1635_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1635:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1635-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1635-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1635-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1635-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1645_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1645:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1647_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1647:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1659_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1659:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1755_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1755:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1755-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1755-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1765-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1765-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1765-le_pt_mount_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1765-le_pt_mount:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1775_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1775:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1775-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1775-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1910_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1910:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1910-e_firmware:5.51.5:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1910-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1921_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1921:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1921-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1921-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1922_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1922:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1922-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1922-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1931-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1931-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1931-e_pt_mount_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1931-e_pt_mount:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1932-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1932-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1932-e_pt_mount_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1932-e_pt_mount:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1941-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1941-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1941-e_pt_mount_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1941-e_pt_mount:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1942-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1942-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1942-e_pt_mount_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1942-e_pt_mount:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q2901-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q2901-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q2901-e_pt_mount_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q2901-e_pt_mount:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3504-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3504-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3504-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3504-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3505-sve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3505-sve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3505-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3505-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3505-v_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3505-v_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3505-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3505-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3505-ve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3505-ve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3515-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3515-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3515-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3515-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3517-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3517-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3517-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3517-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3615-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3615-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3617-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3617-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3708-pve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3708-pve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3709-pve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3709-pve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6000-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6000-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6000-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6000-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6032_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6032:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6032-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6032-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6032-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6032-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6034_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6034:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6034-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6034-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6034-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6034-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6035_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6035:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6035-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6035-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6035-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6035-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6042_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6042:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6042-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6042-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6042-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6042-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6042-s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6042-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6044_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6044:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6044-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6044-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6044-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6044-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6044-s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6044-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045-c_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045-c_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045-s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045-s_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045-s_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6052_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6052:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6052-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6052-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6054_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6054:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6054_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6054_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6054-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6054-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6054-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6054-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6055_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6055:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6055-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6055-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6055-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6055-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6055-s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6055-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6114-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6114-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6115-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6115-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6124-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6124-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6125-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6125-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6128-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6128-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6155-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6155-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7401_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7401:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7404_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7404:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7406_blade_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7406_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7411_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7411:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7414_blade_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7414_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7424-r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7424-r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7424-r_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7424-r_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7436_blade_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7436_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8414-lvs_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8414-lvs:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8631-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8631-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8632-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8632-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8641-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8641-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8642-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8642-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8655-zle_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8655-zle:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8665-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8665-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8665-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8665-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8675-ze_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8675-ze:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8685-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8685-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8685-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8685-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8721-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8721-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8722-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8722-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8741-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8741-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8741-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8741-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8742-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8742-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8742-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8742-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8742-e_zoom_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8742-e_zoom:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8742-le_zoom_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8742-le_zoom:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:v5914_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:v5914:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:v5915_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:v5915:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:xf40-q1765_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:xf40-q1765:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:xf40-q2901_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:xf40-q2901:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:xf60-q2901_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:xf60-q2901:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:xp40-q1765_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:xp40-q1765:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:xp40-q1942_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:xp40-q1942:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:xp60-q1765_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:xp60-q1765:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:d201-s_xpt_q6055_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:d201-s_xpt_q6055:-:*:*:*:*:*:*:*']",1,1
CVE-2018-10661,Axis Communications,0.1054,9.8,1.0,1.0,0.0,1.0,1,2018-06-26,1.0,2018-06-30,,,0.0,An issue was discovered in multiple models of Axis IP Cameras. There is a bypass of access control.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:axis:a1001_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:a1001:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:a8004-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:a8004-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:a8105-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:a8105-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:a9161_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:a9161:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:a9188_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:a9188:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:a9188-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:a9188-v:-:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:c1004-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:c1004-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:c2005:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:c2005_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:c3003-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:c3003-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:c8033:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:c8033_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_bullet_le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_bullet_le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_c360:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_c360_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_cube_l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_cube_l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_cube_lw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_cube_lw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_dome_v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_dome_v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_dome_wv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_dome_wv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_eye_l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_eye_l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_eye_lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_eye_lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_recorder_4ch_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_recorder_4ch:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_recorder_8ch_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_recorder_8ch:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:d2050-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:d2050-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:f34_main_unit_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:f34_main_unit:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:f41_main_unit_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:f41_main_unit:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:f44_dual_audio_input_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:f44_dual_audio_input:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:f44_main_unit_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:f44_main_unit:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:fa54_main_unit_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:fa54_main_unit:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1004-w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1004-w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1013_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1013:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1014_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1014:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1025_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1025:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1033-w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1033-w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1034-w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1034-w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1045-lw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1045-lw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1054_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1054:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1065-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1065-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1065-lw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1065-lw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1103_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1103:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1104_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1104:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1113_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1113:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1113-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1113-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1114_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1114:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1114-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1114-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1124_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1124:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1124-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1124-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1125_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1125:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1125-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1125-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1143-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1143-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1144-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1144-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1145_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1145:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1145-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1145-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m2014-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m2014-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m2025-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m2025-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m2026-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m2026-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m2026-le_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m2026-le_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3004-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3004-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3005-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3005-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3006-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3006-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3007-p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3007-p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3007-pv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3007-pv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3014_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3014:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3015_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3015:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3016_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3016:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3024-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3024-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3025-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3025-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3026-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3026-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3027-pve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3027-pve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3037-pve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3037-pve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3044-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3044-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3044-wv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3044-wv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3045-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3045-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3045-wv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3045-wv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3046-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3046-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3046-v_1.8mm_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3046-v_1.8mm:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3047-p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3047-p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3048-p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3048-p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3104-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3104-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3104-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3104-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3105-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3105-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3105-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3105-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3106-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3106-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3106-l_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3106-l_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3106-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3106-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3106-lve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3106-lve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3113-r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3113-r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3113-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3113-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3114-r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3114-r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3114-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3114-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3203_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3203:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3203-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3203-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3204_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3204:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3204-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3204-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5013_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5013:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5013-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5013-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5014_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5014:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5014-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5014-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5054_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5054:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5055_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5055:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5065_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5065:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5525-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5525-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m7010_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m7010:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m7011_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m7011:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m7014_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m7014:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m7016_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m7016:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1125-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1125-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1125-zl_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1125-zl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1126-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1126-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1126-zl_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1126-zl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1204_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1204:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1214_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1214:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1214-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1214-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1224-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1224-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1244_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1244:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1245_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1245:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1254_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1254:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1264_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1264:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1265_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1265:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1275_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1275:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1280_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1280:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1290_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1290:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1325-z_firmware:7.10.1.1:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1325-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1343_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1343:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1343-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1343-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1344_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1344:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1344-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1344-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1346_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1346:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1346-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1346-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1347_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1347:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1347-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1347-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1353_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1353:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1353-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1353-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1354_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1354:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1354-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1354-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1355_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1355:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1355-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1355-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1357_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1357:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1357-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1357-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1364_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1364:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1364-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1364-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1365_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1365:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1365_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1365_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1365-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1365-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1365-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1365-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1367_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1367:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1367-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1367-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1368-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1368-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1405-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1405-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1405-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1405-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1405-le_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1405-le_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1425-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1425-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1425-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1425-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1425-le_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1425-le_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1427-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1427-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1427-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1427-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1428-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1428-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1435-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1435-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1435-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1435-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1447-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1447-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1448-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1448-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3114-i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3114-i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3114-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3114-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3115-i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3115-i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3115-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3115-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3125-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3125-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3214-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3214-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3214-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3214-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3215-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3215-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3215-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3215-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3224-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3224-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3224-lv_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3224-lv_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3224-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3224-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3224-lve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3224-lve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3224-v_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3224-v_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3224-ve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3224-ve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3225-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3225-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3225-lv_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3225-lv_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3225-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3225-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3225-lve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3225-lve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3225-v_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3225-v_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3225-ve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3225-ve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3227-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3227-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3227-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3227-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3228-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3228-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3228-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3228-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3301_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3301:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3301-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3301-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3304_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3304:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3304-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3304-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3314-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3314-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3314-zl_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3314-zl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3315-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3315-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3315-zl_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3315-zl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3343_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3343:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3343-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3343-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3343-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3343-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3344_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3344:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3344-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3344-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3344-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3344-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3346_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3346:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3346-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3346-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3346-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3346-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3353_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3353:-:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3354:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3354_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3363-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3363-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3363-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3363-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3364-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3364-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3364-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3364-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3364-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3364-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3364-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3364-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3365-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3365-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3365-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3365-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3367-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3367-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3367-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3367-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3374-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3374-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3374-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3374-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3375-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3375-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3375-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3375-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3375-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3375-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3375-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3375-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3384-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3384-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3384-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3384-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3705-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3705-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3706-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3706-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3707-pe_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3707-pe:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3904-r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3904-r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3904-r_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3904-r_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3905-r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3905-r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3905-r_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3905-r_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3905-re_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3905-re:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3915-r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3915-r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3915-r_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3915-r_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5414-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5414-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5415-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5415-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5512_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5512:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5512-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5512-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5514_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5514:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5514-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5514-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5515_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5515:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5515-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5515-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5522_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5522:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5522-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5522-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5532_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5532:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5532-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5532-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5534_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5534:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5534-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5534-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5544_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5544:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5624-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5624-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5624-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5624-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5635-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5635-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5635-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5635-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5635-ze_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5635-ze:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p7210_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p7210:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p7214_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p7214:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p7216_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p7216:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p7224_blade_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p7224_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p8513_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p8513:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p8514_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p8514:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p8524_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p8524:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1602_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1602:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1602-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1602-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1604_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1604:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1604-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1604-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1605-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1605-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1614_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1614:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1614-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1614-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1615_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1615:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1615_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1615_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1615-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1615-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1615-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1615-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1635_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1635:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1635-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1635-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1635-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1635-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1645_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1645:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1647_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1647:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1659_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1659:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1755_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1755:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1755-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1755-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1765-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1765-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1765-le_pt_mount_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1765-le_pt_mount:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1775_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1775:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1775-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1775-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1910_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1910:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1910-e_firmware:5.51.5:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1910-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1921_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1921:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1921-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1921-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1922_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1922:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1922-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1922-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1931-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1931-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1931-e_pt_mount_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1931-e_pt_mount:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1932-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1932-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1932-e_pt_mount_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1932-e_pt_mount:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1941-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1941-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1941-e_pt_mount_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1941-e_pt_mount:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1942-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1942-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1942-e_pt_mount_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1942-e_pt_mount:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q2901-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q2901-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q2901-e_pt_mount_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q2901-e_pt_mount:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3504-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3504-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3504-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3504-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3505-sve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3505-sve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3505-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3505-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3505-v_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3505-v_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3505-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3505-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3505-ve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3505-ve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3515-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3515-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3515-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3515-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3517-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3517-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3517-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3517-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3615-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3615-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3617-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3617-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3708-pve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3708-pve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3709-pve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3709-pve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6000-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6000-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6000-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6000-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6032_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6032:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6032-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6032-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6032-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6032-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6034_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6034:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6034-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6034-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6034-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6034-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6035_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6035:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6035-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6035-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6035-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6035-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6042_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6042:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6042-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6042-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6042-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6042-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6042-s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6042-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6044_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6044:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6044-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6044-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6044-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6044-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6044-s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6044-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045-c_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045-c_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045-s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045-s_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045-s_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6052_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6052:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6052-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6052-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6054_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6054:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6054_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6054_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6054-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6054-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6054-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6054-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6055_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6055:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6055-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6055-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6055-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6055-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6055-s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6055-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6114-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6114-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6115-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6115-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6124-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6124-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6125-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6125-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6128-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6128-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6155-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6155-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7401_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7401:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7404_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7404:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7406_blade_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7406_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7411_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7411:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7414_blade_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7414_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7424-r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7424-r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7424-r_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7424-r_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7436_blade_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7436_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8414-lvs_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8414-lvs:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8631-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8631-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8632-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8632-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8641-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8641-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8642-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8642-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8655-zle_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8655-zle:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8665-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8665-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8665-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8665-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8675-ze_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8675-ze:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8685-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8685-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8685-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8685-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8721-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8721-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8722-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8722-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8741-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8741-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8741-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8741-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8742-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8742-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8742-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8742-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8742-e_zoom_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8742-e_zoom:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8742-le_zoom_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8742-le_zoom:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:v5914_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:v5914:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:v5915_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:v5915:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:xf40-q1765_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:xf40-q1765:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:xf40-q2901_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:xf40-q2901:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:xf60-q2901_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:xf60-q2901:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:xp40-q1765_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:xp40-q1765:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:xp40-q1942_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:xp40-q1942:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:xp60-q1765_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:xp60-q1765:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:d201-s_xpt_q6055_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:d201-s_xpt_q6055:-:*:*:*:*:*:*:*']",1,1
CVE-2018-10662,Axis Communications,0.08987,9.8,1.0,1.0,0.0,1.0,1,2018-06-26,1.0,2018-06-30,,,0.0,An issue was discovered in multiple models of Axis IP Cameras. There is an Exposed Insecure Interface.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:axis:a1001_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:a1001:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:a8004-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:a8004-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:a8105-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:a8105-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:a9161_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:a9161:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:a9188_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:a9188:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:a9188-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:a9188-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:c1004-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:c1004-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:c2005_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:c2005:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:c3003-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:c3003-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:c8033_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:c8033:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_bullet_le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_bullet_le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_c360_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_c360:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_cube_l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_cube_l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_cube_lw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_cube_lw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_dome_v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_dome_v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_dome_wv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_dome_wv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_eye_l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_eye_l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_eye_lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_eye_lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_recorder_4ch_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_recorder_4ch:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_recorder_8ch_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_recorder_8ch:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:d2050-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:d2050-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:f34_main_unit_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:f34_main_unit:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:f41_main_unit_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:f41_main_unit:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:f44_dual_audio_input_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:f44_dual_audio_input:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:f44_main_unit_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:f44_main_unit:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:fa54_main_unit_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:fa54_main_unit:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1004-w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1004-w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1013_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1013:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1014_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1014:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1025_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1025:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1033-w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1033-w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1034-w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1034-w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1045-lw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1045-lw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1054_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1054:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1065-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1065-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1065-lw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1065-lw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1103_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1103:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1104_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1104:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1113_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1113:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1113-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1113-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1114_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1114:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1114-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1114-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1124_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1124:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1124-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1124-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1125_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1125:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1125-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1125-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1143-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1143-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1144-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1144-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1145_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1145:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1145-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1145-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m2014-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m2014-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m2025-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m2025-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m2026-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m2026-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m2026-le_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m2026-le_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3004-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3004-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3005-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3005-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3006-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3006-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3007-p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3007-p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3007-pv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3007-pv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3014_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3014:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3015_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3015:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3016_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3016:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3024-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3024-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3025-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3025-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3026-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3026-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3027-pve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3027-pve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3037-pve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3037-pve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3044-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3044-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3044-wv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3044-wv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3045-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3045-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3045-wv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3045-wv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3046-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3046-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3046-v_1.8mm_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3046-v_1.8mm:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3047-p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3047-p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3048-p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3048-p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3104-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3104-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3104-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3104-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3105-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3105-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3105-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3105-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3106-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3106-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3106-l_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3106-l_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3106-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3106-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3106-lve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3106-lve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3113-r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3113-r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3113-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3113-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3114-r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3114-r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3114-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3114-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3203_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3203:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3203-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3203-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3204_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3204:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3204-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3204-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5013_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5013:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5013-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5013-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5014_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5014:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5014-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5014-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5054_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5054:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5055_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5055:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5065_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5065:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5525-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5525-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m7010_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m7010:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m7011_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m7011:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m7014_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m7014:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m7016_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m7016:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1125-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1125-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1125-zl_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1125-zl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1126-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1126-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1126-zl_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1126-zl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1204_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1204:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1214_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1214:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1214-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1214-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1224-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1224-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1244_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1244:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1245_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1245:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1254_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1254:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1264_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1264:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1265_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1265:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1275_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1275:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1280_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1280:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1290_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1290:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1325-z_firmware:7.10.1.1:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1325-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1343_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1343:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1343-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1343-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1344_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1344:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1344-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1344-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1346_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1346:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1346-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1346-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1347_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1347:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1347-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1347-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1353_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1353:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1353-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1353-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1354_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1354:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1354-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1354-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1355_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1355:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1355-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1355-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1357_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1357:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1357-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1357-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1364_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1364:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1364-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1364-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1365_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1365:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1365_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1365_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1365-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1365-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1365-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1365-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1367_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1367:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1367-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1367-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1368-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1368-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1405-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1405-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1405-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1405-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1405-le_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1405-le_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1425-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1425-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1425-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1425-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1425-le_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1425-le_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1427-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1427-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1427-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1427-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1428-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1428-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1435-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1435-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1435-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1435-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1447-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1447-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1448-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1448-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3114-i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3114-i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3114-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3114-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3115-i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3115-i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3115-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3115-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3125-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3125-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3214-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3214-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3214-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3214-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3215-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3215-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3215-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3215-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3224-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3224-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3224-lv_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3224-lv_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3224-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3224-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3224-lve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3224-lve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3224-v_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3224-v_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3224-ve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3224-ve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3225-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3225-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3225-lv_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3225-lv_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3225-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3225-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3225-lve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3225-lve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3225-v_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3225-v_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3225-ve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3225-ve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3227-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3227-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3227-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3227-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3228-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3228-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3228-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3228-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3301_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3301:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3301-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3301-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3304_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3304:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3304-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3304-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3314-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3314-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3314-zl_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3314-zl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3315-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3315-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3315-zl_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3315-zl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3343_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3343:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3343-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3343-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3343-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3343-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3344_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3344:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3344-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3344-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3344-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3344-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3346_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3346:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3346-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3346-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3346-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3346-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3353_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3353:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3354_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3354:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3363-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3363-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3363-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3363-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3364-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3364-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3364-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3364-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3364-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3364-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3364-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3364-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3365-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3365-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3365-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3365-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3367-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3367-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3367-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3367-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3374-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3374-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3374-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3374-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3375-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3375-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3375-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3375-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3375-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3375-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3375-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3375-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3384-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3384-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3384-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3384-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3705-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3705-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3706-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3706-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3707-pe_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3707-pe:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3904-r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3904-r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3904-r_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3904-r_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3905-r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3905-r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3905-r_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3905-r_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3905-re_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3905-re:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3915-r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3915-r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3915-r_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3915-r_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5414-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5414-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5415-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5415-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5512_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5512:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5512-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5512-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5514_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5514:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5514-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5514-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5515_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5515:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5515-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5515-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5522_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5522:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5522-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5522-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5532_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5532:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5532-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5532-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5534_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5534:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5534-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5534-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5544_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5544:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5624-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5624-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5624-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5624-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5635-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5635-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5635-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5635-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5635-ze_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5635-ze:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p7210_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p7210:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p7214_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p7214:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p7216_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p7216:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p7224_blade_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p7224_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p8513_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p8513:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p8514_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p8514:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p8524_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p8524:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1602_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1602:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1602-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1602-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1604_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1604:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1604-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1604-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1605-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1605-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1614_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1614:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1614-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1614-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1615_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1615:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1615_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1615_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1615-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1615-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1615-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1615-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1635_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1635:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1635-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1635-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1635-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1635-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1645_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1645:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1647_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1647:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1659_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1659:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1755_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1755:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1755-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1755-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1765-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1765-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1765-le_pt_mount_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1765-le_pt_mount:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1775_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1775:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1775-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1775-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1910_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1910:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1910-e_firmware:5.51.5:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1910-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1921_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1921:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1921-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1921-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1922_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1922:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1922-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1922-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1931-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1931-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1931-e_pt_mount_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1931-e_pt_mount:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1932-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1932-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1932-e_pt_mount_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1932-e_pt_mount:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1941-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1941-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1941-e_pt_mount_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1941-e_pt_mount:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1942-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1942-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1942-e_pt_mount_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1942-e_pt_mount:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q2901-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q2901-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q2901-e_pt_mount_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q2901-e_pt_mount:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3504-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3504-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3504-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3504-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3505-sve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3505-sve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3505-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3505-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3505-v_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3505-v_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3505-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3505-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3505-ve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3505-ve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3515-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3515-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3515-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3515-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3517-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3517-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3517-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3517-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3615-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3615-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3617-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3617-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3708-pve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3708-pve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3709-pve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3709-pve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6000-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6000-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6000-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6000-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6032_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6032:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6032-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6032-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6032-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6032-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6034_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6034:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6034-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6034-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6034-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6034-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6035_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6035:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6035-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6035-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6035-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6035-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6042_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6042:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6042-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6042-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6042-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6042-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6042-s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6042-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6044_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6044:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6044-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6044-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6044-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6044-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6044-s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6044-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045-c_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045-c_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045-s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045-s_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045-s_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6052_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6052:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6052-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6052-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6054_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6054:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6054_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6054_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6054-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6054-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6054-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6054-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6055_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6055:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6055-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6055-c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6055-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6055-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6055-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6055-s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6114-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6114-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6115-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6115-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6124-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6124-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6125-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6125-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6128-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6128-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6155-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6155-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7401_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7401:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7404_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7404:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7406_blade_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7406_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7411_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7411:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7414_blade_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7414_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7424-r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7424-r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7424-r_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7424-r_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7436_blade_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7436_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8414-lvs_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8414-lvs:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8631-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8631-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8632-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8632-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8641-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8641-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8642-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8642-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8655-zle_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8655-zle:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8665-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8665-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8665-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8665-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8675-ze_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8675-ze:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8685-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8685-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8685-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8685-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8721-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8721-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8722-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8722-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8741-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8741-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8741-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8741-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8742-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8742-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8742-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8742-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8742-e_zoom_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8742-e_zoom:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8742-le_zoom_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8742-le_zoom:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:v5914_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:v5914:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:v5915_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:v5915:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:xf40-q1765_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:xf40-q1765:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:xf40-q2901_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:xf40-q2901:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:xf60-q2901_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:xf60-q2901:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:xp40-q1765_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:xp40-q1765:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:xp40-q1942_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:xp40-q1942:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:xp60-q1765_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:xp60-q1765:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:d201-s_xpt_q6055_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:d201-s_xpt_q6055:-:*:*:*:*:*:*:*']",1,1
CVE-2018-10663,Axis Communications,0.00366,7.5,0.0,1.0,0.0,1.0,1,2018-06-26,1.0,2018-06-30,,,0.0,An issue was discovered in multiple models of Axis IP Cameras. There is an Incorrect Size Calculation.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-200'],"['cpe:2.3:o:axis:a1001_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:a1001:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:a8004-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:a8004-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:a8105-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:a8105-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:a9161_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:a9161:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:a9188_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:a9188:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:a9188-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:a9188-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:c1004-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:c1004-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:c2005_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:c2005:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:c3003-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:c3003-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:c8033_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:c8033:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_bullet_le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_bullet_le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_c360_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_c360:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_cube_l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_cube_l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_cube_lw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_cube_lw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_dome_v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_dome_v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_dome_wv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_dome_wv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_eye_l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_eye_l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_eye_lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_eye_lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_recorder_4ch_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_recorder_4ch:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_recorder_8ch_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_recorder_8ch:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:d2050-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:d2050-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:f34_main_unit_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:f34_main_unit:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:f41_main_unit_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:f41_main_unit:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:f44_dual_audio_input_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:f44_dual_audio_input:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:f44_main_unit_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:f44_main_unit:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:fa54_main_unit_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:fa54_main_unit:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1004-w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1004-w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1013_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1013:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1014_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1014:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1025_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1025:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1033-w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1033-w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1034-w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1034-w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1045-lw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1045-lw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1054_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1054:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1065-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1065-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1065-lw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1065-lw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1103_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1103:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1104_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1104:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1113_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1113:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1113-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1113-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1114_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1114:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1114-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1114-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1124_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1124:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1124-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1124-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1125_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1125:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1125-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1125-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1143-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1143-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1144-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1144-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1145_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1145:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1145-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1145-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m2014-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m2014-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m2025-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m2025-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m2026-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m2026-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m2026-le_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m2026-le_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3004-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3004-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3005-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3005-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3006-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3006-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3007-p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3007-p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3007-pv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3007-pv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3014_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3014:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3015_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3015:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3016_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3016:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3024-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3024-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3025-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3025-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3026-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3026-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3027-pve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3027-pve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3037-pve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3037-pve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3044-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3044-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3044-wv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3044-wv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3045-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3045-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3045-wv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3045-wv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3046-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3046-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3046-v_1.8mm_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3046-v_1.8mm:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3047-p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3047-p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3048-p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3048-p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3104-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3104-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3104-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3104-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3105-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3105-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3105-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3105-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3106-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3106-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3106-l_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3106-l_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3106-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3106-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3106-lve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3106-lve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3113-r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3113-r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3113-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3113-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3114-r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3114-r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3114-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3114-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3203_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3203:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3203-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3203-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3204_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3204:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3204-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3204-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5013_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5013:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5013-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5013-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5014_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5014:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5014-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5014-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5054_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5054:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5055_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5055:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5065_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5065:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5525-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5525-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m7010_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m7010:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m7011_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m7011:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m7014_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m7014:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m7016_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m7016:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1125-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1125-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1125-zl_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1125-zl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1126-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1126-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1126-zl_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1126-zl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1204_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1204:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1214_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1214:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1214-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1214-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1224-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1224-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1244_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1244:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1245_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1245:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1254_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1254:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1264_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1264:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1265_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1265:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1275_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1275:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1280_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1280:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1290_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1290:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1325-z_firmware:7.10.1.1:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1325-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1343_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1343:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1343-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1343-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1344_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1344:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1344-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1344-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1346_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1346:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1346-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1346-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1347_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1347:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1347-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1347-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1353_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1353:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1353-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1353-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1354_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1354:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1354-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1354-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1355_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1355:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1355-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1355-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1357_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1357:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1357-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1357-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1364_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1364:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1364-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1364-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1365_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1365:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1365_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1365_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1365-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1365-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1365-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1365-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1367_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1367:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1367-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1367-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1368-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1368-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1405-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1405-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1405-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1405-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1405-le_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1405-le_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1425-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1425-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1425-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1425-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1425-le_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1425-le_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1427-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1427-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1427-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1427-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1428-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1428-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1435-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1435-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1435-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1435-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1447-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1447-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1448-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1448-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3114-i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3114-i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3114-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3114-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3115-i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3115-i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3115-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3115-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3125-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3125-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3214-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3214-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3214-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3214-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3215-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3215-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3215-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3215-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3224-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3224-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3224-lv_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3224-lv_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3224-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3224-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3224-lve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3224-lve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3224-v_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3224-v_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3224-ve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3224-ve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3225-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3225-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3225-lv_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3225-lv_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3225-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3225-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3225-lve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3225-lve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3225-v_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3225-v_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3225-ve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3225-ve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3227-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3227-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3227-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3227-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3228-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3228-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3228-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3228-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3301_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3301:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3301-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3301-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3304_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3304:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3304-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3304-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3314-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3314-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3314-zl_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3314-zl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3315-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3315-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3315-zl_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3315-zl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3343_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3343:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3343-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3343-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3343-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3343-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3344_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3344:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3344-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3344-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3344-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3344-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3346_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3346:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3346-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3346-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3346-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3346-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3353_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3353:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3354_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3354:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3363-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3363-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3363-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3363-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3364-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3364-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3364-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3364-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3364-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3364-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3364-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3364-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3365-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3365-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3365-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3365-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3367-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3367-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3367-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3367-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3374-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3374-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3374-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3374-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3375-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3375-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3375-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3375-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3375-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3375-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3375-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3375-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3384-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3384-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3384-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3384-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3705-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3705-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3706-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3706-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3707-pe_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3707-pe:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3904-r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3904-r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3904-r_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3904-r_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3905-r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3905-r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3905-r_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3905-r_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3905-re_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3905-re:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3915-r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3915-r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3915-r_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3915-r_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5414-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5414-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5415-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5415-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5512_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5512:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5512-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5512-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5514_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5514:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5514-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5514-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5515_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5515:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5515-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5515-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5522_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5522:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5522-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5522-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5532_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5532:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5532-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5532-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5534_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5534:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5534-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5534-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5544_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5544:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5624-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5624-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5624-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5624-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5635-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5635-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5635-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5635-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5635-ze_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5635-ze:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p7210_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p7210:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p7214_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p7214:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p7216_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p7216:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p7224_blade_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p7224_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p8513_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p8513:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p8514_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p8514:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p8524_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p8524:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1602_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1602:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1602-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1602-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1604_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1604:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1604-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1604-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1605-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1605-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1614_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1614:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1614-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1614-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1615_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1615:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1615_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1615_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1615-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1615-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1615-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1615-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1635_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1635:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1635-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1635-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1635-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1635-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1645_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1645:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1647_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1647:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1659_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1659:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1755_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1755:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1755-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1755-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1765-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1765-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1765-le_pt_mount_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1765-le_pt_mount:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1775_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1775:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1775-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1775-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1910_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1910:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1910-e_firmware:5.51.5:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1910-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1921_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1921:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1921-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1921-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1922_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1922:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1922-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1922-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1931-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1931-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1931-e_pt_mount_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1931-e_pt_mount:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1932-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1932-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1932-e_pt_mount_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1932-e_pt_mount:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1941-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1941-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1941-e_pt_mount_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1941-e_pt_mount:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1942-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1942-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1942-e_pt_mount_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1942-e_pt_mount:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q2901-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q2901-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q2901-e_pt_mount_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q2901-e_pt_mount:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3504-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3504-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3504-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3504-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3505-sve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3505-sve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3505-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3505-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3505-v_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3505-v_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3505-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3505-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3505-ve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3505-ve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3515-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3515-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3515-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3515-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3517-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3517-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3517-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3517-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3615-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3615-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3617-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3617-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3708-pve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3708-pve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3709-pve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3709-pve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6000-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6000-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6000-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6000-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6032_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6032:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6032-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6032-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6032-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6032-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6034_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6034:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6034-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6034-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6034-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6034-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6035_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6035:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6035-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6035-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6035-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6035-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6042_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6042:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6042-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6042-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6042-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6042-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6042-s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6042-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6044_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6044:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6044-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6044-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6044-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6044-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6044-s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6044-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045-c_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045-c_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045-s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045-s_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045-s_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6052_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6052:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6052-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6052-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6054_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6054:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6054_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6054_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6054-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6054-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6054-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6054-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6055_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6055:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6055-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6055-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6055-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6055-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6055-s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6055-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6114-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6114-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6115-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6115-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6124-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6124-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6125-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6125-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6128-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6128-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6155-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6155-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7401_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7401:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7404_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7404:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7406_blade_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7406_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7411_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7411:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7414_blade_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7414_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7424-r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7424-r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7424-r_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7424-r_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7436_blade_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7436_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8414-lvs_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8414-lvs:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8631-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8631-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8632-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8632-e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8641-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8641-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8642-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8642-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8655-zle:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8655-zle_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8665-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8665-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8665-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8665-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8675-ze:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8675-ze_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8685-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8685-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8685-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8685-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8721-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8721-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8722-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8722-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8741-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8741-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8741-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8741-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8742-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8742-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8742-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8742-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8742-e_zoom_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8742-e_zoom:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8742-le_zoom_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8742-le_zoom:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:v5914_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:v5914:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:v5915_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:v5915:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:xf40-q1765_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:xf40-q1765:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:xf40-q2901_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:xf40-q2901:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:xf60-q2901_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:xf60-q2901:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:xp40-q1765_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:xp40-q1765:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:xp40-q1942_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:xp40-q1942:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:xp60-q1765_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:xp60-q1765:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:d201-s_xpt_q6055_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:d201-s_xpt_q6055:-:*:*:*:*:*:*:*']",0,0
CVE-2018-10664,Axis Communications,0.013,7.5,0.0,1.0,0.0,1.0,1,2018-06-26,1.0,2018-06-30,,,0.0,An issue was discovered in the httpd process in multiple models of Axis IP Cameras. There is Memory Corruption.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-119'],"['cpe:2.3:o:axis:a1001_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:a1001:-:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:a8004-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:a8004-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:a8105-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:a8105-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:a9161:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:a9161_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:a9188:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:a9188_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:a9188-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:a9188-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:c1004-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:c1004-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:c2005:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:c2005_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:c3003-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:c3003-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:c8033_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:c8033:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_bullet_le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_bullet_le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_c360_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_c360:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_cube_l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_cube_l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_cube_lw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_cube_lw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_dome_v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_dome_v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_dome_wv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_dome_wv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_eye_l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_eye_l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_eye_lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_eye_lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_recorder_4ch_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_recorder_4ch:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:companion_recorder_8ch_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:companion_recorder_8ch:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:d2050-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:d2050-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:f34_main_unit_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:f34_main_unit:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:f41_main_unit_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:f41_main_unit:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:f44_dual_audio_input_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:f44_dual_audio_input:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:f44_main_unit_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:f44_main_unit:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:fa54_main_unit_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:fa54_main_unit:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1004-w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1004-w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1013_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1013:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1014_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1014:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1025_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1025:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1033-w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1033-w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1034-w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1034-w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1045-lw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1045-lw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1054_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1054:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1065-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1065-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1065-lw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1065-lw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1103_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1103:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1104_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1104:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1113_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1113:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1113-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1113-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1114_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1114:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1114-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1114-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1124_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1124:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1124-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1124-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1125_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1125:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1125-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1125-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1143-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1143-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1144-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1144-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1145_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1145:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m1145-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m1145-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m2014-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m2014-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m2025-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m2025-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m2026-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m2026-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m2026-le_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m2026-le_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3004-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3004-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3005-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3005-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3006-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3006-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3007-p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3007-p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3007-pv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3007-pv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3014_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3014:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3015_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3015:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3016_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3016:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3024-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3024-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3025-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3025-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3026-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3026-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3027-pve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3027-pve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3037-pve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3037-pve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3044-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3044-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3044-wv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3044-wv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3045-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3045-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3045-wv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3045-wv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3046-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3046-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3046-v_1.8mm_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3046-v_1.8mm:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3047-p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3047-p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3048-p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3048-p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3104-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3104-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3104-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3104-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3105-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3105-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3105-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3105-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3106-l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3106-l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3106-l_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3106-l_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3106-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3106-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3106-lve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3106-lve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3113-r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3113-r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3113-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3113-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3114-r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3114-r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3114-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3114-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3203_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3203:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3203-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3203-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3204_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3204:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m3204-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m3204-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5013_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5013:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5013-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5013-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5014_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5014:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5014-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5014-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5054_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5054:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5055_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5055:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5065_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5065:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m5525-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m5525-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m7010_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m7010:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m7011_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m7011:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m7014_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m7014:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:m7016_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:m7016:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1125-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1125-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1125-zl_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1125-zl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1126-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1126-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1126-zl_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1126-zl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1204_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1204:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1214_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1214:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1214-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1214-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1224-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1224-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1244_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1244:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1245_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1245:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1254_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1254:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1264_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1264:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1265_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1265:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1275_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1275:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1280_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1280:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1290_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1290:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1325-z_firmware:7.10.1.1:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1325-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1343_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1343:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1343-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1343-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1344_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1344:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1344-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1344-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1346_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1346:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1346-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1346-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1347_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1347:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1347-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1347-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1353_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1353:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1353-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1353-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1354_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1354:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1354-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1354-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1355_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1355:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1355-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1355-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1357_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1357:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1357-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1357-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1364_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1364:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1364-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1364-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1365_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1365:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1365_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1365_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1365-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1365-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1365-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1365-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1367_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1367:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1367-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1367-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1368-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1368-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1405-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1405-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1405-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1405-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1405-le_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1405-le_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1425-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1425-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1425-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1425-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1425-le_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1425-le_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1427-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1427-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1427-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1427-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1428-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1428-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1435-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1435-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1435-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1435-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1447-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1447-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p1448-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p1448-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3114-i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3114-i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3114-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3114-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3115-i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3115-i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3115-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3115-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3125-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3125-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3214-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3214-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3214-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3214-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3215-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3215-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3215-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3215-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3224-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3224-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3224-lv_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3224-lv_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3224-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3224-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3224-lve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3224-lve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3224-v_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3224-v_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3224-ve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3224-ve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3225-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3225-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3225-lv_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3225-lv_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3225-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3225-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3225-lve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3225-lve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3225-v_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3225-v_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3225-ve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3225-ve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3227-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3227-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3227-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3227-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3228-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3228-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3228-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3228-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3301_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3301:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3301-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3301-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3304_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3304:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3304-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3304-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3314-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3314-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3314-zl_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3314-zl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3315-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3315-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3315-zl_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3315-zl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3343_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3343:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3343-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3343-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3343-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3343-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3344_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3344:-:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3344-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3344-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3344-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3344-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3346:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3346_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3346-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3346-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3346-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3346-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3353:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3353_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3354:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3354_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3363-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3363-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3363-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3363-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3364-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3364-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3364-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3364-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3364-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3364-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3364-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3364-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3365-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3365-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3365-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3365-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3367-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3367-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3367-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3367-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3374-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3374-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3374-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3374-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3375-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3375-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3375-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3375-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3375-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3375-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3375-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3375-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3384-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3384-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3384-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3384-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3705-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3705-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3706-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3706-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3707-pe_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3707-pe:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3904-r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3904-r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3904-r_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3904-r_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3905-r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3905-r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3905-r_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3905-r_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3905-re_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3905-re:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3915-r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3915-r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p3915-r_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p3915-r_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5414-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5414-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5415-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5415-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5512_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5512:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5512-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5512-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5514_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5514:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5514-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5514-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5515_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5515:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5515-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5515-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5522_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5522:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5522-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5522-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5532_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5532:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5532-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5532-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5534_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5534:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5534-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5534-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5544_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5544:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5624-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5624-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5624-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5624-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5635-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5635-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5635-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5635-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p5635-ze_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p5635-ze:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p7210_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p7210:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p7214_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p7214:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p7216_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p7216:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p7224_blade_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p7224_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p8513_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p8513:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p8514_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p8514:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:p8524_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:p8524:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1602_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1602:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1602-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1602-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1604_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1604:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1604-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1604-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1605-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1605-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1614_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1614:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1614-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1614-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1615_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1615:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1615_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1615_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1615-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1615-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1615-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1615-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1635_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1635:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1635-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1635-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1635-z_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1635-z:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1645_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1645:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1647_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1647:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1659_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1659:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1755_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1755:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1755-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1755-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1765-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1765-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1765-le_pt_mount_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1765-le_pt_mount:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1775_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1775:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1775-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1775-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1910_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1910:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1910-e_firmware:5.51.5:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1910-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1921_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1921:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1921-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1921-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1922_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1922:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1922-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1922-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1931-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1931-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1931-e_pt_mount_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1931-e_pt_mount:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1932-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1932-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1932-e_pt_mount_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1932-e_pt_mount:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1941-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1941-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1941-e_pt_mount_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1941-e_pt_mount:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1942-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1942-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q1942-e_pt_mount_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q1942-e_pt_mount:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q2901-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q2901-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q2901-e_pt_mount_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q2901-e_pt_mount:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3504-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3504-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3504-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3504-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3505-sve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3505-sve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3505-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3505-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3505-v_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3505-v_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3505-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3505-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3505-ve_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3505-ve_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3515-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3515-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3515-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3515-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3517-lv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3517-lv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3517-lve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3517-lve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3615-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3615-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3617-ve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3617-ve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3708-pve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3708-pve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q3709-pve_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q3709-pve:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6000-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6000-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6000-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6000-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6032_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6032:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6032-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6032-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6032-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6032-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6034_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6034:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6034-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6034-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6034-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6034-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6035_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6035:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6035-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6035-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6035-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6035-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6042_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6042:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6042-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6042-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6042-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6042-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6042-s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6042-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6044_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6044:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6044-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6044-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6044-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6044-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6044-s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6044-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045-c_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045-c_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045-s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6045-s_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6045-s_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6052_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6052:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6052-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6052-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6054_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6054:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6054_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6054_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6054-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6054-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6054-e_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6054-e_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6055_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6055:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6055-c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6055-c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6055-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6055-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6055-s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6055-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6114-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6114-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6115-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6115-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6124-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6124-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6125-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6125-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6128-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6128-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q6155-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q6155-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7401_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7401:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7404_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7404:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7406_blade_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7406_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7411_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7411:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7414_blade_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7414_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7424-r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7424-r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7424-r_mk_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7424-r_mk_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q7436_blade_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q7436_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8414-lvs_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8414-lvs:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8631-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8631-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8632-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8632-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8641-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8641-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8642-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8642-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8655-zle_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8655-zle:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8665-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8665-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8665-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8665-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8675-ze_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8675-ze:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8685-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8685-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8685-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8685-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8721-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8721-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8722-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8722-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8741-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8741-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8741-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8741-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8742-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8742-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8742-le_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8742-le:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8742-e_zoom_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8742-e_zoom:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:q8742-le_zoom_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:q8742-le_zoom:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:v5914_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:v5914:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:v5915_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:v5915:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:xf40-q1765_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:xf40-q1765:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:xf40-q2901_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:xf40-q2901:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:xf60-q2901_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:xf60-q2901:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:xp40-q1765_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:xp40-q1765:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:xp40-q1942_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:xp40-q1942:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:xp60-q1765_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:xp60-q1765:-:*:*:*:*:*:*:*', 'cpe:2.3:o:axis:d201-s_xpt_q6055_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:axis:d201-s_xpt_q6055:-:*:*:*:*:*:*:*']",0,0
CVE-2018-9156,Axis Communications,0.00337,7.5,0.0,1.0,0.0,1.0,1,2018-04-01,0.0,,0.0,,,"An issue was discovered on AXIS P1354 (IP camera) Firmware version 5.90.1.1 devices. The upload web page doesn't verify the file type, and an attacker can upload a webshell by making a fileUpload.shtml request for a custom .shtml file, which is interpreted by the Apache HTTP Server mod_include module with "" Access Time Restriction --> Username field, a user cannot delete the rule due to the XSS.",CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,LOW,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.3,2.7,['CWE-79'],"['cpe:2.3:h:fiberhome:hg150-ub:-:*:*:*:*:*:*:*', 'cpe:2.3:o:fiberhome:hg150-ub_firmware:3.0:*:*:*:*:*:*:*']",0,0
CVE-2021-42912,Fiberhome,0.0086,8.8,0.0,1.0,0.0,1.0,1,2021-12-16,0.0,,0.0,,,"FiberHome ONU GPON AN5506-04-F RP2617 is affected by an OS command injection vulnerability. This vulnerability allows the attacker, once logged in, to send commands to the operating system as the root user via the ping diagnostic tool, bypassing the IP address field, and concatenating OS commands with a semicolon.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-78'],"['cpe:2.3:h:fiberhome:an5506-01-a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:fiberhome:an5506-01-a_firmware:rp0509:*:*:*:*:*:*:*', 'cpe:2.3:h:fiberhome:an5506-01-b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:fiberhome:an5506-01-b_firmware:rp2610:*:*:*:*:*:*:*', 'cpe:2.3:h:fiberhome:an5506-02-b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:fiberhome:an5506-02-b_firmware:rp2520:*:*:*:*:*:*:*', 'cpe:2.3:o:fiberhome:an5506-02-b_firmware:rp2521:*:*:*:*:*:*:*', 'cpe:2.3:o:fiberhome:an5506-02-b_firmware:rp2603:*:*:*:*:*:*:*', 'cpe:2.3:h:fiberhome:an5506-04-b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:fiberhome:an5506-04-b_firmware:rp2510:*:*:*:*:*:*:*', 'cpe:2.3:h:fiberhome:an5506-04-f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:fiberhome:an5506-04-f_firmware:rp2617:*:*:*:*:*:*:*', 'cpe:2.3:h:fiberhome:an5506-04-g2g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:fiberhome:aan5506-04-g2g_firmware:rp2560:*:*:*:*:*:*:*']",0,0
CVE-2022-38814,Fiberhome,0.00054,5.4,0.0,1.0,0.0,1.0,1,2022-09-15,0.0,,0.0,,,A stored cross-site scripting (XSS) vulnerability in the auth_settings component of FiberHome AN5506-02-B vRP2521 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the sncfg_loid text field.,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,LOW,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.3,2.7,['CWE-79'],"['cpe:2.3:o:fiberhome:an5506-02-b_firmware:rp2521:*:*:*:*:*:*:*', 'cpe:2.3:h:fiberhome:an5506-02-b:-:*:*:*:*:*:*:*']",0,0
CVE-2019-17186,Fiberhome,0.00609,8.8,0.0,1.0,0.0,1.0,0,2019-10-08,0.0,,0.0,,,/var/WEB-GUI/cgi-bin/telnet.cgi on FiberHome HG2201T 1.00.M5007_JS_201804 devices allows pre-authentication remote code execution.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-306'],"['cpe:2.3:o:fiberhome:hg2201t_firmware:hg2201t_1.00.m5007_js_201804:*:*:*:*:*:*:*', 'cpe:2.3:h:fiberhome:hg2201t:-:*:*:*:*:*:*:*']",0,0
CVE-2022-36200,Fiberhome,0.00496,7.5,0.0,1.0,0.0,1.0,0,2022-08-29,0.0,,0.0,,,"In FiberHome VDSL2 Modem HG150-Ub_V3.0, Credentials of Admin are submitted in URL, which can be logged/sniffed.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-319'],"['cpe:2.3:o:fiberhome:hg150-ub_firmware:3.0:*:*:*:*:*:*:*', 'cpe:2.3:h:fiberhome:hg150-ub:-:*:*:*:*:*:*:*']",0,0
CVE-2017-14219,Intelbras,0.00116,6.1,1.0,1.0,0.0,1.0,1,2017-09-07,0.0,,0.0,,,"XSS (persistent) on the Intelbras Wireless N 150Mbps router with firmware WRN 240 allows attackers to steal wireless credentials without being connected to the network, related to userRpm/popupSiteSurveyRpm.htm and userRpm/WlanSecurityRpm.htm. The attack vector is a crafted ESSID, as demonstrated by an ""airbase-ng -e"" command.",CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:intelbras:wrn_240_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intelbras:wrn_240:-:*:*:*:*:*:*:*']",1,0
CVE-2017-14942,Intelbras,0.07421,9.8,0.0,1.0,0.0,1.0,1,2017-09-30,0.0,,0.0,,,"Intelbras WRN 150 devices allow remote attackers to read the configuration file, and consequently bypass authentication, via a direct request for cgi-bin/DownloadCfg/RouterCfm.cfg containing an admin:language=pt cookie.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-552'],"['cpe:2.3:o:intelbras:wrn_150_firmware:1.0.1:*:*:*:*:*:*:*', 'cpe:2.3:h:intelbras:wrn_150:-:*:*:*:*:*:*:*']",0,0
CVE-2018-10369,Intelbras,0.00222,9.8,0.0,1.0,0.0,1.0,1,2018-08-15,0.0,,0.0,,,A Cross-site scripting (XSS) vulnerability was discovered on Intelbras Win 240 V1.1.0 devices. An attacker can change the Admin Password without a Login.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-79'],"['cpe:2.3:o:intelbras:win_240_firmware:1.1.0:*:*:*:*:*:*:*', 'cpe:2.3:h:intelbras:win_240:-:*:*:*:*:*:*:*']",0,0
CVE-2018-11094,Intelbras,0.07498,9.8,1.0,1.0,0.0,1.0,1,2018-05-15,0.0,,1.0,2018-05-14,,"An issue was discovered on Intelbras NCLOUD 300 1.0 devices. /cgi-bin/ExportSettings.sh, /goform/updateWPS, /goform/RebootSystem, and /goform/vpnBasicSettings do not require authentication. For example, when an HTTP POST request is made to /cgi-bin/ExportSettings.sh, the username, password, and other details are retrieved.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-798'],"['cpe:2.3:o:intelbras:ncloud_300_firmware:1.0:*:*:*:*:*:*:*', 'cpe:2.3:h:intelbras:ncloud_300:-:*:*:*:*:*:*:*']",1,0
CVE-2018-12455,Intelbras,0.00387,8.1,0.0,1.0,0.0,1.0,1,2018-10-10,0.0,,1.0,2018-08-22,,"Intelbras NPLUG 1.0.0.14 wireless repeater devices have a critical vulnerability that allows an attacker to authenticate in the web interface just by using ""admin:"" as the name of a cookie.",CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,HIGH,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.2,5.9,['CWE-287'],"['cpe:2.3:h:intelbras:nplug:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intelbras:nplug_firmware:1.0.0.14:*:*:*:*:*:*:*']",0,0
CVE-2018-12456,Intelbras,0.00077,8.8,0.0,1.0,0.0,1.0,1,2018-10-10,0.0,,1.0,2018-08-22,,"Intelbras NPLUG 1.0.0.14 wireless repeater devices have no CSRF token protection in the web interface, allowing attackers to perform actions such as changing the wireless SSID, rebooting the device, editing access control lists, or activating remote access.",CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-352'],"['cpe:2.3:o:intelbras:nplug_firmware:1.0.0.14:*:*:*:*:*:*:*', 'cpe:2.3:h:intelbras:nplug:-:*:*:*:*:*:*:*']",0,0
CVE-2018-17337,Intelbras,0.00123,6.1,0.0,1.0,0.0,1.0,1,2018-10-10,0.0,,1.0,2018-08-22,,Intelbras NPLUG 1.0.0.14 devices have XSS via a crafted SSID that is received via a network broadcast.,CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:intelbras:nplug_firmware:1.0.0.14:*:*:*:*:*:*:*', 'cpe:2.3:h:intelbras:nplug:-:*:*:*:*:*:*:*']",0,0
CVE-2018-9010,Intelbras,0.00909,7.2,1.0,1.0,0.0,1.0,1,2018-03-25,0.0,,0.0,,,"Intelbras TELEFONE IP TIP200/200 LITE 60.0.75.29 devices allow remote authenticated admins to read arbitrary files via the /cgi-bin/cgiServer.exx page parameter, aka absolute path traversal. In some cases, authentication can be achieved via the admin account with its default admin password.",CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.2,5.9,['CWE-22'],"['cpe:2.3:h:intelbras:tip200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intelbras:tip200_firmware:60.0.75.29:*:*:*:*:*:*:*', 'cpe:2.3:h:intelbras:tip200lite:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intelbras:tip200lite_firmware:60.0.75.29:*:*:*:*:*:*:*']",1,0
CVE-2019-11414,Intelbras,0.00249,8.8,0.0,1.0,0.0,1.0,1,2019-04-22,0.0,,0.0,,,"An issue was discovered on Intelbras IWR 3000N 1.5.0 devices. When the administrator password is changed from a certain client IP address, administrative authorization remains available to any client at that IP address, leading to complete control of the router.",CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-640'],"['cpe:2.3:o:intelbras:iwr_3000n_firmware:1.5.0:*:*:*:*:*:*:*', 'cpe:2.3:h:intelbras:iwr_3000n:-:*:*:*:*:*:*:*']",0,0
CVE-2019-11415,Intelbras,0.03619,7.5,1.0,1.0,0.0,1.0,1,2019-04-22,1.0,2019-04-30,,,0.0,"An issue was discovered on Intelbras IWR 3000N 1.5.0 devices. A malformed login request allows remote attackers to cause a denial of service (reboot), as demonstrated by JSON misparsing of the \""""} string to v1/system/login.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:intelbras:iwr_3000n_firmware:1.5.0:*:*:*:*:*:*:*', 'cpe:2.3:h:intelbras:iwr_3000n:-:*:*:*:*:*:*:*']",1,0
CVE-2019-11416,Intelbras,0.00966,8.8,1.0,1.0,0.0,1.0,1,2019-04-22,1.0,2019-04-30,,,0.0,"A CSRF issue was discovered on Intelbras IWR 3000N 1.5.0 devices, leading to complete control of the router, as demonstrated by v1/system/user.",CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-352'],"['cpe:2.3:o:intelbras:iwr_3000n_firmware:1.5.0:*:*:*:*:*:*:*', 'cpe:2.3:h:intelbras:iwr_3000n:-:*:*:*:*:*:*:*']",1,0
CVE-2019-17222,Intelbras,0.00087,6.1,0.0,1.0,0.0,1.0,1,2019-11-07,0.0,,0.0,,,"An issue was discovered on Intelbras WRN 150 1.0.17 devices. There is stored XSS in the Service Name tab of the WAN configuration screen, leading to a denial of service (inability to change the configuration).",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:intelbras:wrn_150_firmware:1.0.17:*:*:*:*:*:*:*', 'cpe:2.3:h:intelbras:wrn_150:-:*:*:*:*:*:*:*']",0,0
CVE-2019-17600,Intelbras,0.00826,9.8,0.0,1.0,0.0,1.0,1,2019-10-15,1.0,2019-04-30,,,1.0,Intelbras IWR 1000N 1.6.4 devices allow disclosure of the administrator login name and password because v1/system/user is mishandled.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-352'],"['cpe:2.3:h:intelbras:iwr_1000n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intelbras:iwr_1000n_firmware:1.6.4:*:*:*:*:*:*:*']",0,0
CVE-2019-19007,Intelbras,0.00078,7.2,0.0,1.0,0.0,1.0,1,2019-12-05,0.0,,0.0,,,"Intelbras IWR 3000N 1.8.7 devices allow disclosure of the administrator login name and password because v1/system/user is mishandled, a related issue to CVE-2019-17600.",CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.2,5.9,['CWE-200'],"['cpe:2.3:o:intelbras:iwr_3000n_firmware:1.8.7:*:*:*:*:*:*:*', 'cpe:2.3:h:intelbras:iwr_3000n:-:*:*:*:*:*:*:*']",0,0
CVE-2019-19142,Intelbras,0.02157,7.5,1.0,1.0,0.0,1.0,1,2020-01-17,0.0,,0.0,,,Intelbras WRN240 devices do not require authentication to replace the firmware via a POST request to the incoming/Firmware.cfg URI.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,HIGH,NONE,HIGH,3.9,3.6,['CWE-306'],"['cpe:2.3:o:intelbras:wrn_240_firmware:2.0.0:*:*:*:*:*:*:*', 'cpe:2.3:h:intelbras:wrn_240:-:*:*:*:*:*:*:*']",1,0
CVE-2019-19516,Intelbras,0.00093,6.5,1.0,1.0,0.0,1.0,1,2019-12-02,0.0,,0.0,,,Intelbras WRN 150 1.0.18 devices allow CSRF via GO=system_password.asp to the goform/SysToolChangePwd URI to change a password.,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,NONE,HIGH,NONE,MEDIUM,2.8,3.6,['CWE-352'],"['cpe:2.3:o:intelbras:wrn_150_firmware:1.0.18:*:*:*:*:*:*:*', 'cpe:2.3:h:intelbras:wrn_150:-:*:*:*:*:*:*:*']",1,0
CVE-2019-19517,Intelbras,0.00112,8.8,0.0,1.0,0.0,1.0,1,2020-05-05,0.0,,0.0,,,"Intelbras RF1200 1.1.3 devices allow CSRF to bypass the login.html form, as demonstrated by launching a scrapy process.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-352'],"['cpe:2.3:o:intelbras:action_rf_1200_firmware:1.1.3:*:*:*:*:*:*:*', 'cpe:2.3:h:intelbras:action_rf_1200:-:*:*:*:*:*:*:*']",0,0
CVE-2019-19995,Intelbras,0.00073,8.8,0.0,1.0,0.0,1.0,1,2019-12-26,0.0,,0.0,,,"A CSRF issue was discovered on Intelbras IWR 3000N 1.8.7 devices, leading to complete control of the router, as demonstrated by v1/system/user.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-352'],"['cpe:2.3:o:intelbras:iwr_3000n_firmware:1.8.7:*:*:*:*:*:*:*', 'cpe:2.3:h:intelbras:iwr_3000n:-:*:*:*:*:*:*:*']",0,0
CVE-2019-19996,Intelbras,0.00217,7.5,0.0,1.0,0.0,1.0,1,2019-12-26,0.0,,0.0,,,"An issue was discovered on Intelbras IWR 3000N 1.8.7 devices. A malformed login request allows remote attackers to cause a denial of service (reboot), as demonstrated by JSON misparsing of the \""""} string to v1/system/login.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:intelbras:iwr_3000n_firmware:1.8.7:*:*:*:*:*:*:*', 'cpe:2.3:h:intelbras:iwr_3000n:-:*:*:*:*:*:*:*']",0,0
CVE-2019-20004,Intelbras,0.0022,8.8,0.0,1.0,0.0,1.0,1,2020-01-05,0.0,,0.0,,,"An issue was discovered on Intelbras IWR 3000N 1.8.7 devices. When the administrator password is changed from a certain client IP address, administrative authorization remains available to any client at that IP address, leading to complete control of the router.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-640'],"['cpe:2.3:o:intelbras:iwr_3000n_firmware:1.8.7:*:*:*:*:*:*:*', 'cpe:2.3:h:intelbras:iwr_3000n:-:*:*:*:*:*:*:*']",0,0
CVE-2020-8829,Intelbras,0.00112,8.8,0.0,1.0,0.0,1.0,1,2020-05-05,0.0,,0.0,,,CSRF on Intelbras CIP 92200 devices allows an attacker to access the panel and perform scraping or other analysis.,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-352'],"['cpe:2.3:o:intelbras:cip_92200_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intelbras:cip_92200:-:*:*:*:*:*:*:*']",0,0
CVE-2020-12262,Intelbras,0.00083,5.4,0.0,1.0,0.0,1.0,0,2020-11-27,0.0,,0.0,,,"Intelbras TIP200 60.61.75.15, TIP200LITE 60.61.75.15, and TIP300 65.61.75.15 devices allow /cgi-bin/cgiServer.exx?page= XSS.",CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,LOW,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.3,2.7,['CWE-79'],"['cpe:2.3:h:intelbras:tip200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intelbras:tip200_firmware:65.61.75.15:*:*:*:*:*:*:*', 'cpe:2.3:h:intelbras:tip200lite:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intelbras:tip200lite_firmware:60.61.75.15:*:*:*:*:*:*:*', 'cpe:2.3:h:intelbras:tip300:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intelbras:tip300_firmware:60.61.75.15:*:*:*:*:*:*:*']",0,0
CVE-2020-13886,Intelbras,0.00259,5.3,0.0,1.0,0.0,1.0,0,2020-11-26,0.0,,0.0,,,"Intelbras TIP 200 60.61.75.15, TIP 200 LITE 60.61.75.15, and TIP 300 65.61.75.22 devices allow cgi-bin/cgiServer.exx?page=../ Directory Traversal.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,LOW,NONE,NONE,MEDIUM,3.9,1.4,['CWE-22'],"['cpe:2.3:h:intelbras:tip200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intelbras:tip200_firmware:60.61.75.15:*:*:*:*:*:*:*', 'cpe:2.3:h:intelbras:tip200lite:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intelbras:tip200lite_firmware:60.61.75.15:*:*:*:*:*:*:*', 'cpe:2.3:h:intelbras:tip300:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intelbras:tip300_firmware:65.61.75.22:*:*:*:*:*:*:*']",0,0
CVE-2020-24285,Intelbras,0.00293,7.5,0.0,1.0,0.0,1.0,0,2021-04-12,0.0,,0.0,,,INTELBRAS TELEFONE IP TIP200 version 60.61.75.22 allows an attacker to obtain sensitive information through /cgi-bin/cgiServer.exx.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:intelbras:tip200_firmware:60.61.75.22:*:*:*:*:*:*:*', 'cpe:2.3:h:intelbras:tip200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intelbras:tip200lite_firmware:60.61.75.22:*:*:*:*:*:*:*', 'cpe:2.3:h:intelbras:tip200lite:-:*:*:*:*:*:*:*']",0,0
CVE-2021-3017,Intelbras,0.09152,7.5,0.0,1.0,0.0,1.0,0,2021-04-14,0.0,,0.0,,,The web interface on Intelbras WIN 300 and WRN 342 devices through 2021-01-04 allows remote attackers to discover credentials by reading the def_wirelesspassword line in the HTML source code.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:h:intelbras:win_300:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intelbras:win_300_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intelbras:wrn_342:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intelbras:wrn_342_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2021-32402,Intelbras,0.00112,8.8,0.0,1.0,0.0,1.0,0,2021-05-17,0.0,,0.0,,,Intelbras Router RF 301K Firmware 1.1.2 is vulnerable to Cross Site Request Forgery (CSRF) due to lack of validation and insecure configurations in inputs and modules.,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-352'],"['cpe:2.3:o:intelbras:rf_301k_firmware:1.1.2:*:*:*:*:*:*:*', 'cpe:2.3:h:intelbras:rf_301k:-:*:*:*:*:*:*:*']",0,0
CVE-2021-32403,Intelbras,0.00173,8.8,1.0,1.0,0.0,1.0,0,2021-05-17,0.0,,0.0,,,Intelbras Router RF 301K Firmware 1.1.2 is vulnerable to Cross Site Request Forgery (CSRF) due to lack of security mechanisms for token protection and unsafe inputs and modules.,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-352'],"['cpe:2.3:o:intelbras:rf_301k_firmware:1.1.2:*:*:*:*:*:*:*', 'cpe:2.3:h:intelbras:rf_301k:-:*:*:*:*:*:*:*']",1,0
CVE-2017-14443,Insteon,0.0007,6.5,0.0,0.0,0.0,1.0,1,2018-09-17,1.0,2018-04-12,,,1.0,"An exploitable information leak vulnerability exists in Insteon Hub running firmware version 1012. The HTTP server implementation incorrectly checks the number of GET parameters supplied, leading to an arbitrarily controlled information leak on the whole device memory. An attacker can send an authenticated HTTP request to trigger this vulnerability.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,2.8,3.6,['CWE-200'],"['cpe:2.3:o:insteon:hub_2245-222_firmware:1012:*:*:*:*:*:*:*', 'cpe:2.3:h:insteon:hub_2245-222:-:*:*:*:*:*:*:*']",0,0
CVE-2017-14444,Insteon,0.00101,9.9,0.0,1.0,0.0,1.0,1,2018-08-02,1.0,2018-04-12,,,1.0,"An exploitable buffer overflow vulnerability exists in Insteon Hub running firmware version 1012. The HTTP server implementation incorrectly handles the URL parameter during a firmware update request, leading to a buffer overflow on a global section. An attacker can send an HTTP GET request to trigger this vulnerability.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,CHANGED,HIGH,HIGH,HIGH,CRITICAL,3.1,6.0,['CWE-119'],"['cpe:2.3:o:insteon:hub_firmware:1012:*:*:*:*:*:*:*', 'cpe:2.3:h:insteon:hub:-:*:*:*:*:*:*:*']",0,0
CVE-2017-14445,Insteon,0.00101,9.9,0.0,1.0,0.0,1.0,1,2018-08-02,1.0,2018-04-12,,,1.0,"An exploitable buffer overflow vulnerability exists in Insteon Hub running firmware version 1012. The HTTP server implementation incorrectly handles the host parameter during a firmware update request, leading to a buffer overflow on a global section. An attacker can send an HTTP GET request to trigger this vulnerability.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,CHANGED,HIGH,HIGH,HIGH,CRITICAL,3.1,6.0,['CWE-120'],"['cpe:2.3:o:insteon:hub_firmware:1012:*:*:*:*:*:*:*', 'cpe:2.3:h:insteon:hub:-:*:*:*:*:*:*:*']",0,0
CVE-2017-14446,Insteon,0.00101,9.9,0.0,1.0,0.0,1.0,1,2018-08-02,1.0,2018-04-12,,,1.0,"An exploitable stack-based buffer overflow vulnerability exists in Insteon Hub running firmware version 1012. The HTTP server implementation unsafely extracts parameters from the query string, leading to a buffer overflow on the stack. An attacker can send an HTTP GET request to trigger this vulnerability.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,CHANGED,HIGH,HIGH,HIGH,CRITICAL,3.1,6.0,['CWE-787'],"['cpe:2.3:o:insteon:hub_firmware:1012:*:*:*:*:*:*:*', 'cpe:2.3:h:insteon:hub:-:*:*:*:*:*:*:*']",0,0
CVE-2017-14447,Insteon,0.00073,7.7,0.0,1.0,0.0,1.0,1,2018-08-06,1.0,2018-04-12,,,1.0,An exploitable buffer overflow vulnerability exists in the PubNub message handler for the 'ad' channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability.,CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N,NETWORK,LOW,LOW,NONE,CHANGED,NONE,HIGH,NONE,HIGH,3.1,4.0,['CWE-119'],"['cpe:2.3:o:insteon:hub_firmware:1012:*:*:*:*:*:*:*', 'cpe:2.3:h:insteon:hub:-:*:*:*:*:*:*:*']",0,0
CVE-2017-14452,Insteon,0.00101,8.8,0.0,1.0,0.0,1.0,1,2018-08-23,1.0,2018-04-12,,,1.0,"An exploitable buffer overflow vulnerability exists in the PubNub message handler for the ""control"" channel of Insteon Hub running firmware version 1012. Specially crafted replies received from the PubNub service can cause buffer overflows on a global section overwriting arbitrary data. A strcpy overflows the buffer insteon_pubnub.channel_cc_r, which has a size of 16 bytes. An attacker can send an arbitrarily long ""c_r"" parameter in order to exploit this vulnerability. An attacker should impersonate PubNub and answer an HTTPS GET request to trigger this vulnerability.",CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-119'],"['cpe:2.3:o:insteon:hub_firmware:1012:*:*:*:*:*:*:*', 'cpe:2.3:h:insteon:hub:-:*:*:*:*:*:*:*']",0,0
CVE-2017-14453,Insteon,0.00096,8.8,0.0,0.0,0.0,1.0,1,2018-08-23,1.0,2018-04-12,,,1.0,"On Insteon Hub 2245-222 devices with firmware version 1012, specially crafted replies received from the PubNub service can cause buffer overflows on a global section overwriting arbitrary data. An attacker should impersonate PubNub and answer an HTTPS GET request to trigger this vulnerability. A strcpy overflows the buffer insteon_pubnub.channel_ad_r, which has a size of 16 bytes. An attacker can send an arbitrarily long ""ad_r"" parameter in order to exploit this vulnerability.",CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-119'],"['cpe:2.3:o:insteon:hub_2245-222_firmware:1012:*:*:*:*:*:*:*', 'cpe:2.3:h:insteon:hub_2245-222:-:*:*:*:*:*:*:*']",0,0
CVE-2017-14455,Insteon,0.00095,8.8,0.0,0.0,0.0,1.0,1,2018-08-23,1.0,2018-04-12,,,1.0,"On Insteon Hub 2245-222 devices with firmware version 1012, specially crafted replies received from the PubNub service can cause buffer overflows on a global section overwriting arbitrary data. An attacker should impersonate PubNub and answer an HTTPS GET request to trigger this vulnerability. A strcpy overflows the buffer insteon_pubnub.channel_ak, which has a size of 16 bytes. An attacker can send an arbitrarily long ""ak"" parameter in order to exploit this vulnerability.",CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-119'],"['cpe:2.3:o:insteon:hub_2245-222_firmware:1012:*:*:*:*:*:*:*', 'cpe:2.3:h:insteon:hub_2245-222:-:*:*:*:*:*:*:*']",0,0
CVE-2017-16252,Insteon,0.00087,6.5,0.0,0.0,0.0,1.0,1,2018-08-06,1.0,2018-04-12,,,1.0,"Specially crafted commands sent through the PubNub service in Insteon Hub 2245-222 with firmware version 1012 can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability.At 0x9d014cc0 the value for the cmd key is copied using strcpy to the buffer at $sp+0x11c. This buffer is 20 bytes large, sending anything longer will cause a buffer overflow.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,NONE,HIGH,HIGH,HIGH,2.8,5.2,['CWE-787'],"['cpe:2.3:o:insteon:hub_firmware:1012:*:*:*:*:*:*:*', 'cpe:2.3:h:insteon:hub_2245-222:-:*:*:*:*:*:*:*']",0,0
CVE-2017-16253,Insteon,0.00099,6.5,0.0,1.0,0.0,1.0,1,2019-03-21,1.0,2018-04-12,,,1.0,"An exploitable buffer overflow vulnerability exists in the PubNub message handler Insteon Hub 2245-222 - Firmware version 1012 for the cc channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker can send an authenticated HTTP request At 0x9d014dd8 the value for the id key is copied using strcpy to the buffer at $sp+0x290. This buffer is 32 bytes large, sending anything longer will cause a buffer overflow.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,NONE,HIGH,HIGH,HIGH,2.8,5.2,['CWE-787'],"['cpe:2.3:o:insteon:hub_firmware:1012:*:*:*:*:*:*:*', 'cpe:2.3:h:insteon:hub:2245-222:-:*:*:*:*:*:*']",0,0
CVE-2017-16254,Insteon,0.00099,6.5,0.0,1.0,0.0,1.0,1,2019-03-21,1.0,2018-04-12,,,1.0,"An exploitable buffer overflow vulnerability exists in the PubNub message handler Insteon Hub 2245-222 - Firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker can send an authenticated HTTP request at 0x9d014e4c the value for the flg key is copied using strcpy to the buffer at $sp+0x270. This buffer is 16 bytes large, sending anything longer will cause a buffer overflow.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,NONE,HIGH,HIGH,HIGH,2.8,5.2,['CWE-787'],"['cpe:2.3:o:insteon:hub_firmware:1012:*:*:*:*:*:*:*', 'cpe:2.3:h:insteon:hub:2245-222:-:*:*:*:*:*:*']",0,0
CVE-2017-16337,Insteon,0.00101,8.8,0.0,0.0,0.0,1.0,1,2018-08-23,1.0,2018-04-12,,,1.0,"On Insteon Hub 2245-222 devices with firmware version 1012, specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. At 0x9d01ef24 the value for the s_offset key is copied using strcpy to the buffer at $sp+0x2b0. This buffer is 32 bytes large, sending anything longer will cause a buffer overflow.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-120'],"['cpe:2.3:o:insteon:hub_2245-222_firmware:1012:*:*:*:*:*:*:*', 'cpe:2.3:h:insteon:hub_2245-222:-:*:*:*:*:*:*:*']",0,0
CVE-2017-16339,Insteon,0.00101,9.9,0.0,1.0,0.0,1.0,1,2018-08-02,1.0,2018-04-12,,,1.0,"An attacker could send an authenticated HTTP request to trigger this vulnerability in Insteon Hub running firmware version 1012. At 0x9d01bb1c the value for the uri key is copied using strcpy to the buffer at 0xa00016a0. This buffer is 64 bytes large, sending anything longer will cause a buffer overflow.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,CHANGED,HIGH,HIGH,HIGH,CRITICAL,3.1,6.0,['CWE-120'],"['cpe:2.3:o:insteon:hub_firmware:1012:*:*:*:*:*:*:*', 'cpe:2.3:h:insteon:hub:-:*:*:*:*:*:*:*']",0,0
CVE-2017-16340,Insteon,0.00101,9.9,0.0,1.0,0.0,1.0,1,2018-08-02,1.0,2018-04-12,,,1.0,"An attacker could send an authenticated HTTP request to trigger this vulnerability in Insteon Hub running firmware version 1012. At 0x9d01c0e8 the value for the s_dport key is copied using strcpy to the buffer at 0xa000180c. This buffer is 6 bytes large, sending anything longer will cause a buffer overflow.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,CHANGED,HIGH,HIGH,HIGH,CRITICAL,3.1,6.0,['CWE-120'],"['cpe:2.3:o:insteon:hub_firmware:1012:*:*:*:*:*:*:*', 'cpe:2.3:h:insteon:hub:-:*:*:*:*:*:*:*']",0,0
CVE-2017-16341,Insteon,0.00101,9.9,0.0,1.0,0.0,1.0,1,2018-08-02,1.0,2018-04-12,,,1.0,"An attacker could send an authenticated HTTP request to trigger this vulnerability in Insteon Hub running firmware version 1012. At 0x9d01c224 the value for the s_vol_play key is copied using strcpy to the buffer at 0xa0000418. This buffer is maximum 8 bytes large (this is the maximum size it could be, it is possible other global variables are stored between this variable and the next one that we could identify), sending anything longer will cause a buffer overflow.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,CHANGED,HIGH,HIGH,HIGH,CRITICAL,3.1,6.0,['CWE-120'],"['cpe:2.3:o:insteon:hub_firmware:1012:*:*:*:*:*:*:*', 'cpe:2.3:h:insteon:hub:-:*:*:*:*:*:*:*']",0,0
CVE-2017-16342,Insteon,0.00101,9.9,0.0,1.0,0.0,1.0,1,2018-08-02,1.0,2018-04-12,,,1.0,"An attacker could send an authenticated HTTP request to trigger this vulnerability in Insteon Hub running firmware version 1012. At 0x9d01c254 the value for the s_vol_dim_delta key is copied using strcpy to the buffer at 0xa0000514. This buffer is 4 bytes large, sending anything longer will cause a buffer overflow.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,CHANGED,HIGH,HIGH,HIGH,CRITICAL,3.1,6.0,['CWE-120'],"['cpe:2.3:o:insteon:hub_firmware:1012:*:*:*:*:*:*:*', 'cpe:2.3:h:insteon:hub:-:*:*:*:*:*:*:*']",0,0
CVE-2017-16343,Insteon,0.00101,9.9,0.0,1.0,0.0,1.0,1,2018-08-02,1.0,2018-04-12,,,1.0,"An attacker could send an authenticated HTTP request to trigger this vulnerability in Insteon Hub running firmware version 1012. At 0x9d01c284 the value for the s_vol_brt_delta key is copied using strcpy to the buffer at 0xa0000510. This buffer is 4 bytes large, sending anything longer will cause a buffer overflow.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,CHANGED,HIGH,HIGH,HIGH,CRITICAL,3.1,6.0,['CWE-120'],"['cpe:2.3:o:insteon:hub_firmware:1012:*:*:*:*:*:*:*', 'cpe:2.3:h:insteon:hub:-:*:*:*:*:*:*:*']",0,0
CVE-2017-16344,Insteon,0.00101,9.9,0.0,1.0,0.0,1.0,1,2018-08-02,1.0,2018-04-12,,,1.0,"An attacker could send an authenticated HTTP request to trigger this vulnerability in Insteon Hub running firmware version 1012. At 0x9d01c2c8 the value for the s_url key is copied using strcpy to the buffer at 0xa0001a0c. This buffer is 16 bytes large, sending anything longer will cause a buffer overflow. The destination can also be shifted by using an sn_speaker parameter between ""0"" and ""3"".",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,CHANGED,HIGH,HIGH,HIGH,CRITICAL,3.1,6.0,['CWE-120'],"['cpe:2.3:o:insteon:hub_firmware:1012:*:*:*:*:*:*:*', 'cpe:2.3:h:insteon:hub:-:*:*:*:*:*:*:*']",0,0
CVE-2017-16345,Insteon,0.00101,9.9,0.0,1.0,0.0,1.0,1,2018-08-02,1.0,2018-04-12,,,1.0,"An attacker could send an authenticated HTTP request to trigger this vulnerability in Insteon Hub running firmware version 1012. At 0x9d01c318 the value for the s_port key is copied using strcpy to the buffer at 0xa00017f4. This buffer is 6 bytes large, sending anything longer will cause a buffer overflow. The destination can also be shifted by using an sn_speaker parameter between ""0"" and ""3"".",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,CHANGED,HIGH,HIGH,HIGH,CRITICAL,3.1,6.0,['CWE-120'],"['cpe:2.3:o:insteon:hub_firmware:1012:*:*:*:*:*:*:*', 'cpe:2.3:h:insteon:hub:-:*:*:*:*:*:*:*']",0,0
CVE-2017-16346,Insteon,0.00101,9.9,0.0,1.0,0.0,1.0,1,2018-08-02,1.0,2018-04-12,,,1.0,"An attacker could send an authenticated HTTP request to trigger this vulnerability in Insteon Hub running firmware version 1012. At 0x9d01c368 the value for the s_mac key is copied using strcpy to the buffer at 0xa000170c. This buffer is 25 bytes large, sending anything longer will cause a buffer overflow. The destination can also be shifted by using an sn_speaker parameter between ""0"" and ""3"".",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,CHANGED,HIGH,HIGH,HIGH,CRITICAL,3.1,6.0,['CWE-120'],"['cpe:2.3:o:insteon:hub_firmware:1012:*:*:*:*:*:*:*', 'cpe:2.3:h:insteon:hub:-:*:*:*:*:*:*:*']",0,0
CVE-2017-16347,Insteon,0.00101,9.9,0.0,1.0,0.0,1.0,1,2018-08-02,1.0,2018-04-12,,,1.0,"An attacker could send an authenticated HTTP request to trigger this vulnerability in Insteon Hub running firmware version 1012. At 0x9d01e7d4 the value for the s_vol key is copied using strcpy to the buffer at 0xa0001700. This buffer is maximum 12 bytes large (this is the maximum size it could be, it is possible other global variables are stored between this variable and the next one that we could identify), sending anything longer will cause a buffer overflow.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,CHANGED,HIGH,HIGH,HIGH,CRITICAL,3.1,6.0,['CWE-120'],"['cpe:2.3:o:insteon:hub_firmware:1012:*:*:*:*:*:*:*', 'cpe:2.3:h:insteon:hub:-:*:*:*:*:*:*:*']",0,0
CVE-2018-11560,Insteon,0.00465,9.8,0.0,1.0,0.0,1.0,1,2018-06-23,0.0,,0.0,,,"The webService binary on Insteon HD IP Camera White 2864-222 devices has a stack-based Buffer Overflow leading to Control-Flow Hijacking via a crafted usr key, as demonstrated by a long remoteIp parameter to cgi-bin/CGIProxy.fcgi on port 34100.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:o:insteon:2864-222_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:insteon:2864-222:*:*:*:*:*:*:*:*']",0,0
CVE-2018-12640,Insteon,0.00465,9.8,0.0,1.0,0.0,1.0,1,2018-06-23,1.0,2018-04-12,,,1.0,"The webService binary on Insteon HD IP Camera White 2864-222 devices has a Buffer Overflow via a crafted pid, pwd, or usr key in a GET request on port 34100.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-119'],"['cpe:2.3:o:insteon:2864-222_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:insteon:2864-222:*:*:*:*:*:*:*:*']",0,0
CVE-2018-3832,Insteon,0.00103,9.0,0.0,0.0,0.0,1.0,1,2018-08-23,1.0,2018-04-12,,,1.0,"An exploitable firmware update vulnerability exists in Insteon Hub running firmware version 1013. The HTTP server allows for uploading arbitrary MPFS binaries that could be modified to enable access to hidden resources which allow for uploading unsigned firmware images to the device. To trigger this vulnerability, an attacker can upload an MPFS binary via the '/mpfsupload' HTTP form and later on upload the firmware via a POST request to 'firmware.htm'.",CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H,NETWORK,LOW,LOW,REQUIRED,CHANGED,HIGH,HIGH,HIGH,CRITICAL,2.3,6.0,['CWE-434'],"['cpe:2.3:h:insteon:hub_2245-222:-:*:*:*:*:*:*:*', 'cpe:2.3:o:insteon:hub_2245-222_firmware:1013:*:*:*:*:*:*:*']",0,0
CVE-2018-3834,Insteon,0.00144,7.4,0.0,1.0,0.0,1.0,1,2018-08-02,1.0,2018-04-12,,,1.0,"An exploitable permanent denial of service vulnerability exists in Insteon Hub running firmware version 1013. The firmware upgrade functionality, triggered via PubNub, retrieves signed firmware binaries using plain HTTP requests. The device doesn't check the kind of firmware image that is going to be installed and thus allows for flashing any signed firmware into any MCU. Since the device contains different and incompatible MCUs, flashing one firmware to the wrong MCU will result in a permanent brick condition. To trigger this vulnerability, an attacker needs to impersonate the remote server ""cache.insteon.com"" and serve a signed firmware image.",CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H,NETWORK,HIGH,NONE,NONE,UNCHANGED,NONE,HIGH,HIGH,HIGH,2.2,5.2,['CWE-346'],"['cpe:2.3:o:insteon:hub_firmware:1013:*:*:*:*:*:*:*', 'cpe:2.3:h:insteon:hub:-:*:*:*:*:*:*:*']",0,0
CVE-2017-5250,Insteon,0.00222,9.8,0.0,0.0,1.0,0.0,0,2018-02-22,0.0,,0.0,,,"In version 1.9.7 and prior of Insteon's Insteon for Hub Android app, the OAuth token used by the app to authorize user access is not stored in an encrypted and secure manner.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,"['CWE-312', 'CWE-922']",['cpe:2.3:a:insteon:insteon_for_hub:*:*:*:*:*:android:*:*'],0,0
CVE-2017-14515,Tenda,0.00253,7.5,0.0,1.0,0.0,1.0,1,2017-09-17,0.0,,0.0,,,Heap-based Buffer Overflow on Tenda W15E devices before 15.11.0.14 allows remote attackers to cause a denial of service (temporary HTTP outage and forced logout) via unspecified vectors.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-119'],"['cpe:2.3:o:tenda:w15e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:tenda:w15e:-:*:*:*:*:*:*:*']",0,0
CVE-2017-16923,Tenda,0.00171,8.8,0.0,1.0,0.0,1.0,1,2017-11-21,0.0,,0.0,,,"Command Injection vulnerability in app_data_center on Shenzhen Tenda Ac9 US_AC9V1.0BR_V15.03.05.14_multi_TD01, Ac9 ac9_kf_V15.03.05.19(6318_)_cn, Ac15 US_AC15V1.0BR_V15.03.05.18_multi_TD01, Ac15 US_AC15V1.0BR_V15.03.05.19_multi_TD01, Ac18 US_AC18V1.0BR_V15.03.05.05_multi_TD01, and Ac18 ac18_kf_V15.03.05.19(6318_)_cn devices allows remote unauthenticated attackers to execute arbitrary OS commands via a crafted cgi-bin/luci/usbeject?dev_name= GET request from the LAN. This occurs because the ""sub_A6E8 usbeject_process_entry"" function executes a system function with untrusted input.",CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-78'],"['cpe:2.3:o:tenda:ac9_firmware:us_ac9v1.0br_v15.03.05.14_multi_td01:*:*:*:*:*:*:*', 'cpe:2.3:h:tenda:ac9:-:*:*:*:*:*:*:*', 'cpe:2.3:o:tenda:ac9_firmware:ac9_kf_v15.03.05.19\\(6318_\\)_cn:*:*:*:*:*:*:*', 'cpe:2.3:h:tenda:ac9:-:*:*:*:*:*:*:*', 'cpe:2.3:o:tenda:ac15_firmware:us_ac15v1.0br_v15.03.05.18_multi_td01:*:*:*:*:*:*:*', 'cpe:2.3:h:tenda:ac15:-:*:*:*:*:*:*:*', 'cpe:2.3:o:tenda:ac15_firmware:us_ac15v1.0br_v15.03.05.19_multi_td01:*:*:*:*:*:*:*', 'cpe:2.3:h:tenda:ac15:-:*:*:*:*:*:*:*', 'cpe:2.3:o:tenda:ac18_firmware:us_ac18v1.0br_v15.03.05.05_multi_td01:*:*:*:*:*:*:*', 'cpe:2.3:h:tenda:ac18:-:*:*:*:*:*:*:*', 'cpe:2.3:o:tenda:ac18_firmware:ac18_kf_v15.03.05.19\\(6318_\\)_cn:*:*:*:*:*:*:*', 'cpe:2.3:h:tenda:ac18:-:*:*:*:*:*:*:*']",0,0
CVE-2017-9139,Tenda,0.00044,3.5,0.0,1.0,0.0,1.0,1,2017-05-21,0.0,,0.0,,,"There is a stack-based buffer overflow on some Tenda routers (FH1202/F1202/F1200: versions before 1.2.0.20). Crafted POST requests to an unspecified URL result in DoS, interrupting the HTTP service (used to login to the web UI of a router) for 1 to 2 seconds.",CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L,ADJACENT_NETWORK,LOW,LOW,NONE,UNCHANGED,NONE,NONE,LOW,LOW,2.1,1.4,['CWE-119'],"['cpe:2.3:o:tendacn:f1200_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:tendacn:f1200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:tendacn:fh1202_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:tendacn:fh1202:-:*:*:*:*:*:*:*', 'cpe:2.3:o:tendacn:f1202_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:tendacn:f1202:-:*:*:*:*:*:*:*']",0,0
CVE-2019-16213,Tenda,0.01164,8.8,0.0,1.0,0.0,1.0,1,2020-06-25,0.0,,0.0,,,"Tenda PA6 Wi-Fi Powerline extender 1.0.1.21 could allow a remote authenticated attacker to execute arbitrary commands on the system. By sending a specially crafted string, an attacker could modify the device name of an attached PLC adapter to inject and execute arbitrary commands on the system with root privileges.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-78'],"['cpe:2.3:o:tendacn:pa6_firmware:1.0.1.21:*:*:*:*:*:*:*', 'cpe:2.3:h:tendacn:pa6:-:*:*:*:*:*:*:*']",0,0
CVE-2019-16412,Tenda,0.00114,7.5,0.0,1.0,0.0,1.0,1,2019-09-19,0.0,,0.0,,,"In goform/setSysTools on Tenda N301 wireless routers, attackers can trigger a device crash via a zero wanMTU value. (Prohibition of this zero value is only enforced within the GUI.)",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-20'],"['cpe:2.3:o:tendacn:n301_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:tendacn:n301:-:*:*:*:*:*:*:*']",0,0
CVE-2019-19505,Tenda,0.00485,8.8,0.0,1.0,0.0,1.0,1,2020-06-25,0.0,,0.0,,,"Tenda PA6 Wi-Fi Powerline extender 1.0.1.21 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the ""Wireless"" section in the web-UI. By sending a specially crafted hostname, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-787'],"['cpe:2.3:o:tendacn:pa6_firmware:1.0.1.21:*:*:*:*:*:*:*', 'cpe:2.3:h:tendacn:pa6:-:*:*:*:*:*:*:*']",0,0
CVE-2019-19506,Tenda,0.0014,7.5,0.0,1.0,0.0,1.0,1,2020-06-25,0.0,,0.0,,,"Tenda PA6 Wi-Fi Powerline extender 1.0.1.21 is vulnerable to a denial of service, caused by an error in the ""homeplugd"" process. By sending a specially crafted UDP packet, an attacker could exploit this vulnerability to cause the device to reboot.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-835'],"['cpe:2.3:o:tendacn:pa6_firmware:1.0.1.21:*:*:*:*:*:*:*', 'cpe:2.3:h:tendacn:pa6:-:*:*:*:*:*:*:*']",0,0
CVE-2019-5071,Tenda,0.00042,7.8,0.0,1.0,0.0,1.0,1,2019-11-21,0.0,,0.0,,,"An exploitable command injection vulnerability exists in the /goform/WanParameterSetting functionality of Tenda AC9 Router AC1200 Smart Dual-Band Gigabit WiFi Route (AC9V1.0 Firmware V15.03.05.16multiTRU). A specially crafted HTTP POST request can cause a command injection in the DNS1 post parameters, resulting in code execution. An attacker can send HTTP POST request with command to trigger this vulnerability.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-78'],"['cpe:2.3:o:tendacn:ac9v1.0_firmware:15.03.05.14_en:*:*:*:*:*:*:*', 'cpe:2.3:o:tendacn:ac9v1.0_firmware:15.03.05.16multitru:*:*:*:*:*:*:*', 'cpe:2.3:h:tendacn:ac1200_smart_dual-band_gigabit_wifi:-:*:*:*:*:*:*:*']",0,0
CVE-2019-5072,Tenda,0.00042,7.8,0.0,1.0,0.0,1.0,1,2019-11-21,0.0,,0.0,,,"An exploitable command injection vulnerability exists in the /goform/WanParameterSetting functionality of Tenda AC9 Router AC1200 Smart Dual-Band Gigabit WiFi Route (AC9V1.0 Firmware V15.03.05.16multiTRU). A specially crafted HTTP POST request can cause a command injection in the DNS2 post parameters, resulting in code execution. An attacker can send HTTP POST request with command to trigger this vulnerability.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-78'],"['cpe:2.3:o:tendacn:ac9v1.0_firmware:15.03.05.14_en:*:*:*:*:*:*:*', 'cpe:2.3:o:tendacn:ac9v1.0_firmware:15.03.05.16multitru:*:*:*:*:*:*:*', 'cpe:2.3:h:tendacn:ac1200_smart_dual-band_gigabit_wifi:-:*:*:*:*:*:*:*']",0,0
CVE-2020-15916,Tenda,0.38355,9.8,0.0,1.0,0.0,1.0,1,2020-07-23,0.0,,0.0,,,goform/AdvSetLanip endpoint on Tenda AC15 AC1900 15.03.05.19 devices allows remote attackers to execute arbitrary system commands via shell metacharacters in the lanIp POST parameter.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-78'],"['cpe:2.3:o:tenda:ac15_firmware:15.03.05.19:*:*:*:*:*:*:*', 'cpe:2.3:h:tenda:ac15:-:*:*:*:*:*:*:*']",0,0
CVE-2020-20746,Tenda,0.00354,7.2,0.0,1.0,0.0,1.0,1,2021-09-30,0.0,,0.0,,,A stack-based buffer overflow in the httpd server on Tenda AC9 V15.03.06.60_EN allows remote attackers to execute arbitrary code or cause a denial of service (DoS) via a crafted POST request to /goform/SetStaticRouteCfg.,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.2,5.9,['CWE-787'],"['cpe:2.3:o:tendacn:ac9_firmware:15.03.06.60_en:*:*:*:*:*:*:*', 'cpe:2.3:h:tendacn:ac9:3.0:*:*:*:*:*:*:*']",0,0
CVE-2020-22079,Tenda,0.01981,9.8,0.0,1.0,0.0,1.0,1,2021-10-29,0.0,,0.0,,,Stack-based buffer overflow in Tenda AC-10U AC1200 Router US_AC10UV1.0RTL_V15.03.06.48_multi_TDE01 allows remote attackers to execute arbitrary code via the timeZone parameter to goform/SetSysTimeCfg.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:o:tendacn:ac10u_firmware:15.03.06.48_multi_tde01:*:*:*:*:*:*:*', 'cpe:2.3:h:tendacn:ac10u:1.0:*:*:*:*:*:*:*', 'cpe:2.3:o:tendacn:ac9_firmware:15.03.05.19\\(6318\\):*:*:*:*:*:*:*', 'cpe:2.3:h:tendacn:ac9:1.0:*:*:*:*:*:*:*', 'cpe:2.3:o:tendacn:ac9_firmware:15.03.06.42_multi:*:*:*:*:*:*:*', 'cpe:2.3:h:tendacn:ac9:3.0:*:*:*:*:*:*:*']",0,0
CVE-2020-24987,Tenda,0.05953,9.8,0.0,1.0,0.0,1.0,1,2020-09-04,0.0,,0.0,,,"Tenda AC18 Router through V15.03.05.05_EN and through V15.03.05.19(6318) CN devices could cause a remote code execution due to incorrect authentication handling of vulnerable logincheck() function in /usr/lib/lua/ngx_authserver/ngx_wdas.lua file if the administrator UI Interface is set to ""radius"".",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-287'],"['cpe:2.3:h:tendacn:ac18:-:*:*:*:*:*:*:*', 'cpe:2.3:o:tendacn:ac18_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:tendacn:ac18:-:*:*:*:*:*:*:*', 'cpe:2.3:o:tendacn:ac18_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2020-28093,Tenda,0.00109,7.2,0.0,1.0,0.0,1.0,1,2020-12-28,0.0,,0.0,,,"On Tenda AC1200 (Model AC6) 15.03.06.51_multi devices, admin, support, user, and nobody have a password of 1234.",CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.2,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:h:tendacn:ac1200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:tendacn:ac1200_firmware:15.03.06.51:*:*:*:*:*:*:*']",0,0
CVE-2021-31627,Tenda,0.00093,8.8,0.0,1.0,0.0,1.0,1,2021-10-29,0.0,,0.0,,,"Buffer Overflow vulnerability in Tenda AC9 V1.0 through V15.03.05.19(6318), and AC9 V3.0 V15.03.06.42_multi, allows attackers to execute arbitrary code via the index parameter.",CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-120'],"['cpe:2.3:o:tendacn:ac9_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:tendacn:ac9:3.0:*:*:*:*:*:*:*', 'cpe:2.3:o:tendacn:ac9_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:tendacn:ac9:1.0:*:*:*:*:*:*:*']",0,0
CVE-2021-31755,Tenda,0.97145,9.8,0.0,1.0,0.0,1.0,1,2021-05-07,0.0,,0.0,,,An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setmac allows attackers to execute arbitrary code on the system via a crafted post request.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:o:tenda:ac11_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:tenda:ac11:-:*:*:*:*:*:*:*']",0,0
CVE-2021-38772,Tenda,0.00082,7.5,0.0,1.0,0.0,1.0,1,2022-03-23,0.0,,0.0,,,Tenda AC10-1200 v15.03.06.23_EN was discovered to contain a buffer overflow via the list parameter in the fromSetIpMacBind function.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-120'],"['cpe:2.3:o:tendacn:ac10_firmware:15.03.06.23:*:*:*:*:*:*:*', 'cpe:2.3:h:tendacn:ac10:-:*:*:*:*:*:*:*']",0,0
CVE-2021-42659,Tenda,0.00051,6.5,0.0,1.0,0.0,1.0,1,2022-05-24,0.0,,0.0,,,"There is a buffer overflow vulnerability in the Web server httpd of the router in Tenda router devices such as Tenda AC9 V1.0 V15.03.02.19(6318) and Tenda AC9 V3.0 V15.03.06.42_multi. When setting the virtual service, the httpd program will crash and exit when the super-long list parameter occurs.",CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.8,3.6,['CWE-119'],"['cpe:2.3:h:tenda:ac9:1.0:*:*:*:*:*:*:*', 'cpe:2.3:o:tenda:ac9_firmware:15.03.05.19\\(6318\\):*:*:*:*:*:*:*', 'cpe:2.3:h:tenda:ac9:3.0:*:*:*:*:*:*:*', 'cpe:2.3:o:tenda:ac9_firmware:15.03.06.42_multi:*:*:*:*:*:*:*']",0,0
CVE-2021-44352,Tenda,0.00352,9.8,0.0,1.0,0.0,1.0,1,2021-12-03,0.0,,0.0,,,A Stack-based Buffer Overflow vulnerability exists in the Tenda AC15 V15.03.05.18_multi device via the list parameter in a post request in goform/SetIpMacBind.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:o:tendacn:ac15_firmware:15.03.05.18_multi:*:*:*:*:*:*:*', 'cpe:2.3:h:tendacn:ac15:-:*:*:*:*:*:*:*']",0,0
CVE-2021-45401,Tenda,0.00926,9.8,0.0,1.0,0.0,1.0,1,2022-02-18,0.0,,0.0,,,"A Command injection vulnerability exists in Tenda AC10U AC1200 Smart Dual-band Wireless Router AC10U V1.0 Firmware V15.03.06.49_multi via the setUsbUnload functionality. The vulnerability is caused because the client controlled ""deviceName"" value is passed directly to the ""doSystemCmd"" function.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-77'],"['cpe:2.3:o:tendacn:ac10u_firmware:15.03.06.49_multi:*:*:*:*:*:*:*', 'cpe:2.3:h:tendacn:ac10u:1.0:*:*:*:*:*:*:*']",0,0
CVE-2021-45988,Tenda,0.00091,7.5,0.0,1.0,0.0,1.0,1,2022-02-04,0.0,,0.0,,,Tenda routers G1 and G3 v15.11.0.17(9502)_CN were discovered to contain a stack overflow in the function formAddDnsForward. This vulnerability allows attackers to cause a Denial of Service (DoS) via the DnsForwardRule parameter.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-787'],"['cpe:2.3:o:tendacn:g1_firmware:15.11.0.17\\(9502\\)_cn:*:*:*:*:*:*:*', 'cpe:2.3:h:tendacn:g1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:tendacn:g3_firmware:15.11.0.17\\(9502\\)_cn:*:*:*:*:*:*:*', 'cpe:2.3:h:tendacn:g3:-:*:*:*:*:*:*:*']",0,0
CVE-2021-45991,Tenda,0.00091,7.5,0.0,1.0,0.0,1.0,1,2022-02-04,0.0,,0.0,,,Tenda routers G1 and G3 v15.11.0.17(9502)_CN were discovered to contain a stack overflow in the function formAddVpnUsers. This vulnerability allows attackers to cause a Denial of Service (DoS) via the vpnUsers parameter.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-787'],"['cpe:2.3:o:tendacn:g1_firmware:15.11.0.17\\(9502\\)_cn:*:*:*:*:*:*:*', 'cpe:2.3:h:tendacn:g1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:tendacn:g3_firmware:15.11.0.17\\(9502\\)_cn:*:*:*:*:*:*:*', 'cpe:2.3:h:tendacn:g3:-:*:*:*:*:*:*:*']",0,0
CVE-2021-45997,Tenda,0.00091,7.5,0.0,1.0,0.0,1.0,1,2022-02-04,0.0,,0.0,,,"Tenda routers G1 and G3 v15.11.0.17(9502)_CN were discovered to contain a stack overflow in the function formSetPortMapping. This vulnerability allows attackers to cause a Denial of Service (DoS) via the portMappingServer, portMappingProtocol, portMappingWan, porMappingtInternal, and portMappingExternal parameters.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-787'],"['cpe:2.3:o:tendacn:g1_firmware:15.11.0.17\\(9502\\)_cn:*:*:*:*:*:*:*', 'cpe:2.3:h:tendacn:g1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:tendacn:g3_firmware:15.11.0.17\\(9502\\)_cn:*:*:*:*:*:*:*', 'cpe:2.3:h:tendacn:g3:-:*:*:*:*:*:*:*']",0,0
CVE-2021-46265,Tenda,0.00285,9.8,0.0,1.0,0.0,1.0,1,2022-02-15,0.0,,0.0,,,Tenda AC Series Router AC11_V02.03.01.104_CN was discovered to contain a stack buffer overflow in the wanBasicCfg module. This vulnerability allows attackers to cause a Denial of Service (DoS) via crafted overflow data.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:o:tenda:ac11_firmware:02.03.01.104_cn:*:*:*:*:*:*:*', 'cpe:2.3:h:tenda:ac11:-:*:*:*:*:*:*:*']",0,0
CVE-2021-46321,Tenda,0.00285,9.8,0.0,1.0,0.0,1.0,1,2022-02-15,0.0,,0.0,,,Tenda AC Series Router AC11_V02.03.01.104_CN was discovered to contain a stack buffer overflow in the wifiBasicCfg module. This vulnerability allows attackers to cause a Denial of Service (DoS) via crafted overflow data.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:o:tenda:ac11_firmware:02.03.01.104_cn:*:*:*:*:*:*:*', 'cpe:2.3:h:tenda:ac11:-:*:*:*:*:*:*:*']",0,0
CVE-2021-46393,Tenda,0.00662,9.8,0.0,1.0,0.0,1.0,1,2022-03-04,0.0,,0.0,,,"There is a stack buffer overflow vulnerability in the formSetPPTPServer function of Tenda-AX3 router V16.03.12.10_CN. The v10 variable is directly retrieved from the http request parameter startIp. Then v10 will be splice to stack by function sscanf without any security check,which causes stack overflow. By POSTing the page /goform/SetPptpServerCfg with proper startIp, the attacker can easily perform remote code execution with carefully crafted overflow data.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:o:tenda:ax3_firmware:16.03.12.10:*:*:*:*:*:*:*', 'cpe:2.3:h:tenda:ax3:-:*:*:*:*:*:*:*']",0,0
CVE-2021-46394,Tenda,0.00662,9.8,0.0,1.0,0.0,1.0,1,2022-03-04,0.0,,0.0,,,"There is a stack buffer overflow vulnerability in the formSetPPTPServer function of Tenda-AX3 router V16.03.12.10_CN. The v13 variable is directly retrieved from the http request parameter startIp. Then v13 will be splice to stack by function sscanf without any security check, which causes stack overflow. By POSTing the page /goform/SetPptpServerCfg with proper startIp, the attacker can easily perform remote code execution with carefully crafted overflow data.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:o:tenda:ax3_firmware:16.03.12.10:*:*:*:*:*:*:*', 'cpe:2.3:h:tenda:ax3:-:*:*:*:*:*:*:*']",0,0
CVE-2022-30033,Tenda,0.00082,7.5,0.0,1.0,0.0,1.0,1,2022-05-18,0.0,,0.0,,,Tenda TX9 Pro V22.03.02.10 is vulnerable to Buffer Overflow via the functtion setIPv6Status() in httpd module.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-120'],"['cpe:2.3:o:tenda:tx9_pro_firmware:22.03.02.10:*:*:*:*:*:*:*', 'cpe:2.3:h:tenda:tx9_pro:-:*:*:*:*:*:*:*']",0,0
CVE-2022-30425,Tenda,0.02654,8.8,0.0,0.0,0.0,1.0,1,2022-06-02,0.0,,0.0,,,"Tenda Technology Co.,Ltd HG6 3.3.0-210926 was discovered to contain a command injection vulnerability via the pingAddr and traceAddr parameters. This vulnerability is exploited via a crafted POST request.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-78'],"['cpe:2.3:o:tenda:hg6_firmware:3.3.0-210926:*:*:*:*:*:*:*', 'cpe:2.3:h:tenda:hg6:1.0:*:*:*:*:*:*:*']",0,0
CVE-2022-35201,Tenda,0.01097,9.8,0.0,1.0,0.0,1.0,1,2022-08-19,0.0,,0.0,,,Tenda-AC18 V15.03.05.05 was discovered to contain a remote command execution (RCE) vulnerability.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:tenda:ac18_firmware:15.03.05.05:*:*:*:*:*:*:*', 'cpe:2.3:h:tenda:ac18:-:*:*:*:*:*:*:*']",0,0
CVE-2022-36233,Tenda,0.0006,5.5,0.0,1.0,0.0,0.0,1,2022-08-19,0.0,,0.0,,,"Tenda AC9 V15.03.2.13 is vulnerable to Buffer Overflow via httpd, form_fast_setting_wifi_set. httpd.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,1.8,3.6,['CWE-787'],"['cpe:2.3:h:tendacn:ac9:-:*:*:*:*:*:*:*', 'cpe:2.3:o:tendacn:ac9_firmware:15.03.2.13:*:*:*:*:*:*:*']",0,0
CVE-2022-36570,Tenda,0.00097,7.2,0.0,1.0,0.0,1.0,1,2022-08-31,0.0,,0.0,,,Tenda AC9 V15.03.05.19 was discovered to contain a stack overflow via the time parameter at /goform/SetLEDCfg.,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.2,5.9,['CWE-787'],"['cpe:2.3:o:tenda:ac9_firmware:15.03.05.19:*:*:*:*:*:*:*', 'cpe:2.3:h:tenda:ac9:-:*:*:*:*:*:*:*']",0,0
CVE-2022-36571,Tenda,0.00097,7.2,0.0,1.0,0.0,1.0,1,2022-08-31,0.0,,0.0,,,Tenda AC9 V15.03.05.19 was discovered to contain a stack overflow via the mask parameter at /goform/WanParameterSetting.,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.2,5.9,['CWE-787'],"['cpe:2.3:o:tenda:ac9_firmware:15.03.05.19:*:*:*:*:*:*:*', 'cpe:2.3:h:tenda:ac9:-:*:*:*:*:*:*:*']",0,0
CVE-2022-36587,Tenda,0.00278,9.8,0.0,1.0,0.0,1.0,1,2022-09-07,0.0,,0.0,,,"In Tenda G3 US_G3V3.0br_V15.11.0.6(7663)_EN_TDE, there is a buffer overflow vulnerability caused by sprintf in function in the httpd binary.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-120'],"['cpe:2.3:o:tenda:g3_firmware:15.11.0.6\\(7663\\):*:*:*:*:*:*:*', 'cpe:2.3:h:tenda:g3:-:*:*:*:*:*:*:*']",0,0
CVE-2020-35391,Tenda,0.0024,6.5,0.0,1.0,0.0,1.0,0,2021-01-01,0.0,,0.0,,,"Tenda N300 F3 12.01.01.48 devices allow remote attackers to obtain sensitive information (possibly including an http_passwd line) via a direct request for cgi-bin/DownloadCfg/RouterCfm.cfg, a related issue to CVE-2017-14942. NOTE: the vulnerability report may suggest that either a ? character must be placed after the RouterCfm.cfg filename, or that the HTTP request headers must be unusual, but it is not known why these are relevant to the device's HTTP response behavior.",CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,2.8,3.6,['CWE-425'],"['cpe:2.3:o:tenda:f3_firmware:12.01.01.48:*:*:*:*:*:*:*', 'cpe:2.3:h:tenda:f3:-:*:*:*:*:*:*:*']",1,0
CVE-2022-24163,Tenda,0.00136,7.5,0.0,1.0,0.0,1.0,0,2022-02-04,0.0,,0.0,,,Tenda AX3 v16.03.12.10_CN was discovered to contain a stack overflow in the function fromSetSysTime. This vulnerability allows attackers to cause a Denial of Service (DoS) via the timeZone parameter.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-787'],"['cpe:2.3:o:tenda:ax3_firmware:16.03.12.10_cn:*:*:*:*:*:*:*', 'cpe:2.3:h:tenda:ax3:-:*:*:*:*:*:*:*']",0,0
CVE-2022-29591,Tenda,0.00253,9.8,0.0,1.0,0.0,1.0,0,2022-05-10,0.0,,0.0,,,Tenda TX9 Pro 22.03.02.10 devices have a SetNetControlList buffer overflow.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-120'],"['cpe:2.3:o:tenda:tx9_pro_firmware:22.03.02.10:*:*:*:*:*:*:*', 'cpe:2.3:h:tenda:tx9_pro:-:*:*:*:*:*:*:*']",0,0
CVE-2022-29592,Tenda,0.00475,9.8,0.0,1.0,0.0,1.0,0,2022-05-05,0.0,,0.0,,,Tenda TX9 Pro 22.03.02.10 devices allow OS command injection via set_route (called by doSystemCmd_route).,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-78'],"['cpe:2.3:o:tenda:tx9_pro_firmware:22.03.02.10:*:*:*:*:*:*:*', 'cpe:2.3:h:tenda:tx9_pro:-:*:*:*:*:*:*:*']",0,0
CVE-2022-30023,Tenda,0.00236,8.8,0.0,1.0,0.0,1.0,0,2022-06-16,0.0,,0.0,,,Tenda ONT GPON AC1200 Dual band WiFi HG9 v1.0.1 is vulnerable to Command Injection via the Ping function.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-78'],"['cpe:2.3:o:tenda:hg9_firmware:1.0.1:*:*:*:*:*:*:*', 'cpe:2.3:h:tenda:hg9:-:*:*:*:*:*:*:*']",0,0
CVE-2022-30472,Tenda,0.00234,9.8,0.0,1.0,0.0,1.0,0,2022-05-26,0.0,,0.0,,,Tenda AC Seris Router AC18_V15.03.05.19(6318) has a stack-based buffer overflow vulnerability in function fromAddressNat,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:o:tenda:ac18_firmware:15.03.05.19\\(6318\\):*:*:*:*:*:*:*', 'cpe:2.3:h:tenda:ac18:-:*:*:*:*:*:*:*']",0,0
CVE-2022-30473,Tenda,0.00117,7.5,0.0,1.0,0.0,1.0,0,2022-05-26,0.0,,0.0,,,Tenda AC Series Router AC18_V15.03.05.19(6318) has a stack-based buffer overflow vulnerability in function form_fast_setting_wifi_set,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-787'],"['cpe:2.3:o:tenda:ac18_firmware:15.03.05.19\\(6318\\):*:*:*:*:*:*:*', 'cpe:2.3:h:tenda:ac18:-:*:*:*:*:*:*:*']",0,0
CVE-2022-30474,Tenda,0.00234,9.8,0.0,1.0,0.0,1.0,0,2022-05-26,0.0,,0.0,,,Tenda AC Series Router AC18_V15.03.05.19(6318) was discovered to contain a heap overflow in the httpd module when handling /goform/saveParentControlInfo request.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:o:tenda:ac18_firmware:15.03.05.19\\(6318\\):*:*:*:*:*:*:*', 'cpe:2.3:h:tenda:ac18:-:*:*:*:*:*:*:*']",0,0
CVE-2022-30475,Tenda,0.00117,7.5,0.0,1.0,0.0,1.0,0,2022-05-26,0.0,,0.0,,,Tenda AC Series Router AC18_V15.03.05.19(6318) was discovered to contain a stack-based buffer overflow in the httpd module when handling /goform/WifiExtraSet request.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-787'],"['cpe:2.3:o:tenda:ac18_firmware:15.03.05.19\\(6318\\):*:*:*:*:*:*:*', 'cpe:2.3:h:tenda:ac18:-:*:*:*:*:*:*:*']",0,0
CVE-2022-30476,Tenda,0.00234,9.8,0.0,1.0,0.0,1.0,0,2022-05-26,0.0,,0.0,,,Tenda AC Series Router AC18_V15.03.05.19(6318) was discovered to contain a stack-based buffer overflow in the httpd module when handling /goform/SetFirewallCfg request.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:o:tenda:ac18_firmware:15.03.05.19\\(6318\\):*:*:*:*:*:*:*', 'cpe:2.3:h:tenda:ac18:-:*:*:*:*:*:*:*']",0,0
CVE-2022-30477,Tenda,0.00234,9.8,0.0,1.0,0.0,1.0,0,2022-05-26,0.0,,0.0,,,Tenda AC Series Router AC18_V15.03.05.19(6318) was discovered to contain a stack-based buffer overflow in the httpd module when handling /goform/SetClientState request.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:o:tenda:ac18_firmware:15.03.05.19\\(6318\\):*:*:*:*:*:*:*', 'cpe:2.3:h:tenda:ac18:-:*:*:*:*:*:*:*']",0,0
CVE-2022-31446,Tenda,0.0378,9.8,0.0,1.0,0.0,1.0,0,2022-06-14,0.0,,0.0,,,Tenda AC18 router V15.03.05.19 and V15.03.05.05 was discovered to contain a remote code execution (RCE) vulnerability via the Mac parameter at ip/goform/WriteFacMac.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-78'],"['cpe:2.3:o:tendacn:ac18_firmware:15.03.05.05:*:*:*:*:*:*:*', 'cpe:2.3:o:tendacn:ac18_firmware:15.03.05.19:*:*:*:*:*:*:*', 'cpe:2.3:h:tendacn:ac18:-:*:*:*:*:*:*:*']",0,0
CVE-2022-32054,Tenda,0.01236,9.8,0.0,0.0,0.0,1.0,0,2022-07-07,0.0,,0.0,,,Tenda AC10 US_AC10V1.0RTL_V15.03.06.26_multi_TD01 was discovered to contain a remote code execution (RCE) vulnerability via the lanIp parameter.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-78'],"['cpe:2.3:o:tenda:ac10_firmware:15.03.06.26:*:*:*:*:*:*:*', 'cpe:2.3:h:tenda:ac10:1.0:*:*:*:*:*:*:*']",0,0
CVE-2022-37814,Tenda,0.00234,9.8,0.0,1.0,0.0,1.0,0,2022-08-25,0.0,,0.0,,,Tenda AC1206 V15.03.06.23 was discovered to contain multiple stack overflows via the deviceMac and the device_id parameters in the function addWifiMacFilter.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:o:tenda:ac1206_firmware:15.03.06.23:*:*:*:*:*:*:*', 'cpe:2.3:h:tenda:ac1206:-:*:*:*:*:*:*:*']",0,0
CVE-2022-38829,Tenda,0.00234,9.8,0.0,1.0,0.0,1.0,0,2022-09-16,0.0,,0.0,,,Tenda RX9_Pro V22.03.02.10 is vulnerable to Buffer Overflow via httpd/setMacFilterCfg.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-120'],"['cpe:2.3:o:tenda:rx9_pro_firmware:22.03.02.10:*:*:*:*:*:*:*', 'cpe:2.3:h:tenda:rx9_pro:-:*:*:*:*:*:*:*']",0,0
CVE-2022-38831,Tenda,0.00234,9.8,0.0,1.0,0.0,1.0,0,2022-09-16,0.0,,0.0,,,Tenda RX9_Pro V22.03.02.10 is vulnerable to Buffer Overflow via httpd/SetNetControlList,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-120'],"['cpe:2.3:o:tenda:rx9_pro_firmware:22.03.02.10:*:*:*:*:*:*:*', 'cpe:2.3:h:tenda:rx9_pro:-:*:*:*:*:*:*:*']",0,0
CVE-2022-42078,Tenda,0.00061,6.5,0.0,1.0,0.0,0.0,0,2022-10-12,0.0,,0.0,,,Tenda AC1206 US_AC1206V1.0RTL_V15.03.06.23_multi_TD01 is vulnerable to Cross Site Request Forgery (CSRF) via function fromSysToolRestoreSet.,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.8,3.6,['CWE-352'],"['cpe:2.3:o:tenda:ac1206_firmware:15.03.06.23_multi_td01:*:*:*:*:*:*:*', 'cpe:2.3:h:tenda:ac1206:-:*:*:*:*:*:*:*']",0,0
CVE-2022-42079,Tenda,0.00117,7.5,0.0,1.0,0.0,0.0,0,2022-10-12,0.0,,0.0,,,Tenda AC1206 US_AC1206V1.0RTL_V15.03.06.23_multi_TD01 was discovered to contain a stack overflow via the function formWifiBasicSet.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-787'],"['cpe:2.3:o:tenda:ac1206_firmware:15.03.06.23_multi_td01:*:*:*:*:*:*:*', 'cpe:2.3:h:tenda:ac1206:-:*:*:*:*:*:*:*']",0,0
CVE-2022-42080,Tenda,0.00117,7.5,0.0,1.0,0.0,0.0,0,2022-10-12,0.0,,0.0,,,Tenda AC1206 US_AC1206V1.0RTL_V15.03.06.23_multi_TD01 was discovered to contain a heap overflow via sched_start_time parameter.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-787'],"['cpe:2.3:o:tenda:ac1206_firmware:15.03.06.23_multi_td01:*:*:*:*:*:*:*', 'cpe:2.3:h:tenda:ac1206:-:*:*:*:*:*:*:*']",0,0
CVE-2022-42081,Tenda,0.00117,7.5,0.0,1.0,0.0,0.0,0,2022-10-12,0.0,,0.0,,,Tenda AC1206 US_AC1206V1.0RTL_V15.03.06.23_multi_TD01 was discovered to contain a stack overflow via sched_end_time parameter.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-787'],"['cpe:2.3:o:tenda:ac1206_firmware:15.03.06.23_multi_td01:*:*:*:*:*:*:*', 'cpe:2.3:h:tenda:ac1206:-:*:*:*:*:*:*:*']",0,0
CVE-2022-42163,Tenda,0.00234,9.8,0.0,1.0,0.0,1.0,0,2022-10-17,0.0,,0.0,,,Tenda AC10 V15.03.06.23 contains a Stack overflow vulnerability via /goform/fromNatStaticSetting.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:o:tenda:ac10_firmware:15.03.06.23:*:*:*:*:*:*:*', 'cpe:2.3:h:tenda:ac10:-:*:*:*:*:*:*:*']",0,0
CVE-2022-42164,Tenda,0.00234,9.8,0.0,1.0,0.0,1.0,0,2022-10-17,0.0,,0.0,,,Tenda AC10 V15.03.06.23 contains a Stack overflow vulnerability via /goform/formSetClientState.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:o:tenda:ac10_firmware:15.03.06.23:*:*:*:*:*:*:*', 'cpe:2.3:h:tenda:ac10:-:*:*:*:*:*:*:*']",0,0
CVE-2022-42165,Tenda,0.00234,9.8,0.0,1.0,0.0,1.0,0,2022-10-17,0.0,,0.0,,,Tenda AC10 V15.03.06.23 contains a Stack overflow vulnerability via /goform/formSetDeviceName.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:o:tenda:ac10_firmware:15.03.06.23:*:*:*:*:*:*:*', 'cpe:2.3:h:tenda:ac10:-:*:*:*:*:*:*:*']",0,0
CVE-2022-42166,Tenda,0.00234,9.8,0.0,1.0,0.0,1.0,0,2022-10-17,0.0,,0.0,,,Tenda AC10 V15.03.06.23 contains a Stack overflow vulnerability via /goform/formSetSpeedWan.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:h:tenda:ac10:-:*:*:*:*:*:*:*', 'cpe:2.3:o:tenda:ac10_firmware:15.03.06.23:*:*:*:*:*:*:*']",0,0
CVE-2022-42168,Tenda,0.00234,9.8,0.0,1.0,0.0,1.0,0,2022-10-17,0.0,,0.0,,,Tenda AC10 V15.03.06.23 contains a Stack overflow vulnerability via /goform/fromSetIpMacBind.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:o:tenda:ac10_firmware:15.03.06.23:*:*:*:*:*:*:*', 'cpe:2.3:h:tenda:ac10:-:*:*:*:*:*:*:*']",0,0
CVE-2022-42169,Tenda,0.00234,9.8,0.0,1.0,0.0,1.0,0,2022-10-17,0.0,,0.0,,,Tenda AC10 V15.03.06.23 contains a Stack overflow vulnerability via /goform/addWifiMacFilter.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:o:tenda:ac10_firmware:15.03.06.23:*:*:*:*:*:*:*', 'cpe:2.3:h:tenda:ac10:-:*:*:*:*:*:*:*']",0,0
CVE-2022-42170,Tenda,0.00234,9.8,0.0,1.0,0.0,1.0,0,2022-10-17,0.0,,0.0,,,Tenda AC10 V15.03.06.23 contains a Stack overflow vulnerability via /goform/formWifiWpsStart.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:o:tenda:ac10_firmware:15.03.06.23:*:*:*:*:*:*:*', 'cpe:2.3:h:tenda:ac10:-:*:*:*:*:*:*:*']",0,0
CVE-2017-15361,Haier,0.00376,5.9,0.0,1.0,0.0,0.0,1,2017-10-16,0.0,,0.0,,,"The Infineon RSA library 1.02.013 in Infineon Trusted Platform Module (TPM) firmware, such as versions before 0000000000000422 - 4.34, before 000000000000062b - 6.43, and before 0000000000008521 - 133.33, mishandles RSA key generation, which makes it easier for attackers to defeat various cryptographic protection mechanisms via targeted attacks, aka ROCA. Examples of affected technologies include BitLocker with TPM 1.2, YubiKey 4 (before 4.3.5) PGP key generation, and the Cached User Data encryption feature in Chrome OS.",CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,HIGH,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,2.2,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:infineon:trusted_platform_firmware:4.31:*:*:*:*:*:*:*', 'cpe:2.3:o:infineon:trusted_platform_firmware:4.32:*:*:*:*:*:*:*', 'cpe:2.3:o:infineon:trusted_platform_firmware:6.40:*:*:*:*:*:*:*', 'cpe:2.3:o:infineon:trusted_platform_firmware:133.32:*:*:*:*:*:*:*', 'cpe:2.3:h:acer:c720_chromebook:-:*:*:*:*:*:*:*', 'cpe:2.3:h:acer:chromebase:-:*:*:*:*:*:*:*', 'cpe:2.3:h:acer:chromebase_24:-:*:*:*:*:*:*:*', 'cpe:2.3:h:acer:chromebook_11_c730:-:*:*:*:*:*:*:*', 'cpe:2.3:h:acer:chromebook_11_c730e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:acer:chromebook_11_c735:-:*:*:*:*:*:*:*', 'cpe:2.3:h:acer:chromebook_11_c740:-:*:*:*:*:*:*:*', 'cpe:2.3:h:acer:chromebook_11_c771:-:*:*:*:*:*:*:*', 'cpe:2.3:h:acer:chromebook_11_c771t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:acer:chromebook_11_n7_c731:-:*:*:*:*:*:*:*', 'cpe:2.3:h:acer:chromebook_13_cb5-311:-:*:*:*:*:*:*:*', 'cpe:2.3:h:acer:chromebook_14_cb3-431:-:*:*:*:*:*:*:*', 'cpe:2.3:h:acer:chromebook_14_for_work_cp5-471:-:*:*:*:*:*:*:*', 'cpe:2.3:h:acer:chromebook_15_cb3-531:-:*:*:*:*:*:*:*', 'cpe:2.3:h:acer:chromebook_15_cb3-532:-:*:*:*:*:*:*:*', 'cpe:2.3:h:acer:chromebook_15_cb5-571:-:*:*:*:*:*:*:*', 'cpe:2.3:h:acer:chromebook_r11:-:*:*:*:*:*:*:*', 'cpe:2.3:h:acer:chromebook_r13_cb5-312t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:acer:chromebox:-:*:*:*:*:*:*:*', 'cpe:2.3:h:acer:chromebox_cxi2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:aopen:chromebase:-:*:commercial:*:*:*:*:*', 'cpe:2.3:h:aopen:chromebase:-:*:mini:*:*:*:*:*', 'cpe:2.3:h:aopen:chromebox:-:*:commercial:*:*:*:*:*', 'cpe:2.3:h:aopen:chromeboxi:-:*:mini:*:*:*:*:*', 'cpe:2.3:h:asi:chromebook:-:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:chromebit_cs10:-:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:chromebook_c200:-:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:chromebook_c201pa:-:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:chromebook_c202sa:-:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:chromebook_c300:-:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:chromebook_c300sa:-:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:chromebook_c301sa:-:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:chromebook_flip_c100pa:-:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:chromebook_flip_c302:-:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:chromebox_cn60:-:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:chromebox_cn62:-:*:*:*:*:*:*:*', 'cpe:2.3:h:bobicus:chromebook_11:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ctl:j2_chromebook:-:*:*:*:*:education:*:*', 'cpe:2.3:h:ctl:j4_chromebook:-:*:*:*:*:education:*:*', 'cpe:2.3:h:ctl:j5_chromebook:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ctl:n6_chromebook:-:*:*:*:*:education:*:*', 'cpe:2.3:h:ctl:nl61_chromebook:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dell:chromebook_11:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dell:chromebook_11_3120:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dell:chromebook_11_3189:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dell:chromebook_11_model_3180:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dell:chromebook_13_3380:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dell:chromebox:-:*:*:*:*:*:*:*', 'cpe:2.3:h:edugear:chromebook_k:-:*:*:*:*:*:*:*', 'cpe:2.3:h:edugear:chromebook_m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:edugear:chromebook_r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:edugear:cmt_chromebook:-:*:*:*:*:*:*:*', 'cpe:2.3:h:edxis:chromebook:-:*:*:*:*:*:*:*', 'cpe:2.3:h:edxis:education_chromebook:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epik:chromebook_elb1101:-:*:*:*:*:*:*:*', 'cpe:2.3:h:google:pixel:-:*:*:*:*:*:*:*', 'cpe:2.3:h:haier:chromebook_11:-:*:*:*:*:*:*:*', 'cpe:2.3:h:haier:chromebook_11_c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:haier:chromebook_11_g2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:haier:chromebook_11e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hexa:chromebook_pi:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hisense:chromebook_11:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:chromebook:-:*:*:*:*:meetings:*:*', 'cpe:2.3:h:hp:chromebook_11-vxxx:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:chromebook_11_1100-1199:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:chromebook_11_2000-2099:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:chromebook_11_2100-2199:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:chromebook_11_2200-2299:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:chromebook_11_g1:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:chromebook_11_g2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:chromebook_11_g3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:chromebook_11_g4\\/g4_ee:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:chromebook_11_g5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:chromebook_11_g5_ee:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:chromebook_13_g1:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:chromebook_14:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:chromebook_14_ak000-099:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:chromebook_14_g3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:chromebook_14_g4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:chromebook_14_x000-x999:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:chromebox_cb1-\\(000-099\\):-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:chromebox_g1:-:*:*:*:*:*:*:*', 'cpe:2.3:h:lenovo:100s_chromebook:-:*:*:*:*:*:*:*', 'cpe:2.3:h:lenovo:n20_chromebook:-:*:*:*:*:*:*:*', 'cpe:2.3:h:lenovo:n21_chromebook:-:*:*:*:*:*:*:*', 'cpe:2.3:h:lenovo:n22_chromebook:-:*:*:*:*:*:*:*', 'cpe:2.3:h:lenovo:n23_chromebook:-:*:*:*:*:*:*:*', 'cpe:2.3:h:lenovo:n23_flex_11_chromebook:-:*:*:*:*:*:*:*', 'cpe:2.3:h:lenovo:n23_yoga_11_chromebook:-:*:*:*:*:*:*:*', 'cpe:2.3:h:lenovo:n42_chromebook:-:*:*:*:*:*:*:*', 'cpe:2.3:h:lenovo:thinkcentre_chromebox:-:*:*:*:*:*:*:*', 'cpe:2.3:h:lenovo:thinkpad_11e_chromebook:-:*:*:*:*:*:*:*', 'cpe:2.3:h:lenovo:thinkpad_13_chromebook:-:*:*:*:*:*:*:*', 'cpe:2.3:h:lg:chromebase_22cb25s:-:*:*:*:*:*:*:*', 'cpe:2.3:h:lg:chromebase_22cv241:-:*:*:*:*:*:*:*', 'cpe:2.3:h:medion:akoya_s2013:-:*:*:*:*:*:*:*', 'cpe:2.3:h:medion:chromebook_s2015:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mercer:chromebook:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mercer:v2_chromebook:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ncomputing:chromebook_cx100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nexian:chromebook:-:*:*:*:*:*:*:*', 'cpe:2.3:h:pcmerge:chromebook_pcm-116t-432b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:poin2:chromebook_11:-:*:*:*:*:*:*:*', 'cpe:2.3:h:poin2:chromebook_14:-:*:*:*:*:*:*:*', 'cpe:2.3:h:positivo:chromebook_ch1190:-:*:*:*:*:*:*:*', 'cpe:2.3:h:prowise:entry_line_chromebook:-:*:*:*:*:*:*:*', 'cpe:2.3:h:prowise:proline_chromebook:-:*:*:*:*:*:*:*', 'cpe:2.3:h:rgs:education_chromebook:-:*:*:*:*:*:*:*', 'cpe:2.3:h:samsung:chromebook_2_11:-:*:*:*:*:*:*:*', 'cpe:2.3:h:samsung:chromebook_2_11_xe500c12:-:*:*:*:*:*:*:*', 'cpe:2.3:h:samsung:chromebook_2_13:-:*:*:*:*:*:*:*', 'cpe:2.3:h:samsung:chromebook_3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:samsung:chromebook_plus:-:*:*:*:*:*:*:*', 'cpe:2.3:h:samsung:chromebook_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sector-five:e1_rugged_chromebook:-:*:*:*:*:*:*:*', 'cpe:2.3:h:senkatel:c1101_chromebook:-:*:*:*:*:*:*:*', 'cpe:2.3:h:toshiba:chromebook:-:*:*:*:*:*:*:*', 'cpe:2.3:h:toshiba:chromebook_2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:toshiba:chromebook_2:-:*:2015:*:*:*:*:*', 'cpe:2.3:h:true:idc_chromebook:-:*:*:*:*:*:*:*', 'cpe:2.3:h:true:idc_chromebook_11:-:*:*:*:*:*:*:*', 'cpe:2.3:h:videonet:chromebook:-:*:*:*:*:*:*:*', 'cpe:2.3:h:videonet:chromebook_bl10:-:*:*:*:*:*:*:*', 'cpe:2.3:h:viglen:chromebook_11:-:*:*:*:*:*:*:*', 'cpe:2.3:h:viglen:chromebook_360:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xolo:chromebook:-:*:*:*:*:*:*:*', 'cpe:2.3:a:infineon:rsa_library:*:*:*:*:*:*:*:*']",0,0
CVE-2019-15359,Haier,0.00044,5.5,0.0,1.0,0.0,1.0,1,2019-11-14,0.0,,0.0,,,"The Haier A6 Android device with a build fingerprint of Haier/A6/A6:8.1.0/O11019/1534219877:userdebug/release-keys contains a pre-installed app with a package name of com.mediatek.wfo.impl app (versionCode=27, versionName=8.1.0) that allows any app co-located on the device to modify a system property through an exported interface without proper authorization.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N,LOCAL,LOW,LOW,NONE,UNCHANGED,NONE,HIGH,NONE,MEDIUM,1.8,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:haier:a6_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:haier:a6:-:*:*:*:*:*:*:*']",0,0
CVE-2019-15370,Haier,0.00044,5.5,0.0,1.0,0.0,1.0,1,2019-11-14,0.0,,0.0,,,"The Haier G8 Android device with a build fingerprint of Haier/HM-G559-FL/G8:8.1.0/O11019/1526527761:user/release-keys contains a pre-installed app with a package name of com.mediatek.wfo.impl app (versionCode=27, versionName=8.1.0) that allows any app co-located on the device to modify a system property through an exported interface without proper authorization.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N,LOCAL,LOW,LOW,NONE,UNCHANGED,NONE,HIGH,NONE,MEDIUM,1.8,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:haier_g8_project:haier_g8_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:haier_g8_project:haier_g8:-:*:*:*:*:*:*:*']",0,0
CVE-2019-15375,Haier,0.00044,5.5,0.0,1.0,0.0,1.0,1,2019-11-14,0.0,,0.0,,,"The Haier G8 Android device with a build fingerprint of Haier/HM-G559-FL/G8:8.1.0/O11019/1522294799:user/release-keys contains a pre-installed app with a package name of com.mediatek.wfo.impl app (versionCode=27, versionName=8.1.0) that allows any app co-located on the device to modify a system property through an exported interface without proper authorization.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N,LOCAL,LOW,LOW,NONE,UNCHANGED,NONE,HIGH,NONE,MEDIUM,1.8,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:h:haier:g8:-:*:*:*:*:*:*:*', 'cpe:2.3:o:haier:g8_firmware:-:*:*:*:*:*:*:*']",0,0
CVE-2019-15389,Haier,0.00159,8.1,0.0,1.0,0.0,1.0,1,2019-11-14,0.0,,0.0,,,"The Haier A6 Android device with a build fingerprint of Haier/A6/A6:8.1.0/O11019/1534219877:userdebug/release-keys contains a pre-installed platform app with a package name of com.lovelyfont.defcontainer (versionCode=7, versionName=7.1.13). This app contains an exported service named com.lovelyfont.manager.FontCoverService that allows any app co-located on the device to supply arbitrary commands to be executed as the system user. This app cannot be disabled by the user and the attack can be performed by a zero-permission app. In addition to the local attack surface, its accompanying app with a package name of com.ekesoo.lovelyhifonts makes network requests using HTTP and an attacker can perform a Man-in-the-Middle (MITM) attack on the connection to inject a command in a network response that will be executed as the system user by the com.lovelyfont.defcontainer app. Executing commands as the system user can allow a third-party app to video record the user's screen, factory reset the device, obtain the user's notifications, read the logcat logs, inject events in the Graphical User Interface (GUI), and obtains the user's text messages, and more. Executing commands as the system user can allow a third-party app to factory reset the device, obtain the user's notifications, read the logcat logs, inject events in the GUI, change the default Input Method Editor (IME) (e.g., keyboard) with one contained within the attacking app that contains keylogging functionality, and obtains the user's text messages, and more.",CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,HIGH,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.2,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:haier_a6_project:haier_a6_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:haier_a6_project:haier_a6:-:*:*:*:*:*:*:*']",0,0
CVE-2019-15390,Haier,0.00044,5.5,0.0,1.0,0.0,1.0,1,2019-11-14,0.0,,0.0,,,"The Haier G8 Android device with a build fingerprint of Haier/HM-G559-FL/G8:8.1.0/O11019/1522294799:user/release-keys contains a pre-installed app with a package name of com.qiku.service.container app (versionCode=5, versionName=1.03.00_VER_32525983298984) that allows any app co-located on the device to modify a system property through an exported interface without proper authorization.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N,LOCAL,LOW,LOW,NONE,UNCHANGED,NONE,HIGH,NONE,MEDIUM,1.8,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:haier_g8_project:haier_g8_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:haier_g8_project:haier_g8:-:*:*:*:*:*:*:*']",0,0
CVE-2019-15367,Haier,0.00044,5.5,0.0,1.0,0.0,1.0,0,2019-11-14,0.0,,0.0,,,"The Haier P10 Android device with a build fingerprint of Haier/P10/P10:8.1.0/O11019/1532662449:user/release-keys contains a pre-installed app with a package name of com.mediatek.wfo.impl app (versionCode=27, versionName=8.1.0) that allows any app co-located on the device to modify a system property through an exported interface without proper authorization.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N,LOCAL,LOW,LOW,NONE,UNCHANGED,NONE,HIGH,NONE,MEDIUM,1.8,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:h:haier:p10:-:*:*:*:*:*:*:*', 'cpe:2.3:o:haier:p10_firmware:-:*:*:*:*:*:*:*']",0,0
CVE-2017-16522,MitraStar,0.00382,8.8,0.0,1.0,0.0,1.0,1,2017-11-03,0.0,,0.0,,,MitraStar GPT-2541GNAC (HGU) 1.00(VNJ0)b1 and DSL-100HN-T1 ES_113WJY0b16 devices allow remote authenticated users to obtain root access by specifying /bin/sh as the command to execute.,CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-276'],"['cpe:2.3:o:mitrastar:gpt-2541gnac_firmware:1.00\\(vnj0\\)b1:*:*:*:*:*:*:*', 'cpe:2.3:h:mitrastar:gpt-2541gnac:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mitrastar:dsl-100hn-t1_firmware:es_113wjy0b16:*:*:*:*:*:*:*', 'cpe:2.3:h:mitrastar:dsl-100hn-t1:-:*:*:*:*:*:*:*']",0,0
CVE-2017-16523,MitraStar,0.00957,9.8,0.0,1.0,0.0,1.0,1,2017-11-03,0.0,,0.0,,,"MitraStar GPT-2541GNAC (HGU) 1.00(VNJ0)b1 and DSL-100HN-T1 ES_113WJY0b16 devices have a zyad1234 password for the zyad1234 account, which is equivalent to root and undocumented.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:mitrastar:gpt-2541gnac_firmware:1.00\\(vnj0\\)b1:*:*:*:*:*:*:*', 'cpe:2.3:h:mitrastar:gpt-2541gnac:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mitrastar:dsl-100hn-t1_firmware:es_113wjy0b16:*:*:*:*:*:*:*', 'cpe:2.3:h:mitrastar:dsl-100hn-t1:-:*:*:*:*:*:*:*']",0,0
CVE-2021-42165,MitraStar,0.03613,8.8,1.0,1.0,0.0,1.0,0,2022-05-03,0.0,,0.0,,,"MitraStar GPT-2541GNAC-N1 (HGU) 100VNZ0b33 devices allow remote authenticated users to obtain root access by executing command ""deviceinfo show file &&/bin/bash"" because of incorrect sanitization of parameter ""path"".",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-78'],"['cpe:2.3:o:mitrastar:gpt-2541gnac-n1_firmware:br_g3.5_100vnz0b33:*:*:*:*:*:*:*', 'cpe:2.3:h:mitrastar:gpt-2541gnac-n1:-:*:*:*:*:*:*:*']",1,0
CVE-2017-16563,Grandstream Networks,0.00079,8.0,0.0,1.0,0.0,1.0,1,2017-11-06,0.0,,0.0,,,"Cross-Site Request Forgery (CSRF) in the Basic Settings screen on Vonage (Grandstream) HT802 devices allows attackers to modify settings, related to cgi-bin/update.",CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.1,5.9,['CWE-352'],"['cpe:2.3:o:grandstream:ht802_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ht802:-:*:*:*:*:*:*:*']",0,0
CVE-2017-16564,Grandstream Networks,0.00071,5.4,0.0,1.0,0.0,1.0,1,2017-11-06,0.0,,0.0,,,Stored Cross-site scripting (XSS) vulnerability in /cgi-bin/config2 on Vonage (Grandstream) HT802 devices allows remote authenticated users to inject arbitrary web script or HTML via the DHCP vendor class ID field (P148).,CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,LOW,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.3,2.7,['CWE-79'],"['cpe:2.3:o:grandstream:ht802_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ht802:-:*:*:*:*:*:*:*']",0,0
CVE-2017-16565,Grandstream Networks,0.00112,8.8,0.0,1.0,0.0,1.0,1,2017-11-06,0.0,,0.0,,,Cross-Site Request Forgery (CSRF) in /cgi-bin/login on Vonage (Grandstream) HT802 devices allows attackers to authenticate a user via the login screen using the default password of 123 and submit arbitrary requests.,CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-352'],"['cpe:2.3:o:grandstream:ht802_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ht802:-:*:*:*:*:*:*:*']",0,0
CVE-2018-17563,Grandstream Networks,0.0009,5.3,0.0,1.0,0.0,1.0,1,2019-04-01,1.0,2019-01-03,,,1.0,A Malformed Input String to /cgi-bin/api-get_line_status on Grandstream GXP16xx VoIP 1.0.4.128 phones allows attackers to dump the device's configuration in cleartext.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,LOW,NONE,NONE,MEDIUM,3.9,1.4,['CWE-311'],"['cpe:2.3:o:grandstream:gxp1610_firmware:1.0.4.128:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:gxp1610:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:gxp1615_firmware:1.0.4.128:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:gxp1615:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:gxp1620_firmware:1.0.4.128:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:gxp1620:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:gxp1625_firmware:1.0.4.128:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:gxp1625:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:gxp1628_firmware:1.0.4.128:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:gxp1628:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:gxp1630_firmware:1.0.4.128:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:gxp1630:-:*:*:*:*:*:*:*']",0,0
CVE-2018-17564,Grandstream Networks,0.00244,9.8,0.0,1.0,0.0,1.0,1,2019-04-01,1.0,2019-01-03,,,1.0,A Malformed Input String to /cgi-bin/delete_CA on Grandstream GXP16xx VoIP 1.0.4.128 phones allows attackers to delete configuration parameters and gain admin access to the device.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:grandstream:gxp1610_firmware:1.0.4.128:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:gxp1610:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:gxp1615_firmware:1.0.4.128:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:gxp1615:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:gxp1620_firmware:1.0.4.128:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:gxp1620:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:gxp1625_firmware:1.0.4.128:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:gxp1625:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:gxp1628_firmware:1.0.4.128:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:gxp1628:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:gxp1630_firmware:1.0.4.128:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:gxp1630:-:*:*:*:*:*:*:*']",0,0
CVE-2018-17565,Grandstream Networks,0.0027,9.8,0.0,1.0,0.0,1.0,1,2019-04-01,1.0,2019-01-03,,,1.0,Shell Metacharacter Injection in the SSH configuration interface on Grandstream GXP16xx VoIP 1.0.4.128 phones allows attackers to execute arbitrary system commands and gain a root shell.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-78'],"['cpe:2.3:o:grandstream:gxp1610_firmware:1.0.4.128:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:gxp1610:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:gxp1615_firmware:1.0.4.128:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:gxp1615:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:gxp1620_firmware:1.0.4.128:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:gxp1620:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:gxp1625_firmware:1.0.4.128:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:gxp1625:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:gxp1628_firmware:1.0.4.128:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:gxp1628:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:gxp1630_firmware:1.0.4.128:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:gxp1630:-:*:*:*:*:*:*:*']",0,0
CVE-2019-10655,Grandstream Networks,0.91721,9.8,0.0,1.0,0.0,1.0,1,2019-03-30,0.0,,0.0,,,"Grandstream GAC2500 1.0.3.35, GXP2200 1.0.3.27, GVC3202 1.0.3.51, GXV3275 before 1.0.3.219 Beta, and GXV3240 before 1.0.3.219 Beta devices allow unauthenticated remote code execution via shell metacharacters in a /manager?action=getlogcat priority field, in conjunction with a buffer overflow (via the phonecookie cookie) to overwrite a data structure and consequently bypass authentication. This can be exploited remotely or via CSRF because the cookie can be placed in an Accept HTTP header in an XMLHttpRequest call to lighttpd.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-119'],"['cpe:2.3:o:grandstream:gac2500_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:gac2500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:gvc3202_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:gvc3202:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:gxv3275_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:gxv3275:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:gxv3240_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:gxv3240:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:gxp2200_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:gxp2200:-:*:*:*:*:*:*:*']",0,0
CVE-2019-10656,Grandstream Networks,0.0022,8.8,0.0,1.0,0.0,1.0,1,2019-03-30,0.0,,0.0,,,Grandstream GWN7000 before 1.0.6.32 devices allow remote authenticated users to execute arbitrary code via shell metacharacters in the filename in a /ubus/uci.apply update_nds_webroot_from_tmp API call.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-78'],"['cpe:2.3:h:grandstream:gwn7000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:gwn7000_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2019-10658,Grandstream Networks,0.0022,8.8,0.0,1.0,0.0,1.0,1,2019-03-30,0.0,,0.0,,,Grandstream GWN7610 before 1.0.8.18 devices allow remote authenticated users to execute arbitrary code via shell metacharacters in the filename in a /ubus/controller.icc.update_nds_webroot_from_tmp update_nds_webroot_from_tmp API call.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-78'],"['cpe:2.3:o:grandstream:gwn7610_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:gwn7610:-:*:*:*:*:*:*:*']",0,0
CVE-2019-10659,Grandstream Networks,0.00209,8.8,0.0,1.0,0.0,1.0,1,2019-03-30,0.0,,0.0,,,Grandstream GXV3370 before 1.0.1.41 and WP820 before 1.0.3.6 devices allow remote authenticated users to execute arbitrary code via shell metacharacters in a /manager?action=getlogcat priority field.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-78'],"['cpe:2.3:o:grandstream:gxv3370_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:gxv3370:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:wp820_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:wp820:-:*:*:*:*:*:*:*']",0,0
CVE-2019-10660,Grandstream Networks,0.00209,8.8,0.0,1.0,0.0,1.0,1,2019-03-30,0.0,,0.0,,,Grandstream GXV3611IR_HD before 1.0.3.23 devices allow remote authenticated users to execute arbitrary code via shell metacharacters in the /goform/systemlog?cmd=set logserver field.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-78'],"['cpe:2.3:o:grandstream:gxv3611ir_hd_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:gxv3611ir_hd:-:*:*:*:*:*:*:*']",0,0
CVE-2019-10662,Grandstream Networks,0.00209,8.8,0.0,1.0,0.0,1.0,1,2019-03-30,0.0,,0.0,,,Grandstream UCM6204 before 1.0.19.20 devices allow remote authenticated users to execute arbitrary code via shell metacharacters in the backupUCMConfig file-backup parameter to the /cgi? URI.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-78'],"['cpe:2.3:o:grandstream:ucm6204_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ucm6204:-:*:*:*:*:*:*:*']",0,0
CVE-2019-10663,Grandstream Networks,0.0011,8.8,0.0,1.0,0.0,1.0,1,2019-03-30,0.0,,0.0,,,Grandstream UCM6204 before 1.0.19.20 devices allow remote authenticated users to conduct SQL injection attacks via the sord parameter in a listCodeblueGroup API call to the /cgi? URI.,CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-89'],"['cpe:2.3:o:grandstream:ucm6204_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ucm6204:-:*:*:*:*:*:*:*']",0,0
CVE-2020-25217,Grandstream Networks,0.00141,7.2,0.0,1.0,0.0,1.0,1,2021-03-29,1.0,2020-10-30,,,1.0,Grandstream GRP261x VoIP phone running firmware version 1.0.3.6 (Base) allows Command Injection as root in its administrative web interface.,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.2,5.9,['CWE-77'],"['cpe:2.3:o:grandstream:grp2612_firmware:1.0.3.6:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:grp2612:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:grp2612p_firmware:1.0.3.6:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:grp2612p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:grp2612w_firmware:1.0.3.6:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:grp2612w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:grp2613_firmware:1.0.3.6:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:grp2613:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:grp2614_firmware:1.0.3.6:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:grp2614:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:grp2615_firmware:1.0.3.6:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:grp2615:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:grp2616_firmware:1.0.3.6:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:grp2616:-:*:*:*:*:*:*:*']",0,0
CVE-2020-25218,Grandstream Networks,0.00235,9.8,0.0,1.0,0.0,1.0,1,2021-03-29,1.0,2020-10-30,,,1.0,Grandstream GRP261x VoIP phone running firmware version 1.0.3.6 (Base) allow Authentication Bypass in its administrative web interface.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-306'],"['cpe:2.3:o:grandstream:grp2612_firmware:1.0.3.6:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:grp2612:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:grp2612p_firmware:1.0.3.6:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:grp2612p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:grp2612w_firmware:1.0.3.6:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:grp2612w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:grp2613_firmware:1.0.3.6:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:grp2613:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:grp2614_firmware:1.0.3.6:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:grp2614:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:grp2615_firmware:1.0.3.6:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:grp2615:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:grp2616_firmware:1.0.3.6:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:grp2616:-:*:*:*:*:*:*:*']",0,0
CVE-2020-5722,Grandstream Networks,0.97534,9.8,1.0,1.0,0.0,0.0,1,2020-03-23,1.0,2020-03-20,,,1.0,The HTTP interface of the Grandstream UCM6200 series is vulnerable to an unauthenticated remote SQL injection via crafted HTTP request. An attacker can use this vulnerability to execute shell commands as root on versions before 1.0.19.20 or inject HTML in password recovery emails in versions before 1.0.20.17.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-89'],"['cpe:2.3:o:grandstream:ucm6200_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ucm6200:-:*:*:*:*:*:*:*']",1,0
CVE-2020-5723,Grandstream Networks,0.00659,9.8,0.0,1.0,0.0,1.0,1,2020-03-30,1.0,2020-03-30,,,1.0,The UCM6200 series 1.0.20.22 and below stores unencrypted user passwords in an SQLite database. This could allow an attacker to retrieve all passwords and possibly gain elevated privileges.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-312'],"['cpe:2.3:o:grandstream:ucm6202_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ucm6202:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:ucm6204_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ucm6204:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:ucm6208_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ucm6208:-:*:*:*:*:*:*:*']",0,0
CVE-2020-5724,Grandstream Networks,0.00226,7.5,0.0,1.0,0.0,1.0,1,2020-03-30,1.0,2020-03-30,,,1.0,The Grandstream UCM6200 series before 1.0.20.22 is vulnerable to an SQL injection via the HTTP server's websockify endpoint. A remote unauthenticated attacker can invoke the challenge action with a crafted username and discover user passwords.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-89'],"['cpe:2.3:o:grandstream:ucm6202_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ucm6202:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:ucm6204_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ucm6204:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:ucm6208_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ucm6208:-:*:*:*:*:*:*:*']",0,0
CVE-2020-5725,Grandstream Networks,0.00255,5.9,0.0,1.0,0.0,1.0,1,2020-03-30,1.0,2020-03-30,,,1.0,"The Grandstream UCM6200 series before 1.0.20.22 is vulnerable to an SQL injection via the HTTP server's websockify endpoint. A remote unauthenticated attacker can invoke the login action with a crafted username and, through the use of timing attacks, can discover user passwords.",CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,HIGH,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,2.2,3.6,['CWE-89'],"['cpe:2.3:o:grandstream:ucm6202_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ucm6202:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:ucm6204_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ucm6204:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:ucm6208_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ucm6208:-:*:*:*:*:*:*:*']",0,0
CVE-2020-5726,Grandstream Networks,0.00291,7.5,1.0,1.0,0.0,1.0,1,2020-03-30,1.0,2020-03-30,,,1.0,The Grandstream UCM6200 series before 1.0.20.22 is vulnerable to an SQL injection via the CTI server on port 8888. A remote unauthenticated attacker can invoke the challenge action with a crafted username and discover user passwords.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-89'],"['cpe:2.3:o:grandstream:ucm6202_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ucm6202:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:ucm6204_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ucm6204:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:ucm6208_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ucm6208:-:*:*:*:*:*:*:*']",1,0
CVE-2020-5738,Grandstream Networks,0.00331,8.8,0.0,1.0,0.0,1.0,1,2020-04-14,0.0,,1.0,2020-04-06,,Grandstream GXP1600 series firmware 1.0.4.152 and below is vulnerable to authenticated remote command execution when an attacker uploads a specially crafted tar file to the HTTP /cgi-bin/upload_vpntar interface.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-59'],"['cpe:2.3:o:grandstream:gxp1610_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:gxp1610:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:gxp1615_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:gxp1615:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:gxp1620_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:gxp1620:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:gxp1625_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:gxp1625:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:gxp1628_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:gxp1628:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:gxp1630_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:gxp1630:-:*:*:*:*:*:*:*']",0,0
CVE-2020-5739,Grandstream Networks,0.00257,8.8,0.0,1.0,0.0,1.0,1,2020-04-14,0.0,,1.0,2020-04-06,,"Grandstream GXP1600 series firmware 1.0.4.152 and below is vulnerable to authenticated remote command execution when an attacker adds an OpenVPN up script to the phone's VPN settings via the ""Additional Settings"" field in the web interface. When the VPN's connection is established, the user defined script is executed with root privileges.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-94'],"['cpe:2.3:o:grandstream:gxp1610_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:gxp1610:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:gxp1615_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:gxp1615:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:gxp1620_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:gxp1620:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:gxp1625_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:gxp1625:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:gxp1628_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:gxp1628:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:gxp1630_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:gxp1630:-:*:*:*:*:*:*:*']",0,0
CVE-2020-5757,Grandstream Networks,0.00241,9.8,0.0,1.0,0.0,1.0,1,2020-07-17,1.0,2020-07-09,,,1.0,"Grandstream UCM6200 series firmware version 1.0.20.23 and below is vulnerable to OS command injection via HTTP. An authenticated remote attacker can bypass command injection mitigations and execute commands as the root user by sending a crafted HTTP POST to the UCM's ""New"" HTTPS API.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-78'],"['cpe:2.3:h:grandstream:ucm6202:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:ucm6202_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ucm6204:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:ucm6204_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ucm6208:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:ucm6208_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2020-5758,Grandstream Networks,0.00104,8.8,0.0,1.0,0.0,1.0,1,2020-07-17,1.0,2020-07-09,,,1.0,"Grandstream UCM6200 series firmware version 1.0.20.23 and below is vulnerable to OS command injection via HTTP. An authenticated remote attacker can execute commands as the root user by sending a crafted HTTP GET to the UCM's ""Old"" HTTPS API.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-78'],"['cpe:2.3:o:grandstream:ucm6202_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ucm6202:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:ucm6204_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ucm6204:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:ucm6208_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ucm6208:-:*:*:*:*:*:*:*']",0,0
CVE-2020-5759,Grandstream Networks,0.00257,9.8,0.0,1.0,0.0,1.0,1,2020-07-17,1.0,2020-07-09,,,1.0,"Grandstream UCM6200 series firmware version 1.0.20.23 and below is vulnerable to OS command injection via SSH. An authenticated remote attacker can execute commands as the root user by issuing a specially crafted ""unset"" command.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-78'],"['cpe:2.3:o:grandstream:ucm6202_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ucm6202:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:ucm6204_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ucm6204:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:ucm6208_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ucm6208:-:*:*:*:*:*:*:*']",0,0
CVE-2016-1518,Grandstream Networks,0.00184,8.1,0.0,0.0,1.0,0.0,0,2017-04-21,0.0,,0.0,,,"The auto-provisioning mechanism in the Grandstream Wave app 1.0.1.26 and earlier for Android and Grandstream Video IP phones allows man-in-the-middle attackers to spoof provisioning data and consequently modify device functionality, obtain sensitive information from system logs, and have unspecified other impact by leveraging failure to use an HTTPS session for downloading configuration files from http://fm.grandstream.com/gs/.",CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,HIGH,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.2,5.9,['CWE-284'],['cpe:2.3:a:grandstream:wave:*:*:*:*:*:android:*:*'],0,0
CVE-2016-1519,Grandstream Networks,0.0011,5.9,0.0,0.0,1.0,0.0,0,2017-04-21,0.0,,0.0,,,"The com.softphone.common package in the Grandstream Wave app 1.0.1.26 and earlier for Android does not properly validate SSL certificates, which allows man-in-the-middle attackers to spoof the Grandstream provisioning server via a crafted certificate.",CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N,NETWORK,HIGH,NONE,NONE,UNCHANGED,NONE,HIGH,NONE,MEDIUM,2.2,3.6,['CWE-295'],['cpe:2.3:a:grandstream:wave:*:*:*:*:*:android:*:*'],0,0
CVE-2016-1520,Grandstream Networks,0.00125,7.8,0.0,0.0,1.0,0.0,0,2017-04-21,0.0,,0.0,,,"The Grandstream Wave app 1.0.1.26 and earlier for Android does not use HTTPS when retrieving update information, which might allow man-in-the-middle attackers to execute arbitrary code via a crafted application.",CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-254'],['cpe:2.3:a:grandstream:wave:*:*:*:*:*:android:*:*'],0,0
CVE-2020-5760,Grandstream Networks,0.00112,7.8,0.0,1.0,0.0,1.0,0,2020-07-29,1.0,2020-05-14,,,1.0,Grandstream HT800 series firmware version 1.0.17.5 and below is vulnerable to an OS command injection vulnerability. Unauthenticated remote attackers can execute arbitrary commands as root by crafting a special configuration file and sending a crafted SIP message.,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-78'],"['cpe:2.3:h:grandstream:ht801:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:ht801_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ht802:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:ht802_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ht812:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:ht812_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ht814:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:ht814_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ht818:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:ht818_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ht813:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:ht813_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2020-5761,Grandstream Networks,0.00729,7.5,0.0,1.0,0.0,1.0,0,2020-07-29,1.0,2020-05-14,,,1.0,Grandstream HT800 series firmware version 1.0.17.5 and below is vulnerable to CPU exhaustion due to an infinite loop in the TR-069 service. Unauthenticated remote attackers can trigger this case by sending a one character TCP message to the TR-069 service.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-835'],"['cpe:2.3:o:grandstream:ht801_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ht801:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:ht802_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ht802:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:ht812_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ht812:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:ht814_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ht814:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:ht818_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ht818:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:ht813_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ht813:-:*:*:*:*:*:*:*']",0,0
CVE-2020-5762,Grandstream Networks,0.00575,7.5,0.0,1.0,0.0,1.0,0,2020-07-29,1.0,2020-05-14,,,1.0,Grandstream HT800 series firmware version 1.0.17.5 and below is vulnerable to a denial of service attack against the TR-069 service. An unauthenticated remote attacker can stop the service due to a NULL pointer dereference in the TR-069 service. This condition is triggered due to mishandling of the HTTP Authentication field.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-476'],"['cpe:2.3:o:grandstream:ht801_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ht801:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:ht802_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ht802:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:ht812_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ht812:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:ht814_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ht814:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:ht818_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ht818:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:ht813_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ht813:-:*:*:*:*:*:*:*']",0,0
CVE-2020-5763,Grandstream Networks,0.00504,8.8,0.0,1.0,0.0,1.0,0,2020-07-29,1.0,2020-05-14,,,1.0,Grandstream HT800 series firmware version 1.0.17.5 and below contain a backdoor in the SSH service. An authenticated remote attacker can obtain a root shell by correctly answering a challenge prompt.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,"['CWE-326', 'CWE-489']","['cpe:2.3:o:grandstream:ht801_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ht801:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:ht802_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ht802:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:ht812_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ht812:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:ht814_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ht814:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:ht818_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ht818:-:*:*:*:*:*:*:*', 'cpe:2.3:o:grandstream:ht813_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ht813:-:*:*:*:*:*:*:*']",0,0
CVE-2021-37748,Grandstream Networks,0.01275,8.8,0.0,1.0,0.0,1.0,0,2021-10-28,0.0,,0.0,,,"Multiple buffer overflows in the limited configuration shell (/sbin/gs_config) on Grandstream HT801 devices before 1.0.29 allow remote authenticated users to execute arbitrary code as root via a crafted manage_if setting, thus bypassing the intended restrictions of this shell and taking full control of the device. There are default weak credentials that can be used to authenticate.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-787'],"['cpe:2.3:o:grandstream:ht801_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ht801:-:*:*:*:*:*:*:*']",0,0
CVE-2021-37915,Grandstream Networks,0.00264,8.8,0.0,1.0,0.0,1.0,0,2021-10-28,0.0,,0.0,,,"An issue was discovered on the Grandstream HT801 Analog Telephone Adaptor before 1.0.29.8. From the limited configuration shell, it is possible to set the malicious gdb_debug_server variable. As a result, after a reboot, the device downloads and executes malicious scripts from an attacker-defined host.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:grandstream:ht801_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:grandstream:ht801:-:*:*:*:*:*:*:*']",0,0
CVE-2017-16725,Xiongmai Tech,0.00396,9.8,0.0,1.0,0.0,1.0,1,2017-12-20,0.0,,0.0,,,"A Stack-based Buffer Overflow issue was discovered in Xiongmai Technology IP Cameras and DVRs using the NetSurveillance Web interface. The stack-based buffer overflow vulnerability has been identified, which may allow an attacker to execute code remotely or crash the device. After rebooting, the device restores itself to a more vulnerable state in which Telnet is accessible.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-119'],"['cpe:2.3:o:xiongmaitech:ahb7008f8-h_firmware:4.02.r11.3070:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7008f8-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7008f4-h_firmware:4.02.r11.3070:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7008f4-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7008f2-h_firmware:4.02.r11.3070:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7008f2-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7008t-mh-v2_firmware:4.02.r11.7601:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7008t-mh-v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7004t-mh-v2_firmware:4.02.r11.7601:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7004t-mh-v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7004t-h-v2_firmware:4.02.r11.7601:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7004t-h-v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7016t-lm-v2_firmware:4.02.r11.7601:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7016t-lm-v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7008t-lm-v2_firmware:4.02.r11.7601:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7008t-lm-v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7016t4-mh-v2_firmware:4.02.r11.7601:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7016t4-mh-v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7016t-mh-v2_firmware:4.02.r11.7601:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7016t-mh-v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7008t4-h-v2_firmware:4.02.r11.7601:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7008t4-h-v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7008t-h-v2_firmware:4.02.r11.7601:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7008t-h-v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7008t4-h-v2:_firmware:4.02.r11.7601:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7008t4-h-v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7008t-h-v2_firmware:4.02.r11.7601:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7008t-h-v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7032f8-lm-v2_firmware:4.02.r11.7601:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7032f8-lm-v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7032f4-lm-v2_firmware:4.02.r11.7601:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7032f4-lm-v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7808r-ms-v3_firmware:4.02.r11.nat.onvifc.20170327:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7808r-ms-v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7804r-ms-v3_firmware:4.02.r11.nat.onvifc.20170327:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7804r-ms-v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7016t-lm-v3_firmware:4.02.r11.3070:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7016t-lm-v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7008t-lm-v3_firmware:4.02.r11.3070:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7008t-lm-v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7004t-lm-v3_firmware:4.02.r11.3070:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7004t-lm-v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7016t4-gs-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7016t4-gs-v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7016t-gs-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7016t-gs-v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7008t-gs-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7008t-gs-v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7004t-gs-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7004t-gs-v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7016t-mh-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7016t-mh-v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7008t-mh-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7008t-mh-v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7004t-mh-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7004t-mh-v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7008t-gl-v4_firmware:4.02.r11.7601:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7008t-gl-v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7004t-gl-v4_firmware:4.02.r11.7601:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7004t-gl-v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7004t-g-v4_firmware:4.02.r11.7601:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7004t-g-v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7016f8-gs-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7016f8-gs-v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7016f8-gl-v4_firmware:4.02.r11.7601:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7016f8-gl-v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7016f4-gl-v4_firmware:4.02.r11.7601:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7016f4-gl-v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7016f2-gl-v4_firmware:4.02.r11.7601:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7016f2-gl-v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7808r-lm-v3_firmware:4.02.r11.nat.onvifc.20171120:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7808r-lm-v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7804r-lm-v3_firmware:4.02.r11.nat.onvifc.20171120:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7804r-lm-v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7804r-lms-v3_firmware:4.02.r11.nat.onvifc.20171019:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7804r-lms-v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7008f8-g-v4_firmware:4.02.r11.7601:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7008f8-g-v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7008f4-g-v4_firmware:4.02.r11.7601:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7008f4-g-v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7008f2-g-v4_firmware:4.02.r11.7601:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7008f2-g-v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7032f4-lm-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7032f4-lm-v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7032f2-lm-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7032f2-lm-v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7032f8-gs-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7032f8-gs-v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7032f4-gs-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7032f4-gs-v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7032f2-gs-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7032f2-gs-v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7016t-lme-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7016t-lme-v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7008t-lme-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7008t-lme-v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7004t-lme-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7004t-lme-v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7808r-mh-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7808r-mh-v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7804r-mh-v3_firmware:4.02.r11.7601:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7804r-mh-v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-50h10pl-p_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-50h10pl-p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-50h10pl-b_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-50h10pl-b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-50h10pl-ae_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-50h10pl-ae:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-50h10pl-s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-50h10pl-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-52h10pl-p_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-52h10pl-p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-52h10pl-b_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-52h10pl-b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-53h13pet-s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-53h13pet-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-53h13pls-s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-53h13pls-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-53h13pes-s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-53h13pes-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-53h13pes-sl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-53h13pes-sl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-53h13pl-p_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-53h13pl-p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-53h13pl-b_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-53h13pl-b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-53h13pl-ae_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-53h13pl-ae:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-53h13pl-s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-53h13pl-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-53h13p-p_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-53h13p-p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-53h13p-b_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-53h13p-b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-53h13p-ae_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-53h13p-ae:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-53h13p-s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-53h13p-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-83h40pl-b_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-83h40pl-b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-83h40pl-p_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-83h40pl-p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-83h50p-p_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-83h50p-p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-83h50p-b_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-83h50p-b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-53h10pe-s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-53h10pe-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-50h10pe-sl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-50h10pe-sl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-50h10pe-s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-50h10pe-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipm-50hv10pt-wr_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipm-50hv10pt-wr:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipm-50v10pl-wr_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipm-50v10pl-wr:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipm-50h10pe-wr_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipm-50h10pe-wr:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-54h13pe-s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-54h13pe-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-54h20pl-s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-54h20pl-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-50h10pl-r_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-50h10pl-r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-54h20pl-s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-54h20pl-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipm-50h10pe-o\\(r\\)_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipm-50h10pe-o\\(r\\):-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-53h13pl-r_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-53h13pl-r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-50h10pe-wp_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-50h10pe-wp:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-50hv10pt-wp_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-50hv10pt-wp:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-53hv13pa-wp_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-53hv13pa-wp:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-53h13pe-wp_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-53h13pe-wp:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-53h20pl-p_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-53h20pl-p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-53h20pl-b_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-53h20pl-b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-53h20pl-ae_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-53h20pl-ae:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-53h20pl-s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-53h20pl-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-50hv20pet-a_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-50hv20pet-a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-50hv20pet-s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-50hv20pet-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-50hv20pes-s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-50hv20pes-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-50h10pe-wk_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-50h10pe-wk:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-53h13pe-wk_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-53h13pe-wk:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-53h13pe-s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-53h13pe-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipm-50h10pe-wrm_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipm-50h10pe-wrm:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipm-53h13pe-wrm_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipm-53h13pe-wrm:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-83h40af_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-83h40af:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipm-50v10pl-wrc_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-83h40af:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipm-50h10pe-wrc_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipm-50h10pe-wrc:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-50x10pt-s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-50x10pt-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-50x10pe-s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-50x10pe-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-53x13pt-s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-53x13pt-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-53x13pa-s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-53x13pa-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-53x13pe-s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-53x13pe-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipm-53h13pe-wrc_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipm-53h13pe-wrc:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipm-53hv13pe-wr_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipm-53hv13pe-wr:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipm-53v13pl-wr_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipm-53v13pl-wr:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipm-53h13pe-wr_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipm-53h13pe-wr:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-50h10pe-wk-2f_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-50h10pe-wk-2f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-83h20pl-p_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-83h20pl-p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-83h20pl-b_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-83h20pl-b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-53hv13pt-s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-53hv13pt-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-53hv13pt-s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-53hv13pt-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-53hv13pa-a_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-53hv13pa-a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-53hv13pa-s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-53hv13pa-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipm-50hv20pe-wr_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipm-50hv20pe-wr:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-50hv10pt-a_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-50hv10pt-a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-50hv10pt-s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-50hv10pt-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-50hv10pv-a_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-50hv10pv-a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-50hv10pv-s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-50hv10pv-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-80h20pt-a_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-80h20pt-a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-80h20pt-s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-80h20pt-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-50h20pt-s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-50h20pt-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-53h20py-s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-53h20py-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-53h13pe-wk-4f_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-53h13pe-wk-4f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-83h20pa-a_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-83h20pa-a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-83h20pa-s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-83h20pa-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-50hv20psa-s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-50hv20psa-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-50hv20psb-a_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-50hv20psb-a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-50hv20psb-s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-50hv20psb-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ivg-hp203y-ae_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ivg-hp203y-ae:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ivg-hp203y-se_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ivg-hp203y-se:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-hp500nr-s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-hp500nr-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ipg-80he20ps-s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ipg-80he20ps-s:-:*:*:*:*:*:*:*']",0,0
CVE-2017-7577,Xiongmai Tech,0.005,9.8,0.0,0.0,1.0,0.0,1,2017-04-07,0.0,,0.0,,,"XiongMai uc-httpd has directory traversal allowing the reading of arbitrary files via a ""GET ../"" HTTP request.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-22'],['cpe:2.3:a:xiongmaitech:uc-httpd:-:*:*:*:*:*:*:*'],0,0
CVE-2018-17915,Xiongmai Tech,0.00213,9.8,0.0,0.0,1.0,0.0,1,2018-10-10,0.0,,1.0,2018-10-09,,"All versions of Hangzhou Xiongmai Technology Co., Ltd XMeye P2P Cloud Server do not encrypt all device communication. This includes the XMeye service and firmware update communication. This could allow an attacker to eavesdrop on video feeds, steal XMeye login credentials, or impersonate the update server with malicious update code.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-311'],['cpe:2.3:a:xiongmaitech:xmeye_p2p_cloud_server:-:*:*:*:*:*:*:*'],0,0
CVE-2018-17917,Xiongmai Tech,0.00081,5.3,0.0,0.0,1.0,0.0,1,2018-10-10,0.0,,1.0,2018-10-09,,"All versions of Hangzhou Xiongmai Technology Co., Ltd XMeye P2P Cloud Server may allow an attacker to use MAC addresses to enumerate potential Cloud IDs. Using this ID, the attacker can discover and connect to valid devices using one of the supported apps.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,LOW,NONE,NONE,MEDIUM,3.9,1.4,"['CWE-200', 'CWE-341']",['cpe:2.3:a:xiongmaitech:xmeye_p2p_cloud_server:*:*:*:*:*:*:*:*'],0,0
CVE-2018-17919,Xiongmai Tech,0.00081,6.5,0.0,0.0,1.0,0.0,1,2018-10-10,0.0,,1.0,2018-10-09,,"All versions of Hangzhou Xiongmai Technology Co., Ltd XMeye P2P Cloud Server may allow an attacker to use an undocumented user account ""default"" with its default password to login to XMeye and access/view video streams.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,LOW,LOW,NONE,MEDIUM,3.9,2.5,"['CWE-798', 'CWE-912']",['cpe:2.3:a:xiongmaitech:xmeye_p2p_cloud_server:*:*:*:*:*:*:*:*'],0,0
CVE-2019-11878,Xiongmai Tech,0.00065,6.5,0.0,1.0,0.0,1.0,1,2019-05-10,0.0,,0.0,,,"An issue was discovered on XiongMai Besder IP20H1 V4.02.R12.00035520.12012.047500.00200 cameras. An attacker on the same local network as the camera can craft a message with a size field larger than 0x80000000 and send it to the camera, related to an integer overflow or use of a negative number. This then crashes the camera for about 120 seconds.",CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.8,3.6,['CWE-190'],"['cpe:2.3:o:xiongmaitech:besder_ip20h1_firmware:4.02.r12.00035520.12012.047500.00200:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:besder_ip20h1:-:*:*:*:*:*:*:*']",0,0
CVE-2018-10088,Xiongmai Tech,0.02201,9.8,1.0,0.0,1.0,0.0,0,2018-06-08,0.0,,0.0,,,"Buffer overflow in XiongMai uc-httpd 1.0.0 has unspecified impact and attack vectors, a different vulnerability than CVE-2017-16725.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-119'],['cpe:2.3:a:xiongmaitech:uc-httpd:1.0.0:*:*:*:*:*:*:*'],1,0
CVE-2020-22253,Xiongmai Tech,0.00201,9.8,0.0,1.0,0.0,1.0,0,2022-04-06,1.0,2020-02-20,,,1.0,"Xiongmai Technology Co devices AHB7008T-MH-V2, AHB7804R-ELS, AHB7804R-MH-V2, AHB7808R-MS-V2, AHB7808R-MS, AHB7808T-MS-V2, AHB7804R-LMS, and HI3518E_50H10L_S39 were all discovered to have port 9530 open which allows unauthenticated attackers to make arbitrary Telnet connections with the victim device.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:h:xiongmaitech:ahb7008t-mh-v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7008t-mh-v2_firmware:4.02.r11.7601.nat.onvifc.20170420:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7804r-els:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7804r-els_firmware:4.02.r11.nat.onvifc.20160422:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7804r-mh-v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7804r-mh-v2_firmware:4.02.r11.7601.nat.onvifc.20170424:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7808r-ms-v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7808r-ms-v2_firmware:4.02.r11.nat.onvifc.20170327:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7808r-ms:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7808r-ms_firmware:4.02.r11.nat.onvifc.20170328:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7808t-ms-v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7808t-ms-v2_firmware:4.02.r11.nat.onvifc.20161205:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7804r-lms:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7804r-lms_firmware:4.02.r11.nat.onvifc.20170301:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:hi3518e_50h10l_s39:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:hi3518e_50h10l_s39_firmware:4.02.r12.nat.onvifs.20170727_all:*:*:*:*:*:*:*']",0,0
CVE-2021-38827,Xiongmai Tech,0.00081,7.5,0.0,1.0,0.0,1.0,0,2022-11-14,0.0,,0.0,,,Xiongmai Camera XM-JPR2-LX V4.02.R12.A6420987.10002.147502.00000 is vulnerable to account takeover.,CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,HIGH,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.6,5.9,['CWE-294'],"['cpe:2.3:h:xiongmaitech:xm-jpr2-lx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:xm-jpr2-lx_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2021-38828,Xiongmai Tech,0.00079,5.3,0.0,1.0,0.0,1.0,0,2022-11-14,0.0,,0.0,,,Xiongmai Camera XM-JPR2-LX V4.02.R12.A6420987.10002.147502.00000 is vulnerable to plain-text traffic sniffing.,CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N,ADJACENT_NETWORK,HIGH,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.6,3.6,['CWE-319'],"['cpe:2.3:o:xiongmaitech:xm-jpr2-lx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:xm-jpr2-lx:-:*:*:*:*:*:*:*']",0,0
CVE-2021-41506,Xiongmai Tech,0.00351,9.8,0.0,1.0,0.0,1.0,0,2022-06-30,1.0,2020-02-20,,,1.0,"Xiaongmai AHB7008T-MH-V2, AHB7804R-ELS, AHB7804R-MH-V2, AHB7808R-MS-V2, AHB7808R-MS, AHB7808T-MS-V2, AHB7804R-LMS, HI3518_50H10L_S39 V4.02.R11.7601.Nat.Onvif.20170420, V4.02.R11.Nat.Onvif.20160422, V4.02.R11.7601.Nat.Onvif.20170424, V4.02.R11.Nat.Onvif.20170327, V4.02.R11.Nat.Onvif.20161205, V4.02.R11.Nat.20170301, V4.02.R12.Nat.OnvifS.20170727 is affected by a backdoor in the macGuarder and dvrHelper binaries of DVR/NVR/IP camera firmware due to static root account credentials in the system.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-287'],"['cpe:2.3:h:xiongmaitech:ahb7008t-mh-v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7008t-mh-v2_firmware:4.02.r11.7601.nat.onvif.20170420:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7804r-els:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7804r-els_firmware:4.02.r11.nat.onvif.20160422:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7804r-mh-v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7804r-mh-v2_firmware:4.02.r11.7601.nat.onvif.20170424:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7808r-ms-v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7808r-ms-v2_firmware:4.02.r11.nat.onvif.20170327:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7808r-ms:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7808r-ms_firmware:4.02.r11.nat.onvif.20160328:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7808t-ms-v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7808t-ms-v2_firmware:4.02.r11.nat.onvifc.20161205:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb7804r-lms:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb7804r-lms_firmware:4.02.r11.nat.20170301:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:hi3518e_50h10l_s39:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:hi3518e_50h10l_s39_firmware:4.02.r12.nat.onvifs.20170727:*:*:*:*:*:*:*']",0,0
CVE-2022-26259,Xiongmai Tech,0.00048,7.8,0.0,1.0,0.0,1.0,0,2022-03-28,1.0,2022-02-22,,,1.0,"A buffer over flow in Xiongmai DVR devices NBD80X16S-KL, NBD80X09S-KL, NBD80X08S-KL, NBD80X09RA-KL, AHB80X04R-MH, AHB80X04R-MH-V2, AHB80X04-R-MH-V3, AHB80N16T-GS, AHB80N32F4-LME, and NBD90S0VT-QW allows attackers to cause a Denial of Service (DoS) via a crafted RSTP request.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-120'],"['cpe:2.3:o:xiongmaitech:nbd80x16s-kl_firmware:4.03.r11.nat.dss.onvifc.20210727:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:nbd80x16s-kl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:nbd80x09s-kl_firmware:4.03.r11.nat.dss.onvifc.20210727:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:nbd80x09s-kl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:nbd80x08s-kl_firmware:4.03.r11.nat.dss.onvifc.20210727:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:nbd80x08s-kl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:nbd80x09ra-kl_firmware:4.03.r11.nat.dss.onvifc.20210727:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:nbd80x09ra-kl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb80x04r-mh_firmware:4.03.r11.nat.dss.onvifc.20210729:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb80x04r-mh:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb80x04r-mh-v2_firmware:4.03.r11.nat.dss.onvifc.20210729:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb80x04r-mh-v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb80x04-r-mh-v3_firmware:4.03.r11.nat.dss.onvifc.20210729:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb80x04-r-mh-v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb80n16t-gs_firmware:4.03.r11.7601.nat.onvifc.20211223:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb80n16t-gs:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:ahb80n32f4-lme_firmware:4.03.r11.7601.nat.onvifc.20211228:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:ahb80n32f4-lme:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xiongmaitech:nbd90s0vt-qw_firmware:4.03.r11.713g.nat.onvifc.2021:*:*:*:*:*:*:*', 'cpe:2.3:h:xiongmaitech:nbd90s0vt-qw:-:*:*:*:*:*:*:*']",0,0
CVE-2017-17560,Western Digital,0.97244,9.8,1.0,1.0,0.0,1.0,1,2017-12-12,0.0,,0.0,,,"An issue was discovered on Western Digital MyCloud PR4100 2.30.172 devices. The web administration component, /web/jquery/uploader/multi_uploadify.php, provides multipart upload functionality that is accessible without authentication and can be used to place a file anywhere on the device's file system. This allows an attacker the ability to upload a PHP shell onto the device and obtain arbitrary code execution as root.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-287'],"['cpe:2.3:o:westerndigital:my_cloud_pr4100_firmware:2.30.172:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_pr4100:-:*:*:*:*:*:*:*']",1,1
CVE-2018-1151,Western Digital,0.01091,9.8,0.0,1.0,0.0,1.0,1,2018-06-12,0.0,,0.0,,,The web server on Western Digital TV Media Player 1.03.07 and TV Live Hub 3.12.13 allow unauthenticated remote attackers to execute arbitrary code or cause denial of service via crafted HTTP requests to toServerValue.cgi.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-119'],"['cpe:2.3:o:westerndigital:tv_live_hub_firmware:3.12.13:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:tv_live_hub:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:tv_media_player_firmware:1.03.07:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:tv_media_player:-:*:*:*:*:*:*:*']",0,0
CVE-2018-9148,Western Digital,0.01834,9.8,0.0,1.0,0.0,1.0,1,2018-03-30,0.0,,0.0,,,"Western Digital WD My Cloud v04.05.00-320 devices embed the session token (aka PHPSESSID) in filenames, which makes it easier for attackers to bypass authentication by listing a directory. NOTE: this can be exploited in conjunction with CVE-2018-7171 for remote authentication bypass within a product that uses My Cloud.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-287'],"['cpe:2.3:o:westerndigital:my_cloud_firmware:04.05.00-320:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud:-:*:*:*:*:*:*:*']",0,0
CVE-2019-16399,Western Digital,0.11214,9.8,1.0,1.0,0.0,1.0,1,2019-09-18,0.0,,0.0,,,"Western Digital WD My Book World through II 1.02.12 suffers from Broken Authentication, which allows an attacker to access the /admin/ directory without credentials. An attacker can easily enable SSH from /admin/system_advanced.php?lang=en and login with the default root password welc0me.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-798'],"['cpe:2.3:o:westerndigital:wd_my_book_firmware:*:*:world_ii:*:*:*:*:*', 'cpe:2.3:h:westerndigital:wd_my_book:-:*:world_ii:*:*:*:*:*']",1,0
CVE-2019-9949,Western Digital,0.01796,8.8,0.0,1.0,0.0,1.0,1,2019-05-23,1.0,2019-05-21,,,1.0,"Western Digital My Cloud Cloud, Mirror Gen2, EX2 Ultra, EX2100, EX4100, DL2100, DL4100, PR2100 and PR4100 before firmware 2.31.183 are affected by a code execution (as root, starting from a low-privilege user session) vulnerability. The cgi-bin/webfile_mgr.cgi file allows arbitrary file write by abusing symlinks. Specifically, this occurs by uploading a tar archive that contains a symbolic link, then uploading another archive that writes a file to the link using the ""cgi_untar"" command. Other commands might also be susceptible. Code can be executed because the ""name"" parameter passed to the cgi_unzip command is not sanitized.",CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-59'],"['cpe:2.3:o:westerndigital:my_cloud_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:my_cloud_mirror_gen2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_mirror_gen2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:my_cloud_ex2_ultra_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_ex2_ultra:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:my_cloud_ex2100_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_ex2100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:my_cloud_ex4100_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_ex4100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:my_cloud_dl2100_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_dl2100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:my_cloud_dl4100_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_dl4100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:my_cloud_pr2100_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_pr2100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:my_cloud_pr4100_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_pr4100:-:*:*:*:*:*:*:*']",0,0
CVE-2020-12427,Western Digital,0.00071,8.8,0.0,0.0,1.0,0.0,1,2020-05-13,1.0,2020-04-27,,,1.0,"The Western Digital WD Discovery application before 3.8.229 for MyCloud Home on Windows and macOS is vulnerable to CSRF, with impacts such as stealing data, modifying disk contents, or exhausting disk space.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-352'],"['cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*', 'cpe:2.3:a:westerndigital:wd_discovery:*:*:*:*:*:my_cloud_home:*:*']",0,0
CVE-2020-29563,Western Digital,0.00317,9.8,0.0,1.0,0.0,1.0,1,2020-12-12,1.0,2020-12-09,,,1.0,An issue was discovered on Western Digital My Cloud OS 5 devices before 5.07.118. A NAS Admin authentication bypass vulnerability could allow an unauthenticated user to gain access to the device.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-287'],"['cpe:2.3:o:westerndigital:my_cloud_os_5:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_ex2_ultra:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_ex4100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_mirror_gen_2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_pr2100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_pr4100:-:*:*:*:*:*:*:*']",0,0
CVE-2021-3310,Western Digital,0.00045,7.8,0.0,1.0,0.0,1.0,1,2021-03-10,1.0,2021-02-22,,,1.0,Western Digital My Cloud OS 5 devices before 5.10.122 mishandle Symbolic Link Following on SMB and AFP shares. This can lead to code execution and information disclosure (by reading local files).,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-59'],"['cpe:2.3:h:westerndigital:my_cloud_dl2100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_dl4100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_ex2_ultra:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_ex2100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_ex4100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_mirror_gen_2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_pr2100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_pr4100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:my_cloud_os:*:*:*:*:*:*:*:*']",0,0
CVE-2021-35941,Western Digital,0.00134,7.5,0.0,1.0,0.0,1.0,1,2021-06-29,0.0,,1.0,2021-07-06,,"Western Digital WD My Book Live (2.x and later) and WD My Book Live Duo (all versions) have an administrator API that can perform a system factory restore without authentication, as exploited in the wild in June 2021, a different vulnerability than CVE-2018-18472.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-306'],"['cpe:2.3:h:westerndigital:wd_my_book_live:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:wd_my_book_live_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:wd_my_book_live_duo:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:wd_my_book_live_duo_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2022-22989,Western Digital,0.00308,9.8,0.0,1.0,0.0,1.0,1,2022-01-13,1.0,2022-01-10,,,1.0,"My Cloud OS 5 was vulnerable to a pre-authenticated stack overflow vulnerability on the FTP service that could be exploited by unauthenticated attackers on the network. Addressed the vulnerability by adding defenses against stack overflow issues.
",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,"['CWE-787', 'CWE-121']","['cpe:2.3:o:westerndigital:my_cloud_os:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_dl2100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_dl4100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_ex2_ultra:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_ex2100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_ex4100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_mirror_gen_2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_pr2100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_pr4100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:wd_cloud:-:*:*:*:*:*:*:*']",0,0
CVE-2022-22990,Western Digital,0.07732,8.8,0.0,1.0,0.0,1.0,1,2022-01-13,1.0,2022-01-10,,,1.0,A limited authentication bypass vulnerability was discovered that could allow an attacker to achieve remote code execution and escalate privileges on the My Cloud devices. Addressed this vulnerability by changing access token validation logic and rewriting rule logic on PHP scripts.,CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,"['CWE-697', 'CWE-287']","['cpe:2.3:o:westerndigital:my_cloud_os:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_dl2100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_dl4100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_ex2_ultra:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_ex2100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_ex4100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_mirror_gen_2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_pr2100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_pr4100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:wd_cloud:-:*:*:*:*:*:*:*']",0,0
CVE-2022-22991,Western Digital,0.00102,8.8,0.0,1.0,0.0,1.0,1,2022-01-13,1.0,2022-01-10,,,1.0,A malicious user on the same LAN could use DNS spoofing followed by a command injection attack to trick a NAS device into loading through an unsecured HTTP call. Addressed this vulnerability by disabling checks for internet connectivity using HTTP.,CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,"['CWE-77', 'CWE-78']","['cpe:2.3:o:westerndigital:my_cloud_os:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_dl2100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_dl4100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_ex2_ultra:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_ex2100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_ex4100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_mirror_gen_2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_pr2100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_pr4100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:wd_cloud:-:*:*:*:*:*:*:*']",0,0
CVE-2016-10107,Western Digital,0.00621,9.8,0.0,0.0,1.0,0.0,0,2017-01-03,0.0,,0.0,,,Unauthenticated Remote Command injection as root occurs in the Western Digital MyCloud NAS 2.11.142 index.php page via a modified Cookie header.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-77'],['cpe:2.3:a:western_digital:mycloud_nas:2.11.142:*:*:*:*:*:*:*'],0,0
CVE-2016-10108,Western Digital,0.85655,9.8,0.0,0.0,1.0,0.0,0,2017-01-03,0.0,,0.0,,,Unauthenticated Remote Command injection as root occurs in the Western Digital MyCloud NAS 2.11.142 /web/google_analytics.php URL via a modified arg parameter in the POST data.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-77'],['cpe:2.3:a:western_digital:mycloud_nas:2.11.142:*:*:*:*:*:*:*'],0,0
CVE-2019-10705,Western Digital,0.00179,7.5,0.0,1.0,0.0,0.0,0,2020-03-10,1.0,2019-05-20,,,1.0,"Western Digital SanDisk X600 devices in certain configurations, a vulnerability in the access control mechanism of the drive may allow data to be decrypted without knowledge of proper authentication credentials.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-522'],"['cpe:2.3:h:westerndigital:sandisk_x600_sd9tb8w-128g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x600_sd9tb8w-128g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x600_sd9tb8w-256g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x600_sd9tb8w-256g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x600_sd9tb8w-512g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x600_sd9tb8w-512g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x600_sd9tb8w-1t00:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x600_sd9tb8w-1t00_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x600_sd9tb8w-2t00:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x600_sd9tb8w-2t00_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x600_sd9tn8w-128g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x600_sd9tn8w-128g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x600_sd9tn8w-256g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x600_sd9tn8w-256g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x600_sd9tn8w-512g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x600_sd9tn8w-512g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x600_sd9tn8w-1t00_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x600_sd9tn8w-1t00:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x600_sd9tn8w-2t00_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x600_sd9tn8w-2t00:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x600_sd9sb8w-128g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x600_sd9sb8w-128g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x600_sd9sb8w-256g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x600_sd9sb8w-256g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x600_sd9sb8w-512g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x600_sd9sb8w-512g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x600_sd9sb8w-1t00_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x600_sd9sb8w-1t00:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x600_sd9sb8w-2t00_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x600_sd9sb8w-2t00:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x600_sd9sn8w-128g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x600_sd9sn8w-128g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x600_sd9sn8w-256g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x600_sd9sn8w-256g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x600_sd9sn8w-512g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x600_sd9sn8w-512g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x600_sd9sn8w-1t00_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x600_sd9sn8w-1t00:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x600_sd9sn8w-2t00_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x600_sd9sn8w-2t00:-:*:*:*:*:*:*:*']",0,0
CVE-2019-10706,Western Digital,0.00044,6.3,0.0,1.0,0.0,1.0,0,2020-03-10,1.0,2019-05-20,,,1.0,"Western Digital SanDisk SanDisk X300, X300s, X400, and X600 devices: The firmware update authentication method relies on a symmetric HMAC digest. The key used to validate this digest is present in a protected area of the device, and if extracted could be used to install arbitrary firmware to other devices.",CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H,LOCAL,HIGH,LOW,NONE,UNCHANGED,NONE,HIGH,HIGH,MEDIUM,1.0,5.2,['CWE-522'],"['cpe:2.3:h:westerndigital:sandisk_x600_sd9tb8w-128g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x600_sd9tb8w-128g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x600_sd9tb8w-256g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x600_sd9tb8w-256g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x600_sd9tb8w-512g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x600_sd9tb8w-512g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x600_sd9tb8w-1t00:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x600_sd9tb8w-1t00_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x600_sd9tb8w-2t00:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x600_sd9tb8w-2t00_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x600_sd9tn8w-128g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x600_sd9tn8w-128g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x600_sd9tn8w-256g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x600_sd9tn8w-256g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x600_sd9tn8w-512g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x600_sd9tn8w-512g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x600_sd9tn8w-1t00_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x600_sd9tn8w-1t00:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x600_sd9tn8w-2t00_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x600_sd9tn8w-2t00:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x600_sd9sb8w-128g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x600_sd9sb8w-128g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x600_sd9sb8w-256g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x600_sd9sb8w-256g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x600_sd9sb8w-512g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x600_sd9sb8w-512g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x600_sd9sb8w-1t00_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x600_sd9sb8w-1t00:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x600_sd9sb8w-2t00_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x600_sd9sb8w-2t00:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x600_sd9sn8w-128g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x600_sd9sn8w-128g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x600_sd9sn8w-256g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x600_sd9sn8w-256g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x600_sd9sn8w-512g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x600_sd9sn8w-512g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x600_sd9sn8w-1t00_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x600_sd9sn8w-1t00:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x600_sd9sn8w-2t00_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x600_sd9sn8w-2t00:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x300s_sd7sb3q-064g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x300s_sd7sb3q-064g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x300s_sd7sn3q-064g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x300s_sd7sn3q-064g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x300s_sd7ub2q-010t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x300s_sd7ub2q-010t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x300s_sd7ub2q-512g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x300s_sd7ub2q-512g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x300s_sd7ub3q-128g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x300s_sd7ub3q-128g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x300s_sd7ub3q-256g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x300s_sd7ub3q-256g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x300s_sd7un3q-128g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x300s_sd7un3q-128g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x300s_sd7un3q-256g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x300s_sd7un3q-256g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x300s_sd7un3q-512g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x300s_sd7un3q-512g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x400_sd8sb8u-128g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x400_sd8sb8u-128g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x400_sd8sb8u-128g-1122_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x400_sd8sb8u-128g-1122:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x400_sd8sb8u-1t00_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x400_sd8sb8u-1t00:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x400_sd8sb8u-1t00-1122_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x400_sd8sb8u-1t00-1122:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x400_sd8sb8u-256g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x400_sd8sb8u-256g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x400_sd8sb8u-256g-1122_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x400_sd8sb8u-256g-1122:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x400_sd8sb8u-512g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x400_sd8sb8u-512g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x400_sd8sb8u-512g-1122_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x400_sd8sb8u-512g-1122:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x400_sd8sn8u-128g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x400_sd8sn8u-128g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x400_sd8sn8u-128g-1122_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x400_sd8sn8u-128g-1122:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x400_sd8sn8u-1t00_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x400_sd8sn8u-1t00:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x400_sd8sn8u-1t00-1122_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x400_sd8sn8u-1t00-1122:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x400_sd8sn8u-256g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x400_sd8sn8u-256g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x400_sd8sn8u-256g-1122_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x400_sd8sn8u-256g-1122:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x400_sd8sn8u-512g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x400_sd8sn8u-512g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x400_sd8sn8u-512g-1122_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x400_sd8sn8u-512g-1122:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x400_sd8tb8u-128g-1122_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x400_sd8tb8u-128g-1122:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x400_sd8tb8u-1t00-1122_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x400_sd8tb8u-1t00-1122:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x400_sd8tb8u-256g-1122_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x400_sd8tb8u-256g-1122:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x400_sd8tb8u-512g-1122_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x400_sd8tb8u-512g-1122:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x300_sd7sb6s-128g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x300_sd7sb6s-128g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x300_sd7sb6s-256g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x300_sd7sb6s-256g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x300_sd7sb7s-010t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x300_sd7sb7s-010t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x300_sd7sb7s-512g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x300_sd7sb7s-512g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x300_sd7sf6s-128g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x300_sd7sf6s-128g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x300_sd7sf6s-256g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x300_sd7sf6s-256g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x300_sd7sf6s-512g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x300_sd7sf6s-512g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x300_sd7sn6s-128g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x300_sd7sn6s-128g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x300_sd7sn6s-256g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x300_sd7sn6s-256g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_x300_sd7sn6s-512g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_x300_sd7sn6s-512g:-:*:*:*:*:*:*:*']",0,0
CVE-2019-18929,Western Digital,0.00089,8.8,0.0,0.0,0.0,1.0,0,2019-11-13,0.0,,0.0,,,Western Digital My Cloud EX2 Ultra firmware 2.31.183 allows web users (including guest accounts) to remotely execute arbitrary code via a download_mgr.cgi stack-based buffer overflow.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-787'],"['cpe:2.3:o:western_digital:my_cloud_ex2_ultra_firmware:2.31.195:*:*:*:*:*:*:*', 'cpe:2.3:h:western_digital:my_cloud_ex2_ultra:-:*:*:*:*:*:*:*']",0,0
CVE-2019-18930,Western Digital,0.00085,8.8,0.0,0.0,0.0,1.0,0,2019-11-13,0.0,,0.0,,,"Western Digital My Cloud EX2 Ultra firmware 2.31.183 allows web users (including guest account) to remotely execute arbitrary code via a stack-based buffer overflow. There is no size verification logic in one of functions in libscheddl.so, and download_mgr.cgi makes it possible to enter large-sized f_idx inputs.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-787'],"['cpe:2.3:o:western_digital:my_cloud_ex2_ultra_firmware:2.31.183:*:*:*:*:*:*:*', 'cpe:2.3:h:western_digital:my_cloud_ex2_ultra:-:*:*:*:*:*:*:*']",0,0
CVE-2019-18931,Western Digital,0.00138,8.8,0.0,0.0,0.0,1.0,0,2019-11-13,0.0,,0.0,,,Western Digital My Cloud EX2 Ultra firmware 2.31.195 allows a Buffer Overflow with Extended Instruction Pointer (EIP) control via crafted GET/POST parameters.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-120'],"['cpe:2.3:o:western_digital:my_cloud_ex2_ultra_firmware:2.31.195:*:*:*:*:*:*:*', 'cpe:2.3:h:western_digital:my_cloud_ex2_ultra:-:*:*:*:*:*:*:*']",0,0
CVE-2020-13799,Western Digital,0.00143,6.8,0.0,1.0,0.0,0.0,0,2020-11-18,0.0,,1.0,2020-11-16,,"Western Digital has identified a security vulnerability in the Replay Protected Memory Block (RPMB) protocol as specified in multiple standards for storage device interfaces, including all versions of eMMC, UFS, and NVMe. The RPMB protocol is specified by industry standards bodies and is implemented by storage devices from multiple vendors to assist host systems in securing trusted firmware. Several scenarios have been identified in which the RPMB state may be affected by an attacker without the knowledge of the trusted component that uses the RPMB feature.",CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,PHYSICAL,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.9,5.9,['CWE-294'],"['cpe:2.3:h:westerndigital:inand_cl_em132:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:inand_cl_em132_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:inand_ix_em132:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:inand_ix_em132_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:inand_ix_em132_xi:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:inand_ix_em132_xi_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:linaro:op-tee:*:*:*:*:*:*:*:*']",0,0
CVE-2020-15816,Western Digital,0.00105,8.8,0.0,0.0,1.0,0.0,0,2020-07-17,1.0,2020-06-19,,,1.0,"In Western Digital WD Discovery before 4.0.251.0, a malicious application running with standard user permissions could potentially execute code in the application's process through library injection by using DYLD environment variables.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-668'],"['cpe:2.3:a:westerndigital:wd_discovery:*:*:*:*:*:macos:*:*', 'cpe:2.3:a:westerndigital:wd_discovery:*:*:*:*:*:windows:*:*']",0,0
CVE-2020-27159,Western Digital,0.03839,9.8,0.0,1.0,0.0,1.0,0,2020-10-27,1.0,2020-10-27,,,1.0,Addressed remote code execution vulnerability in DsdkProxy.php due to insufficient sanitization and insufficient validation of user input in Western Digital My Cloud NAS devices prior to 5.04.114,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-78'],"['cpe:2.3:o:westerndigital:my_cloud_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_ex4100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_expert_series_ex2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_mirror_-_gen_2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_pr2100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_pr4100:-:*:*:*:*:*:*:*']",0,0
CVE-2020-27744,Western Digital,0.02247,9.8,0.0,1.0,0.0,1.0,0,2020-10-29,1.0,2020-10-27,,,1.0,An issue was discovered on Western Digital My Cloud NAS devices before 5.04.114. They allow remote code execution with resultant escalation of privileges.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-78'],"['cpe:2.3:h:westerndigital:my_cloud_ex2_ultra:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_ex4100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_mirror_gen2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_pr2100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_pr4100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:my_cloud_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2020-28940,Western Digital,0.00857,9.8,0.0,1.0,0.0,1.0,0,2020-12-01,1.0,2020-11-19,,,1.0,"On Western Digital My Cloud OS 5 devices before 5.06.115, the NAS Admin dashboard has an authentication bypass vulnerability that could allow an unauthenticated user to execute privileged commands on the device.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-287'],"['cpe:2.3:o:westerndigital:my_cloud_os_5:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_ex2_ultra:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_ex4100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_mirror_gen_2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_pr2100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_pr4100:-:*:*:*:*:*:*:*']",0,0
CVE-2020-28970,Western Digital,0.00857,9.8,0.0,1.0,0.0,1.0,0,2020-12-01,1.0,2020-11-19,,,1.0,"An issue was discovered on Western Digital My Cloud OS 5 devices before 5.06.115. A NAS Admin authentication bypass vulnerability could allow an unauthenticated user to execute privileged commands on the device via a cookie. (In addition, an upload endpoint could then be used by an authenticated administrator to upload executable PHP scripts.)",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-287'],"['cpe:2.3:o:westerndigital:my_cloud_os_5:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_ex2_ultra:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_ex4100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_mirror_gen_2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_pr2100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_pr4100:-:*:*:*:*:*:*:*']",0,0
CVE-2020-28971,Western Digital,0.00857,9.8,0.0,1.0,0.0,1.0,0,2020-12-01,1.0,2020-11-19,,,1.0,"An issue was discovered on Western Digital My Cloud OS 5 devices before 5.06.115. A NAS Admin authentication bypass vulnerability could allow an unauthenticated user to execute privileged commands on the device via a cookie, because of insufficient validation of URI paths.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-287'],"['cpe:2.3:o:westerndigital:my_cloud_os_5:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_ex2_ultra:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_ex4100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_mirror_gen_2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_pr2100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_pr4100:-:*:*:*:*:*:*:*']",0,0
CVE-2020-8990,Western Digital,0.00178,9.1,0.0,0.0,1.0,0.0,0,2020-02-20,0.0,,0.0,,,Western Digital My Cloud Home before 3.6.0 and ibi before 3.6.0 allow Session Fixation.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,NONE,CRITICAL,3.9,5.2,['CWE-384'],"['cpe:2.3:a:western_digital:ibi:*:*:*:*:*:*:*:*', 'cpe:2.3:a:western_digital:my_cloud_home:*:*:*:*:*:*:*:*']",0,0
CVE-2021-28653,Western Digital,0.00065,6.5,0.0,0.0,1.0,0.0,0,2021-03-19,0.0,,0.0,,,The iOS and macOS apps before 1.4.1 for the Western Digital G-Technology ArmorLock NVMe SSD store keys insecurely. They choose a non-preferred storage mechanism if the device has Secure Enclave support but lacks biometric authentication hardware.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,2.8,3.6,['CWE-922'],"['cpe:2.3:a:westerndigital:armorlock:*:*:*:*:*:iphone_os:*:*', 'cpe:2.3:a:westerndigital:armorlock:*:*:*:*:*:macos:*:*']",0,0
CVE-2022-22988,Western Digital,0.00168,9.1,0.0,0.0,1.0,0.0,0,2022-01-13,1.0,2022-01-10,,,1.0,"File and directory permissions have been corrected to prevent unintended users from modifying or accessing resources. It would be more difficult for an authenticated attacker to now traverse through the files and directories. This can only be exploited once an attacker has already found a way to get authenticated access to the device.Â
",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,NONE,CRITICAL,3.9,5.2,"['CWE-732', 'CWE-275']","['cpe:2.3:a:westerndigital:edgerover:*:*:*:*:*:macos:*:*', 'cpe:2.3:a:westerndigital:edgerover:*:*:*:*:*:windows:*:*']",0,0
CVE-2022-22992,Western Digital,0.00607,9.8,0.0,1.0,0.0,1.0,0,2022-01-28,1.0,2022-01-10,,,1.0,A command injection remote code execution vulnerability was discovered on Western Digital My Cloud Devices that could allow an attacker to execute arbitrary system commands on the device. The vulnerability was addressed by escaping individual arguments to shell functions coming from user input.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-116'],"['cpe:2.3:o:westerndigital:my_cloud_os:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud:-:*:*:*:-:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_dl2100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_dl4100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_ex2_ultra:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_ex2100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_ex4100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_mirror_gen_2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_pr2100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_pr4100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:wd_cloud:-:*:*:*:*:*:*:*']",0,0
CVE-2022-22993,Western Digital,0.00151,8.8,0.0,1.0,0.0,1.0,0,2022-01-28,1.0,2022-01-10,,,1.0,A limited SSRF vulnerability was discovered on Western Digital My Cloud devices that could allow an attacker to impersonate a server and reach any page on the server by bypassing access controls. The vulnerability was addressed by creating a whitelist for valid parameters.,CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-918'],"['cpe:2.3:o:westerndigital:my_cloud_os:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud:-:*:*:*:-:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_dl2100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_dl4100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_ex2_ultra:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_ex2100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_ex4100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_mirror_gen_2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_pr2100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_pr4100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:wd_cloud:-:*:*:*:*:*:*:*']",0,0
CVE-2022-22994,Western Digital,0.05781,9.8,0.0,1.0,0.0,1.0,0,2022-01-28,1.0,2022-01-10,,,1.0,A remote code execution vulnerability was discovered on Western Digital My Cloud devices where an attacker could trick a NAS device into loading through an unsecured HTTP call. This was a result insufficient verification of calls to the device. The vulnerability was addressed by disabling checks for internet connectivity using HTTP.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-345'],"['cpe:2.3:o:westerndigital:my_cloud_os:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud:-:*:*:*:-:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_dl2100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_dl4100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_ex2_ultra:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_ex2100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_ex4100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_mirror_gen_2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_pr2100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_pr4100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:wd_cloud:-:*:*:*:*:*:*:*']",0,0
CVE-2022-23001,Western Digital,0.00079,5.3,0.0,0.0,1.0,0.0,0,2022-07-29,1.0,2022-07-29,,,1.0,"When compressing or decompressing elliptic curve points using the Sweet B library, an incorrect choice of sign bit is used. An attacker with user level privileges and no other user's assistance can exploit this vulnerability with only knowledge of the public key and the library. The resulting output may cause an error when used in other operations; for instance, verification of a valid signature under a decompressed public key may fail. This may be leveraged by an attacker to cause an error scenario in applications which use the library, resulting in a limited denial of service for an individual user. The scope of impact cannot extend to other components.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,LOW,MEDIUM,3.9,1.4,['CWE-682'],['cpe:2.3:a:westerndigital:sweet_b:1:*:*:*:*:*:*:*'],0,0
CVE-2022-23002,Western Digital,0.00079,5.3,0.0,0.0,1.0,0.0,0,2022-07-29,1.0,2022-07-29,,,1.0,"When compressing or decompressing a point on the NIST P-256 elliptic curve with an X coordinate of zero, the resulting output is not properly reduced modulo the P-256 field prime and is invalid. The resulting output will cause an error when used in other operations. This may be leveraged by an attacker to cause an error scenario in applications which use the library, resulting in a limited denial of service for an individual user. The scope of impact cannot extend to other components.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,LOW,MEDIUM,3.9,1.4,"['NVD-CWE-noinfo', 'CWE-703']",['cpe:2.3:a:westerndigital:sweet_b:1:*:*:*:*:*:*:*'],0,0
CVE-2022-23003,Western Digital,0.00079,5.3,0.0,0.0,1.0,0.0,0,2022-07-29,1.0,2022-07-29,,,1.0,"When computing a shared secret or point multiplication on the NIST P-256 curve that results in an X coordinate of zero, the resulting output is not properly reduced modulo the P-256 field prime and is invalid. The resulting output may cause an error when used in other operations. This may be leveraged by an attacker to cause an error scenario or incorrect choice of session key in applications which use the library, resulting in a limited denial of service for an individual user. The scope of impact cannot extend to other components.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,LOW,MEDIUM,3.9,1.4,"['CWE-682', 'CWE-703']",['cpe:2.3:a:westerndigital:sweet_b:1:*:*:*:*:*:*:*'],0,0
CVE-2022-23004,Western Digital,0.00079,5.3,0.0,0.0,1.0,0.0,0,2022-07-29,1.0,2022-07-29,,,1.0,"When computing a shared secret or point multiplication on the NIST P-256 curve using a public key with an X coordinate of zero, an error is returned from the library, and an invalid unreduced value is written to the output buffer. This may be leveraged by an attacker to cause an error scenario, resulting in a limited denial of service for an individual user. The scope of impact cannot extend to other components.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,LOW,MEDIUM,3.9,1.4,"['CWE-682', 'CWE-703']",['cpe:2.3:a:westerndigital:sweet_b:1:*:*:*:*:*:*:*'],0,0
CVE-2022-23006,Western Digital,0.0007,6.7,0.0,1.0,0.0,1.0,0,2022-09-27,1.0,2022-09-21,,,1.0,"A stack-based buffer overflow vulnerability was found on Western Digital My Cloud Home, My Cloud Home Duo, and SanDisk ibi that could allow an attacker accessing the system locally to read information from /etc/version file. This vulnerability can only be exploited by chaining it with another issue. If an attacker is able to carry out a remote code execution attack, they can gain access to the vulnerable file, due to the presence of insecure functions in code. User interaction is required for exploitation. Exploiting the vulnerability could result in exposure of information, ability to modify files, memory access errors, or system crashes.",CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H,LOCAL,HIGH,LOW,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.8,5.9,"['CWE-787', 'CWE-121']","['cpe:2.3:o:westerndigital:my_cloud_home_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_home:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:my_cloud_home_duo_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:my_cloud_home_duo:-:*:*:*:*:*:*:*', 'cpe:2.3:o:westerndigital:sandisk_ibi_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:westerndigital:sandisk_ibi:-:*:*:*:*:*:*:*']",0,0
CVE-2017-18263,Seagate,0.00742,7.5,0.0,1.0,0.0,1.0,1,2018-04-28,1.0,2017-09-30,,,1.0,Seagate Media Server in Seagate Personal Cloud before 4.3.18.4 has directory traversal in getPhotoPlaylistPhotos.psp via a parameter named url.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-22'],"['cpe:2.3:o:seagate:personal_cloud_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:seagate:personal_cloud:-:*:*:*:*:*:*:*']",0,0
CVE-2018-5347,Seagate,0.85474,9.8,1.0,1.0,0.0,1.0,1,2018-01-12,0.0,,0.0,,,Seagate Media Server in Seagate Personal Cloud has unauthenticated command injection in the uploadTelemetry and getLogs functions in views.py because .psp URLs are handled by the fastcgi.server component and shell metacharacters are mishandled.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-78'],"['cpe:2.3:o:seagate:personal_cloud_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:seagate:personal_cloud:-:*:*:*:*:*:*:*']",1,0
CVE-2018-12295,Seagate,0.00212,9.8,0.0,0.0,0.0,1.0,0,2019-05-13,0.0,,0.0,,,SQL injection in folderViewSpecific.psp in Seagate NAS OS version 4.3.15.1 allows attackers to execute arbitrary SQL commands via the dirId URL parameter.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-89'],['cpe:2.3:o:seagate:nas_os:4.3.15.1:*:*:*:*:*:*:*'],0,0
CVE-2018-12296,Seagate,0.01442,7.5,0.0,0.0,0.0,1.0,0,2019-05-13,0.0,,0.0,,,Insufficient access control in /api/external/7.0/system.System.get_infos in Seagate NAS OS version 4.3.15.1 allows attackers to obtain information about the NAS without authentication via empty POST requests.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-732'],['cpe:2.3:o:seagate:nas_os:4.3.15.1:*:*:*:*:*:*:*'],0,0
CVE-2018-12297,Seagate,0.00105,6.1,0.0,0.0,0.0,1.0,0,2019-05-13,0.0,,0.0,,,Cross-site scripting in API error pages in Seagate NAS OS version 4.3.15.1 allows attackers to execute JavaScript via URL path names.,CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],['cpe:2.3:o:seagate:nas_os:4.3.15.1:*:*:*:*:*:*:*'],0,0
CVE-2018-12298,Seagate,0.00902,7.5,0.0,0.0,0.0,1.0,0,2019-05-13,0.0,,0.0,,,Directory Traversal in filebrowser in Seagate NAS OS 4.3.15.1 allows attackers to read files within the application's container via a URL path.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-22'],['cpe:2.3:o:seagate:nas_os:4.3.15.1:*:*:*:*:*:*:*'],0,0
CVE-2018-12299,Seagate,0.00058,5.4,0.0,0.0,0.0,1.0,0,2019-05-13,0.0,,0.0,,,Cross-site scripting in filebrowser in Seagate NAS OS version 4.3.15.1 allows attackers to execute JavaScript via uploaded file names.,CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,LOW,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.3,2.7,['CWE-79'],['cpe:2.3:o:seagate:nas_os:4.3.15.1:*:*:*:*:*:*:*'],0,0
CVE-2018-12300,Seagate,0.00118,6.1,0.0,0.0,0.0,1.0,0,2019-05-13,0.0,,0.0,,,Arbitrary Redirect in echo-server.html in Seagate NAS OS version 4.3.15.1 allows attackers to disclose information in the Referer header via the 'state' URL parameter.,CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-601'],['cpe:2.3:o:seagate:nas_os:4.3.15.1:*:*:*:*:*:*:*'],0,0
CVE-2018-12301,Seagate,0.00168,7.5,0.0,0.0,0.0,1.0,0,2019-05-13,0.0,,0.0,,,Unvalidated URL in Download Manager in Seagate NAS OS version 4.3.15.1 allows attackers to access the loopback interface via a Download URL of 127.0.0.1 or localhost.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-200'],['cpe:2.3:o:seagate:nas_os:4.3.15.1:*:*:*:*:*:*:*'],0,0
CVE-2018-12302,Seagate,0.00078,6.1,0.0,0.0,0.0,1.0,0,2019-05-13,0.0,,0.0,,,Missing HTTPOnly flag on session cookies in the Seagate NAS OS version 4.3.15.1 web application allows attackers to steal session tokens via cross-site scripting.,CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],['cpe:2.3:o:seagate:nas_os:4.3.15.1:*:*:*:*:*:*:*'],0,0
CVE-2018-12303,Seagate,0.00058,5.4,0.0,0.0,0.0,1.0,0,2019-05-13,0.0,,0.0,,,Cross-site scripting in filebrowser in Seagate NAS OS version 4.3.15.1 allows attackers to execute JavaScript via directory names.,CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,LOW,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.3,2.7,['CWE-79'],['cpe:2.3:o:seagate:nas_os:4.3.15.1:*:*:*:*:*:*:*'],0,0
CVE-2018-12304,Seagate,0.00105,6.1,0.0,0.0,0.0,1.0,0,2019-05-13,0.0,,0.0,,,"Cross-site scripting in Application Manager in Seagate NAS OS version 4.3.15.1 allows attackers to execute JavaScript via multiple application metadata fields: Short Description, Publisher Name, Publisher Contact, or Website URL.",CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],['cpe:2.3:o:seagate:nas_os:4.3.15.1:*:*:*:*:*:*:*'],0,0
CVE-2018-18471,Seagate,0.01105,9.8,0.0,1.0,0.0,0.0,0,2019-06-19,0.0,,0.0,,,"/api/2.0/rest/aggregator/xml in Axentra firmware, used by NETGEAR Stora, Seagate GoFlex Home, and MEDION LifeCloud, has an XXE vulnerability that can be chained with an SSRF bug to gain remote command execution as root. It can be triggered by anyone who knows the IP address of the affected device.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-611'],"['cpe:2.3:o:axentra:hipserv:-:*:*:*:*:*:*:*', 'cpe:2.3:h:medion:lifecloud:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netgear:stora:-:*:*:*:*:*:*:*', 'cpe:2.3:h:seagate:goflex_home:-:*:*:*:*:*:*:*']",0,0
CVE-2017-2125,Allied Telesis,0.00316,8.8,0.0,1.0,0.0,1.0,1,2017-04-28,0.0,,1.0,2017-03-30,,Privilege escalation vulnerability in CentreCOM AR260S V2 remote authenticated attackers to gain privileges via the guest account.,CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:allied_telesis_k.k.:centrecom_ar260s_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:allied_telesis_k.k.:centrecom_ar260s_v2:-:*:*:*:*:*:*:*']",0,0
CVE-2018-20503,Allied Telesis,0.00238,6.1,1.0,1.0,0.0,1.0,1,2019-05-07,0.0,,1.0,2017-03-30,,Allied Telesis 8100L/8 devices allow XSS via the edit-ipv4_interface.php vlanid or subnet_mask parameter.,CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:alliedtelesis:8100l\\/8_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:alliedtelesis:8100l\\/8:-:*:*:*:*:*:*:*']",1,0
CVE-2019-18922,Allied Telesis,0.1773,7.5,0.0,1.0,0.0,0.0,1,2019-11-29,0.0,,0.0,,,A Directory Traversal in the Web interface of the Allied Telesis AT-GS950/8 until Firmware AT-S107 V.1.1.3 [1.00.047] allows unauthenticated attackers to read arbitrary system files via a GET request. NOTE: This is an End-of-Life product.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-22'],"['cpe:2.3:o:alliedtelesis:at-gs950\\/8_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:alliedtelesis:at-gs950\\/8:-:*:*:*:*:*:*:*']",0,0
CVE-2017-3167,Apple,0.01399,9.8,0.0,0.0,0.0,1.0,1,2017-06-20,0.0,,0.0,,,"In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may lead to authentication requirements being bypassed.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-287'],"['cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*', 'cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:secure_global_desktop:5.3:*:*:*:*:*:*:*']",0,0
CVE-2018-14468,Apple,0.00407,7.5,0.0,0.0,0.0,1.0,1,2019-10-03,1.0,2019-12-10,,,0.0,The FRF.16 parser in tcpdump before 4.9.3 has a buffer over-read in print-fr.c:mfr_print().,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-125'],"['cpe:2.3:a:tcpdump:tcpdump:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-iq_centralized_management:7.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:enterprise_manager:3.1.1:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:iworkflow:2.3.0:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*']",0,0
CVE-2018-14880,Apple,0.0038,7.5,0.0,0.0,0.0,1.0,1,2019-10-03,1.0,2020-02-11,,,0.0,The OSPFv3 parser in tcpdump before 4.9.3 has a buffer over-read in print-ospf6.c:ospf6_print_lshdr().,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-125'],"['cpe:2.3:a:tcpdump:tcpdump:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-iq_centralized_management:7.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:enterprise_manager:3.1.1:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:iworkflow:2.3.0:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*']",0,0
CVE-2018-18311,Apple,0.00313,9.8,0.0,0.0,0.0,1.0,1,2018-12-07,1.0,2019-03-25,,,0.0,Perl before 5.26.3 and 5.28.x before 5.28.1 has a buffer overflow via a crafted regular expression that triggers invalid write operations.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-190'],"['cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*', 'cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:e-series_santricity_os_controller:-:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:snap_creator_framework:-:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:snapdriver:-:*:*:*:*:unix:*:*', 'cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:7.4:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:7.5:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:7.6:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*']",0,0
CVE-2019-14379,Apple,0.00984,9.8,0.0,0.0,1.0,0.0,1,2019-07-29,0.0,,0.0,,,"SubTypeValidator.java in FasterXML jackson-databind before 2.9.9.2 mishandles default typing when ehcache is used (because of net.sf.ehcache.transaction.manager.DefaultTransactionManagerLookup), leading to remote code execution.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-1321'],"['cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*', 'cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*', 'cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*', 'cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:linux:*:*', 'cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*', 'cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*', 'cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:service_level_manager:-:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:single_sign-on:7.3:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:single_sign-on:7.3:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:single_sign-on:7.3:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:banking_platform:2.4.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:banking_platform:2.4.1:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:banking_platform:2.5.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:banking_platform:2.6.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:banking_platform:2.6.1:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:banking_platform:2.7.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:banking_platform:2.7.1:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:communications_diameter_signaling_router:8.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:communications_diameter_signaling_router:8.1:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2.1:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.3.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:*:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:goldengate_stream_analytics:*:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:jd_edwards_enterpriseone_orchestrator:9.2:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:primavera_gateway:15.2:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:primavera_gateway:16.2:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:primavera_gateway:17.12:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:primavera_gateway:18.8.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:primavera_unifier:*:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:primavera_unifier:16.1:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:primavera_unifier:16.2:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:primavera_unifier:18.8:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:retail_customer_management_and_segmentation_foundation:17.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:retail_xstore_point_of_service:7.1:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:retail_xstore_point_of_service:15.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:retail_xstore_point_of_service:16.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:retail_xstore_point_of_service:17.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:retail_xstore_point_of_service:18.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:siebel_engineering_-_installer_\\&_deployment:*:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:siebel_ui_framework:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:*']",0,0
CVE-2019-8615,Apple,0.00612,6.5,0.0,0.0,1.0,1.0,1,2019-12-18,1.0,2019-05-13,,,1.0,"Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,NONE,NONE,MEDIUM,2.8,3.6,['CWE-125'],"['cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*', 'cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*', 'cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*']",0,0
CVE-2019-8619,Apple,0.01416,8.8,0.0,0.0,1.0,1.0,1,2019-12-18,1.0,2019-05-13,,,1.0,"Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-787'],"['cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*', 'cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*', 'cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*', 'cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*']",0,0
CVE-2019-8623,Apple,0.07534,8.8,1.0,0.0,1.0,1.0,1,2019-12-18,1.0,2019-05-13,,,1.0,"Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, watchOS 5.2.1, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-787'],"['cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*', 'cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*', 'cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*', 'cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",1,1
CVE-2019-8628,Apple,0.01416,8.8,0.0,0.0,1.0,1.0,1,2019-12-18,1.0,2019-05-13,,,1.0,"Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-787'],"['cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*', 'cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*', 'cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*', 'cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*']",0,0
CVE-2019-9506,Apple,0.00105,8.1,0.0,0.0,0.0,1.0,1,2019-08-14,0.0,,0.0,,,"The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka ""KNOB"") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.",CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,NONE,HIGH,2.8,5.2,"['CWE-327', 'CWE-310']","['cpe:2.3:h:blackberry:blackberry:-:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:-:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:12.4:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.12.6:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.13.6:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.5:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:12.4:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:5.3:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:mrg_realtime:2.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:virtualization_host_eus:4.2:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_aus:7.5:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_for_real_time_eus:8.2:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_for_real_time_eus:8.4:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:8:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_eus:8.2:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_eus:8.4:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_tus:7.6:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:alp-al00b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:alp-al00b_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:ares-al00b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:ares-al00b_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:ares-al10d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:ares-al10d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:ares-tl00c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:ares-tl00c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:asoka-al00ax:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:asoka-al00ax_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:atomu-l33_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:atomu-l33:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:atomu-l41_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:atomu-l41:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:atomu-l42_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:atomu-l42:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:bla-al00b_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:bla-al00b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:bla-l29c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:bla-l29c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:bla-tl00b_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:bla-tl00b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:barca-al00_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:barca-al00:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:berkeley-al20_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:berkeley-al20:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:berkeley-l09_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:berkeley-l09:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:berkeley-tl10_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:berkeley-tl10:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:cairogo-l22_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:cairogo-l22:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:charlotte-l29c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:charlotte-l29c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:columbia-al10b_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:columbia-al10b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:columbia-al10i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:columbia-al10i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:columbia-l29d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:columbia-l29d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:columbia-tl00d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:columbia-tl00d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:cornell-al00a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:cornell-al00a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:cornell-al00i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:cornell-al00i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:cornell-al00ind_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:cornell-al00ind:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:cornell-al10ind_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:cornell-al10ind:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:cornell-l29a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:cornell-l29a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:cornell-tl10b_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:cornell-tl10b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:dubai-al00a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:dubai-al00a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:dura-al00a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:dura-al00a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:dura-tl00a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:dura-tl00a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:emily-l29c_firmware:8.1.0.156\\(c605\\):*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:emily-l29c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:ever-l29b_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:ever-l29b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:figo-l23_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:figo-l23:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:figo-l31_firmware:8.0.0.122d\\(c652\\):*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:figo-l31:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:figo-tl10b_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:figo-tl10b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:florida-al20b_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:florida-al20b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:florida-l21_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:florida-l21:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:florida-l22_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:florida-l22:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:florida-l23_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:florida-l23:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:florida-tl10b_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:florida-tl10b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:honor_20_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:honor_20:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:mate_20_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:mate_20:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:mate_20_pro_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:mate_20_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:mate_20_x_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:mate_20_x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:p_smart_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:p_smart:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:p_smart_2019_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:p_smart_2019:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:p20_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:p20:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:p20_pro_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:p20_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:p30_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:p30:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:p30_pro_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:p30_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:y5_2018_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:y5_2018:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:y5_lite_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:y5_lite:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:y6_2019_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:y6_2019:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:y6_prime_2018_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:y6_prime_2018:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:y6_pro_2019_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:y6_pro_2019:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:y7_2019_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:y7_2019:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:y9_2019_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:y9_2019:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:nova_3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:nova_3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:nova_4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:nova_4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:nova_5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:nova_5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:nova_5i_pro_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:nova_5i_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:nova_lite_3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:nova_lite_3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:harry-al00c_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:harry-al00c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:harry-al10b_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:harry-al10b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:harry-tl00c_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:harry-tl00c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:hima-l29c_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:hima-l29c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:honor_10_lite_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:honor_10_lite:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:honor_8a_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:honor_8a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:honor_8x_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:honor_8x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:honor_view_10_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:honor_view_10:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:honor_view_20_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:honor_view_20:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:jakarta-al00a_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:jakarta-al00a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:johnson-tl00d_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:johnson-tl00d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:johnson-tl00f_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:johnson-tl00f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:katyusha-al00a_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:katyusha-al00a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:laya-al00ep_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:laya-al00ep:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:leland-l21a_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:leland-l21a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:leland-l31a_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:leland-l31a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:leland-l32a_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:leland-l32a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:leland-l32c_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:leland-l32c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:leland-l42a_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:leland-l42a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:leland-l42c_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:leland-l42c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:leland-tl10b_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:leland-tl10b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:leland-tl10c_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:leland-tl10c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:lelandp-al00c_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:lelandp-al00c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:lelandp-al10b_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:lelandp-al10b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:lelandp-al10d_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:lelandp-al10d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:lelandp-l22a_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:lelandp-l22a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:lelandp-l22c_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:lelandp-l22c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:lelandp-l22d_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:lelandp-l22d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:london-al40ind_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:london-al40ind:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:madrid-al00a_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:madrid-al00a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:madrid-tl00a_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:madrid-tl00a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:neo-al00d_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:neo-al00d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:paris-al00ic_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:paris-al00ic:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:paris-l21b_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:paris-l21b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:paris-l21meb_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:paris-l21meb:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:paris-l29b_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:paris-l29b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:potter-al00c_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:potter-al00c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:potter-al10a_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:potter-al10a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:princeton-al10b_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:princeton-al10b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:princeton-al10d_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:princeton-al10d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:princeton-tl10c_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:princeton-tl10c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:sydney-al00_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:sydney-al00:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:sydney-l21_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:sydney-l21:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:sydney-l21br_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:sydney-l21br:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:sydney-l22_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:sydney-l22:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:sydney-l22br_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:sydney-l22br:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:sydney-tl00_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:sydney-tl00:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:sydneym-al00_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:sydneym-al00:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:sydneym-l01_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:sydneym-l01:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:sydneym-l03_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:sydneym-l03:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:sydneym-l21_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:sydneym-l21:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:sydneym-l22_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:sydneym-l22:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:sydneym-l23_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:sydneym-l23:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:tony-al00b_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:tony-al00b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:tony-tl00b_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:tony-tl00b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:yale-al00a_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:yale-al00a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:yale-al50a_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:yale-al50a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:yale-l21a_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:yale-l21a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:yale-l61c_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:yale-l61c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:yale-tl00b_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:yale-tl00b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:yalep-al10b_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:yalep-al10b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:imanager_neteco_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:imanager_neteco:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:imanager_neteco_6000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:imanager_neteco_6000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:bla-l29c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:bla-l29c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:bla-l29c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:bla-l29c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:bla-l29c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:bla-l29c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:bla-l29c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:bla-l29c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:berkeley-l09_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:berkeley-l09:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:berkeley-l09_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:berkeley-l09:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:charlotte-l29c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:charlotte-l29c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:charlotte-l29c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:charlotte-l29c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:charlotte-l29c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:charlotte-l29c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:charlotte-l29c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:charlotte-l29c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:columbia-l29d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:columbia-l29d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:columbia-l29d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:columbia-l29d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:columbia-l29d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:columbia-l29d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:columbia-l29d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:columbia-l29d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:cornell-l29a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:cornell-l29a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:cornell-l29a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:cornell-l29a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:cornell-l29a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:cornell-l29a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:emily-l29c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:emily-l29c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:emily-l29c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:emily-l29c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:emily-l29c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:emily-l29c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:emily-l29c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:emily-l29c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:emily-l29c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:emily-l29c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:figo-l31_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:figo-l31:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:figo-l31_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:figo-l31:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:figo-l31_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:figo-l31:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:figo-l31_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:figo-l31:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:figo-l31_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:figo-l31:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:florida-l21_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:florida-l21:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:honor_20_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:honor_20:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*']",0,0
CVE-2019-9511,Apple,0.07759,7.5,0.0,0.0,1.0,1.0,1,2019-08-13,0.0,,0.0,,,"Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,"['CWE-770', 'CWE-400']","['cpe:2.3:a:apple:swiftnio:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:diskstation_manager:6.2:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*', 'cpe:2.3:o:synology:vs960hd_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:openshift_service_mesh:1.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:graalvm:19.2.0:*:*:*:enterprise:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:enterprise_communications_broker:3.2.0:*:*:*:*:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*']",0,0
CVE-2019-9513,Apple,0.04253,7.5,0.0,0.0,1.0,1.0,1,2019-08-13,0.0,,0.0,,,"Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,"['NVD-CWE-Other', 'CWE-400']","['cpe:2.3:a:apple:swiftnio:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:diskstation_manager:6.2:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*', 'cpe:2.3:o:synology:vs960hd_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:openshift_service_mesh:1.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:graalvm:19.2.0:*:*:*:enterprise:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:enterprise_communications_broker:3.2.0:*:*:*:*:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*']",0,0
CVE-2019-9514,Apple,0.7923,7.5,0.0,0.0,1.0,1.0,1,2019-08-13,0.0,,0.0,,,"Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,"['CWE-770', 'CWE-400']","['cpe:2.3:a:apple:swiftnio:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:diskstation_manager:6.2:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*', 'cpe:2.3:o:synology:vs960hd_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:developer_tools:1.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:openshift_container_platform:3.9:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:openshift_container_platform:3.10:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:openshift_container_platform:4.2:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:openshift_service_mesh:1.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:openstack:14:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:single_sign-on:7.3:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:graalvm:19.2.0:*:*:*:enterprise:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:cloud_insights:-:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:trident:-:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*']",0,0
CVE-2019-9515,Apple,0.03886,7.5,0.0,0.0,1.0,1.0,1,2019-08-13,0.0,,0.0,,,"Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,"['CWE-770', 'CWE-400']","['cpe:2.3:a:apple:swiftnio:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:diskstation_manager:6.2:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*', 'cpe:2.3:o:synology:vs960hd_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:openshift_service_mesh:1.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:openstack:14:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:single_sign-on:7.3:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:graalvm:19.2.0:*:*:*:enterprise:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*']",0,0
CVE-2019-9516,Apple,0.00702,6.5,0.0,0.0,1.0,1.0,1,2019-08-13,0.0,,0.0,,,"Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.8,3.6,"['CWE-770', 'CWE-400']","['cpe:2.3:a:apple:swiftnio:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:diskstation_manager:6.2:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*', 'cpe:2.3:o:synology:vs960hd_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:openshift_service_mesh:1.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:graalvm:19.2.0:*:*:*:enterprise:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*']",0,0
CVE-2019-9517,Apple,0.03532,7.5,0.0,0.0,1.0,1.0,1,2019-08-13,0.0,,0.0,,,"Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,"['CWE-770', 'CWE-400']","['cpe:2.3:a:apple:swiftnio:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:diskstation_manager:6.2:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*', 'cpe:2.3:o:synology:vs960hd_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:openshift_service_mesh:1.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:communications_element_manager:8.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:communications_element_manager:8.1.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:communications_element_manager:8.1.1:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:communications_element_manager:8.2.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:graalvm:19.2.0:*:*:*:enterprise:*:*:*', 'cpe:2.3:a:oracle:instantis_enterprisetrack:*:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:retail_xstore_point_of_service:7.1:*:*:*:*:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*']",0,0
CVE-2019-9518,Apple,0.01188,7.5,0.0,0.0,1.0,1.0,1,2019-08-13,0.0,,0.0,,,"Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,"['CWE-770', 'CWE-400']","['cpe:2.3:a:apple:swiftnio:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:diskstation_manager:6.2:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*', 'cpe:2.3:o:synology:vs960hd_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:openshift_service_mesh:1.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:graalvm:19.2.0:*:*:*:enterprise:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*', 'cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*']",0,0
CVE-2019-9536,Apple,0.001,6.8,0.0,1.0,0.0,0.0,1,2019-11-22,0.0,,0.0,,,"Apple iPhone 3GS bootrom malloc implementation returns a non-NULL pointer when unable to allocate memory, aka 'alloc8'. An attacker with physical access to the device can install arbitrary firmware.",CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,PHYSICAL,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.9,5.9,['CWE-755'],['cpe:2.3:h:apple:iphone_3gs:-:*:*:*:*:*:*:*'],0,0
CVE-2020-12243,Apple,0.09157,7.5,0.0,0.0,0.0,1.0,1,2020-04-28,0.0,,0.0,,,"In filter.c in slapd in OpenLDAP before 2.4.50, LDAP search filters with nested boolean expressions can result in denial of service (daemon crash).",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-674'],"['cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*', 'cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:broadcom:brocade_fabric_operating_system:-:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2018-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2018-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2020-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2020-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.13.6:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*', 'cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*', 'cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*', 'cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*']",0,0
CVE-2020-12427,Apple,0.00071,8.8,0.0,0.0,0.0,1.0,1,2020-05-13,1.0,2020-04-27,,,1.0,"The Western Digital WD Discovery application before 3.8.229 for MyCloud Home on Windows and macOS is vulnerable to CSRF, with impacts such as stealing data, modifying disk contents, or exhausting disk space.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-352'],"['cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*', 'cpe:2.3:a:westerndigital:wd_discovery:*:*:*:*:*:my_cloud_home:*:*']",0,0
CVE-2021-22945,Apple,0.00688,9.1,0.0,0.0,0.0,1.0,1,2021-09-23,1.0,2022-03-21,,,0.0,"When sending data to an MQTT server, libcurl <= 7.73.0 and 7.78.0 could in some circumstances erroneously keep a pointer to an already freed memory area and both use that again in a subsequent call to send data and also free it *again*.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,HIGH,CRITICAL,3.9,5.2,['CWE-415'],"['cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:sinec_ins:*:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*', 'cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*', 'cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*', 'cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:*']",0,0
CVE-2021-23841,Apple,0.00416,5.9,0.0,0.0,1.0,1.0,1,2021-02-16,1.0,2021-05-24,,,0.0,The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,HIGH,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.2,3.6,['CWE-476'],"['cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*', 'cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe:2.3:a:tenable:nessus_network_monitor:5.11.0:*:*:*:*:*:*:*', 'cpe:2.3:a:tenable:nessus_network_monitor:5.11.1:*:*:*:*:*:*:*', 'cpe:2.3:a:tenable:nessus_network_monitor:5.12.0:*:*:*:*:*:*:*', 'cpe:2.3:a:tenable:nessus_network_monitor:5.12.1:*:*:*:*:*:*:*', 'cpe:2.3:a:tenable:nessus_network_monitor:5.13.0:*:*:*:*:*:*:*', 'cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:business_intelligence:5.5.0.0.0:*:*:*:enterprise:*:*:*', 'cpe:2.3:a:oracle:business_intelligence:5.9.0.0.0:*:*:*:enterprise:*:*:*', 'cpe:2.3:a:oracle:business_intelligence:12.2.1.3.0:*:*:*:enterprise:*:*:*', 'cpe:2.3:a:oracle:business_intelligence:12.2.1.4.0:*:*:*:enterprise:*:*:*', 'cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.15.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:enterprise_manager_for_storage_management:13.4.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:essbase:21.2:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:graalvm:19.3.5:*:*:*:enterprise:*:*:*', 'cpe:2.3:a:oracle:graalvm:20.3.1.2:*:*:*:enterprise:*:*:*', 'cpe:2.3:a:oracle:graalvm:21.0.0.2:*:*:*:enterprise:*:*:*', 'cpe:2.3:a:oracle:jd_edwards_world_security:a9.4:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:sinec_ins:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:sinec_ins:1.0:-:*:*:*:*:*:*', 'cpe:2.3:a:siemens:sinec_ins:1.0:sp1:*:*:*:*:*:*']",0,0
CVE-2021-25252,Apple,0.00044,5.5,0.0,0.0,0.0,1.0,1,2021-03-03,1.0,2021-03-04,,,0.0,Trend Micro's Virus Scan API (VSAPI) and Advanced Threat Scan Engine (ATSE) - are vulnerable to a memory exhaustion vulnerability that may lead to denial-of-service or system freeze if exploited by an attacker using a specially crafted file.,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,1.8,3.6,['CWE-400'],"['cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*', 'cpe:2.3:a:trendmicro:apex_central:2019:-:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*', 'cpe:2.3:a:trendmicro:apex_one:2019:-:*:*:*:*:*:*', 'cpe:2.3:a:trendmicro:cloud_edge:5.0:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*', 'cpe:2.3:a:trendmicro:apex_one:-:-:*:*:*:*:*:*', 'cpe:2.3:a:trendmicro:deep_security:10.0:-:*:*:*:*:*:*', 'cpe:2.3:a:trendmicro:deep_security:11.0:-:*:*:*:*:*:*', 'cpe:2.3:a:trendmicro:deep_security:12.0:-:*:*:*:*:*:*', 'cpe:2.3:a:trendmicro:deep_security:20.0:-:*:*:long_term_support:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*', 'cpe:2.3:a:trendmicro:control_manager:7.0:-:*:*:*:*:*:*', 'cpe:2.3:a:trendmicro:deep_discovery_analyzer:5.1:-:*:*:*:*:*:*', 'cpe:2.3:a:trendmicro:deep_discovery_email_inspector:2.5:-:*:*:*:*:*:*', 'cpe:2.3:a:trendmicro:deep_discovery_inspector:3.8:-:*:*:*:*:*:*', 'cpe:2.3:a:trendmicro:interscan_messaging_security_virtual_appliance:9.1:-:*:*:*:*:*:*', 'cpe:2.3:a:trendmicro:interscan_web_security_virtual_appliance:6.5:-:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*', 'cpe:2.3:a:trendmicro:officescan:-:*:*:*:*:*:*:*', 'cpe:2.3:a:trendmicro:portal_protect:2.6:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*', 'cpe:2.3:a:trendmicro:scanmail:14.0:*:*:*:*:microsoft_exchange:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*', 'cpe:2.3:a:trendmicro:scanmail_for_ibm_domino:5.8:-:*:*:*:*:*:*', 'cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*', 'cpe:2.3:a:trendmicro:serverprotect_for_storage:6.0:-:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*', 'cpe:2.3:a:trendmicro:serverprotect:5.8:-:*:*:*:*:*:*', 'cpe:2.3:h:emc:celerra_network_attached_storage:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*', 'cpe:2.3:o:novell:netware:-:*:*:*:*:*:*:*', 'cpe:2.3:a:trendmicro:serverprotect_for_network_appliance_filers:5.8:-:*:*:*:*:*:*', 'cpe:2.3:o:netapp:cluster_data_ontap:-:*:*:*:*:*:*:*', 'cpe:2.3:a:trendmicro:safe_lock:1.1:-:*:*:txone:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*', 'cpe:2.3:a:trendmicro:worry-free_business_security:10.1:-:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*']",0,0
CVE-2021-44224,Apple,0.31186,8.2,0.0,0.0,0.0,1.0,1,2021-12-20,1.0,2022-05-16,,,0.0,"A crafted URI sent to httpd configured as a forward proxy (ProxyRequests on) can cause a crash (NULL pointer dereference) or, for configurations mixing forward and reverse proxy declarations, can allow for requests to be directed to a declared Unix Domain Socket endpoint (Server Side Request Forgery). This issue affects Apache HTTP Server 2.4.7 up to 2.4.51 (included).",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,LOW,HIGH,HIGH,3.9,4.2,['CWE-476'],"['cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*', 'cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*', 'cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:communications_operations_monitor:4.3:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:communications_operations_monitor:4.4:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:communications_operations_monitor:5.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:http_server:-:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-008:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-44790,Apple,0.10912,9.8,0.0,0.0,0.0,1.0,1,2021-12-20,1.0,2022-05-16,,,0.0,A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*', 'cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:communications_operations_monitor:4.3:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:communications_operations_monitor:4.4:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:communications_operations_monitor:5.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-008:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*']",1,1
CVE-2017-2492,Apple,0.00182,6.1,0.0,0.0,1.0,1.0,0,2018-04-03,1.0,2017-04-24,,,1.0,"An issue was discovered in certain Apple products. iOS before 10.3 is affected. Safari before 10.1 is affected. tvOS before 10.2 is affected. The issue involves the ""JavaScriptCore"" component. It allows remote attackers to conduct Universal XSS (UXSS) attacks via a crafted web site that triggers prototype mishandling.",CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*']",0,0
CVE-2017-7071,Apple,0.01268,8.8,0.0,0.0,1.0,0.0,0,2018-04-03,1.0,2017-08-23,,,1.0,"An issue was discovered in certain Apple products. Safari before 10.1 is affected. The issue involves the ""WebKit"" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.",CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-119'],['cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*'],0,0
CVE-2018-25010,Apple,0.00302,9.1,0.0,0.0,0.0,1.0,0,2021-05-21,1.0,2021-07-21,,,0.0,A heap-based buffer overflow was found in libwebp in versions before 1.0.1 in ApplyFilter().,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,HIGH,CRITICAL,3.9,5.2,['CWE-125'],"['cpe:2.3:a:webmproject:libwebp:*:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*']",0,0
CVE-2018-25011,Apple,0.00276,9.8,0.0,0.0,0.0,1.0,0,2021-05-21,1.0,2021-07-21,,,0.0,A heap-based buffer overflow was found in libwebp in versions before 1.0.1 in PutLE16().,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:a:webmproject:libwebp:*:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*']",0,0
CVE-2018-25014,Apple,0.00302,9.8,0.0,0.0,0.0,1.0,0,2021-05-21,1.0,2021-07-21,,,0.0,A use of uninitialized value was found in libwebp in versions before 1.0.1 in ReadSymbol().,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-908'],"['cpe:2.3:a:webmproject:libwebp:*:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*']",0,0
CVE-2018-4126,Apple,0.00272,7.8,0.0,0.0,1.0,1.0,0,2019-04-03,1.0,2018-10-30,,,1.0,"A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to iOS 12, macOS Mojave 10.14, tvOS 12, watchOS 5, iTunes 12.9 for Windows, iCloud for Windows 7.7.",CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-119'],"['cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*']",0,0
CVE-2018-4153,Apple,0.00079,5.9,0.0,0.0,0.0,1.0,0,2019-04-03,1.0,2018-10-30,,,1.0,An injection issue was addressed with improved validation. This issue affected versions prior to macOS Mojave 10.14.,CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N,NETWORK,HIGH,NONE,NONE,UNCHANGED,NONE,HIGH,NONE,MEDIUM,2.2,3.6,['CWE-74'],['cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*'],0,0
CVE-2018-4187,Apple,0.00607,6.5,0.0,0.0,0.0,1.0,0,2018-06-08,1.0,2019-04-03,,,0.0,"An issue was discovered in certain Apple products. iOS before 11.3.1 is affected. macOS before 10.13.4 Security Update 2018-001 is affected. The issue involves the ""LinkPresentation"" component. It allows remote attackers to spoof the UI via a crafted URL in a text message.",CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,NONE,HIGH,NONE,MEDIUM,2.8,3.6,['CWE-20'],"['cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*']",0,0
CVE-2018-4295,Apple,0.00244,9.8,0.0,0.0,0.0,1.0,0,2019-04-03,1.0,2018-10-30,,,1.0,An input validation issue was addressed with improved input validation. This issue affected versions prior to macOS Mojave 10.14.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-20'],['cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*'],0,0
CVE-2018-4304,Apple,0.00062,5.0,0.0,0.0,0.0,1.0,0,2019-04-03,1.0,2018-10-30,,,1.0,"A denial of service issue was addressed with improved validation. This issue affected versions prior to iOS 12, macOS Mojave 10.14, tvOS 12, watchOS 5.",CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H,LOCAL,LOW,LOW,REQUIRED,UNCHANGED,NONE,NONE,HIGH,MEDIUM,1.3,3.6,['CWE-20'],"['cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2018-4308,Apple,0.00069,5.5,0.0,0.0,0.0,1.0,0,2019-04-03,1.0,2018-10-30,,,1.0,An out-of-bounds read was addressed with improved bounds checking. This issue affected versions prior to macOS Mojave 10.14.,CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.8,3.6,['CWE-125'],['cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*'],0,0
CVE-2018-4342,Apple,0.00044,5.5,0.0,0.0,0.0,1.0,0,2019-04-03,1.0,2018-10-30,,,1.0,A configuration issue was addressed with additional restrictions. This issue affected versions prior to macOS Mojave 10.14.1.,CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N,LOCAL,LOW,LOW,NONE,UNCHANGED,NONE,HIGH,NONE,MEDIUM,1.8,3.6,['CWE-20'],['cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*'],0,0
CVE-2018-4346,Apple,0.00069,5.5,0.0,0.0,0.0,1.0,0,2019-04-03,1.0,2018-10-30,,,1.0,A validation issue existed which allowed local file access. This was addressed with input sanitization. This issue affected versions prior to macOS Mojave 10.14.,CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.8,3.6,['CWE-20'],['cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*'],0,0
CVE-2018-4398,Apple,0.00279,7.5,0.0,0.0,1.0,1.0,0,2019-04-03,1.0,2018-10-30,,,1.0,"An issue existed in the method for determining prime numbers. This issue was addressed by using pseudorandom bases for testing of primes. This issue affected versions prior to iOS 12.1, macOS Mojave 10.14.1, tvOS 12.1, watchOS 5.1, iTunes 12.9.1, iCloud for Windows 7.8.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,HIGH,NONE,HIGH,3.9,3.6,['CWE-20'],"['cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*']",0,0
CVE-2018-4403,Apple,0.00066,5.5,0.0,0.0,0.0,1.0,0,2019-04-03,1.0,2019-02-15,,,1.0,This issue was addressed by removing additional entitlements. This issue affected versions prior to macOS Mojave 10.14.1.,CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.8,3.6,['CWE-200'],['cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*'],0,0
CVE-2018-4406,Apple,0.00085,6.5,0.0,0.0,0.0,1.0,0,2019-04-03,1.0,2018-10-30,,,1.0,A denial of service issue was addressed with improved validation. This issue affected versions prior to macOS Mojave 10.14.,CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.8,3.6,['CWE-20'],['cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*'],0,0
CVE-2018-4410,Apple,0.00078,7.8,0.0,0.0,0.0,1.0,0,2019-04-03,1.0,2018-10-30,,,1.0,A memory corruption issue was addressed with improved input validation. This issue affected versions prior to macOS Mojave 10.14.1.,CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-119'],['cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*'],0,0
CVE-2018-4411,Apple,0.00081,7.8,0.0,0.0,0.0,1.0,0,2019-04-03,1.0,2018-10-30,,,1.0,A memory corruption issue was addressed with improved input validation. This issue affected versions prior to macOS Mojave 10.14.,CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-119'],['cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*'],0,0
CVE-2018-4412,Apple,0.00229,7.8,0.0,0.0,1.0,1.0,0,2019-04-03,1.0,2018-10-30,,,1.0,"A memory corruption issue was addressed with improved input validation. This issue affected versions prior to iOS 12, macOS Mojave 10.14, tvOS 12, watchOS 5, iTunes 12.9 for Windows, iCloud for Windows 7.7.",CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-119'],"['cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*']",0,0
CVE-2018-4415,Apple,0.00063,7.8,0.0,0.0,0.0,1.0,0,2019-04-03,1.0,2018-10-30,,,1.0,A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to macOS Mojave 10.14.1.,CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-119'],['cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*'],0,0
CVE-2018-4417,Apple,0.00079,5.5,0.0,0.0,0.0,1.0,0,2019-04-03,1.0,2018-10-30,,,1.0,A validation issue was addressed with improved input sanitization. This issue affected versions prior to macOS Mojave 10.14.,CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.8,3.6,['CWE-20'],['cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*'],0,0
CVE-2018-4418,Apple,0.00069,5.5,0.0,0.0,0.0,1.0,0,2019-04-03,1.0,2018-10-30,,,1.0,A validation issue was addressed with improved input sanitization. This issue affected versions prior to macOS Mojave 10.14.,CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.8,3.6,['CWE-20'],['cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*'],0,0
CVE-2018-4421,Apple,0.0007,7.8,0.0,0.0,0.0,1.0,0,2019-04-03,1.0,2018-12-21,,,1.0,A memory initialization issue was addressed with improved memory handling. This issue affected versions prior to macOS Mojave 10.14.1.,CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-119'],['cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*'],0,0
CVE-2018-4423,Apple,0.00059,7.8,0.0,0.0,0.0,1.0,0,2019-04-03,1.0,2018-11-16,,,1.0,A logic issue was addressed with improved validation. This issue affected versions prior to macOS Mojave 10.14.1.,CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-20'],['cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*'],0,0
CVE-2018-4426,Apple,0.00203,7.8,0.0,0.0,0.0,1.0,0,2019-04-03,1.0,2018-10-30,,,1.0,"A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to iOS 12, macOS Mojave 10.14, tvOS 12, watchOS 5.",CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-119'],"['cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2018-4468,Apple,0.00066,5.5,0.0,0.0,0.0,1.0,0,2020-10-27,1.0,2018-10-30,,,1.0,"This issue was addressed by removing additional entitlements. This issue is fixed in macOS Mojave 10.14.1, Security Update 2018-002 High Sierra, Security Update 2018-005 Sierra. A malicious application may be able to access restricted files.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.8,3.6,['NVD-CWE-noinfo'],['cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*'],0,0
CVE-2019-8737,Apple,0.00085,6.5,0.0,0.0,0.0,1.0,0,2020-10-27,1.0,2019-10-29,,,1.0,"A denial of service issue was addressed with improved validation. This issue is fixed in macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006, macOS Catalina 10.15. An attacker in a privileged position may be able to perform a denial of service attack.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.8,3.6,['CWE-20'],['cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*'],0,0
CVE-2020-10002,Apple,0.00042,5.5,0.0,0.0,1.0,1.0,0,2020-12-08,1.0,2020-11-05,,,1.0,"A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.1, iOS 14.2 and iPadOS 14.2, iCloud for Windows 11.5, tvOS 14.2, iTunes 12.11 for Windows. A local user may be able to read arbitrary files.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.8,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*', 'cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*', 'cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2020-36328,Apple,0.00754,9.8,0.0,0.0,0.0,1.0,0,2021-05-21,1.0,2021-07-21,,,0.0,A flaw was found in libwebp in versions before 1.0.1. A heap-based buffer overflow in function WebPDecodeRGBInto is possible due to an invalid check for buffer size. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:a:webmproject:libwebp:*:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:ipados:14.7:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:14.7:*:*:*:*:*:*:*']",0,0
CVE-2020-36329,Apple,0.00549,9.8,0.0,0.0,0.0,1.0,0,2021-05-21,1.0,2021-07-21,,,0.0,A flaw was found in libwebp in versions before 1.0.1. A use-after-free was found due to a thread being killed too early. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-416'],"['cpe:2.3:a:webmproject:libwebp:*:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*']",0,0
CVE-2020-36330,Apple,0.00424,9.1,0.0,0.0,0.0,1.0,0,2021-05-21,1.0,2021-07-21,,,0.0,A flaw was found in libwebp in versions before 1.0.1. An out-of-bounds read was found in function ChunkVerifyAndAssign. The highest threat from this vulnerability is to data confidentiality and to the service availability.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,HIGH,CRITICAL,3.9,5.2,['CWE-125'],"['cpe:2.3:a:webmproject:libwebp:*:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*']",0,0
CVE-2020-36331,Apple,0.00422,9.1,0.0,0.0,0.0,1.0,0,2021-05-21,1.0,2021-07-21,,,0.0,A flaw was found in libwebp in versions before 1.0.1. An out-of-bounds read was found in function ChunkAssignData. The highest threat from this vulnerability is to data confidentiality and to the service availability.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,HIGH,CRITICAL,3.9,5.2,['CWE-125'],"['cpe:2.3:a:webmproject:libwebp:*:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*']",0,0
CVE-2020-9949,Apple,0.00216,7.8,0.0,0.0,0.0,1.0,0,2020-12-08,1.0,2020-11-12,,,1.0,"A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.0, iOS 14.0 and iPadOS 14.0, macOS Catalina 10.15.6, Security Update 2020-004 Mojave, Security Update 2020-004 High Sierra, tvOS 14.0. An application may be able to execute arbitrary code with kernel privileges.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-416'],"['cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-1761,Apple,0.00532,7.5,0.0,0.0,0.0,1.0,0,2021-04-02,1.0,2021-05-28,,,0.0,"This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. A remote attacker may be able to cause a denial of service.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-1794,Apple,0.00603,9.8,0.0,0.0,0.0,1.0,0,2021-04-02,1.0,2021-05-28,,,0.0,An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 14.4 and iPadOS 14.4. A remote attacker may be able to cause arbitrary code execution.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-125'],"['cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30737,Apple,0.00381,8.8,0.0,0.0,0.0,1.0,0,2021-09-08,1.0,2021-06-14,,,1.0,"A memory corruption issue in the ASN.1 decoder was addressed by removing the vulnerable code. This issue is fixed in tvOS 14.6, Security Update 2021-004 Mojave, iOS 14.6 and iPadOS 14.6, iOS 12.5.4, Security Update 2021-003 Catalina, macOS Big Sur 11.4, watchOS 7.5. Processing a maliciously crafted certificate may lead to arbitrary code execution.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-787'],"['cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.6:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.6:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30748,Apple,0.00121,7.8,0.0,0.0,0.0,1.0,0,2021-09-08,1.0,2021-07-21,,,1.0,"A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 14.7, macOS Big Sur 11.5. An application may be able to execute arbitrary code with kernel privileges.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-787'],"['cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30758,Apple,0.00412,8.8,0.0,0.0,1.0,1.0,0,2021-09-08,1.0,2021-07-21,,,1.0,"A type confusion issue was addressed with improved state handling. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to arbitrary code execution.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-843'],"['cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30759,Apple,0.00148,7.8,0.0,0.0,0.0,1.0,0,2021-09-08,1.0,2021-07-21,,,1.0,"A stack overflow was addressed with improved input validation. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7, Security Update 2021-005 Mojave, Security Update 2021-004 Catalina. Processing a maliciously crafted font file may lead to arbitrary code execution.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-787'],"['cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.0:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.1:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.2:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.3:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.4:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.5:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.1:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.2:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.3:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.4:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.5:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.6:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.6:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30760,Apple,0.00161,7.8,0.0,0.0,0.0,1.0,0,2021-09-08,1.0,2021-07-21,,,1.0,"An integer overflow was addressed through improved input validation. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7, Security Update 2021-005 Mojave, Security Update 2021-004 Catalina. Processing a maliciously crafted font file may lead to arbitrary code execution.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-190'],"['cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.0:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.1:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.2:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.3:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.4:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.5:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.1:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.2:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.3:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.4:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.5:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.6:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.6:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30761,Apple,0.00495,8.8,0.0,0.0,0.0,1.0,0,2021-09-08,1.0,2021-06-14,,,1.0,A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 12.5.4. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-787'],['cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*'],0,0
CVE-2021-30762,Apple,0.00579,8.8,0.0,0.0,0.0,1.0,0,2021-09-08,1.0,2021-06-14,,,1.0,A use after free issue was addressed with improved memory management. This issue is fixed in iOS 12.5.4. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-416'],['cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*'],0,0
CVE-2021-30763,Apple,0.00053,5.5,0.0,0.0,0.0,1.0,0,2021-09-08,1.0,2021-07-21,,,1.0,"An input validation issue was addressed with improved input validation. This issue is fixed in iOS 14.7, watchOS 7.6. A shortcut may be able to bypass Internet permission requirements.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,NONE,HIGH,NONE,MEDIUM,1.8,3.6,['CWE-20'],"['cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30768,Apple,0.00073,5.5,0.0,0.0,0.0,1.0,0,2021-09-08,1.0,2021-07-21,,,1.0,"A logic issue was addressed with improved validation. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7, Security Update 2021-004 Catalina. A sandboxed process may be able to circumvent sandbox restrictions.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,NONE,HIGH,NONE,MEDIUM,1.8,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30769,Apple,0.00064,5.5,0.0,0.0,0.0,1.0,0,2021-09-08,1.0,2021-07-21,,,1.0,"A logic issue was addressed with improved state management. This issue is fixed in iOS 14.7, tvOS 14.7, watchOS 7.6. A malicious attacker with arbitrary read and write capability may be able to bypass Pointer Authentication.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,NONE,HIGH,NONE,MEDIUM,1.8,3.6,['CWE-287'],"['cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30770,Apple,0.00046,5.5,0.0,0.0,0.0,1.0,0,2021-09-08,1.0,2021-07-21,,,1.0,"A logic issue was addressed with improved validation. This issue is fixed in iOS 14.7, tvOS 14.7, watchOS 7.6. An attacker that has already achieved kernel code execution may be able to bypass kernel memory mitigations.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N,LOCAL,LOW,LOW,NONE,UNCHANGED,NONE,HIGH,NONE,MEDIUM,1.8,3.6,['CWE-287'],"['cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30773,Apple,0.00081,5.5,0.0,0.0,0.0,1.0,0,2021-09-08,1.0,2021-07-21,,,1.0,"An issue in code signature validation was addressed with improved checks. This issue is fixed in iOS 14.7, tvOS 14.7, watchOS 7.6. A malicious application may be able to bypass code signing checks.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,NONE,HIGH,NONE,MEDIUM,1.8,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30774,Apple,0.00085,7.8,0.0,0.0,0.0,1.0,0,2021-09-08,1.0,2021-07-21,,,1.0,"A logic issue was addressed with improved validation. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. A malicious application may be able to gain root privileges.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30775,Apple,0.00114,7.8,0.0,0.0,0.0,1.0,0,2021-09-08,1.0,2021-07-21,,,1.0,"A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7, Security Update 2021-004 Catalina. Processing a maliciously crafted audio file may lead to arbitrary code execution.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-787'],"['cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30776,Apple,0.00066,5.5,0.0,0.0,0.0,1.0,0,2021-09-08,1.0,2021-07-21,,,1.0,"A logic issue was addressed with improved validation. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7, Security Update 2021-004 Catalina. Playing a malicious audio file may lead to an unexpected application termination.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,NONE,NONE,HIGH,MEDIUM,1.8,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30779,Apple,0.00104,7.8,0.0,0.0,0.0,1.0,0,2021-09-08,1.0,2021-07-21,,,1.0,"This issue was addressed with improved checks. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing a maliciously crafted image may lead to arbitrary code execution.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30780,Apple,0.00165,7.8,0.0,0.0,0.0,1.0,0,2021-09-08,1.0,2021-07-21,,,1.0,"An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7, Security Update 2021-005 Mojave, Security Update 2021-004 Catalina. A malicious application may be able to gain root privileges.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-787'],"['cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30781,Apple,0.00042,7.8,0.0,0.0,0.0,1.0,0,2021-09-08,1.0,2021-07-21,,,1.0,"This issue was addressed with improved checks. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7, Security Update 2021-005 Mojave, Security Update 2021-004 Catalina. A local attacker may be able to cause unexpected application termination or arbitrary code execution.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30785,Apple,0.00189,7.8,0.0,0.0,0.0,1.0,0,2021-09-08,1.0,2021-07-21,,,1.0,"A buffer overflow was addressed with improved bounds checking. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7, Security Update 2021-004 Catalina. Processing a maliciously crafted image may lead to arbitrary code execution.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-120'],"['cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30786,Apple,0.00085,7.0,0.0,0.0,0.0,1.0,0,2021-09-08,1.0,2021-07-21,,,1.0,"A race condition was addressed with improved state handling. This issue is fixed in iOS 14.7, macOS Big Sur 11.5. Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution.",CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,HIGH,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.0,5.9,['CWE-362'],"['cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30788,Apple,0.00142,7.1,0.0,0.0,0.0,1.0,0,2021-09-08,1.0,2021-07-21,,,1.0,"This issue was addressed with improved checks. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7, Security Update 2021-005 Mojave, Security Update 2021-004 Catalina. Processing a maliciously crafted tiff file may lead to a denial-of-service or potentially disclose memory contents.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,NONE,HIGH,HIGH,1.8,5.2,['NVD-CWE-noinfo'],"['cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30789,Apple,0.00123,7.8,0.0,0.0,0.0,1.0,0,2021-09-08,1.0,2021-07-21,,,1.0,"An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7, Security Update 2021-004 Catalina. Processing a maliciously crafted font file may lead to arbitrary code execution.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-125'],"['cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30791,Apple,0.00103,5.5,0.0,0.0,0.0,1.0,0,2021-09-08,1.0,2021-07-21,,,1.0,"An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 14.7, macOS Big Sur 11.5. Processing a maliciously crafted file may disclose user information.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.8,3.6,['CWE-125'],"['cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30792,Apple,0.00125,7.8,0.0,0.0,0.0,1.0,0,2021-09-08,1.0,2021-07-21,,,1.0,"An out-of-bounds write was addressed with improved input validation. This issue is fixed in iOS 14.7, macOS Big Sur 11.5. Processing a maliciously crafted image may lead to arbitrary code execution.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-787'],"['cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30795,Apple,0.00426,8.8,0.0,0.0,1.0,1.0,0,2021-09-08,1.0,2021-07-21,,,1.0,"A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to arbitrary code execution.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-416'],"['cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30796,Apple,0.00164,6.5,0.0,0.0,0.0,1.0,0,2021-09-08,1.0,2021-07-21,,,1.0,"A logic issue was addressed with improved validation. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, Security Update 2021-004 Catalina, Security Update 2021-005 Mojave. Processing a maliciously crafted image may lead to a denial of service.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.8,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.0:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.1:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.2:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.3:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.4:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.4:beta4:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.5:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.1:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.2:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.3:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.4:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.5:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.6:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.6:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.6:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30797,Apple,0.00382,8.8,0.0,0.0,1.0,1.0,0,2021-09-08,1.0,2021-07-21,,,1.0,"This issue was addressed with improved checks. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to code execution.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30798,Apple,0.00191,7.5,0.0,0.0,0.0,1.0,0,2021-09-08,1.0,2021-07-21,,,1.0,"A logic issue was addressed with improved state management. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, watchOS 7.6. A malicious application may be able to bypass certain Privacy preferences.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30799,Apple,0.00469,8.8,0.0,0.0,0.0,1.0,0,2021-09-08,1.0,2021-07-21,,,1.0,"Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, Security Update 2021-004 Catalina, Security Update 2021-005 Mojave. Processing maliciously crafted web content may lead to arbitrary code execution.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-787'],"['cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2021-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.6:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30800,Apple,0.00085,8.8,0.0,0.0,0.0,1.0,0,2021-09-08,1.0,2021-07-21,,,1.0,This issue was addressed with improved checks. This issue is fixed in iOS 14.7. Joining a malicious Wi-Fi network may result in a denial of service or arbitrary code execution.,CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['NVD-CWE-noinfo'],['cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*'],0,0
CVE-2021-30802,Apple,0.00359,8.8,0.0,0.0,0.0,1.0,0,2021-09-08,1.0,2021-07-21,,,1.0,"A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.7, tvOS 14.7. Processing maliciously crafted web content may lead to arbitrary code execution.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-416'],"['cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30804,Apple,0.00055,3.3,0.0,0.0,0.0,1.0,0,2021-09-08,1.0,2021-07-21,,,1.0,A permissions issue was addressed with improved validation. This issue is fixed in iOS 14.7. A malicious application may be able to access Find My data.,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,NONE,LOW,NONE,LOW,1.8,1.4,['NVD-CWE-noinfo'],['cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*'],0,0
CVE-2021-30808,Apple,0.00067,5.5,0.0,0.0,0.0,1.0,0,2021-10-28,1.0,2021-11-18,,,0.0,"This issue was addressed with improved checks. This issue is fixed in tvOS 15, watchOS 8, iOS 15 and iPadOS 15. A malicious application may be able to modify protected parts of the file system.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,NONE,HIGH,NONE,MEDIUM,1.8,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30809,Apple,0.00645,8.8,0.0,0.0,1.0,1.0,0,2021-10-28,1.0,2021-11-18,,,0.0,"A use after free issue was addressed with improved memory management. This issue is fixed in Safari 15, tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to arbitrary code execution.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-416'],"['cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30813,Apple,0.00044,6.5,0.0,0.0,0.0,1.0,0,2021-10-28,1.0,2022-05-25,,,0.0,This issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.0.1. A person with access to a host Mac may be able to bypass the Login Window in Remote Desktop for a locked instance of macOS.,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N,LOCAL,LOW,LOW,NONE,CHANGED,NONE,HIGH,NONE,MEDIUM,2.0,4.0,['NVD-CWE-noinfo'],['cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*'],0,0
CVE-2021-30814,Apple,0.00114,7.8,0.0,0.0,0.0,1.0,0,2021-10-28,1.0,2021-11-18,,,0.0,"A memory corruption issue was addressed with improved input validation. This issue is fixed in tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Processing a maliciously crafted image may lead to arbitrary code execution.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-787'],"['cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30818,Apple,0.00649,8.8,0.0,0.0,1.0,1.0,0,2021-10-28,1.0,2021-11-18,,,0.0,"A type confusion issue was addressed with improved state handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, tvOS 15, iOS 15 and iPadOS 15, Safari 15, watchOS 8. Processing maliciously crafted web content may lead to arbitrary code execution.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-843'],"['cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30821,Apple,0.00108,7.8,0.0,0.0,0.0,1.0,0,2021-10-28,1.0,2021-10-25,,,1.0,"A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.0.1, Security Update 2021-007 Catalina, macOS Big Sur 11.6.1. A malicious application may be able to execute arbitrary code with kernel privileges.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30823,Apple,0.00179,6.5,0.0,0.0,1.0,1.0,0,2021-10-28,1.0,2021-10-25,,,1.0,"A logic issue was addressed with improved restrictions. This issue is fixed in macOS Monterey 12.0.1, iOS 14.8 and iPadOS 14.8, tvOS 15, Safari 15, watchOS 8. An attacker in a privileged network position may be able to bypass HSTS.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N,NETWORK,LOW,LOW,NONE,UNCHANGED,NONE,HIGH,NONE,MEDIUM,2.8,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30824,Apple,0.00121,7.8,0.0,0.0,0.0,1.0,0,2021-10-28,1.0,2021-10-25,,,1.0,"A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.0.1, Security Update 2021-007 Catalina, macOS Big Sur 11.6.1. A malicious application may be able to execute arbitrary code with kernel privileges.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-787'],"['cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30831,Apple,0.00066,5.5,0.0,0.0,0.0,1.0,0,2021-10-28,1.0,2021-11-18,,,0.0,"An out-of-bounds read was addressed with improved input validation. This issue is fixed in tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Processing a maliciously crafted font may result in the disclosure of process memory.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.8,3.6,['CWE-125'],"['cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30833,Apple,0.0007,5.5,0.0,0.0,0.0,1.0,0,2021-10-28,1.0,2021-10-25,,,1.0,This issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.0.1. Unpacking a maliciously crafted archive may allow an attacker to write arbitrary files.,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,NONE,HIGH,NONE,MEDIUM,1.8,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30836,Apple,0.00085,5.5,0.0,0.0,1.0,1.0,0,2021-10-28,1.0,2021-11-18,,,0.0,"An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 14.8 and iPadOS 14.8, tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Processing a maliciously crafted audio file may disclose restricted memory.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.8,3.6,['CWE-125'],"['cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30840,Apple,0.00104,7.8,0.0,0.0,0.0,1.0,0,2021-10-28,1.0,2021-11-18,,,0.0,"This issue was addressed with improved checks. This issue is fixed in tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Processing a maliciously crafted dfont file may lead to arbitrary code execution.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30846,Apple,0.00123,7.8,0.0,0.0,1.0,1.0,0,2021-10-19,1.0,2021-11-18,,,0.0,"A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, Safari 15, tvOS 15, iOS 15 and iPadOS 15, watchOS 8. Processing maliciously crafted web content may lead to arbitrary code execution.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-787'],"['cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*']",0,0
CVE-2021-30848,Apple,0.00167,7.8,0.0,0.0,1.0,1.0,0,2021-10-19,1.0,2021-11-18,,,0.0,"A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, Safari 15, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to code execution.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-787'],"['cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30849,Apple,0.00145,7.8,0.0,0.0,1.0,1.0,0,2021-10-19,1.0,2021-11-18,,,0.0,"Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, watchOS 8, Safari 15, tvOS 15, iOS 15 and iPadOS 15, iTunes 12.12 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-787'],"['cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*', 'cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30851,Apple,0.0047,8.8,0.0,0.0,1.0,1.0,0,2021-08-24,1.0,2021-11-18,,,0.0,"A memory corruption vulnerability was addressed with improved locking. This issue is fixed in Safari 15, tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to code execution.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-787'],"['cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:12.0.1:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*']",0,0
CVE-2021-30852,Apple,0.00627,8.8,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-11-18,,,0.0,"A type confusion issue was addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to arbitrary code execution.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-843'],"['cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30861,Apple,0.00062,5.5,0.0,0.0,1.0,1.0,0,2021-08-24,1.0,2021-10-25,,,0.0,A logic issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.0.1. A malicious application may bypass Gatekeeper checks.,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,NONE,HIGH,NONE,MEDIUM,1.8,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30864,Apple,0.00081,8.6,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-10-25,,,0.0,A logic issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.0.1. A sandboxed process may be able to circumvent sandbox restrictions.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N,NETWORK,LOW,NONE,NONE,CHANGED,NONE,HIGH,NONE,HIGH,3.9,4.0,['NVD-CWE-noinfo'],"['cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:12.0.0:*:*:*:*:*:*:*']",0,0
CVE-2021-30866,Apple,0.00075,6.5,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-11-18,,,0.0,"A user privacy issue was addressed by removing the broadcast MAC address. This issue is fixed in tvOS 15, watchOS 8, iOS 15 and iPadOS 15. A device may be passively tracked by its WiFi MAC address.",CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,2.8,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30867,Apple,0.00068,5.5,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-11-18,,,0.0,The issue was addressed with improved authentication. This issue is fixed in iOS 15 and iPadOS 15. A malicious application may be able to access photo metadata without needing permission to access photos.,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.8,3.6,['CWE-287'],"['cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30868,Apple,0.00085,7.0,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-10-25,,,0.0,"A race condition was addressed with improved locking. This issue is fixed in macOS Monterey 12.0.1, macOS Big Sur 11.6.1. A malicious application may be able to execute arbitrary code with kernel privileges.",CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,HIGH,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.0,5.9,['CWE-362'],"['cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:12.0:*:*:*:*:*:*:*']",0,0
CVE-2021-30869,Apple,0.0013,7.8,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-09-23,,,0.0,"A type confusion issue was addressed with improved state handling. This issue is fixed in iOS 12.5.5, iOS 14.4 and iPadOS 14.4, macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, Security Update 2021-006 Catalina. A malicious application may be able to execute arbitrary code with kernel privileges. Apple is aware of reports that an exploit for this issue exists in the wild.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-843'],"['cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30871,Apple,0.00042,5.5,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-10-25,,,0.0,"This issue was addressed with a new entitlement. This issue is fixed in iOS 14.7, watchOS 7.6, macOS Big Sur 11.5. A local attacker may be able to access analytics data.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.8,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30873,Apple,0.00067,7.8,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-10-25,,,0.0,A logic issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.0.1. A malicious application may be able to elevate privileges.,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30874,Apple,0.00076,7.5,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-11-18,,,0.0,An authorization issue was addressed with improved state management. This issue is fixed in iOS 15 and iPadOS 15. A VPN configuration may be installed by an app without user permission.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,HIGH,NONE,HIGH,3.9,3.6,['CWE-862'],"['cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30875,Apple,0.00042,3.3,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-10-25,,,0.0,A lock screen issue allowed access to contacts on a locked device. This issue was addressed with improved state management. This issue is fixed in iOS 15.1 and iPadOS 15.1. A local attacker may be able to view contacts from the lock screen.,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N,LOCAL,LOW,LOW,NONE,UNCHANGED,LOW,NONE,NONE,LOW,1.8,1.4,['NVD-CWE-noinfo'],"['cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30876,Apple,0.00084,7.1,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-10-25,,,0.0,"An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Monterey 12.0.1, Security Update 2021-007 Catalina, macOS Big Sur 11.6.1. Processing a maliciously crafted AppleScript binary may result in unexpected application termination or disclosure of process memory.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,NONE,HIGH,HIGH,1.8,5.2,['CWE-125'],"['cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30877,Apple,0.00084,7.1,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-10-25,,,0.0,"An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Monterey 12.0.1, Security Update 2021-007 Catalina, macOS Big Sur 11.6.1. Processing a maliciously crafted AppleScript binary may result in unexpected application termination or disclosure of process memory.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,NONE,HIGH,HIGH,1.8,5.2,['CWE-125'],"['cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30879,Apple,0.00084,7.1,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-10-25,,,0.0,"An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Monterey 12.0.1, Security Update 2021-007 Catalina, macOS Big Sur 11.6.1. Processing a maliciously crafted AppleScript binary may result in unexpected application termination or disclosure of process memory.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,NONE,HIGH,HIGH,1.8,5.2,['CWE-125'],"['cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30880,Apple,0.00084,7.1,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-10-25,,,0.0,"An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Monterey 12.0.1, Security Update 2021-007 Catalina, macOS Big Sur 11.6.1. Processing a maliciously crafted AppleScript binary may result in unexpected application termination or disclosure of process memory.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,NONE,HIGH,HIGH,1.8,5.2,['CWE-125'],"['cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30881,Apple,0.00138,7.8,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-10-25,,,0.0,"An input validation issue was addressed with improved memory handling. This issue is fixed in iOS 15.1 and iPadOS 15.1, macOS Monterey 12.0.1, tvOS 15.1, watchOS 8.1, Security Update 2021-007 Catalina, macOS Big Sur 11.6.1. Unpacking a maliciously crafted archive may lead to arbitrary code execution.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-20'],"['cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:12.0:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30883,Apple,0.00222,7.8,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-10-11,,,0.0,"A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 15.0.2 and iPadOS 15.0.2, macOS Monterey 12.0.1, iOS 14.8.1 and iPadOS 14.8.1, tvOS 15.1, watchOS 8.1, macOS Big Sur 11.6.1. An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited..",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-787'],"['cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:12.0:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30884,Apple,0.0015,4.7,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-11-18,,,0.0,"The issue was resolved with additional restrictions on CSS compositing. This issue is fixed in tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Visiting a maliciously crafted website may reveal a user's browsing history.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,NONE,NONE,MEDIUM,2.8,1.4,['NVD-CWE-noinfo'],"['cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30886,Apple,0.00116,7.8,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-10-25,,,0.0,"A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.0.1, iOS 15.1 and iPadOS 15.1, watchOS 8.1, tvOS 15.1. An application may be able to execute arbitrary code with kernel privileges.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-416'],"['cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30887,Apple,0.0072,6.5,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-10-25,,,0.0,"A logic issue was addressed with improved restrictions. This issue is fixed in macOS Monterey 12.0.1, iOS 15.1 and iPadOS 15.1, watchOS 8.1, tvOS 15.1. Processing maliciously crafted web content may lead to unexpectedly unenforced Content Security Policy.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,NONE,HIGH,NONE,MEDIUM,2.8,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*']",0,0
CVE-2021-30888,Apple,0.00286,7.4,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-10-25,,,0.0,"An information leakage issue was addressed. This issue is fixed in iOS 15.1 and iPadOS 15.1, macOS Monterey 12.0.1, iOS 14.8.1 and iPadOS 14.8.1, tvOS 15.1, watchOS 8.1. A malicious website using Content Security Policy reports may be able to leak information via redirect behavior .",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,HIGH,NONE,NONE,HIGH,2.8,4.0,['CWE-601'],"['cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:ipados:15.0:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:15.0:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30889,Apple,0.00376,8.8,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-10-25,,,0.0,"A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.0.1, iOS 15.1 and iPadOS 15.1, watchOS 8.1, tvOS 15.1. Processing maliciously crafted web content may lead to arbitrary code execution.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-120'],"['cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30890,Apple,0.00759,6.1,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-10-25,,,0.0,"A logic issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.0.1, iOS 15.1 and iPadOS 15.1, watchOS 8.1, tvOS 15.1. Processing maliciously crafted web content may lead to universal cross site scripting.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*']",0,0
CVE-2021-30892,Apple,0.0007,5.5,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-10-25,,,0.0,"An inherited permissions issue was addressed with additional restrictions. This issue is fixed in macOS Monterey 12.0.1, Security Update 2021-007 Catalina, macOS Big Sur 11.6.1. A malicious application may be able to modify protected parts of the file system.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,NONE,HIGH,NONE,MEDIUM,1.8,3.6,['CWE-732'],"['cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:12.0:*:*:*:*:*:*:*']",0,0
CVE-2021-30894,Apple,0.00085,7.8,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-10-25,,,0.0,"A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 15.1 and iPadOS 15.1, tvOS 15.1. An application may be able to execute arbitrary code with kernel privileges.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-787'],"['cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30895,Apple,0.00085,5.5,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-10-25,,,0.0,"A logic issue was addressed with improved restrictions. This issue is fixed in iOS 15.0.2 and iPadOS 15.0.2, tvOS 15.1, watchOS 8.1, macOS Monterey 12.0.1. A malicious application may be able to access information about a user's contacts.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.8,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:12.0:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30896,Apple,0.00071,5.5,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-10-25,,,0.0,"A logic issue was addressed with improved restrictions. This issue is fixed in iOS 15.0.2 and iPadOS 15.0.2, tvOS 15.1, watchOS 8.1, macOS Monterey 12.0.1. A malicious application may be able to read user's gameplay data.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.8,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:12.0:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30897,Apple,0.0015,6.5,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-10-25,,,0.0,An issue existed in the specification for the resource timing API. The specification was updated and the updated specification was implemented. This issue is fixed in macOS Monterey 12.0.1. A malicious website may exfiltrate data cross-origin.,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,NONE,NONE,MEDIUM,2.8,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30899,Apple,0.00121,7.0,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-10-25,,,0.0,"A race condition was addressed with improved state handling. This issue is fixed in macOS Monterey 12.0.1, Security Update 2021-007 Catalina, macOS Big Sur 11.6.1. A malicious application may be able to execute arbitrary code with kernel privileges.",CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,HIGH,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.0,5.9,['CWE-362'],"['cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:12.0:*:*:*:*:*:*:*']",0,0
CVE-2021-30900,Apple,0.00238,7.8,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-10-25,,,0.0,"An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 14.8.1 and iPadOS 14.8.1, iOS 15.1 and iPadOS 15.1. A malicious application may be able to execute arbitrary code with kernel privileges.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-787'],"['cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:ipados:15.0:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:15.0:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30901,Apple,0.00121,7.8,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-10-25,,,0.0,"Multiple out-of-bounds write issues were addressed with improved bounds checking. This issue is fixed in macOS Monterey 12.0.1, Security Update 2021-007 Catalina, macOS Big Sur 11.6.1. A malicious application may be able to execute arbitrary code with kernel privileges.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-787'],"['cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:12.0:*:*:*:*:*:*:*']",0,0
CVE-2021-30902,Apple,0.00042,7.8,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-10-25,,,0.0,"A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.8.1 and iPadOS 14.8.1, iOS 15.1 and iPadOS 15.1. A local attacker may be able to cause unexpected application termination or arbitrary code execution.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-416'],"['cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:ipados:15.0:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:15.0:*:*:*:*:*:*:*']",0,0
CVE-2021-30903,Apple,0.00042,7.8,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2022-05-25,,,0.0,"This issue was addressed with improved checks. This issue is fixed in iOS 14.8.1 and iPadOS 14.8.1, iOS 15.1 and iPadOS 15.1, macOS Monterey 12.0.1. A local attacker may be able to cause unexpected application termination or arbitrary code execution.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:ipados:15.0:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:15.0:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30904,Apple,0.00084,5.3,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-11-18,,,0.0,A sync issue was addressed with improved state validation. This issue is fixed in macOS Monterey 12.0.1. A user's messages may continue to sync after the user has signed out of iMessage.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,LOW,NONE,NONE,MEDIUM,3.9,1.4,['CWE-662'],['cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*'],0,0
CVE-2021-30905,Apple,0.00133,5.5,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-10-25,,,0.0,"An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 15.1 and iPadOS 15.1, macOS Monterey 12.0.1, tvOS 15.1, watchOS 8.1, Security Update 2021-007 Catalina. Processing a maliciously crafted file may disclose user information.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.8,3.6,['CWE-125'],"['cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:ipados:15.0:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:15.0:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:12.0.0:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30906,Apple,0.00042,7.8,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-10-25,,,0.0,"This issue was addressed with improved checks. This issue is fixed in iOS 15.1 and iPadOS 15.1, macOS Monterey 12.0.1, tvOS 15.1, watchOS 8.1, macOS Big Sur 11.6.1. A local attacker may be able to elevate their privileges.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:12.0:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30907,Apple,0.00124,7.8,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-10-25,,,0.0,"An integer overflow was addressed through improved input validation. This issue is fixed in iOS 15.1 and iPadOS 15.1, macOS Monterey 12.0.1, iOS 14.8.1 and iPadOS 14.8.1, tvOS 15.1, watchOS 8.1, Security Update 2021-007 Catalina, macOS Big Sur 11.6.1. A malicious application may be able to elevate privileges.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-190'],"['cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:ipados:15.0:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:15.0:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:12.0:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30908,Apple,0.00056,3.3,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-10-25,,,0.0,"An authentication issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.0.1, macOS Big Sur 11.6.1. A local attacker may be able to view the previous logged-in user’s desktop from the fast user switching screen.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,LOW,NONE,NONE,LOW,1.8,1.4,['NVD-CWE-noinfo'],"['cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:12.0:*:*:*:*:*:*:*']",0,0
CVE-2021-30909,Apple,0.00138,7.8,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-10-25,,,0.0,"A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 15.1 and iPadOS 15.1, macOS Monterey 12.0.1, iOS 14.8.1 and iPadOS 14.8.1, tvOS 15.1, watchOS 8.1, Security Update 2021-007 Catalina, macOS Big Sur 11.6.1. An application may be able to execute arbitrary code with kernel privileges.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-787'],"['cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:ipados:15.0:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:15.0:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:12.0:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30910,Apple,0.00124,5.5,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-10-25,,,0.0,"An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 15.1 and iPadOS 15.1, macOS Monterey 12.0.1, tvOS 15.1, Security Update 2021-007 Catalina, macOS Big Sur 11.6.1. Processing a maliciously crafted file may disclose user information.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.8,3.6,['CWE-125'],"['cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:12.0:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30911,Apple,0.0007,5.5,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-10-25,,,0.0,"An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Monterey 12.0.1, Security Update 2021-007 Catalina, iOS 15.1 and iPadOS 15.1, macOS Big Sur 11.6.1. Processing a maliciously crafted USD file may disclose memory contents.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.8,3.6,['CWE-125'],"['cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:12.0:*:*:*:*:*:*:*']",0,0
CVE-2021-30912,Apple,0.00071,5.5,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-10-25,,,0.0,"The issue was addressed with improved permissions logic. This issue is fixed in macOS Monterey 12.0.1, Security Update 2021-007 Catalina, macOS Big Sur 11.6.1. A malicious application may gain access to a user's Keychain items.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.8,3.6,['CWE-281'],"['cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:12.0:*:*:*:*:*:*:*']",0,0
CVE-2021-30913,Apple,0.00068,5.5,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2022-05-25,,,0.0,"The issue was addressed with improved permissions logic. This issue is fixed in macOS Monterey 12.0.1, macOS Big Sur 11.6.1. An unprivileged application may be able to edit NVRAM variables.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,NONE,HIGH,NONE,MEDIUM,1.8,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:12.0:*:*:*:*:*:*:*']",0,0
CVE-2021-30914,Apple,0.00072,7.8,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-10-25,,,0.0,A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 15.1 and iPadOS 15.1. An application may be able to execute arbitrary code with kernel privileges.,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-787'],"['cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30915,Apple,0.00085,2.4,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-10-25,,,0.0,"A logic issue was addressed with improved state management. This issue is fixed in iOS 15.1 and iPadOS 15.1, macOS Monterey 12.0.1, tvOS 15.1, watchOS 8.1, Security Update 2021-007 Catalina, macOS Big Sur 11.6.1. A person with physical access to an iOS device may be able to determine characteristics of a user's password in a secure text entry field.",CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,PHYSICAL,LOW,NONE,NONE,UNCHANGED,LOW,NONE,NONE,LOW,0.9,1.4,['NVD-CWE-noinfo'],"['cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:12.0:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30916,Apple,0.00138,7.8,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-10-25,,,0.0,"A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 15.1 and iPadOS 15.1, macOS Monterey 12.0.1, iOS 14.8.1 and iPadOS 14.8.1, Security Update 2021-007 Catalina, macOS Big Sur 11.6.1. A malicious application may be able to execute arbitrary code with kernel privileges.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-787'],"['cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:ipados:15.0:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:15.0:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:12.0:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30917,Apple,0.00138,7.8,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-10-25,,,0.0,"A memory corruption issue existed in the processing of ICC profiles. This issue was addressed with improved input validation. This issue is fixed in iOS 15.1 and iPadOS 15.1, macOS Monterey 12.0.1, iOS 14.8.1 and iPadOS 14.8.1, tvOS 15.1, watchOS 8.1, Security Update 2021-007 Catalina, macOS Big Sur 11.6.1. Processing a maliciously crafted image may lead to arbitrary code execution.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-20'],"['cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:ipados:15.0:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:15.0:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:12.0:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30919,Apple,0.00148,7.8,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-10-25,,,0.0,"An out-of-bounds write was addressed with improved input validation. This issue is fixed in iOS 15.1 and iPadOS 15.1, macOS Monterey 12.0.1, iOS 14.8.1 and iPadOS 14.8.1, tvOS 15.1, watchOS 8.1, Security Update 2021-007 Catalina, macOS Big Sur 11.6.1. Processing a maliciously crafted PDF may lead to arbitrary code execution.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-787'],"['cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:ipados:15.0:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:15.0:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:12.0:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30920,Apple,0.00042,5.5,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-10-25,,,0.0,A permissions issue was addressed with improved validation. This issue is fixed in macOS Monterey 12.0.1. A local attacker may be able to read sensitive information.,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.8,3.6,['CWE-732'],['cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*'],0,0
CVE-2021-30922,Apple,0.00045,7.8,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2022-03-31,,,0.0,Multiple out-of-bounds write issues were addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.6.1. A malicious application may be able to execute arbitrary code with kernel privileges.,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-787'],"['cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:12.0.0:*:*:*:*:*:*:*']",0,0
CVE-2021-30923,Apple,0.00085,7.0,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2022-05-25,,,0.0,A race condition was addressed with improved locking. This issue is fixed in macOS Monterey 12.0.1. A malicious application may be able to execute arbitrary code with kernel privileges.,CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,HIGH,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.0,5.9,['CWE-362'],"['cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30924,Apple,0.00645,7.5,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2022-01-19,,,0.0,A denial of service issue was addressed with improved state handling. This issue is fixed in macOS Monterey 12.0.1. A remote attacker can cause a device to unexpectedly restart.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30930,Apple,0.00075,5.3,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2022-09-16,,,0.0,A logic issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.0.1. An attacker may be able to track users through their IP address.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,LOW,NONE,NONE,MEDIUM,3.9,1.4,['NVD-CWE-noinfo'],['cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*'],0,0
CVE-2021-30931,Apple,0.00069,5.5,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2021-10-25,,,0.0,"A logic issue was addressed with improved validation. This issue is fixed in macOS Monterey 12.0.1, macOS Big Sur 11.6.2, Security Update 2021-008 Catalina. A malicious application may be able to disclose kernel memory.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.8,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-007:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-30933,Apple,0.00085,7.0,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2022-05-25,,,0.0,"A race condition was addressed with improved state handling. This issue is fixed in macOS Monterey 12.0.1, macOS Big Sur 11.6. A malicious application may be able to execute arbitrary code with kernel privileges.",CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,HIGH,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.0,5.9,['CWE-362'],"['cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:12.0.0:*:*:*:*:*:*:*']",0,0
CVE-2021-30994,Apple,0.00052,3.3,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2022-05-25,,,0.0,An access issue was addressed with improved access restrictions. This issue is fixed in macOS Monterey 12.0.1. A malicious application may be able to access local users' Apple IDs.,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,LOW,NONE,NONE,LOW,1.8,1.4,['NVD-CWE-noinfo'],['cpe:2.3:o:apple:macos:12.0.0:*:*:*:*:*:*:*'],0,0
CVE-2021-31002,Apple,0.00085,7.8,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2022-09-16,,,0.0,"An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Monterey 12.0.1, macOS Big Sur 11.6.2. A malicious application may be able to execute arbitrary code with system privileges.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-125'],"['cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:12.0.0:*:*:*:*:*:*:*']",0,0
CVE-2021-31004,Apple,0.0007,7.0,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2022-03-31,,,0.0,"A race condition was addressed with improved locking. This issue is fixed in macOS Monterey 12.0.1, macOS Big Sur 11.5. An application may be able to gain elevated privileges.",CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,HIGH,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.0,5.9,['CWE-362'],"['cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:12.0.0:*:*:*:*:*:*:*']",0,0
CVE-2021-31005,Apple,0.00081,7.5,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2022-03-31,,,0.0,"Description: A logic issue was addressed with improved state management. This issue is fixed in iOS 15 and iPadOS 15, macOS Monterey 12.0.1. Turning off ""Block all remote content"" may not apply to all remote content types.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,HIGH,NONE,HIGH,3.9,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:12.0.0:*:*:*:*:*:*:*']",0,0
CVE-2021-31007,Apple,0.00066,5.5,0.0,0.0,0.0,1.0,0,2021-08-24,1.0,2022-05-25,,,0.0,"Description: A permissions issue was addressed with improved validation. This issue is fixed in iOS 15.1 and iPadOS 15.1, tvOS 15.1, macOS Big Sur 11.6.2, watchOS 8.1, macOS Monterey 12.1. A malicious application may be able to bypass Privacy preferences.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,NONE,HIGH,NONE,MEDIUM,1.8,3.6,['CWE-276'],"['cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2021-31008,Apple,0.00477,8.8,0.0,0.0,1.0,1.0,0,2021-08-24,1.0,2022-03-31,,,0.0,"A type confusion issue was addressed with improved memory handling. This issue is fixed in Safari 15.1, tvOS 15.1, iOS 15 and iPadOS 15, macOS Monterey 12.0.1, watchOS 8.1. Processing maliciously crafted web content may lead to code execution.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-843'],"['cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:macos:12.0.0:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*']",0,0
CVE-2017-3223,Dahua,0.01166,9.8,0.0,1.0,0.0,1.0,1,2018-07-24,1.0,2017-07-18,0.0,,1.0,"Dahua IP camera products using firmware versions prior to V2.400.0000.14.R.20170713 include a version of the Sonia web interface that may be vulnerable to a stack buffer overflow. Dahua IP camera products include an application known as Sonia (/usr/bin/sonia) that provides the web interface and other services for controlling the IP camera remotely. Versions of Sonia included in firmware versions prior to DH_IPC-Consumer-Zi-Themis_Eng_P_V2.408.0000.11.R.20170621 do not validate input data length for the 'password' field of the web interface. A remote, unauthenticated attacker may submit a crafted POST request to the IP camera's Sonia web interface that may lead to out-of-bounds memory operations and loss of availability or remote code execution. The issue was originally identified by the researcher in firmware version DH_IPC-HX1X2X-Themis_EngSpnFrn_N_V2.400.0000.30.R.20160803.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,"['CWE-119', 'CWE-121']","['cpe:2.3:o:dahuasecurity:ip_camera_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ip_camera:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ip_camera_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ip_camera:-:*:*:*:*:*:*:*']",0,0
CVE-2017-6341,Dahua,0.0048,5.9,0.0,1.0,0.0,1.0,1,2017-02-27,1.0,2017-07-31,,,0.0,"Dahua DHI-HCVR7216A-S3 devices with NVR Firmware 3.210.0001.10 2016-06-06, Camera Firmware 2.400.0000.28.R 2016-03-29, and SmartPSS Software 1.16.1 2017-01-19 send cleartext passwords in response to requests from the Web Page, Mobile Application, and Desktop Application interfaces, which allows remote attackers to obtain sensitive information by sniffing the network, a different vulnerability than CVE-2013-6117.",CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,HIGH,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,2.2,3.6,['CWE-319'],"['cpe:2.3:o:dahuasecurity:camera_firmware:2.400.0000.28.r:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:nvr_firmware:3.210.0001.10:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:smartpss_firmware:1.16.1:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:dhi-hcvr7216a-s3:-:*:*:*:*:*:*:*']",0,0
CVE-2017-6342,Dahua,0.00331,9.8,0.0,1.0,0.0,1.0,1,2017-02-27,1.0,2017-07-31,,,0.0,"An issue was discovered on Dahua DHI-HCVR7216A-S3 devices with NVR Firmware 3.210.0001.10 2016-06-06, Camera Firmware 2.400.0000.28.R 2016-03-29, and SmartPSS Software 1.16.1 2017-01-19. When SmartPSS Software is launched, while on the login screen, the software in the background automatically logs in as admin. This allows sniffing sensitive information identified in CVE-2017-6341 without prior knowledge of the password. This is a different vulnerability than CVE-2013-6117.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-269'],"['cpe:2.3:o:dahuasecurity:camera_firmware:2.400.0000.28.r:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:nvr_firmware:3.210.0001.10:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:smartpss_firmware:1.16.1:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:dhi-hcvr7216a-s3:-:*:*:*:*:*:*:*']",0,0
CVE-2017-6343,Dahua,0.31255,8.1,0.0,1.0,0.0,1.0,1,2017-02-27,1.0,2017-07-31,,,0.0,"The web interface on Dahua DHI-HCVR7216A-S3 devices with NVR Firmware 3.210.0001.10 2016-06-06, Camera Firmware 2.400.0000.28.R 2016-03-29, and SmartPSS Software 1.16.1 2017-01-19 allows remote attackers to obtain login access by leveraging knowledge of the MD5 Admin Hash without knowledge of the corresponding password, a different vulnerability than CVE-2013-6117.",CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,HIGH,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.2,5.9,['CWE-287'],"['cpe:2.3:o:dahuasecurity:camera_firmware:2.400.0000.28.r:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:nvr_firmware:3.210.0001.10:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:smartpss_firmware:1.16.1:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:dhi-hcvr7216a-s3:-:*:*:*:*:*:*:*']",0,0
CVE-2017-6432,Dahua,0.00159,8.1,0.0,1.0,0.0,1.0,1,2017-03-09,0.0,,0.0,,,"An issue was discovered on Dahua DHI-HCVR7216A-S3 3.210.0001.10 build 2016-06-06 devices. The Dahua DVR Protocol, which operates on TCP Port 37777, is an unencrypted, binary protocol. Performing a Man-in-the-Middle attack allows both sniffing and injections of packets, which allows creation of fully privileged new users, in addition to capture of sensitive information.",CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,HIGH,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.2,5.9,['CWE-319'],"['cpe:2.3:o:dahuasecurity:nvr_firmware:3.210.0001.10:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:dhi-hcvr7216a-s3:-:*:*:*:*:*:*:*']",0,0
CVE-2017-7253,Dahua,0.00101,8.8,0.0,1.0,0.0,1.0,1,2017-03-30,0.0,,0.0,,,"Dahua IP Camera devices 3.200.0001.6 can be exploited via these steps: 1. Use the default low-privilege credentials to list all users via a request to a certain URI. 2. Login to the IP camera with admin credentials so as to obtain full control of the target IP camera. During exploitation, the first JSON object encountered has a ""Component error: login challenge!"" message. The second JSON object encountered has a result indicating a successful admin login.",CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-922'],"['cpe:2.3:h:dahuasecurity:ip_camera:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ip_camera_firmware:3.200.0001.6:*:*:*:*:*:*:*']",0,0
CVE-2017-7925,Dahua,0.31992,9.8,0.0,1.0,0.0,1.0,1,2017-05-06,0.0,,1.0,2017-05-04,,"A Password in Configuration File issue was discovered in Dahua DH-IPC-HDBW23A0RN-ZS, DH-IPC-HDBW13A0SN, DH-IPC-HDW1XXX, DH-IPC-HDW2XXX, DH-IPC-HDW4XXX, DH-IPC-HFW1XXX, DH-IPC-HFW2XXX, DH-IPC-HFW4XXX, DH-SD6CXX, DH-NVR1XXX, DH-HCVR4XXX, DH-HCVR5XXX, DHI-HCVR51A04HE-S3, DHI-HCVR51A08HE-S3, and DHI-HCVR58A32S-S2 devices. The password in configuration file vulnerability was identified, which could lead to a malicious user assuming the identity of a privileged user and gaining access to sensitive information.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,"['CWE-522', 'CWE-260']","['cpe:2.3:o:dahuasecurity:dh-ipc-hdbw23a0rn-zs_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:dh-ipc-hdbw23a0rn-zs:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:dh-ipc-hdbw13a0sn_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:dh-ipc-hdbw13a0sn:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:dh-ipc-hdw1xxx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:dh-ipc-hdw1xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:dh-ipc-hdw2xxx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:dh-ipc-hdw2xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:dh-ipc-hdw4xxx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:dh-ipc-hdw4xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:dh-ipc-hfw1xxx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:dh-ipc-hfw1xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:dh-ipc-hfw2xxx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:dh-ipc-hfw2xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:dh-ipc-hfw4xxx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:dh-ipc-hfw4xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:dh-sd6cxx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:dh-sd6cxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:dh-nvr1xxx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:dh-nvr1xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:dh-hcvr4xxx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ddh-hcvr4xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:dh-hcvr5xxx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:dh-hcvr5xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:dhi-hcvr51a04he-s3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:dhi-hcvr51a04he-s3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:dhi-hcvr51a08he-s3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:dhi-hcvr51a08he-s3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:dhi-hcvr58a32s-s2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:dhi-hcvr58a32s-s2:-:*:*:*:*:*:*:*']",0,0
CVE-2017-7927,Dahua,0.03148,7.3,0.0,1.0,0.0,1.0,1,2017-05-06,0.0,,1.0,2017-05-04,,"A Use of Password Hash Instead of Password for Authentication issue was discovered in Dahua DH-IPC-HDBW23A0RN-ZS, DH-IPC-HDBW13A0SN, DH-IPC-HDW1XXX, DH-IPC-HDW2XXX, DH-IPC-HDW4XXX, DH-IPC-HFW1XXX, DH-IPC-HFW2XXX, DH-IPC-HFW4XXX, DH-SD6CXX, DH-NVR1XXX, DH-HCVR4XXX, DH-HCVR5XXX, DHI-HCVR51A04HE-S3, DHI-HCVR51A08HE-S3, and DHI-HCVR58A32S-S2 devices. The use of password hash instead of password for authentication vulnerability was identified, which could allow a malicious user to bypass authentication without obtaining the actual password.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L,NETWORK,LOW,NONE,NONE,UNCHANGED,LOW,LOW,LOW,HIGH,3.9,3.4,"['CWE-798', 'CWE-836']","['cpe:2.3:o:dahuasecurity:dh-ipc-hdbw23a0rn-zs_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:dh-ipc-hdbw23a0rn-zs:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:dh-ipc-hdbw13a0sn_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:dh-ipc-hdbw13a0sn:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:dh-ipc-hdw1xxx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:dh-ipc-hdw1xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:dh-ipc-hdw2xxx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:dh-ipc-hdw2xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:dh-ipc-hdw4xxx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:dh-ipc-hdw4xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:dh-ipc-hfw1xxx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:dh-ipc-hfw1xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:dh-ipc-hfw2xxx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:dh-ipc-hfw2xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:dh-ipc-hfw4xxx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:dh-ipc-hfw4xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:dh-sd6cxx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:dh-sd6cxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:dh-nvr1xxx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:dh-nvr1xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:dh-hcvr4xxx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ddh-hcvr4xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:dh-hcvr5xxx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:dh-hcvr5xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:dhi-hcvr51a04he-s3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:dhi-hcvr51a04he-s3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:dhi-hcvr51a08he-s3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:dhi-hcvr51a08he-s3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:dhi-hcvr58a32s-s2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:dhi-hcvr58a32s-s2:-:*:*:*:*:*:*:*']",0,0
CVE-2017-9314,Dahua,0.00087,8.8,0.0,1.0,0.0,1.0,1,2017-11-13,0.0,,0.0,,,"Authentication vulnerability found in Dahua NVR models NVR50XX, NVR52XX, NVR54XX, NVR58XX with software before DH_NVR5xxx_Eng_P_V2.616.0000.0.R.20171102. Attacker could exploit this vulnerability to gain access to additional operations by means of forging json message.",CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-287'],"['cpe:2.3:o:dahuasecurity:nvr5464-16p-4ks2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:nvr5464-16p-4ks2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:nvr5208-8p-4ks2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:nvr5208-8p-4ks2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:nvr5432-16p-4ks2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:nvr5432-16p-4ks2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:nvr5416-16p-4ks2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:nvr5416-16p-4ks2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:nvr5464-4ks2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:nvr5464-4ks2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:nvr5432-4ks2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:nvr5432-4ks2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:nvr5416-4ks2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:nvr5416-4ks2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:nvr5232-16p-4ks2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:nvr5232-16p-4ks2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:nvr5216-16p-4ks2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:nvr5216-16p-4ks2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:nvr5232-8p-4ks2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:nvr5232-8p-4ks2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:nvr5216-8p-4ks2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:nvr5216-8p-4ks2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:nvr5232-4ks2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:nvr5232-4ks2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:nvr5216-4ks2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:nvr5216-4ks2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:nvr5208-4ks2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:nvr5208-4ks2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:nvr5816-4ks2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:nvr5816-4ks2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:nvr5832-4ks2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:nvr5832-4ks2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:nvr5864-4ks2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:nvr5864-4ks2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:nvr5864-16p-4ks2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:nvr5864-16p-4ks2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:nvr5832-16p-4ks2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:nvr5832-16p-4ks2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:nvr5816-16p-4ks2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:nvr5816-16p-4ks2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:nvr5424-24p-4ks2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:nvr5424-24p-4ks2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:nvr5224-24p-4ks2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:nvr5224-24p-4ks2:-:*:*:*:*:*:*:*']",0,0
CVE-2017-9315,Dahua,0.00558,9.8,0.0,1.0,0.0,1.0,1,2017-11-28,0.0,,0.0,,,Customer of Dahua IP camera or IP PTZ could submit relevant device information to receive a time limited temporary password from Dahua authorized dealer to reset the admin password. The algorithm used in this mechanism is potentially at risk of being compromised and subsequently utilized by attacker.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:dahuasecurity:ipc-hfw1xxx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw1xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdw1xxx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdw1xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw1xxx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw1xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2xxx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdw2xxx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdw2xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2xxx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw4xxx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw4xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdw4xxx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdw4xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw4xxx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw4xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hf5xxx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hf5xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw5xxx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw5xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdw5xxx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdw5xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw5xxx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw5xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hf8xxx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hf8xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw8xxx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw8xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw8xxx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw8xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-ebw8xxx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-ebw8xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-pfw8xxx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-pfw8xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:dh-sd2xxxxx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:dh-sd2xxxxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-pdbw8xxx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-pdbw8xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hum8xxx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hum8xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:psd8xxxx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:psd8xxxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:dh-sd4xxxxx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:dh-sd4xxxxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:dh-sd5xxxxx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:dh-sd5xxxxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:dh-sd6xxxxx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:dh-sd6xxxxx:-:*:*:*:*:*:*:*']",0,0
CVE-2017-9316,Dahua,0.00336,6.5,0.0,1.0,0.0,1.0,1,2017-11-27,0.0,,0.0,,,"Firmware upgrade authentication bypass vulnerability was found in Dahua IPC-HDW4300S and some IP products. The vulnerability was caused by internal Debug function. This particular function was used for problem analysis and performance tuning during product development phase. It allowed the device to receive only specific data (one direction, no transmit) and therefore it was not involved in any instance of collecting user privacy data or allowing remote code execution.",CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H,NETWORK,HIGH,NONE,NONE,UNCHANGED,NONE,LOW,HIGH,MEDIUM,2.2,4.2,['CWE-287'],"['cpe:2.3:o:dahuasecurity:nvr11hs_firmware:3.210.0000.0.r.20150206:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:nvr11hs_firmware:3.210.0000.1.r.20150420:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:nvr11hs_firmware:3.210.0000.2.r.20150715:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:nvr11hs_firmware:3.210.0000.3.r.20150921:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:nvr11hs_firmware:3.210.0000.5.r.20160409:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:nvr11hs_firmware:3.210.0000.5.r.20160603:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:nvr11hs_firmware:3.210.0000.5.r.20160803:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:nvr11hs_firmware:3.210.0000.5.r.20161226:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:nvr11hs_firmware:3.210.0000.5.r.20170305:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:nvr11hs_firmware:3.210.0000.5.r.20170321:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:nvr11hs:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdw4300s_firmware:2.240.0009.0.r.20131015:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdw4300s_firmware:2.400.0000.0.r.20131231:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdw4300s_firmware:2.420.0000.0.r.20140419:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdw4300s_firmware:2.420.0002.0.r.20140621:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdw4300s_firmware:2.420.0002.0.r.20140724:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdw4300s_firmware:2.420.0005.0.r.20141205:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdw4300s_firmware:2.420.0006.0.r.20150311:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdw4300s_firmware:2.420.0007.0.r.20150409:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdw4300s_firmware:2.420.0008.0.r.20150710:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdw4300s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw4x00_firmware:2.400.0000.3.r.20150312:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw4x00_firmware:2.420.0006.0.r.20150311:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw4x00:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdw4x00_firmware:2.400.0000.3.r.20150312:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdw4x00_firmware:2.420.0006.0.r.20150311:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdw4x00:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw4x00_firmware:2.400.0000.3.r.20150312:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw4x00_firmware:2.420.0006.0.r.20150311:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw4x00:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hf5x00_firmware:2.400.0000.3.r.20150312:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hf5x00_firmware:2.420.0006.0.r.20150311:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hf5x00:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw5x00_firmware:2.400.0000.3.r.20150312:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw5x00_firmware:2.420.0006.0.r.20150311:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw5x00:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdw5x00_firmware:2.400.0000.3.r.20150312:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdw5x00_firmware:2.420.0006.0.r.20150311:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdw5x00:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw5x00_firmware:2.400.0000.3.r.20150312:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw5x00_firmware:2.420.0006.0.r.20150311:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw5x00:-:*:*:*:*:*:*:*']",0,0
CVE-2020-9499,Dahua,0.00096,7.2,0.0,1.0,0.0,1.0,1,2020-04-09,1.0,2020-04-07,,,1.0,"Some Dahua products have buffer overflow vulnerabilities. After the successful login of the legal account, the attacker sends a specific DDNS test command, which may cause the device to go down.",CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.2,5.9,['CWE-120'],"['cpe:2.3:h:dahuasecurity:sd6al:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:sd6al_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:sd5a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:sd5a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:sd1a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:sd1a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ptz1a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ptz1a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:sd50:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:sd50_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:sd52c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:sd52c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hx5842h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hx5842h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hx7842h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hx7842h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hx2xxx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hx2xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hxxx5x4x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hxxx5x4x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:n42b1p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:n42b1p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:n42b2p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:n42b2p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:n42b3p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:n42b3p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:n52a4p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:n52a4p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:n54a4p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahua:n54a4p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:n52b2p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:n52b2p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:n52b5p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:n52b5p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:n52b3p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:n52b3p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:n54b2p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:n54b2p:-:*:*:*:*:*:*:*']",0,0
CVE-2020-9500,Dahua,0.00081,4.9,0.0,1.0,0.0,1.0,1,2020-04-09,1.0,2020-04-07,,,1.0,"Some products of Dahua have Denial of Service vulnerabilities. After the successful login of the legal account, the attacker sends a specific log query command, which may cause the device to go down.",CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,1.2,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:dahuasecurity:sd6al_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:sd6al:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:sd5a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:sd5a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:sd1a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:sd1a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ptz1a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ptz1a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:sd50_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:sd50:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:sd52c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:sd52c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hx5842h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hx5842h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hx7842h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hx7842h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hx2xxx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hx2xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hxxx5x4x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hxxx5x4x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:n42b1p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:n42b1p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:n42b2p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:n42b2p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:n42b3p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:n42b3p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:n52a4p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:n52a4p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:n54a4p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahua:n54a4p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:n52b2p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:n52b2p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:n52b5p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:n52b5p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:n52b3p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:n52b3p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:n54b2p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:n54b2p:-:*:*:*:*:*:*:*']",0,0
CVE-2021-33044,Dahua,0.95229,9.8,0.0,1.0,0.0,0.0,1,2021-09-15,1.0,2021-11-15,,,0.0,The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-287'],"['cpe:2.3:o:dahuasecurity:ipc-hum7xxx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hum7xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hx3xxx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hx3xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hx5xxx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hx5xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:sd1a1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:sd1a1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:sd22_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:sd22:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:sd41_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:sd41:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:sd50_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:sd50:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:sd52c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:sd52c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:sd6al_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:sd6al:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:tpc-bf1241_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:tpc-bf1241:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:tpc-bf2221_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:tpc-bf2221:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:tpc-bf5x01_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:tpc-bf5x01:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:tpc-pt8x21b_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:tpc-pt8x21b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:tpc-sd2221_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:tpc-sd2221:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:tpc-sd8x21_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:tpc-sd8x21:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:vto-65xxx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:vto-65xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:vto-75x95x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:vto-75x95x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:vth-542xh_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:vth-542xh:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:tpc-bf5x21_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:tpc-bf5x21:-:*:*:*:*:*:*:*']",0,0
CVE-2021-33045,Dahua,0.93321,9.8,0.0,1.0,0.0,1.0,1,2021-09-15,1.0,2021-11-15,,,0.0,The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-287'],"['cpe:2.3:o:dahuasecurity:ipc-hum7xxx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hum7xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hx3xxx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hx3xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hx5xxx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hx5xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:nvr-1xxx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:nvr-1xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:nvr-2xxx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:nvr-2xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:nvr-4xxx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:nvr-4xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:nvr-5xxx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:nvr-5xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:nvr-6xx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:nvr-6xx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:vth-542xh_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:vth-542xh:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:vto-65xxx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:vto-65xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:vto-75x95x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:vto-75x95x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:xvr-4x04_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:xvr-4x04:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:xvr-4x08_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:xvr-4x08:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:xvr-4x04_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:xvr-4x04:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:xvr-5x04_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:xvr-5x04:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:xvr-5x08_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:xvr-5x08:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:xvr-5x16_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:xvr-5x16:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:xvr-7x16_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:xvr-7x16:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:xvr-7x32_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:xvr-7x32:-:*:*:*:*:*:*:*']",0,0
CVE-2022-30560,Dahua,0.00164,7.4,0.0,1.0,0.0,1.0,1,2022-06-28,1.0,2022-06-28,,,1.0,"When an attacker obtaining the administrative account and password, or through a man-in-the-middle attack, the attacker could send a specified crafted packet to the vulnerable interface then lead the device to crash.",CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H,NETWORK,HIGH,NONE,NONE,UNCHANGED,HIGH,NONE,HIGH,HIGH,2.2,5.2,['NVD-CWE-noinfo'],"['cpe:2.3:h:dahuasecurity:ipc-hdbw2431e-s-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2431e-s-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2831e-s-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2831e-s-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2230e-s-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2230e-s-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2831r-zs-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2831r-zs-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2831r-zas-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2831r-zas-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2831e-s-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2831e-s-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2531r-zs-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2531r-zs-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2531r-zas-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2531r-zas-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2531e-s-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2531e-s-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2431r-zs-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2431r-zs-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2431r-zas-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2431r-zas-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2231f-as-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2231f-as-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2231e-s-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2231e-s-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2231r-zs-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2231r-zs-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2231r-zas-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2231r-zas-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2231m-as-i2-b-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2231m-as-i2-b-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2231t-as-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2231t-as-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2231s-s-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2231s-s-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2231t-zs-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2231t-zs-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2231t-zas-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2231t-zas-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2230s-s-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2230s-s-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2431t-as-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2431t-as-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2431t-zs-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2431t-zs-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2431t-zas-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2431t-zas-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2431s-s-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2431s-s-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2531t-as-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2531t-as-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2531t-zs-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2531t-zs-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2531t-zas-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2531t-zas-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2531s-s-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2531s-s-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2831t-as-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2831t-as-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2831t-zs-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2831t-zs-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2831t-zas-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2831t-zas-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2831s-s-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2831s-s-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2439m-as-led-b-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2439m-as-led-b-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2239m-as-led-b-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2239m-as-led-b-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2439s-sa-led-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2439s-sa-led-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2239s-sa-led-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2239s-sa-led-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:asi7213x-t1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:asi7213x-t1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:asi7223x-a-t1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:asi7223x-a-t1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:asi7223x-a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:asi7223x-a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:asi7213x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:asi7213x:-:*:*:*:*:*:*:*']",0,0
CVE-2017-9317,Dahua,0.00104,8.8,0.0,1.0,0.0,1.0,0,2018-05-23,0.0,,0.0,,,Privilege escalation vulnerability found in some Dahua IP devices. Attacker in possession of low privilege account can gain access to credential information of high privilege account and further obtain device information or attack the device.,CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:h:dahuasecurity:xvr5x16:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:xvr5x16_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:xvr5x08:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:xvr5x08_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:xvr5x04:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:xvr5x04_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:xvr7x16:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:xvr7x16_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw4xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw4xxx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw4xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw4xxx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw5xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw5xxx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw5xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw5xxx_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2019-9677,Dahua,0.0025,9.8,0.0,1.0,0.0,1.0,0,2019-09-18,1.0,2020-01-10,,,0.0,"The specific fields of CGI interface of some Dahua products are not strictly verified, an attacker can cause a buffer overflow by constructing malicious packets. Affected products include: IPC-HDW1X2X,IPC-HFW1X2X,IPC-HDW2X2X,IPC-HFW2X2X,IPC-HDW4X2X,IPC-HFW4X2X,IPC-HDBW4X2X,IPC-HDW5X2X,IPC-HFW5X2X for versions which Build time is before August 18, 2019.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-120'],"['cpe:2.3:o:dahuasecurity:ipc-hdw1x2x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdw1x2x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw1x2x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw1x2x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdw2x2x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdw2x2x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2x2x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2x2x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdw4x2x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdw4x2x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw4x2x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw4x2x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw4x2x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw4x2x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdw5x2x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdw5x2x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw5x2x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw5x2x:-:*:*:*:*:*:*:*']",0,0
CVE-2019-9678,Dahua,0.00103,7.5,0.0,1.0,0.0,1.0,0,2019-09-18,1.0,2020-01-10,,,0.0,"Some Dahua products have the problem of denial of service during the login process. An attacker can cause a device crashed by constructing a malicious packet. Affected products include: IPC-HDW1X2X,IPC-HFW1X2X,IPC-HDW2X2X,IPC-HFW2X2X,IPC-HDW4X2X,IPC-HFW4X2X,IPC-HDBW4X2X,IPC-HDW5X2X,IPC-HFW5X2X for versions which Build time is before August 18, 2019.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:dahuasecurity:ipc-hdw1x2x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdw1x2x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw1x2x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw1x2x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdw2x2x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdw2x2x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2x2x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2x2x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdw4x2x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdw4x2x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw4x2x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw4x2x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw4x2x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw4x2x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdw5x2x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdw5x2x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw5x2x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw5x2x:-:*:*:*:*:*:*:*']",0,0
CVE-2019-9679,Dahua,0.00104,8.8,0.0,1.0,0.0,1.0,0,2019-09-18,1.0,2020-01-10,,,0.0,"Some of Dahua's Debug functions do not have permission separation. Low-privileged users can use the Debug function after logging in. Affected products include: IPC-HDW1X2X,IPC-HFW1X2X,IPC-HDW2X2X,IPC-HFW2X2X,IPC-HDW4X2X,IPC-HFW4X2X,IPC-HDBW4X2X,IPC-HDW5X2X,IPC-HFW5X2X for versions which Build time is before August 18,2019.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-276'],"['cpe:2.3:o:dahuasecurity:ipc-hdw1x2x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdw1x2x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw1x2x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw1x2x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdw2x2x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdw2x2x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2x2x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2x2x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdw4x2x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdw4x2x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw4x2x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw4x2x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw4x2x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw4x2x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdw5x2x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdw5x2x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw5x2x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw5x2x:-:*:*:*:*:*:*:*']",0,0
CVE-2019-9680,Dahua,0.00084,5.3,0.0,1.0,0.0,1.0,0,2019-09-18,1.0,2020-01-10,,,0.0,"Some Dahua products have information leakage issues. Attackers can obtain the IP address and device model information of the device by constructing malicious data packets. Affected products include: IPC-HDW1X2X,IPC-HFW1X2X,IPC-HDW2X2X,IPC-HFW2X2X,IPC-HDW4X2X,IPC-HFW4X2X,IPC-HDBW4X2X,IPC-HDW5X2X,IPC-HFW5X2X for versions which Build time is before August 18, 2019.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,LOW,NONE,NONE,MEDIUM,3.9,1.4,['NVD-CWE-noinfo'],"['cpe:2.3:o:dahuasecurity:ipc-hdw1x2x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdw1x2x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw1x2x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw1x2x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdw2x2x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdw2x2x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2x2x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2x2x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdw4x2x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdw4x2x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw4x2x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw4x2x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw4x2x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw4x2x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdw5x2x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdw5x2x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw5x2x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw5x2x:-:*:*:*:*:*:*:*']",0,0
CVE-2019-9681,Dahua,0.00084,5.3,0.0,1.0,0.0,1.0,0,2019-09-17,1.0,2020-01-10,,,0.0,"Online upgrade information in some firmware packages of Dahua products is not encrypted. Attackers can obtain this information by analyzing firmware packages by specific means. Affected products include: IPC-HDW1X2X,IPC-HFW1X2X,IPC-HDW2X2X,IPC-HFW2X2X,IPC-HDW4X2X,IPC-HFW4X2X,IPC-HDBW4X2X,IPC-HDW5X2X,IPC-HFW5X2X for versions which Build time is before August 18,2019.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,LOW,NONE,NONE,MEDIUM,3.9,1.4,['CWE-311'],"['cpe:2.3:o:dahuasecurity:ipc-hdw1x2x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdw1x2x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw1x2x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw1x2x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdw2x2x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdw2x2x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2x2x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2x2x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdw4x2x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdw4x2x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw4x2x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw4x2x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw4x2x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw4x2x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdw5x2x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdw5x2x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw5x2x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw5x2x:-:*:*:*:*:*:*:*']",0,0
CVE-2019-9682,Dahua,0.00222,8.1,0.0,1.0,0.0,1.0,0,2020-05-13,1.0,2020-05-11,,,1.0,"Dahua devices with Build time before December 2019 use strong security login mode by default, but in order to be compatible with the normal login of early devices, some devices retain the weak security login mode that users can control. If the user uses a weak security login method, an attacker can monitor the device network to intercept network packets to attack the device. So it is recommended that the user disable this login method.",CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,HIGH,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.2,5.9,['CWE-276'],"['cpe:2.3:o:dahuasecurity:sd6al_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:sd6al:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:sd5a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:sd5a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:sd1a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:sd1a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ptz1a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ptz1a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:sd50_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:sd50:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:sd52c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:sd52c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hx5842h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hx5842h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hx7842h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hx7842h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hx2xxx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hx2xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hxxx5x4x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hxxx5x4x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:n42b1p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:n42b1p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:n42b2p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:n42b2p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:n42b3p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:n42b3p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:n52a4p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:n52a4p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:n54a4p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:n54a4p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:n52b2p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:n52b2p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:n52b5p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:n52b5p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:n52b3p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:n52b3p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:n54b2p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:n54b2p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw1320e-w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw1320e-w:-:*:*:*:*:*:*:*']",0,0
CVE-2020-9502,Dahua,0.00222,9.8,0.0,1.0,0.0,1.0,0,2020-05-13,1.0,2020-05-11,,,1.0,"Some Dahua products with Build time before December 2019 have Session ID predictable vulnerabilities. During normal user access, an attacker can use the predicted Session ID to construct a data packet to attack the device.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-330'],"['cpe:2.3:o:dahuasecurity:sd6al_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:sd6al:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:sd5a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:sd5a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:sd1a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:sd1a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ptz1a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ptz1a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:sd50_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:sd50:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:sd52c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:sd52c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hx5842h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hx5842h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hx7842h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hx7842h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hx2xxx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hx2xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hxxx5x4x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hxxx5x4x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:n42b1p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:n42b1p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:n42b2p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:n42b2p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:n42b3p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:n42b3p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:n52a4p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:n52a4p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:n54a4p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:n54a4p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:n52b2p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:n52b2p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:n52b5p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:n52b5p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:n52b3p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:n52b3p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:n54b2p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:n54b2p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw1320e-w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw1320e-w:-:*:*:*:*:*:*:*']",0,0
CVE-2021-33046,Dahua,0.00256,9.8,0.0,1.0,0.0,1.0,0,2022-01-13,1.0,2022-01-12,,,1.0,Some Dahua products have access control vulnerability in the password reset process. Attackers can exploit this vulnerability through specific deployments to reset device passwords.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-287'],"['cpe:2.3:o:dahuasecurity:ipc-hx1xxx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hx1xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hx2xxx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hx2xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hx3xxx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hx3xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hx5\\(4\\)\\(3\\)xxx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hx5\\(4\\)\\(3\\)xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hx5xxx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hx5xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:sd1a1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:sd1a1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:sd22_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:sd22:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:sd49_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:sd49:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:sd50_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:sd50:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:sd52c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:sd52c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:sd6al_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:sd6al:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:tpc-bf1241_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:tpc-bf1241:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:tpc-bf2221_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:tpc-bf2221:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:tpc-bf5x01_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:tpc-bf5x01:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:tpc-pt8x21x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:tpc-pt8x21x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:tpc-sd2221_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:tpc-sd2221:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:tpc-sd8x21_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:tpc-sd8x21:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:nvr1xxx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:nvr1xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:nvr2xxx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:nvr2xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:nvr4xxx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:nvr4xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:nvr5xxx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:nvr5xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:xvr4xxx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:xvr4xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:xvr5xxx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:xvr5xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:xvr7xxx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:xvr7xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:hcvr7xxx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:hcvr7xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:hcvr8xxx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:hcvr8xxx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:vtox20xf_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:vtox20xf:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:asc2204c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:asc2204c:-:*:*:*:*:*:*:*']",0,0
CVE-2022-30561,Dahua,0.00133,5.9,0.0,1.0,0.0,1.0,0,2022-06-28,1.0,2022-06-28,,,1.0,"When an attacker uses a man-in-the-middle attack to sniff the request packets with success logging in, the attacker could log in to the device by replaying the user's login packet.",CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,HIGH,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,2.2,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:dahuasecurity:ipc-hdbw2431e-s-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2431e-s-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2831e-s-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2831e-s-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2230e-s-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2230e-s-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2831r-zs-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2831r-zs-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2831r-zas-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2831r-zas-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2831e-s-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2831e-s-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2531r-zs-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2531r-zs-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2531r-zas-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2531r-zas-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2531e-s-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2531e-s-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2431r-zs-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2431r-zs-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2431r-zas-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2431r-zas-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2231f-as-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2231f-as-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2231e-s-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2231e-s-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2231r-zs-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2231r-zs-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2231r-zas-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2231r-zas-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2231m-as-i2-b-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2231m-as-i2-b-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2231t-as-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2231t-as-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2231s-s-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2231s-s-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2231t-zs-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2231t-zs-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2231t-zas-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2231t-zas-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2230s-s-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2230s-s-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2431t-as-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2431t-as-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2431t-zs-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2431t-zs-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2431t-zas-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2431t-zas-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2431s-s-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2431s-s-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2531t-as-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2531t-as-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2531t-zs-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2531t-zs-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2531t-zas-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2531t-zas-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2531s-s-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2531s-s-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2831t-as-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2831t-as-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2831t-zs-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2831t-zs-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2831t-zas-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2831t-zas-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2831s-s-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2831s-s-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2439m-as-led-b-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2439m-as-led-b-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2239m-as-led-b-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2239m-as-led-b-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2439s-sa-led-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2439s-sa-led-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2239s-sa-led-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2239s-sa-led-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:asi7213x-t1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:asi7213x-t1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:asi7223x-a-t1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:asi7223x-a-t1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:asi7223x-a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:asi7223x-a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:asi7213x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:asi7213x:-:*:*:*:*:*:*:*']",0,0
CVE-2022-30562,Dahua,0.00065,4.7,0.0,1.0,0.0,1.0,0,2022-06-28,1.0,2022-06-28,,,1.0,"If the user enables the https function on the device, an attacker can modify the user’s request data packet through a man-in-the-middle attack ,Injection of a malicious URL in the Host: header of the HTTP Request results in a 302 redirect to an attacker-controlled page.",CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,HIGH,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,1.6,2.7,['CWE-601'],"['cpe:2.3:h:dahuasecurity:ipc-hdbw2431e-s-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2431e-s-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2831e-s-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2831e-s-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2230e-s-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2230e-s-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2831r-zs-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2831r-zs-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2831r-zas-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2831r-zas-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2831e-s-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2831e-s-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2531r-zs-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2531r-zs-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2531r-zas-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2531r-zas-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2531e-s-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2531e-s-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2431r-zs-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2431r-zs-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2431r-zas-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2431r-zas-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2231f-as-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2231f-as-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2231e-s-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2231e-s-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2231r-zs-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2231r-zs-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2231r-zas-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2231r-zas-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2231m-as-i2-b-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2231m-as-i2-b-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2231t-as-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2231t-as-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2231s-s-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2231s-s-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2231t-zs-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2231t-zs-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2231t-zas-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2231t-zas-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2230s-s-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2230s-s-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2431t-as-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2431t-as-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2431t-zs-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2431t-zs-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2431t-zas-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2431t-zas-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2431s-s-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2431s-s-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2531t-as-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2531t-as-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2531t-zs-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2531t-zs-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2531t-zas-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2531t-zas-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2531s-s-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2531s-s-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2831t-as-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2831t-as-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2831t-zs-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2831t-zs-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2831t-zas-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2831t-zas-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2831s-s-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2831s-s-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2439m-as-led-b-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2439m-as-led-b-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2239m-as-led-b-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2239m-as-led-b-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2439s-sa-led-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2439s-sa-led-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2239s-sa-led-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2239s-sa-led-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:asi7213x-t1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:asi7213x-t1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:asi7223x-a-t1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:asi7223x-a-t1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:asi7223x-a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:asi7223x-a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:asi7213x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:asi7213x_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2022-30563,Dahua,0.00135,7.4,0.0,1.0,0.0,1.0,0,2022-06-28,1.0,2022-06-28,,,1.0,"When an attacker uses a man-in-the-middle attack to sniff the request packets with success logging in through ONVIF, he can log in to the device by replaying the user's login packet.",CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N,NETWORK,HIGH,NONE,NONE,UNCHANGED,HIGH,HIGH,NONE,HIGH,2.2,5.2,['NVD-CWE-noinfo'],"['cpe:2.3:o:dahuasecurity:ipc-hdbw2431e-s-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2431e-s-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2831e-s-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2831e-s-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2230e-s-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2230e-s-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2831r-zs-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2831r-zs-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2831r-zas-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2831r-zas-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2831e-s-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2831e-s-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2531r-zs-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2531r-zs-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2531r-zas-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2531r-zas-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2531e-s-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2531e-s-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2431r-zs-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2431r-zs-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2431r-zas-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2431r-zas-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2231f-as-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2231f-as-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2231e-s-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2231e-s-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2231r-zs-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2231r-zs-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hdbw2231r-zas-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hdbw2231r-zas-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2231m-as-i2-b-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2231m-as-i2-b-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2231t-as-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2231t-as-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2231s-s-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2231s-s-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2231t-zs-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2231t-zs-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2231t-zas-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2231t-zas-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2230s-s-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2230s-s-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2431t-as-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2431t-as-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2431t-zs-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2431t-zs-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2431t-zas-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2431t-zas-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2431s-s-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2431s-s-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2531t-as-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2531t-as-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2531t-zs-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2531t-zs-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2531t-zas-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2531t-zas-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2531s-s-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2531s-s-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2831t-as-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2831t-as-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2831t-zs-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2831t-zs-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2831t-zas-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2831t-zas-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2831s-s-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2831s-s-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2439m-as-led-b-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2439m-as-led-b-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2239m-as-led-b-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2239m-as-led-b-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2439s-sa-led-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2439s-sa-led-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:ipc-hfw2239s-sa-led-s2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:ipc-hfw2239s-sa-led-s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:asi7213x-t1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:asi7213x-t1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:asi7223x-a-t1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:asi7223x-a-t1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:asi7223x-a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:asi7223x-a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:dahuasecurity:asi7213x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:dahuasecurity:asi7213x:-:*:*:*:*:*:*:*']",0,0
CVE-2017-5693,Intel,0.0013,7.5,0.0,1.0,0.0,1.0,1,2018-07-31,0.0,,1.0,2018-07-31,,"Firmware in the Intel Puma 5, 6, and 7 Series might experience resource depletion or timeout, which allows a network attacker to create a denial of service via crafted network traffic.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-400'],"['cpe:2.3:o:intel:puma_firmware:5.0:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:puma:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:puma_firmware:6.0_soc:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:puma:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:puma_firmware:7.0_soc:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:puma:-:*:*:*:*:*:*:*']",0,0
CVE-2017-5729,Intel,0.00219,7.4,0.0,1.0,0.0,1.0,1,2017-11-21,1.0,2017-12-07,,,0.0,Frame replay vulnerability in Wi-Fi subsystem in Intel Dual-Band and Tri-Band Wireless-AC Products allows remote attacker to replay frames via channel-based man-in-the-middle.,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H,NETWORK,HIGH,NONE,NONE,UNCHANGED,NONE,HIGH,HIGH,HIGH,2.2,5.2,['NVD-CWE-noinfo'],"['cpe:2.3:o:intel:dual_band_wireless-ac_3160:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:dual_band_wireless-ac_3160:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:dual_band_wireless-ac_7260:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:dual_band_wireless-ac_7260:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:dual_band_wireless-n_7260:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:dual_band_wireless-n_7260:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:wireless-n_7260:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:wireless-n_7260:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:dual_band_wireless-ac_7260:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:dual_band_wireless-ac_7260:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:dual_band_wireless-ac_7265:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:dual_band_wireless-ac_7265:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:dual_band_wireless-n_7265:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:dual_band_wireless-n_7265:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:wireless-n_7265:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:wireless-n_7265:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:dual_band_wireless-ac_7265:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:dual_band_wireless-ac_7265:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:dual_band_wireless-n_7265:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:dual_band_wireless-n_7265:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:wireless-n_7265:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:wireless-n_7265:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:tri-band_wireless-ac_17265:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:tri-band_wireless-ac_17265:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:tri-band_wireless-ac_18260:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:tri-band_wireless-ac_18260:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:tri-band_wireless-ac_18265:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:tri-band_wireless-ac_18265:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:wireless-ac_9260:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:wireless-ac_9260:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2017-5753,Intel,0.97551,5.6,1.0,1.0,0.0,0.0,1,2018-01-04,1.0,2018-04-04,,,0.0,Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.,CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N,LOCAL,HIGH,LOW,NONE,CHANGED,HIGH,NONE,NONE,MEDIUM,1.1,4.0,['CWE-203'],"['cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c:c2316:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c:c2338:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c:c2350:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c:c2358:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c:c2508:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c:c2516:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c:c2518:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c:c2530:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c:c2538:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c:c2550:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c:c2558:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c:c2718:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c:c2730:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c:c2738:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c:c2750:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c:c2758:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_x3:c3130:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_x3:c3200rk:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_x3:c3205rk:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_x3:c3230rk:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_x3:c3235rk:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_x3:c3265rk:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_x3:c3295rk:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_x3:c3405:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_x3:c3445:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z:z3770d:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z:z3775:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z:z3775d:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z:z3785:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z:z3795:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j:j1750:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j:j1800:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j:j1850:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j:j1900:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j:j3060:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j:j3160:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j:j3355:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n2805:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n2806:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n2807:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n2808:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n2810:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n2815:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n2820:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n2830:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n2840:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n2910:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n2920:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n2930:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n2940:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n3000:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n3010:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n3050:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n3060:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n3150:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n3160:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n3350:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n4000:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n4100:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3450:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_m:5y10:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_m:5y10a:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_m:5y10c:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_m:5y31:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_m:5y51:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_m:5y70:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_m:5y71:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_m3:6y30:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_m3:7y30:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_m3:7y32:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_m5:6y54:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_m5:6y57:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_m7:6y75:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_j:j2850:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_j:j2900:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_j:j3710:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_j:j4205:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_n:n3510:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_n:n3520:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_n:n3530:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_n:n3540:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_n:n3700:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_n:n3710:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_n:n4200:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:e5502:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:e5503:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:e5504:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:e5506:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:e5507:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:e5520:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:e5530:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:e5540:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:e5603:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:e5606:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:e5607:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:e5620:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:e5630:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:e5640:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:e5645:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:e5649:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:e6510:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:e6540:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:e7520:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:e7530:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:e7540:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:ec5509:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:ec5539:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:ec5549:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:l3406:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:l3426:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:l5506:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:l5508:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:l5518:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:l5520:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:l5530:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:l5609:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:l5618:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:l5630:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:l5638:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:l5640:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:l7545:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:l7555:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:lc5518:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:lc5528:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:w3670:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:w3680:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:w3690:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:w5580:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:w5590:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:x3430:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:x3440:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:x3450:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:x3460:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:x3470:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:x3480:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:x5550:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:x5560:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:x5570:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:x5647:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:x5650:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:x5660:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:x5667:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:x5670:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:x5672:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:x5675:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:x5677:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:x5680:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:x5687:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:x5690:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:x6550:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:x7542:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:x7550:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon:x7560:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-1105c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3:1505m_v6:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3:1515m_v5:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3:1535m_v5:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3:1535m_v6:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3:1545m_v5:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3:1558l_v5:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3:1565l_v5:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3:1575m_v5:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3:1578l_v5:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3:1585_v5:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3:1585l_v5:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1105c_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1125c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1125c_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1220:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1220_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1220_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_12201:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_12201_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1220l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1225:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1225_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1225_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1226_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1230:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1230_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1230_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1230l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1231_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1235:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1240:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1240_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1240_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1240l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1241_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1245:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1245_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1245_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1246_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1258l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1260l:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1265l_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1265l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1265l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1268l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1270:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1270_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1270_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1271_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1275:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1275_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1275_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1275l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1276_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1278l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1280:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1280_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1280_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1281_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1285_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1285_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1285l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1285l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1286_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1286l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1290:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1290_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1501l_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1501m_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1505l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1505l_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1505m_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:2650l_v4:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:2658:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:2658_v2:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:2658_v3:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:2658_v4:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:2658a_v3:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:2660:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:2660_v2:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:2660_v3:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:2660_v4:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:2665:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:2667:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:2667_v2:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:2667_v3:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:2667_v4:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:2670:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:2670_v2:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:2670_v3:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:2680:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:2680_v2:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:2680_v3:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:2680_v4:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:2683_v3:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:2683_v4:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:2687w:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:2687w_v2:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:2687w_v3:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:2687w_v4:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:2690:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:2690_v2:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:2690_v3:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:2690_v4:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:2695_v2:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:2695_v3:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:2695_v4:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:2697_v2:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:2697_v3:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:2697_v4:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:2697a_v4:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:2698_v3:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:2698_v4:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:2699_v3:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:2699_v4:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:2699a_v4:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:2699r_v4:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:4603:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:4603_v2:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:4607:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:4607_v2:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:4610:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:4610_v2:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:4610_v3:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:4610_v4:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:4617:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:4620:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:4620_v2:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:4620_v3:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:4620_v4:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:4624l_v2:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:4627_v2:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:4627_v3:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:4627_v4:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:4628l_v4:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:4640:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:4640_v2:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:4640_v3:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:4640_v4:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:4648_v3:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:4650:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:4650_v2:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:4650_v3:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:4650_v4:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:4650l:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:4655_v3:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:4655_v4:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:4657l_v2:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:4660_v3:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:4660_v4:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:4667_v3:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:4667_v4:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:4669_v3:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5:4669_v4:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_1428l:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_1428l_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_1428l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_1620:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_1620_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_1620_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_1620_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_1630_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_1630_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_1650:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_1650_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_1650_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_1650_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_1660:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_1660_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_1660_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_1660_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_1680_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_1680_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2403:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2403_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2407:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2407_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2408l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2418l:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2418l_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2418l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2420:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2420_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2428l:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2428l_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2428l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2430:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2430_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2430l:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2430l_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2438l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2440:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2440_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2448l:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2448l_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2450:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2450_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2450l:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2450l_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2470:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2470_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2603:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2603_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2603_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2603_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2608l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2608l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2609:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2609_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2609_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2609_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2618l_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2618l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2618l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2620:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2620_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2620_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2620_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2623_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2623_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2628l_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2628l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2628l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2630:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2630_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2630_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2630_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2630l:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2630l_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2630l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2630l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2637:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2637_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2637_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2637_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2640:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2640_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2640_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2640_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2643:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2643_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2643_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2643_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2648l:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2648l_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2648l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2648l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2650:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2650_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2650_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2650_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2650l:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2650l_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5_2650l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:2803:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:2820:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:2830:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:2850:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:2850_v2:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:2860:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:2870:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:2870_v2:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:2880_v2:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:2890_v2:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:4807:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:4809_v2:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:4809_v3:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:4809_v4:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:4820:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:4820_v2:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:4820_v3:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:4820_v4:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:4830:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:4830_v2:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:4830_v3:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:4830_v4:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:4850:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:4850_v2:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:4850_v3:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:4850_v4:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:4860:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:4860_v2:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:4870:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:4870_v2:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:4880_v2:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:4890_v2:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:8830:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:8837:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:8850:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:8850_v2:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:8857_v2:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:8860:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:8860_v3:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:8860_v4:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:8867_v3:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:8867_v4:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:8867l:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:8870:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:8870_v2:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:8870_v3:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:8870_v4:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:8880_v2:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:8880_v3:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:8880_v4:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:8880l_v2:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:8880l_v3:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:8890_v2:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:8890_v3:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:8890_v4:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:8891_v2:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:8891_v3:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:8891_v4:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:8893_v2:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:8893_v3:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:8893_v4:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7:8894_v4:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold:5118:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold:5119t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold:5120:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold:5120t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold:5122:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold:6126:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold:6126f:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold:6126t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold:6128:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold:6130:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold:6130f:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold:6130t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold:6132:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold:6134:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold:6134m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold:6136:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold:6138:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold:6138f:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold:6138t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold:6140:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold:6140m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold:6142:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold:6142f:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold:6142m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold:6144:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold:6146:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold:6148:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold:6148f:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold:6150:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold:6152:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold:6154:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_phi:7210:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_phi:7210f:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_phi:7230:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_phi:7230f:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_phi:7235:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_phi:7250:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_phi:7250f:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_phi:7285:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_phi:7290:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_phi:7290f:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_phi:7295:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:local_service_management_system:13.1:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:local_service_management_system:13.2:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:local_service_management_system:13.3:*:*:*:*:*:*:*', 'cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*', 'cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:diskstation_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:router_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:virtual_machine_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*', 'cpe:2.3:o:synology:vs960hd_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:synology:vs360hd:-:*:*:*:*:*:*:*', 'cpe:2.3:o:synology:vs360hd_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*', 'cpe:2.3:o:suse:suse_linux_enterprise_desktop:12:sp2:*:*:*:*:*:*', 'cpe:2.3:o:suse:suse_linux_enterprise_desktop:12:sp3:*:*:*:*:*:*', 'cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp4:*:*:*:*:*:*', 'cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp2:*:*:*:*:*:*', 'cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp2:*:*:*:*:raspberry_pi:*', 'cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp3:*:*:*:*:*:*', 'cpe:2.3:o:suse:suse_linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*', 'cpe:2.3:o:suse:suse_linux_enterprise_software_development_kit:12:sp2:*:*:*:*:*:*', 'cpe:2.3:o:suse:suse_linux_enterprise_software_development_kit:12:sp3:*:*:*:*:*:*', 'cpe:2.3:h:arm:cortex-r7:-:*:*:*:*:*:*:*', 'cpe:2.3:o:arm:cortex-r7_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:arm:cortex-r8:-:*:*:*:*:*:*:*', 'cpe:2.3:o:arm:cortex-r8_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:arm:cortex-a8:-:*:*:*:*:*:*:*', 'cpe:2.3:o:arm:cortex-a8_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:arm:cortex-a9:-:*:*:*:*:*:*:*', 'cpe:2.3:o:arm:cortex-a9_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:o:arm:cortex-a12_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:arm:cortex-a12:-:*:*:*:*:*:*:*', 'cpe:2.3:o:arm:cortex-a15_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:arm:cortex-a15:-:*:*:*:*:*:*:*', 'cpe:2.3:o:arm:cortex-a17_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:arm:cortex-a17:-:*:*:*:*:*:*:*', 'cpe:2.3:o:arm:cortex-a57_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:arm:cortex-a57:-:*:*:*:*:*:*:*', 'cpe:2.3:o:arm:cortex-a72_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:arm:cortex-a72:-:*:*:*:*:*:*:*', 'cpe:2.3:o:arm:cortex-a73_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:arm:cortex-a73:-:*:*:*:*:*:*:*', 'cpe:2.3:o:arm:cortex-a75_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:arm:cortex-a75:-:*:*:*:*:*:*:*', 'cpe:2.3:o:arm:cortex-a76_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:arm:cortex-a76:-:*:*:*:*:*:*:*', 'cpe:2.3:a:pepperl-fuchs:visunet_rm_shell:-:*:*:*:*:*:*:*', 'cpe:2.3:o:pepperl-fuchs:btc12_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:pepperl-fuchs:btc12:-:*:*:*:*:*:*:*', 'cpe:2.3:o:pepperl-fuchs:btc14_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:pepperl-fuchs:btc14:-:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:hci:-:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:bl_ppc_1000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:bl_ppc_1000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:bl_ppc12_1000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:bl_ppc12_1000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:bl_ppc15_1000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:bl_ppc15_1000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:bl_ppc17_1000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:bl_ppc17_1000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:bl_bpc_2000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:bl_bpc_2000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:bl_bpc_2001_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:bl_bpc_2001:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:bl_bpc_3000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:bl_bpc_3000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:bl_bpc_3001_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:bl_bpc_3001:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:bl_ppc15_3000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:bl_ppc15_3000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:bl_ppc17_3000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:bl_ppc17_3000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:bl_bpc_7000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:bl_bpc_7000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:bl_bpc_7001_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:bl_bpc_7001:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:bl_ppc_7000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:bl_ppc_7000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:bl_ppc15_7000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:bl_ppc15_7000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:bl_ppc17_7000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:bl_ppc17_7000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:bl_rackmount_2u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:bl_rackmount_2u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:bl_rackmount_4u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:bl_rackmount_4u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:bl2_bpc_1000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:bl2_bpc_1000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:bl2_ppc_1000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:bl2_ppc_1000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:bl2_bpc_2000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:bl2_bpc_2000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:bl2_ppc_2000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:bl2_ppc_2000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:bl2_bpc_7000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:bl2_bpc_7000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:bl2_ppc_7000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:bl2_ppc_7000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:dl_ppc15_1000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:dl_ppc15_1000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:dl_ppc15m_7000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:dl_ppc15m_7000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:dl_ppc18.5m_7000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:dl_ppc18.5m_7000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:dl_ppc21.5m_7000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:dl_ppc21.5m_7000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:el_ppc_1000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:el_ppc_1000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:el_ppc_1000\\/wt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:el_ppc_1000\\/wt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:el_ppc_1000\\/m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:el_ppc_1000\\/m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:valueline_ipc_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:valueline_ipc:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:vl_bpc_1000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:vl_bpc_1000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:vl_bpc_2000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:vl_bpc_2000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:vl_ppc_2000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:vl_ppc_2000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:vl_bpc_3000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:vl_bpc_3000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:vl_ppc_3000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:vl_ppc_3000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:vl_ipc_p7000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:vl_ipc_p7000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:vl2_bpc_1000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:vl2_bpc_1000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:vl2_ppc_1000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:vl2_ppc_1000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:vl2_bpc_2000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:vl2_bpc_2000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:vl2_ppc_2000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:vl2_ppc_2000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:vl2_bpc_3000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:vl2_bpc_3000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:vl2_ppc_3000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:vl2_ppc_3000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:vl2_bpc_7000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:vl2_bpc_7000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:vl2_ppc_7000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:vl2_ppc_7000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:vl2_bpc_9000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:vl2_bpc_9000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:vl2_ppc_9000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:vl2_ppc_9000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:vl2_ppc7_1000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:vl2_ppc7_1000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:vl2_ppc9_1000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:vl2_ppc9_1000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:phoenixcontact:vl2_ppc12_1000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:phoenixcontact:vl2_ppc12_1000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_itc1500_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_itc1500:v3:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_itc1500_pro_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_itc1500_pro:v3:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_itc1900_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_itc1900:v3:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_itc1900_pro_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_itc1900_pro:v3:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_itc2200_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_itc2200:v3:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_itc2200_pro_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_itc2200_pro:v3:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_winac_rtx_\\(f\\)_2010_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_winac_rtx_\\(f\\)_2010_firmware:2010:-:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_winac_rtx_\\(f\\)_2010_firmware:2010:sp1:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_winac_rtx_\\(f\\)_2010_firmware:2010:sp2:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_winac_rtx_\\(f\\)_2010:-:*:*:*:*:*:*:*', 'cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*', 'cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:-:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201312101:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201312102:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201312401:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201312402:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201403101:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201403102:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201403201:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201403202:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201403203:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201403204:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201403205:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201403206:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201403207:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201403208:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201403209:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201403210:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201403211:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201404401:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201404402:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201404403:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201404420:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201406401:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201407101:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201407102:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201407401:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201407402:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201407403:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201407404:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201407405:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201409101:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201409201:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201409202:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201409203:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201409204:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201409205:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201409206:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201409207:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201410101:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201410401:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201410402:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201410403:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201410404:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201410405:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201410406:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201501101:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201501401:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201501402:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201501403:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201501404:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201501405:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201502401:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201504201:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201505101:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201505401:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201505402:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201505403:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201505404:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201509101:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201509102:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201509201:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201509202:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201509203:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201509204:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201509205:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201509206:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201509207:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201509208:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201509209:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201509210:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201509211:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201509212:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201509213:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201510401:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201512101:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201512102:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201512401:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201512402:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201512403:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201512404:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201601401:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201602401:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201608101:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201608102:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201608401:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201608402:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201608403:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201608404:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201608405:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201609101:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201609102:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201609401:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201609402:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201609403:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201612101:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201612102:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201612401:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201612402:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201703401:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201709101:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201709102:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201709103:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201709401:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201709402:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:5.5.0:550-201709403:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:-:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201504401:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201505401:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201507101:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201507102:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201507401:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201507402:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201507403:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201507404:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201507405:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201507406:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201507407:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201509101:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201509102:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201509201:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201509202:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201509203:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201509204:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201509205:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201509206:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201509207:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201509208:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201509209:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201509210:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201510401:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201511401:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201601101:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201601102:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201601401:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201601402:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201601403:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201601404:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201601405:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201602401:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201603101:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201603102:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201603201:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201603202:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201603203:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201603204:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201603205:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201603206:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201603207:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201603208:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201605401:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201608101:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201608401:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201608402:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201608403:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201608404:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201608405:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201610410:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201611401:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201611402:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201611403:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201702101:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201702102:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201702201:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201702202:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201702203:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201702204:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201702205:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201702206:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201702207:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201702208:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201702209:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201702210:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201702211:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201702212:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201703401:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201706101:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201706102:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201706103:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201706401:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201706402:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201706403:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.0:600-201710301:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*', 'cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*', 'cpe:2.3:o:arm:cortex-a77_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:arm:cortex-a77:-:*:*:*:*:*:*:*', 'cpe:2.3:o:arm:cortex-a78_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:arm:cortex-a78:-:*:*:*:*:*:*:*', 'cpe:2.3:o:arm:cortex-a78ae_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:arm:cortex-a78ae:-:*:*:*:*:*:*:*', 'cpe:2.3:o:arm:neoverse_n1_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:arm:neoverse_n1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:arm:neoverse_n2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:arm:neoverse_n2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:arm:cortex-x1_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:arm:cortex-x1:-:*:*:*:*:*:*:*']",2,0
CVE-2018-12163,Intel,0.00044,4.8,0.0,0.0,1.0,0.0,1,2018-09-12,1.0,2018-09-11,,,1.0,A DLL injection vulnerability in the Intel IoT Developers Kit 4.0 installer may allow an authenticated user to potentially escalate privileges using file modification via local access.,CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L,LOCAL,LOW,LOW,REQUIRED,UNCHANGED,LOW,LOW,LOW,MEDIUM,1.3,3.4,['CWE-427'],['cpe:2.3:a:intel:iot_developers_kit:4.0:*:*:*:*:*:*:*'],0,0
CVE-2018-12187,Intel,0.00124,7.5,0.0,0.0,0.0,1.0,1,2019-03-14,1.0,2019-03-12,,,1.0,"Insufficient input validation in Intel(R) Active Management Technology (Intel(R) AMT) before version 11.8.60, 11.11.60, 11.22.60 or 12.0.20 may allow an unauthenticated user to potentially cause a denial of service via network access.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-20'],"['cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2018-12189,Intel,0.00044,4.4,0.0,0.0,0.0,1.0,1,2019-03-14,1.0,2019-03-12,,,1.0,"Unhandled exception in Content Protection subsystem in Intel CSME before versions 11.8.60, 11.11.60, 11.22.60 or 12.0.20 or Intel TXE before 3.1.60 or 4.0.10 may allow privileged user to potentially modify data via local access.",CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N,LOCAL,LOW,HIGH,NONE,UNCHANGED,NONE,HIGH,NONE,MEDIUM,0.8,3.6,['CWE-754'],"['cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:trusted_execution_engine_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:trusted_execution_engine_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2018-12205,Intel,0.00132,6.8,0.0,1.0,0.0,1.0,1,2019-03-14,1.0,2019-04-24,,,0.0,"Improper certificate validation in Platform Sample/ Silicon Reference firmware for 8th Generation Intel(R) Core(tm) Processor, 7th Generation Intel(R) Core(tm) Processor may allow an unauthenticated user to potentially enable an escalation of privilege via physical access.",CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,PHYSICAL,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.9,5.9,['CWE-295'],"['cpe:2.3:o:intel:platform_sample_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:8100h:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:8100t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:8109u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:8130u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:8145u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:8300:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:8300t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8200y:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8259u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8265u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8269u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8300h:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8305g:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8400b:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8400h:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8400t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8500:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8500b:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8500t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8600:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8600t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8086k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8500y:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8559u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8565u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8700b:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8700t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8705g:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8706g:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8709g:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8750h:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8809g:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8850h:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:platform_sample_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:7020u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:7100:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:7100e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:7100h:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:7100t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:7100u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:7101e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:7101te:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:7102e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:7130u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:7167u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:7300:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:7300t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:7320:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:7350k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7200u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7260u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7267u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7287u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7300hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7300u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7360u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7400:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7400t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7440eq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7440hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7442eq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7500:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7500t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7600:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7600k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7600t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7640x:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7740x:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7800x:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7820x:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:silicon_reference_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:8100h:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:8100t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:8109u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:8130u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:8145u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:8300:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:8300t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8200y:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8259u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8265u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8269u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8300h:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8305g:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8400b:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8400h:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8400t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8500:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8500b:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8500t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8600:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8600t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8086k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8500y:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8559u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8565u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8700b:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8700t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8705g:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8706g:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8709g:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8750h:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8809g:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8850h:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:silicon_reference_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:7020u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:7100:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:7100e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:7100h:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:7100t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:7100u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:7101e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:7101te:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:7102e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:7130u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:7167u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:7300:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:7300t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:7320:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:7350k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7200u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7260u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7267u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7287u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7300hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7300u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7360u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7400:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7400t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7440eq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7440hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7442eq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7500:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7500t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7600:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7600k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7600t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7640x:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7740x:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7800x:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7820x:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*']",0,0
CVE-2018-12207,Intel,0.00046,6.5,0.0,1.0,0.0,1.0,1,2019-11-14,0.0,,1.0,2019-11-12,,Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H,LOCAL,LOW,LOW,NONE,CHANGED,NONE,NONE,HIGH,MEDIUM,2.0,4.0,['CWE-20'],"['cpe:2.3:o:intel:core_i3-10110u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-10110y_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-1005g1_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-9300t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-9300t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-9300_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-9300:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-9100_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-9100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-9100t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-9100t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-9350k_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-9350k:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-9320_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-9320:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-8145u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-8300_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-8100t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-8300t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-8109u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-8130u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-8100_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-8350k_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-7100_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-7100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-7350k_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-7350k:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-7300t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-7300t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-7167u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-7167u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-7300_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-7300:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-7100h_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-7100h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-7320_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-7320:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-7100t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-7100t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-7100u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-7100u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-6100u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-6100u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-6100h_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-6100h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-6167u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-6167u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-6100_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-6100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-5015u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-5015u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-5020u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-5020u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-5005u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-5005u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-5010u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-5010u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-5157u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-5157u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-10210u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-10310y_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-10210y_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-1035g4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-1035g7_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-1035g1_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-9500_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-9500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-9600_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-9600:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-9400t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-9400t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-9600t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-9600t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-9500t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-9500t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-9300h_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-9300h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-9400h_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-9400h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-9400_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-9400:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-9600k_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-9600k:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8265u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8200y_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8400t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8300h_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8259u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8269u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8700b_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8700b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8400b_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8500b_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5\\+8500_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5\\+8500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5\\+8400_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5\\+8400:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8305g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8400_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8250u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8350u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-7400_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-7400:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-7500t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-7500t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-7600t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-7600t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-7400t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-7400t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-7600_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-7600:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-7500_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-7500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-7300hq_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-7300hq:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-7267u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-7267u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-7600k_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-7600k:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-7260u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-7260u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-7440hq_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-7440hq:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-7287u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-7287u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-7360u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-7360u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-7200u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-7200u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-7y54_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-7y54:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-6350hq_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-6350hq:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-6200u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-6200u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-6300hq_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-6300hq:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-6287u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-6287u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-6267u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-6267u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-6260u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-6260u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-5350h_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-5350h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-5200u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-5200u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-5287u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-5287u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-5250u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-5250u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-5257u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-5257u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-10510u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-10510y_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-10710u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-1065g7_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-9700t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-9700t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-9700_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-9700:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-9750h_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-9750h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-9850h_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-9700k_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8565u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8500y_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8086k_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8750h_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8559u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7\\+8700_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7\\+8700:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8709g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8809g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8705g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8706g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8550u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8650u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-7700t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-7820hk_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-7700hq_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-7660u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-7560u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-7700_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-7567u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-7700k_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-7920hq_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-7820hq_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-7500u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-6970hq_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6970hq:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-6870hq_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6870hq:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-6770hq_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6770hq:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-6500u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6500u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-6700hq_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6700hq:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-6820hk_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6820hk:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-6560u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6560u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-6567u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6567u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-5850hq_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-5850hq:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-5950hq_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-5950hq:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-5775c_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-5775c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-5700hq_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-5700hq:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-5750hq_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-5750hq:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-5500u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-5500u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-5550u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-5550u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-5557u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-5557u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_m3-8100y_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_m3-7y30_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_m3-7y30:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_m3-6y54_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_m3-6y54:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_m3-6y30_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_m3-6y30:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_m-5y31_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_m-5y31:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_m-5y51_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_m-5y51:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_m-5y10c_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_m-5y10c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_m-5y10_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_m-5y10:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_m-5y10a_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_m-5y10a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_m-5y71_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_m-5y71:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_m-5y70_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_m-5y70:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_m-5y10c_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_m-5y10c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i9-10980xe_firmware:-:*:*:*:extreme:*:*:*', 'cpe:2.3:h:intel:core_i9-10980xe:-:*:*:*:extreme:*:*:*', 'cpe:2.3:o:intel:core_i9-10900x_x-series_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-10900x_x-series:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i9-10920x_x-series_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-10920x_x-series:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i9-10940x_x-series_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-10940x_x-series:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i9-9900x_x-series_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-9900x_x-series:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i9-9920x_x-series_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-9920x_x-series:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i9-9960x_x-series_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-9960x_x-series:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i9-9980xe_firmware:-:*:*:*:extreme:*:*:*', 'cpe:2.3:h:intel:core_i9-9980xe:-:*:*:*:extreme:*:*:*', 'cpe:2.3:o:intel:core_i9-9940x_x-series_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-9940x_x-series:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i9-7960x_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-7960x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i9-7940x_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-7940x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i9-7980xe_firmware:-:*:*:*:extreme:*:*:*', 'cpe:2.3:h:intel:core_i9-7980xe:-:*:*:*:extreme:*:*:*', 'cpe:2.3:o:intel:core_i9-7920x_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-7920x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i9-7900x_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-7900x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-7820x_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7820x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-7800x_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7800x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:pentium_gold_g5620_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:pentium_gold_g5600t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:pentium_gold_g5600_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:pentium_gold_g5500t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:pentium_gold_g5500_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:pentium_gold_g5420t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:pentium_gold_g5420_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:pentium_gold_6405u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:pentium_gold_5405u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:pentium_gold_g5400t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:pentium_gold_g5400_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:pentium_gold_4425y_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:pentium_gold_4417u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:pentium_gold_4415u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:pentium_gold_4415y_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:pentium_gold_4410y_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_g4950_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g4950:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_g4932e_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g4932e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_g4930t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g4930t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_g4930e_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g4930e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_g4930_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g4930:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_g4920_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g4920:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_g4900t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g4900t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_g4900_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g4900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_g3950_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g3950:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_g3930te_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g3930te:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_g3930t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g3930t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_g3930e_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g3930e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_g3930_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g3930:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_g3920_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g3920:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_g3902e_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g3902e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_g3900te_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g3900te:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_g3900e_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g3900e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_g3900t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g3900t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_g3900_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g3900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_g1850_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g1850:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_g1840t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g1840t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_g1840_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g1840:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_g1830_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g1830:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_g1820te_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g1820te:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_g1820t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g1820t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_g1630_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g1630:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g1820:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_g1820_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g1620t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_g1620t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g1620:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_g1620_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g1610t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_g1610t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g1610:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_g1610_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_9282_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_9242_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_9222:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_9222_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_9221_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_9221:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8280m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8280m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8280l_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8280_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8276m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8276m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8276l_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8276_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8270_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8268_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8260y_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8260m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8260m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8260l_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8260_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8256_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8253_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6262v_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6254_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6252n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6252_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6248_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6246_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6244_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6242_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6240y_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6240y_:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6240m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6240m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6240l_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6240_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6238t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6238m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6238m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6238l_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6238_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6234_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6234:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6230t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6230t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6230n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6230n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6230_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6226_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6222v_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5222_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5220t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5220t_:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5220s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5220_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5218t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5218t_:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5218n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5218b_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5218_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5217_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5215m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5215m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5215l_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5215_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_silver_4216_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_silver_4215_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_silver_4214y_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_silver_4214_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_silver_4210_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_silver_4209t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_silver_4208_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_bronze_3204_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8890_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8890_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8893_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8893_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8880_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8880_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-4830_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-4830_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8860_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8860_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-4809_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-4809_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8870_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8870_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-4820_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-4820_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8891_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8891_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8867_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8867_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-4850_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-4850_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8855_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8855_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8860_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8860_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8867_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8867_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8870_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8870_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8880_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8880_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8880l_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8880l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-4809_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-4809_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8890_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8890_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-4820_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-4820_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8891_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8891_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-4830_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-4830_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-4850_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-4850_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8893_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8893_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-4809_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-4809_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8880l_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8880l_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8880_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8880_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-4820_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-4820_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8890_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8890_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8891_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8891_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-2850_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-2850_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-4830_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-4830_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8893_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8893_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-2870_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-2870_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-4850_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-4850_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-2880_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-2880_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-2890_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-2890_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-4860_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-4860_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-4870_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-4870_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-4890_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-4890_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8850_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8850_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8857_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8857_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8870_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8870_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-4880_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-4880_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8895_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8895_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2699a_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2699a_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4627_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4627_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4610a_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4610a_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4620_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4620_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4628l_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4628l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4660_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4660_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4640_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4640_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4669_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4669_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4667_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4667_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4655_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4655_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4650_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4650_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-1660_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1660_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-1630_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1630_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-1620_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1620_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-1680_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1680_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-1650_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1650_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2687w_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2687w_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2695_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2695_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2690_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2690_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2699_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2699_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2650l_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2650l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2658_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2658_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2698_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2698_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2660_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2660_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2680_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2680_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2697_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2697_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2683_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2683_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2628l_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2628l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2650_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2650_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2697a_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2697a_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2648l_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2648l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2620_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2620_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2630l_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2630l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2608l_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2608l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2667_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2667_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2643_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2643_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2623_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2623_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2609_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2609_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2630_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2630_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2618l_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2618l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2637_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2637_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2603_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2603_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2640_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2640_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4640_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4640_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4650_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4650_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4655_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4655_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4660_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4660_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4667_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4667_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4669_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4669_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4610_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4610_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4620_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4620_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4627_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4627_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2695_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2695_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2697_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2697_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2698_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2698_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2699_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2699_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2683_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2683_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2690_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2690_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2650_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2650_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2660_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2660_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2680_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2680_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2670_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2670_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-1630_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1630_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-1650_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1650_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2687w_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2687w_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2643_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2643_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-1660_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1660_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-1680_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1680_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2650l_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2650l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2620_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2620_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2623_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2623_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-1620_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1620_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2630_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2630_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2630l_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2630l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2637_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2637_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2640_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2640_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2603_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2603_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2667_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2667_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4640_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4640_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4650_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4650_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4657l_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4657l_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4607_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4607_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4610_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4610_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4620_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4620_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4657l_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4657l_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4627_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4627_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4603_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4603_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2420_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2420_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2440_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2440_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2403_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2403_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2430_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2430_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2450_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2450_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2430l_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2430l_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2450l_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2450l_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2470_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2470_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2407_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2407_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2640_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2640_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2680_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2680_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2690_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2690_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2643_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2643_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2650_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2650_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2650l_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2650l_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2695_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2695_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2660_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2660_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2667_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2667_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2697_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2697_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2603_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2603_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2670_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2670_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2609_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2609_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-1620_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1620_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2687w_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2687w_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-1650_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1650_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2620_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2620_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-1660_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1660_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2630_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2630_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2630l_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2630l_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2637_v2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2637_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1230_v6_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1230_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1280_v6_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1280_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1225_v6_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1225_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1240_v6_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1240_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1275_v6_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1275_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1220_v6_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1220_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1270_v6_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1270_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1245_v6_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1245_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1535m_v6_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1535m_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1505m_v6_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1505m_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1565l_v5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1565l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1585l_v5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1585l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1585_v5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1585_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1558l_v5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1558l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1545m_v5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1545m_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1575m_v5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1575m_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1515m_v5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1515m_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1240l_v5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1240l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1235l_v5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1235l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1280_v5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1280_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1220_v5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1220_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1230_v5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1230_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1245_v5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1245_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1270_v5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1270_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1225_v5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1225_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1260l_v5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1260l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1240_v5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1240_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1275_v5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1275_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1268l_v5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1268l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1505m_v5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1505m_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1535m_v5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1535m_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1265l_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1265l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1285l_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1285l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1285_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1285_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1241_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1241_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1231_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1231_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1240l_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1240l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1276_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1276_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1281_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1281_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1246_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1246_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1271_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1271_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1226_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1226_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1220l_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1220l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1220_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1220_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1230l_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1230l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1225_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1225_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1265l_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1265l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1275_v3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1275_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2226g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2234_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2236_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2244g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2274g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2246g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2224_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2224g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2288g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2278g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2286g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2276g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2124g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2146g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2176g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2136_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2134_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2144g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2174g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2104g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2104g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2186g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2126g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2124_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1602_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1602:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1653n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1653n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1622_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1622:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1623n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1623n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1627_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1627:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1637_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1637:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1633n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1633n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1649n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1649n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2141i_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2177nt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2161i_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2143it_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2146nt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2145nt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2123it_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2173it_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2191_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2191:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2187nt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2142it_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2163it_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2183it_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2166nt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1533n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1533n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1513n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1513n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1543n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1543n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1523n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1523n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1553n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1553n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1539_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1539:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1529_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1529:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1559_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1559:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1557_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1557:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1567_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1567:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1577:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1577_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1571:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1571_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1528:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1528_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1541:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1541_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1518:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1518_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1521:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1521_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1531:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1531_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1548:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1548_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1527_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1527:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1537_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1537:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1520_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1520:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1540_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1540:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w-2275_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2275:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w-2295_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2295:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w-2265_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2265:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w-2255_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2255:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w-2223_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2223:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w-2245_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2245:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w-2225_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2225:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w-2235_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2235:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w-3265m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w-3245m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w-3275_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w-3245_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w-3275m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w-3223_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w-3265_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w-3225_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w-3175x_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3175x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w-2175_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2175:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w-2133_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2133:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w-2155_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2155:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w-2123_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2123:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w-2145_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2145:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w-2125_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2125:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w-2135_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2135:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w-2195_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2195:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_x7560_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_x7560:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_l7555_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_l7555:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_x7550_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_x7550:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_l7545_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_l7545:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_x7542_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_x7542:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7540_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7540:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7530_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7530:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7520_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7520:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_x7460_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_x7460:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7450_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7450:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_l7455_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_l7455:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_l7445_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_l7445:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7440_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7440:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7430_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7430:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7420_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7420:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_x7350_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_x7350:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_l7345_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_l7345:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7340_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7340:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7330_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7330:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7320_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7320:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7310_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7310:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7220_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7220:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7210_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7210:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_7150n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_7150n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_7140n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_7140n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_7140m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_7140m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_7130n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_7130n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_7130m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_7130m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_7120n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_7120n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_7120m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_7120m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_7110n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_7110n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_7110m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_7110m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_7041_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_7041:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_7040_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_7040:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_7020_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_7020:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_7030_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_7030:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_x6550_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_x6550:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e6540_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e6540:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e6510_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e6510:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_x5690_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_x5690:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_x5687_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_x5687:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_x5680_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_x5680:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_x5677_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_x5677:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_x5675_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_x5675:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_x5672_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_x5672:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_x5670_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_x5670:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_x5667_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_x5667:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_x5660_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_x5660:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_x5650_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_x5650:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5649_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5649:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_x5647_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_x5647:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5645_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5645:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_l5640_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_l5640:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5640_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5640:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_l5638_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_l5638:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_l5630_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_l5630:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5630_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5630:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5620_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5620:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_l5618_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_l5618:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_l5609_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_l5609:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5607_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5607:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5606_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5606:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5506_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5506:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5603_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5603:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w5590_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w5590:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w5580_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w5580:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_x5570_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_x5570:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_x5560_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_x5560:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_x5550_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_x5550:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_ec5549_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_ec5549:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5540_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5540:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_ec5539_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_ec5539:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_l5530_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_l5530:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5530_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5530:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_lc5528_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_lc5528:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_l5520_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_l5520:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5520_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5520:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_lc5518_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_lc5518:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_l5518_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_l5518:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_ec5509_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_ec5509:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_l5508_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_l5508:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5507_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5507:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_l5506_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_l5506:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5504_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5504:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5503_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5503:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5502_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5502:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_x5492_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_x5492:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_x5482_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_x5482:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_x5472_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_x5472:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5472_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5472:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_x5470_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_x5470:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5462_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5462:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_x5460_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_x5460:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_x5450_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_x5450:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5450_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5450:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5440_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5440:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_l5430_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_l5430:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5430_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5430:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_l5420_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_l5420:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5420_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5420:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_l5410_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_l5410:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5410_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5410:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_l5408_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_l5408:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5405_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5405:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_x5365_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_x5365:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_x5355_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_x5355:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5345_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5345:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_l5335_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_l5335:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5335_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5335:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_l5320_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_l5320:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5320_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5320:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_l5318_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_l5318:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_l5310_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_l5310:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5310_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5310:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_x5272_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_x5272:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_x5270_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_x5270:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_x5260_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_x5260:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_l5240_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_l5240:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5240_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5240:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_l5238_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_l5238:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5220_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5220:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_l5215_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_l5215:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5205_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5205:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_5160_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_5160:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_5150_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_5150:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_lv_5148_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_lv_5148:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_5140_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_5140:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_lv_5138_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_lv_5138:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_lv_5133_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_lv_5133:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_5130_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_5130:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_lv_5128_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_lv_5128:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_5120_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_5120:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_lv_5113_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_lv_5113:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_5110_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_5110:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_5080_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_5080:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_5070_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_5070:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_5063_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_5063:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_5060_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_5060:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_5050_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_5050:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_5040_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_5040:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_5030_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_5030:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w3690_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w3690:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w3680_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w3680:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w3670_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w3670:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w3580_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w3580:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w3570_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w3570:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w3565_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w3565:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w3550_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w3550:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w3540_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w3540:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_ec3539_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_ec3539:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w3530_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w3530:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_lc3528_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_lc3528:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w3520_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w3520:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_lc3518_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_lc3518:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_x3480_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_x3480:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_x3470_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_x3470:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_x3460_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_x3460:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_x3450_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_x3450:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_x3440_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_x3440:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_x3430_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_x3430:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_l3426_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_l3426:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_l3406_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_l3406:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_x3380_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_x3380:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_x3370_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_x3370:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_x3360_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_x3360:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_l3360_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_l3360:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_x3350_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_x3350:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_x3330_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_x3330:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_x3320_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_x3320:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_x3230_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_x3230:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_x3220_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_x3220:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_x3210_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_x3210:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3120_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3120:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_l3110_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_l3110:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3110_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3110:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_3070_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_3070:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_3065:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_3065_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_3060:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_3060_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_3050:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_3050_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_3040:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_3040_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_l3014:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_l3014_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*', 'cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-iq_centralized_management:7.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:enterprise_manager:3.1.1:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:openshift_container_platform:4.2:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_eus:8.1:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*', 'cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*']",0,0
CVE-2018-12211,Intel,0.00044,6.5,0.0,0.0,1.0,0.0,1,2019-03-14,1.0,2019-03-12,,,1.0,"Insufficient input validation in User Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause a denial of service via local access.",CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H,LOCAL,LOW,LOW,NONE,CHANGED,NONE,NONE,HIGH,MEDIUM,2.0,4.0,['CWE-20'],"['cpe:2.3:a:intel:graphics_driver:15.33.43.4425:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.33.45.4653:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.33.46.4885:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.36.26.4294:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.36.28.4332:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.36.31.4414:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.36.33.4578:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.36.34.4889:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.40.34.4624:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.40.36.4703:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.40.37.4835:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.40.38.4963:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.40.41.5058:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.45.18.4664:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.45.19.4678:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.45.21.4821:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.45.23.4860:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:24.20.100.6025:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:24.20.100.6094:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:24.20.100.6136:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:24.20.100.6194:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:24.20.100.6229:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:24.20.100.6286:*:*:*:*:windows:*:*']",0,0
CVE-2018-12221,Intel,0.00044,7.8,0.0,0.0,1.0,0.0,1,2019-03-14,1.0,2019-03-12,,,1.0,"Insufficient input validation in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to cause an integer overflow via local access.",CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-20'],"['cpe:2.3:a:intel:graphics_driver:15.33.43.4425:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.33.45.4653:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.33.46.4885:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.36.26.4294:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.36.28.4332:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.36.31.4414:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.36.33.4578:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.36.34.4889:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.40.34.4624:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.40.36.4703:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.40.37.4835:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.40.38.4963:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.40.41.5058:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.45.18.4664:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.45.19.4678:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.45.21.4821:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.45.23.4860:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:24.20.100.6025:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:24.20.100.6094:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:24.20.100.6136:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:24.20.100.6194:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:24.20.100.6229:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:24.20.100.6286:*:*:*:*:windows:*:*']",0,0
CVE-2018-12223,Intel,0.00044,6.3,0.0,0.0,1.0,0.0,1,2019-03-14,1.0,2019-03-12,,,1.0,"Insufficient access control in User Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to escape from a virtual machine guest-to-host via local access.",CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L,LOCAL,LOW,LOW,NONE,CHANGED,LOW,LOW,LOW,MEDIUM,2.0,3.7,['CWE-732'],"['cpe:2.3:a:intel:graphics_driver:15.33.43.4425:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.33.45.4653:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.33.46.4885:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.36.26.4294:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.36.28.4332:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.36.31.4414:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.36.33.4578:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.36.34.4889:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.40.34.4624:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.40.36.4703:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.40.37.4835:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.40.38.4963:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.40.41.5058:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.45.18.4664:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.45.19.4678:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.45.21.4821:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.45.23.4860:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:24.20.100.6025:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:24.20.100.6094:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:24.20.100.6136:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:24.20.100.6194:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:24.20.100.6229:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:24.20.100.6286:*:*:*:*:windows:*:*']",0,0
CVE-2018-18093,Intel,0.00044,7.8,0.0,0.0,1.0,0.0,1,2018-12-14,1.0,2018-12-11,,,1.0,Improper file permissions in the installer for Intel VTune Amplifier 2018 Update 3 and before may allow unprivileged user to potentially gain privileged access via local access.,CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-732'],"['cpe:2.3:a:intel:vtune_amplifier:*:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:vtune_amplifier:2018:update1:*:*:*:*:*:*', 'cpe:2.3:a:intel:vtune_amplifier:2018:update2:*:*:*:*:*:*', 'cpe:2.3:a:intel:vtune_amplifier:2018:update3:*:*:*:*:*:*']",0,0
CVE-2018-3615,Intel,0.00047,6.4,0.0,1.0,0.0,0.0,1,2018-08-14,1.0,2018-08-14,,,1.0,Systems with microprocessors utilizing speculative execution and Intel software guard extensions (Intel SGX) may allow unauthorized disclosure of information residing in the L1 data cache from an enclave to an attacker with local user access via a side-channel analysis.,CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N,LOCAL,HIGH,LOW,NONE,CHANGED,HIGH,LOW,NONE,MEDIUM,1.1,4.7,['CWE-203'],"['cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3:1515m_v5:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3:1535m_v5:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3:1545m_v5:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3:1558l_v5:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3:1565l_v5:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3:1575m_v5:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3:1578l_v5:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3:1585_v5:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3:1585l_v5:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1505l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1505m_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3:1505m_v6:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3:1535m_v6:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1501l_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1501m_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1505l_v6:-:*:*:*:*:*:*:*']",0,0
CVE-2018-3627,Intel,0.00042,8.2,0.0,1.0,0.0,1.0,1,2018-07-10,1.0,2018-07-10,,,1.0,Logic bug in Intel Converged Security Management Engine 11.x may allow an attacker to execute arbitrary code via local privileged access.,CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H,LOCAL,LOW,HIGH,NONE,CHANGED,HIGH,HIGH,HIGH,HIGH,1.5,6.0,['NVD-CWE-noinfo'],"['cpe:2.3:o:intel:converged_security_management_engine_firmware:11.0:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:7020u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:7100:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:7100e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:7100h:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:7100t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:7100u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:7101e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:7101te:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:7102e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:7130u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:7167u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:7300:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:7300t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:7320:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:7350k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:8100h:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:8100t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:8109u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:8130u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:8145u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:8300:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:8300t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:converged_security_management_engine_firmware:11.0:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7y54:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7y57:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7200u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7260u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7267u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7287u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7300hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7300u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7360u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7400:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7400t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7440eq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7440hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7442eq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7500:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7500t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7600:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7600k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:7600t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8200y:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8259u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8265u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8269u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8300h:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8305g:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8400b:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8400h:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8400t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8500:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8500b:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8500t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8600:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8600t:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:converged_security_management_engine_firmware:11.0:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:6500u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:6560u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:6567u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:6600u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:6650u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:6660u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:6700:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:6700hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:6700k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:6700t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:6700te:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:6770hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:6785r:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:6820eq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:6820hk:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:6820hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:6822eq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:6870hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:6920hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:6970hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8086k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8500y:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8559u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8565u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8700b:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8700t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8705g:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8706g:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8709g:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8750h:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8809g:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8850h:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:converged_security_management_engine_firmware:11.0:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9:8950hk:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:converged_security_management_engine_firmware:11.0:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:converged_security_management_engine_firmware:11.0:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w:2123:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w:2125:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w:2133:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w:2135:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w:2145:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w:2155:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w:2175:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w:2195:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:element_software_management_node:-:*:*:*:*:*:*:*']",0,0
CVE-2018-3649,Intel,0.00062,7.8,0.0,1.0,0.0,1.0,1,2018-05-10,1.0,2018-02-05,,,1.0,"DLL injection vulnerability in the installation executables (Autorun.exe and Setup.exe) for Intel's wireless drivers and related software in Intel Dual Band Wireless-AC, Tri-Band Wireless-AC and Wireless-AC family of products allows a local attacker to cause escalation of privilege via remote code execution.",CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-427'],"['cpe:2.3:h:intel:dual_band_wireless-ac_3160:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:dual_band_wireless-ac_3160:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:dual_band_wireless-ac_7260:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:dual_band_wireless-ac_7260:*:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:dual_band_wireless-n_7260:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:dual_band_wireless-n_7260:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:wireless-n_7260:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:wireless-n_7260:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:dual_band_wireless-ac_7260:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:dual_band_wireless-ac_7260:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:dual_band_wireless-ac_7265:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:dual_band_wireless-ac_7265:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:dual_band_wireless-n_7265:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:dual_band_wireless-n_7265:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:wireless-n_7265:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:wireless-n_7265:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:dual_band_wireless-ac_3165:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:dual_band_wireless-ac_7265:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:dual_band_wireless-ac_7265:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:dual_band_wireless-n_7265:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:dual_band_wireless-n_7265:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:wireless-n_7265:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:wireless-n_7265:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:dual_band_wireless-ac_3168:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:tri-band_wireless-ac_17265:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:tri-band_wireless-ac_17265:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:dual_band_wireless-ac_8260:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:tri-band_wireless-ac_18260:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:tri-band_wireless-ac_18260:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:dual_band_wireless-ac_8265:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:tri-band_wireless-ac_18265:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:tri-band_wireless-ac_18265:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:wireless-ac_9260:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:wireless-ac_9560:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:wireless-ac_9461:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:wireless-ac_9462:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*']",0,0
CVE-2018-3665,Intel,0.00074,5.6,0.0,1.0,0.0,0.0,1,2018-06-21,0.0,,1.0,2018-06-13,,System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.,CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N,LOCAL,HIGH,LOW,NONE,CHANGED,HIGH,NONE,NONE,MEDIUM,1.1,4.0,['CWE-200'],"['cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3450:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_m:5y10:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_m:5y10a:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_m:5y10c:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_m:5y31:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_m:5y51:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_m:5y70:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_m:5y71:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_m3:6y30:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_m3:7y30:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_m3:7y32:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_m5:6y54:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_m5:6y57:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_m7:6y75:*:*:*:*:*:*:*', 'cpe:2.3:a:citrix:xenserver:7.0:*:*:*:*:*:*:*', 'cpe:2.3:a:citrix:xenserver:7.1:*:*:*:*:*:*:*', 'cpe:2.3:a:citrix:xenserver:7.3:*:*:*:*:*:*:*', 'cpe:2.3:a:citrix:xenserver:7.4:*:*:*:*:*:*:*', 'cpe:2.3:a:citrix:xenserver:7.5:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:freebsd:freebsd:11.0:*:*:*:*:*:*:*', 'cpe:2.3:o:freebsd:freebsd:11.1:*:*:*:*:*:*:*', 'cpe:2.3:o:freebsd:freebsd:11.2:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:x64:*', 'cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:x64:*']",0,0
CVE-2019-0114,Intel,0.00044,4.7,0.0,0.0,1.0,0.0,1,2019-05-17,1.0,2019-05-14,,,1.0,A race condition in Intel(R) Graphics Drivers before version 10.18.14.5067 (aka 15.36.x.5067) and 10.18.10.5069 (aka 15.33.x.5069) may allow an authenticated user to potentially enable a denial of service via local access.,CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H,LOCAL,HIGH,LOW,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,1.0,3.6,['CWE-362'],"['cpe:2.3:a:intel:graphics_driver:15.33.43.4425:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.33.45.4653:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.33.46.4885:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.36.26.4294:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.36.28.4332:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.36.31.4414:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.36.33.4578:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.36.34.4889:*:*:*:*:windows:*:*']",0,0
CVE-2019-0115,Intel,0.00044,5.5,0.0,0.0,1.0,0.0,1,2019-05-17,1.0,2019-05-14,,,1.0,Insufficient input validation in KMD module for Intel(R) Graphics Driver before version 10.18.14.5067 (aka 15.36.x.5067) and 10.18.10.5069 (aka 15.33.x.5069) may allow an authenticated user to potentially enable denial of service via local access.,CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,1.8,3.6,['CWE-20'],"['cpe:2.3:a:intel:graphics_driver:15.33.43.4425:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.33.45.4653:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.33.46.4885:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.36.26.4294:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.36.28.4332:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.36.31.4414:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.36.33.4578:*:*:*:*:windows:*:*', 'cpe:2.3:a:intel:graphics_driver:15.36.34.4889:*:*:*:*:windows:*:*']",0,0
CVE-2019-0145,Intel,0.00044,7.8,0.0,1.0,1.0,1.0,1,2019-11-14,1.0,2019-11-12,,,1.0,Buffer overflow in i40e driver for Intel(R) Ethernet 700 Series Controllers versions before 7.0 may allow an authenticated user to potentially enable an escalation of privilege via local access.,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-120'],"['cpe:2.3:o:intel:ethernet_controller_x710-tm4_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:ethernet_controller_x710-tm4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:ethernet_controller_x710-at2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:ethernet_controller_x710-at2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:ethernet_controller_xxv710-am2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:ethernet_controller_xxv710-am2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:ethernet_controller_xxv710-am1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:ethernet_controller_xxv710-am1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:ethernet_controller_x710-bm2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:ethernet_controller_x710-bm2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:ethernet_controller_710-bm1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:ethernet_controller_710-bm1:-:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:ethernet_700_series_software:*:*:*:*:*:*:*:*', 'cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*', 'cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*', 'cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*', 'cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*']",0,0
CVE-2019-0178,Intel,0.00044,3.6,0.0,0.0,1.0,0.0,1,2019-06-13,0.0,,1.0,2019-06-11,,Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access.,CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N,LOCAL,HIGH,LOW,NONE,UNCHANGED,LOW,LOW,NONE,LOW,1.0,2.5,['CWE-522'],"['cpe:2.3:a:intel:open_cloud_integrity_tehnology:-:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:openattestation:-:*:*:*:*:*:*:*']",0,0
CVE-2019-0182,Intel,0.00044,3.3,0.0,0.0,1.0,0.0,1,2019-06-13,0.0,,1.0,2019-06-11,,Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access.,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N,LOCAL,LOW,LOW,NONE,UNCHANGED,LOW,NONE,NONE,LOW,1.8,1.4,['CWE-522'],"['cpe:2.3:a:intel:open_cloud_integrity_tehnology:-:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:openattestation:-:*:*:*:*:*:*:*']",0,0
CVE-2019-11103,Intel,0.00044,7.8,0.0,0.0,0.0,1.0,1,2019-12-18,1.0,2019-11-12,,,1.0,"Insufficient input validation in firmware update software for Intel(R) CSME before versions 12.0.45,13.0.10 and 14.0.10 may allow an authenticated user to potentially enable escalation of privilege via local access.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-20'],"['cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2020-12312,Intel,0.0007,6.8,0.0,1.0,1.0,1.0,1,2020-11-12,1.0,2020-11-10,,,1.0,Improper buffer restrictions in the Intel(R) Stratix(R) 10 FPGA firmware provided with the Intel(R) Quartus(R) Prime Pro software before version 20.2 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.,CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,PHYSICAL,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.9,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:a:intel:quartus_prime_pro:*:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:stratix_10_fpga_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:stratix_10_fpga:-:*:*:*:*:*:*:*']",0,0
CVE-2020-12336,Intel,0.00044,7.8,0.0,1.0,0.0,1.0,1,2020-11-12,1.0,2020-11-10,,,1.0,Insecure default variable initialization in firmware for some Intel(R) NUCs may allow an authenticated user to potentially enable escalation of privilege via local access.,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-1188'],"['cpe:2.3:o:intel:nuc_8_mainstream-g_kit_nuc8i5inh_firmware:inwhl357.0036:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_8_mainstream-g_kit_nuc8i5inh:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_8_mainstream-g_kit_nuc8i7inh_firmware:inwhl357.0036:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_8_mainstream-g_kit_nuc8i7inh:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_8_mainstream-g_mini_pc_nuc8i5inh_firmware:inwhl357.0036:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_8_mainstream-g_mini_pc_nuc8i5inh:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_8_mainstream-g_mini_pc_nuc8i7inh_firmware:inwhl357.0036:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_8_mainstream-g_mini_pc_nuc8i7inh:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_8_pro_board_nuc8i3pnb_firmware:pnwhl357.0037:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_8_pro_board_nuc8i3pnb:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_8_pro_kit_nuc8i3pnh_firmware:pnwhl357.0037:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_8_pro_kit_nuc8i3pnh:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_8_pro_kit_nuc8i3pnk:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_8_pro_kit_nuc8i3pnk_firmware:pnwhl357.0037:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_8_pro_mini_pc_nuc8i3pnk:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_8_pro_mini_pc_nuc8i3pnk_firmware:pnwhl357.0037:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_8_rugged_kit_nuc8cchkr:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_8_rugged_kit_nuc8cchkr_firmware:chaplcel.0049:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_9_pro_kit_nuc9v7qnx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_9_pro_kit_nuc9v7qnx_firmware:qncflx70.34:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_9_pro_kit_nuc9vxqnx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_9_pro_kit_nuc9vxqnx_firmware:qncflx70.34:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_board_h27002-400:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_board_h27002-400_firmware:tybyt10h.86a:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_board_h27002-401:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_board_h27002-401_firmware:tybyt10h.86a:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_board_h27002-402_firmware:tybyt10h.86a:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_board_h27002-402:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_board_h27002-404_firmware:tybyt10h.86a:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_board_h27002-404:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_board_h27002-500_firmware:tybyt20h.86a:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_board_h27002-500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_board_nuc8cchb_firmware:chaplcel.0049:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_board_nuc8cchb:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_kit_h26998-401_firmware:tybyt10h.86a:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_kit_h26998-401:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_kit_h26998-402_firmware:tybyt10h.86a:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_kit_h26998-402:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_kit_h26998-403_firmware:tybyt10h.86a:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_kit_h26998-403:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_kit_h26998-404_firmware:tybyt10h.86a:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_kit_h26998-404:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_kit_h26998-405_firmware:tybyt10h.86a:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_kit_h26998-405:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_kit_h26998-500_firmware:tybyt20h.86a:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_kit_h26998-500:-:*:*:*:*:*:*:*']",0,0
CVE-2020-12357,Intel,0.00044,6.7,0.0,1.0,0.0,1.0,1,2021-06-09,1.0,2021-06-08,,,1.0,Improper initialization in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.,CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.8,5.9,['CWE-665'],"['cpe:2.3:o:intel:bios:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-l13g4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-l16g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1060ng7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-11700b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6498du:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6500u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6560u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6567u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6600u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6650u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6660u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6700:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6700hq:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6700k:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6700t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6700te:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6770hq:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6785r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6820eq:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6820hk:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6820hq:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6822eq:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6870hq:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6920hq:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6970hq:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-10900x:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-10920x:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-10940x:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-10980xe:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_bronze_3206r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1513n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1518:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1520:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1521:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1523n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1524n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1527:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1528:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1529:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1531:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1533n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1537:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1539:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1540:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1541:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1543n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1548:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1553n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1557:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1559:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1563n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1567:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1571:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1573n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1577:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1581:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1587:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1602:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1612:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1622:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1623n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1627:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1632:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1633n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1637:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1649n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1653n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2191:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2104g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2254me:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2254ml:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2276me:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2276ml:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1205_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1220_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1220_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1225_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1225_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1230_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1230_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1235l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1240_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1240_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1240l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1245_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1245_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1260l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1268l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1270_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1270_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1275_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1275_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1280_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1280_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1285_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1501l_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1501m_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1505l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1505l_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1505m_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1505m_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1515m_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1535m_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1535m_v6:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1545m_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1558l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1565l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1575m_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1578l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1585_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1585l_v5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1428l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1603_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1603_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1607_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1607_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1620_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1620_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1630_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1630_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1650_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1650_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1660_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1660_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1680_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1680_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2408l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2418l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2428l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2438l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2603_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2603_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2608l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2608l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2609_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2609_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2618l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2618l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2620_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2620_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2623_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2623_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2628l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2628l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2630_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2630_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2630l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2630l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2637_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2637_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2640_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2640_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2643_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2643_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2648l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2648l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2650_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2650_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2650l_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2650l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2658_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2658_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2658a_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2660_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2660_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2667_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2667_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2670_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2679_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2680_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2680_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2683_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2683_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2685_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2687w_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2687w_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2689_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2690_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2690_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2695_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2695_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2697_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2697_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2697a_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2698_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2698_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2699_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2699_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2699a_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2699r_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4610_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4610_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4620_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4620_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4627_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4627_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4628l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4640_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4640_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4648_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4650_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4650_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4655_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4655_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4660_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4660_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4667_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4667_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4669_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4669_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-4809_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-4820_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-4830_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-4850_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8855_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8860_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8867_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8870_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8880_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8890_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8891_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8893_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8894_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5115:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5117:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5117f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5118:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5119t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5120:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5120t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5122:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5218r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5219y:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5220r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6122:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6126:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6126f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6126t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6128:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6129:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6130:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6130f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6130h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6130t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6132:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6134:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6134m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6135:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6136:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6137:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6138:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6138f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6138p:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6138t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6140:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6140m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6142:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6142f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6142m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6143:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6144:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6146:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6148:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6148f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6150:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6152:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6154:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6162:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6208u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6222:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6226r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6230n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6230r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6230t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6234:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6240r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6242r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6246r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6248r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6250:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6250l:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6256:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6258r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6262:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6269y:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8153:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8156:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8158:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8160:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8160f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8160h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8160m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8160t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8164:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8165:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8168:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8170:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8170m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8174:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8176:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8176f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8176m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8180:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8180m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8274:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8284:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_9221:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_9222:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4106h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4108:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4109t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4110:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4112:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4114:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4114t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4116:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4116t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4123:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4210r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4210t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4214r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4215r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-11855m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-11955m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1250e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1250te:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1270e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1270te:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1290e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1290te:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1350:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1350p:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1370:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1370p:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1390:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1390p:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1390t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2102:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2104:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2123:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2125:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2133:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2135:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2145:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2155:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2175:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2195:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2223:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2225:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2235:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2245:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2255:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2265:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2275:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2295:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3175x:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3235:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:aff_bios:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:e-series_bios:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:fas_bios:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:hci_compute_node_bios:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:hci_storage_node_bios:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:solidfire_bios:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_cpu_1518-4_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_cpu_1518-4:-:*:*:*:*:*:*:*']",0,0
CVE-2020-8692,Intel,0.00044,6.7,0.0,1.0,0.0,0.0,1,2020-11-12,1.0,2020-11-10,,,1.0,Insufficient access control in the firmware of the Intel(R) Ethernet 700 Series Controllers before version 7.3 may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access.,CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.8,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:intel:v710-at2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:v710-at2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:x710-tm4_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:x710-tm4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:x710-at2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:x710-at2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xxv710-am2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xxv710-am2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xxv710-am1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xxv710-am1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:x710-bm2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:x710-bm2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xl710-bm2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xl710-bm2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xl710-bm1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xl710-bm1:-:*:*:*:*:*:*:*']",0,0
CVE-2020-8698,Intel,0.00047,5.5,0.0,1.0,0.0,1.0,1,2020-11-12,1.0,2021-02-16,,,0.0,Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.8,3.6,['CWE-668'],"['cpe:2.3:o:intel:microcode:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:hci_compute_node_bios:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:hci_storage_node_bios:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:hci_storage_node:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:solidfire_bios:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netapp:solidfire:-:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*']",0,0
CVE-2020-8704,Intel,0.00044,6.4,0.0,0.0,1.0,0.0,1,2021-06-09,1.0,2021-06-08,,,1.0,Race condition in a subsystem in the Intel(R) LMS versions before 2039.1.0.0 may allow a privileged user to potentially enable escalation of privilege via local access.,CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H,LOCAL,HIGH,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.5,5.9,['CWE-362'],"['cpe:2.3:a:intel:local_manageability_service:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_ipc527g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_ipc527g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*']",0,0
CVE-2021-0067,Intel,0.00044,6.7,0.0,1.0,0.0,1.0,1,2021-06-09,1.0,2021-06-08,,,1.0, Improper access control in system firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access.,CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.8,5.9,['NVD-CWE-Other'],"['cpe:2.3:o:intel:nuc_m15_laptop_kit_lapbc510_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_m15_laptop_kit_lapbc510:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_m15_laptop_kit_lapbc710_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_m15_laptop_kit_lapbc710:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_11_compute_element_cm11ebc4_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_11_compute_element_cm11ebc4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_11_compute_element_cm11ebi38w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_11_compute_element_cm11ebi38w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_11_compute_element_cm11ebi58w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_11_compute_element_cm11ebi58w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_11_compute_element_cm11ebi716w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_11_compute_element_cm11ebi716w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_11_performance_kit_nuc11pahi3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_11_performance_kit_nuc11pahi3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_11_performance_kit_nuc11pahi5_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_11_performance_kit_nuc11pahi5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_11_performance_kit_nuc11pahi7_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_11_performance_kit_nuc11pahi7:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_11_performance_kit_nuc11paki3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_11_performance_kit_nuc11paki3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_11_performance_kit_nuc11paki5_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_11_performance_kit_nuc11paki5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_11_performance_kit_nuc11paki7_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_11_performance_kit_nuc11paki7:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_11_performance_mini_pc_nuc11paqi50wa_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_11_performance_mini_pc_nuc11paqi50wa:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_11_performance_mini_pc_nuc11paqi70qa_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_11_performance_mini_pc_nuc11paqi70qa:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_11_pro_board_nuc11tnbi3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_11_pro_board_nuc11tnbi3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_11_pro_board_nuc11tnbi5_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_11_pro_board_nuc11tnbi5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_11_pro_board_nuc11tnbi7_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_11_pro_board_nuc11tnbi7:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi30l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi30l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi30p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi30p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi5_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi50l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi50l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi50w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi50w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi7_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi7:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi70l_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi70l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnhi70q_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnhi70q:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnki3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnki3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnki5_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnki5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_11_pro_kit_nuc11tnki7_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_11_pro_kit_nuc11tnki7:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_11_enthusiast_kit_nuc11phki7c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_11_enthusiast_kit_nuc11phki7c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_11_enthusiast_mini_pc_nuc11phki7caa_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_11_enthusiast_mini_pc_nuc11phki7caa:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnh_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnh:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnhf_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnhf:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i3fnk_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i3fnk:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnh_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnh:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnhf_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnhf:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnhj_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnhj:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnk_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnk:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i5fnkp_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i5fnkp:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnh_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnh:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnhc_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnhc:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnk_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnk:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_10_performance_kit_nuc10i7fnkp_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_10_performance_kit_nuc10i7fnkp:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i3fnhfa_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i3fnhfa:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i3fnhja_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i3fnhja:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i5fnhca_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i5fnhca:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i5fnhja_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i5fnhja:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i5fnkpa_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i5fnkpa:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i7fnhaa_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i7fnhaa:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i7fnhja_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i7fnhja:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_10_performance_mini_pc_nuc10i7fnkpa_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_10_performance_mini_pc_nuc10i7fnkpa:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_9_pro_compute_element_nuc9v7qnb_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_9_pro_compute_element_nuc9v7qnb:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_9_pro_compute_element_nuc9vxqnb_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_9_pro_compute_element_nuc9vxqnb:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_9_pro_kit_nuc9v7qnx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_9_pro_kit_nuc9v7qnx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_9_pro_kit_nuc9vxqnx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_9_pro_kit_nuc9vxqnx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_8_business\\,_a_mini_pc_with_windows_10_nuc8i7hnkqc_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_8_business\\,_a_mini_pc_with_windows_10_nuc8i7hnkqc:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_8_enthusiast\\,_a_mini_pc_with_windows_10_nuc8i7hvkva_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_8_enthusiast\\,_a_mini_pc_with_windows_10_nuc8i7hvkva:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_8_enthusiast\\,_a_mini_pc_with_windows_10_nuc8i7hvkvaw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_8_enthusiast\\,_a_mini_pc_with_windows_10_nuc8i7hvkvaw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_kit_nuc8i7hnk_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_kit_nuc8i7hnk:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_kit_nuc8i7hvk_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_kit_nuc8i7hvk:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_8_rugged_kit_nuc8cchkr_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_8_rugged_kit_nuc8cchkr:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_board_nuc8cchb_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_board_nuc8cchb:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_8_compute_element_cm8ccb_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_8_compute_element_cm8ccb:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_8_compute_element_cm8i3cb_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_8_compute_element_cm8i3cb:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_8_compute_element_cm8i5cb_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_8_compute_element_cm8i5cb:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_8_compute_element_cm8i7cb_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_8_compute_element_cm8i7cb:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_8_compute_element_cm8pcb_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_8_compute_element_cm8pcb:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_8_pro_board_nuc8i3pnb_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_8_pro_board_nuc8i3pnb:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_8_pro_kit_nuc8i3pnh_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_8_pro_kit_nuc8i3pnh:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_8_pro_kit_nuc8i3pnk_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_8_pro_kit_nuc8i3pnk:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_8_mainstream-g_kit_nuc8i5inh_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_8_mainstream-g_kit_nuc8i5inh:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_8_mainstream-g_kit_nuc8i7inh_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_8_mainstream-g_kit_nuc8i7inh:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_8_mainstream-g_mini_pc_nuc8i5inh_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_8_mainstream-g_mini_pc_nuc8i5inh:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_8_mainstream-g_mini_pc_nuc8i7inh_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_8_mainstream-g_mini_pc_nuc8i7inh:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_7_essential\\,_a_mini_pc_with_windows_10_nuc7cjysal_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_7_essential\\,_a_mini_pc_with_windows_10_nuc7cjysal:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_kit_nuc7cjyh_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_kit_nuc7cjyh:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_kit_nuc7pjyh_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_kit_nuc7pjyh:-:*:*:*:*:*:*:*']",0,0
CVE-2021-26313,Intel,0.00053,5.5,0.0,1.0,0.0,0.0,1,2021-06-09,0.0,,0.0,,,"Potential speculative code store bypass in all supported CPU products, in conjunction with software vulnerabilities relating to speculative execution of overwritten instructions, may cause an incorrect speculation and could result in data leakage.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.8,3.6,"['CWE-203', 'CWE-208']","['cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*', 'cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*', 'cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*', 'cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*', 'cpe:2.3:h:arm:cortex-a72:-:*:*:*:*:*:*:*', 'cpe:2.3:h:broadcom:bcm2711:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*']",0,0
CVE-2021-33069,Intel,0.00044,5.5,0.0,1.0,0.0,1.0,1,2022-05-12,1.0,2022-05-10,,,1.0,"Improper resource shutdown or release in firmware for some Intel(R) SSD, Intel(R) SSD DC, Intel(R) Optane(TM) SSD and Intel(R) Optane(TM) SSD DC may allow a privileged user to potentially enable denial of service via local access.
",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,1.8,3.6,['CWE-404'],"['cpe:2.3:o:intel:optane_ssd_dc_p4800x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:optane_ssd_dc_p4800x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:optane_ssd_dc_p4801x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:optane_ssd_dc_p4801x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:optane_ssd_p5800x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:optane_ssd_p5800x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:optane_memory_h20_with_solid_state_storage_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:optane_memory_h20_with_solid_state_storage:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:optane_memory_h10_with_solid_state_storage_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:optane_memory_h10_with_solid_state_storage:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:optane_ssd_905p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:optane_ssd_905p:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:optane_ssd_900p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:optane_ssd_900p_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2021-33074,Intel,0.00064,4.6,0.0,1.0,0.0,1.0,1,2022-05-12,1.0,2022-05-10,,,1.0,"Protection mechanism failure in firmware for some Intel(R) SSD, Intel(R) SSD DC and Intel(R) Optane(TM) SSD Products may allow an unauthenticated user to potentially enable information disclosure via physical access.",CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,PHYSICAL,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,0.9,3.6,['NVD-CWE-Other'],"['cpe:2.3:h:intel:optane_ssd_dc_p4800x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:optane_ssd_dc_p4800x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:optane_ssd_dc_p4801x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:optane_ssd_dc_p4801x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:optane_ssd_p5800x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:optane_ssd_p5800x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:optane_memory_h20_with_solid_state_storage:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:optane_memory_h20_with_solid_state_storage_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:optane_memory_h10_with_solid_state_storage:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:optane_memory_h10_with_solid_state_storage_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:optane_ssd_905p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:optane_ssd_905p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:optane_ssd_900p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:optane_ssd_900p_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2021-33126,Intel,0.00044,4.4,0.0,1.0,0.0,1.0,1,2022-08-18,1.0,2022-08-09,,,1.0,Improper access control in the firmware for some Intel(R) 700 and 722 Series Ethernet Controllers and Adapters before versions 8.5 and 1.5.5 may allow a privileged user to potentially enable denial of service via local access.,CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H,LOCAL,LOW,HIGH,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,0.8,3.6,['NVD-CWE-Other'],"['cpe:2.3:o:intel:ethernet_controller_xxv710_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:ethernet_controller_xxv710:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:ethernet_controller_xl710_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:ethernet_controller_xl710:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:ethernet_controller_v710_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:ethernet_controller_v710:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:ethernet_controller_x710_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:ethernet_controller_x710:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:ethernet_network_adapter_x722da2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:ethernet_network_adapter_x722da2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:ethernet_network_adapter_x722da4fh_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:ethernet_network_adapter_x722da4fh:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:ethernet_network_adapter_x722da4g1p5_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:ethernet_network_adapter_x722da4g1p5:-:*:*:*:*:*:*:*']",0,0
CVE-2021-44228,Intel,0.96763,10.0,1.0,0.0,1.0,0.0,1,2021-12-10,1.0,2021-12-23,,,0.0,"Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,CHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,6.0,"['CWE-20', 'CWE-917']","['cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apache:log4j:2.0:-:*:*:*:*:*:*', 'cpe:2.3:a:apache:log4j:2.0:beta9:*:*:*:*:*:*', 'cpe:2.3:a:apache:log4j:2.0:rc1:*:*:*:*:*:*', 'cpe:2.3:a:apache:log4j:2.0:rc2:*:*:*:*:*:*', 'cpe:2.3:o:siemens:sppa-t3000_ses3000_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:sppa-t3000_ses3000:-:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:captial:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:captial:2019.1:-:*:*:*:*:*:*', 'cpe:2.3:a:siemens:captial:2019.1:sp1912:*:*:*:*:*:*', 'cpe:2.3:a:siemens:comos:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:desigo_cc_advanced_reports:4.0:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:desigo_cc_advanced_reports:4.1:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:desigo_cc_advanced_reports:4.2:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:desigo_cc_advanced_reports:5.0:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:desigo_cc_advanced_reports:5.1:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:desigo_cc_info_center:5.0:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:desigo_cc_info_center:5.1:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:e-car_operation_center:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:energy_engage:3.1:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:energyip:8.5:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:energyip:8.6:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:energyip:8.7:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:energyip:9.0:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:energyip_prepay:3.7:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:energyip_prepay:3.8:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:gma-manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:head-end_system_universal_device_integration_system:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:industrial_edge_management:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:industrial_edge_management_hub:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:logo\\!_soft_comfort:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:mendix:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:mindsphere:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:navigator:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:nx:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:opcenter_intelligence:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:operation_scheduler:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:sentron_powermanager:4.1:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:sentron_powermanager:4.2:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:siguard_dsa:4.2:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:siguard_dsa:4.3:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:siguard_dsa:4.4:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:sipass_integrated:2.80:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:sipass_integrated:2.85:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:siveillance_command:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:siveillance_control_pro:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:siveillance_identity:1.5:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:siveillance_identity:1.6:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:siveillance_vantage:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:siveillance_viewpoint:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:solid_edge_cam_pro:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:solid_edge_harness_design:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:solid_edge_harness_design:2020:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:solid_edge_harness_design:2020:-:*:*:*:*:*:*', 'cpe:2.3:a:siemens:solid_edge_harness_design:2020:sp2002:*:*:*:*:*:*', 'cpe:2.3:a:siemens:spectrum_power_4:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:spectrum_power_4:4.70:-:*:*:*:*:*:*', 'cpe:2.3:a:siemens:spectrum_power_4:4.70:sp7:*:*:*:*:*:*', 'cpe:2.3:a:siemens:spectrum_power_4:4.70:sp8:*:*:*:*:*:*', 'cpe:2.3:a:siemens:spectrum_power_7:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:spectrum_power_7:2.30:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:spectrum_power_7:2.30:-:*:*:*:*:*:*', 'cpe:2.3:a:siemens:spectrum_power_7:2.30:sp2:*:*:*:*:*:*', 'cpe:2.3:a:siemens:teamcenter:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:vesys:*:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:vesys:2019.1:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:vesys:2019.1:-:*:*:*:*:*:*', 'cpe:2.3:a:siemens:vesys:2019.1:sp1912:*:*:*:*:*:*', 'cpe:2.3:a:siemens:xpedition_enterprise:-:*:*:*:*:*:*:*', 'cpe:2.3:a:siemens:xpedition_package_integrator:-:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:audio_development_kit:-:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:computer_vision_annotation_tool:-:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:data_center_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:genomics_kernel_library:-:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:oneapi_sample_browser:-:*:*:*:*:eclipse:*:*', 'cpe:2.3:a:intel:secure_device_onboard:-:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:sensor_solution_firmware_development_kit:-:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:system_debugger:-:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:system_studio:-:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*', 'cpe:2.3:a:sonicwall:email_security:*:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*', 'cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*', 'cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*', 'cpe:2.3:a:netapp:cloud_insights:-:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:cloud_manager:-:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:ontap_tools:-:*:*:*:*:vmware_vsphere:*:*', 'cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:vmware_vsphere:*:*', 'cpe:2.3:a:cisco:advanced_malware_protection_virtual_private_cloud_appliance:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:automated_subsea_tuning:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:broadworks:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:business_process_automation:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:business_process_automation:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:business_process_automation:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:cloud_connect:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:cloudcenter:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:cloudcenter_cost_optimizer:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:cloudcenter_suite_admin:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:cloudcenter_workload_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:common_services_platform_collector:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:common_services_platform_collector:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:connected_mobile_experiences:-:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:contact_center_domain_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:contact_center_management_portal:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:crosswork_data_gateway:3.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:crosswork_network_controller:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:crosswork_network_controller:3.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:crosswork_optimization_engine:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:crosswork_optimization_engine:3.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:crosswork_platform_infrastructure:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:crosswork_platform_infrastructure:4.1.0:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:3.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:customer_experience_cloud_agent:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:cyber_vision_sensor_management_extension:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:data_center_network_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:data_center_network_manager:11.3\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:dna_center:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:dna_center:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:dna_center:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:dna_spaces\\:_connector:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:emergency_responder:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:enterprise_chat_and_email:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:evolved_programmable_network_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:finesse:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:finesse:12.6\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:fog_director:-:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:identity_services_engine:2.4.0:-:*:*:*:*:*:*', 'cpe:2.3:a:cisco:integrated_management_controller_supervisor:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:intersight_virtual_appliance:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:iot_operations_dashboard:-:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:network_assurance_engine:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:network_services_orchestrator:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:network_services_orchestrator:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:network_services_orchestrator:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:network_services_orchestrator:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:nexus_dashboard:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:nexus_insights:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:optical_network_controller:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:packaged_contact_center_enterprise:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:packaged_contact_center_enterprise:11.6\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:paging_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:prime_service_catalog:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:smart_phy:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:ucs_central:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:ucs_director:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:-:*:*:*', 'cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:session_management:*:*:*', 'cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1\\):*:*:*:-:*:*:*', 'cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1\\):*:*:*:session_management:*:*:*', 'cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1\\)su3:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:unified_communications_manager_im_and_presence_service:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:unified_communications_manager_im_and_presence_service:11.5\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:unified_contact_center_enterprise:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:unified_contact_center_enterprise:11.6\\(2\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:unified_contact_center_express:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:unified_customer_voice_portal:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:unified_customer_voice_portal:11.6:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:unified_customer_voice_portal:12.0:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:unified_customer_voice_portal:12.5:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:unity_connection:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:video_surveillance_operations_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:virtual_topology_system:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:virtualized_infrastructure_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:virtualized_infrastructure_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:virtualized_voice_browser:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:wan_automation_engine:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:webex_meetings_server:*:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:webex_meetings_server:3.0:-:*:*:*:*:*:*', 'cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release1:*:*:*:*:*:*', 'cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release2:*:*:*:*:*:*', 'cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release3:*:*:*:*:*:*', 'cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release3:-:*:*:*:*:*', 'cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release3_security_patch4:*:*:*:*:*:*', 'cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release3_security_patch5:*:*:*:*:*:*', 'cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release3_service_pack_2:*:*:*:*:*:*', 'cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release3_service_pack_3:*:*:*:*:*:*', 'cpe:2.3:a:cisco:webex_meetings_server:3.0:maintenance_release4:*:*:*:*:*:*', 'cpe:2.3:a:cisco:webex_meetings_server:4.0:-:*:*:*:*:*:*', 'cpe:2.3:a:cisco:webex_meetings_server:4.0:maintenance_release1:*:*:*:*:*:*', 'cpe:2.3:a:cisco:webex_meetings_server:4.0:maintenance_release2:*:*:*:*:*:*', 'cpe:2.3:a:cisco:webex_meetings_server:4.0:maintenance_release3:*:*:*:*:*:*', 'cpe:2.3:a:cisco:workload_optimization_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:unified_intelligence_center:*:*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:unified_sip_proxy:*:*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:unified_workforce_optimization:*:*:*:*:*:*:*:*', 'cpe:2.3:h:cisco:firepower_1010:-:*:*:*:*:*:*:*', 'cpe:2.3:h:cisco:firepower_1120:-:*:*:*:*:*:*:*', 'cpe:2.3:h:cisco:firepower_1140:-:*:*:*:*:*:*:*', 'cpe:2.3:h:cisco:firepower_1150:-:*:*:*:*:*:*:*', 'cpe:2.3:h:cisco:firepower_2110:-:*:*:*:*:*:*:*', 'cpe:2.3:h:cisco:firepower_2120:-:*:*:*:*:*:*:*', 'cpe:2.3:h:cisco:firepower_2130:-:*:*:*:*:*:*:*', 'cpe:2.3:h:cisco:firepower_2140:-:*:*:*:*:*:*:*', 'cpe:2.3:h:cisco:firepower_4110:-:*:*:*:*:*:*:*', 'cpe:2.3:h:cisco:firepower_4112:-:*:*:*:*:*:*:*', 'cpe:2.3:h:cisco:firepower_4115:-:*:*:*:*:*:*:*', 'cpe:2.3:h:cisco:firepower_4120:-:*:*:*:*:*:*:*', 'cpe:2.3:h:cisco:firepower_4125:-:*:*:*:*:*:*:*', 'cpe:2.3:h:cisco:firepower_4140:-:*:*:*:*:*:*:*', 'cpe:2.3:h:cisco:firepower_4145:-:*:*:*:*:*:*:*', 'cpe:2.3:h:cisco:firepower_4150:-:*:*:*:*:*:*:*', 'cpe:2.3:h:cisco:firepower_9300:-:*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:fxos:6.2.3:*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:fxos:6.3.0:*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:fxos:6.4.0:*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:fxos:6.5.0:*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:fxos:6.6.0:*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:fxos:6.7.0:*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:fxos:7.0.0:*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:fxos:7.1.0:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:automated_subsea_tuning:02.01.00:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:broadworks:-:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:cloudcenter_suite:4.10\\(0.15\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:cloudcenter_suite:5.3\\(0\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:cloudcenter_suite:5.4\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:cloudcenter_suite:5.5\\(0\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:cloudcenter_suite:5.5\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:common_services_platform_collector:002.009\\(000.000\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:common_services_platform_collector:002.009\\(000.001\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:common_services_platform_collector:002.009\\(000.002\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:common_services_platform_collector:002.009\\(001.000\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:common_services_platform_collector:002.009\\(001.001\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:common_services_platform_collector:002.009\\(001.002\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:common_services_platform_collector:002.010\\(000.000\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:connected_analytics_for_network_deployment:006.004.000.003:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:connected_analytics_for_network_deployment:006.005.000.:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:connected_analytics_for_network_deployment:006.005.000.000:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:connected_analytics_for_network_deployment:007.000.001:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:connected_analytics_for_network_deployment:007.001.000:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:connected_analytics_for_network_deployment:007.002.000:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:connected_analytics_for_network_deployment:7.3:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:connected_analytics_for_network_deployment:007.003.000:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:connected_analytics_for_network_deployment:007.003.001.001:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:connected_analytics_for_network_deployment:007.003.003:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:connected_analytics_for_network_deployment:008.000.000:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:connected_analytics_for_network_deployment:008.000.000.000.004:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:crosswork_network_automation:-:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:crosswork_network_automation:2.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:crosswork_network_automation:3.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:crosswork_network_automation:4.1.0:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:crosswork_network_automation:4.1.1:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:cx_cloud_agent:001.012:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:cyber_vision:4.0.2:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:cyber_vision_sensor_management_extension:4.0.2:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:dna_center:2.2.2.8:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:dna_spaces:-:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:dna_spaces_connector:-:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:emergency_responder:11.5:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:emergency_responder:11.5\\(4.65000.14\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:emergency_responder:11.5\\(4.66000.14\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:enterprise_chat_and_email:12.0\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:enterprise_chat_and_email:12.5\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:enterprise_chat_and_email:12.6\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:evolved_programmable_network_manager:3.0:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:evolved_programmable_network_manager:3.1:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:evolved_programmable_network_manager:4.0:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:evolved_programmable_network_manager:4.1:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:evolved_programmable_network_manager:5.0:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:evolved_programmable_network_manager:5.1:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:finesse:12.5\\(1\\):su1:*:*:*:*:*:*', 'cpe:2.3:a:cisco:finesse:12.5\\(1\\):su2:*:*:*:*:*:*', 'cpe:2.3:a:cisco:finesse:12.6\\(1\\):-:*:*:*:*:*:*', 'cpe:2.3:a:cisco:finesse:12.6\\(1\\):es01:*:*:*:*:*:*', 'cpe:2.3:a:cisco:finesse:12.6\\(1\\):es02:*:*:*:*:*:*', 'cpe:2.3:a:cisco:finesse:12.6\\(1\\):es03:*:*:*:*:*:*', 'cpe:2.3:a:cisco:firepower_threat_defense:6.2.3:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:firepower_threat_defense:6.3.0:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:firepower_threat_defense:6.4.0:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:firepower_threat_defense:6.5.0:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:firepower_threat_defense:6.6.0:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:firepower_threat_defense:6.7.0:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:firepower_threat_defense:7.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:firepower_threat_defense:7.1.0:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:identity_services_engine:002.004\\(000.914\\):-:*:*:*:*:*:*', 'cpe:2.3:a:cisco:identity_services_engine:002.006\\(000.156\\):-:*:*:*:*:*:*', 'cpe:2.3:a:cisco:identity_services_engine:002.007\\(000.356\\):-:*:*:*:*:*:*', 'cpe:2.3:a:cisco:identity_services_engine:003.000\\(000.458\\):-:*:*:*:*:*:*', 'cpe:2.3:a:cisco:identity_services_engine:003.001\\(000.518\\):-:*:*:*:*:*:*', 'cpe:2.3:a:cisco:identity_services_engine:003.002\\(000.116\\):-:*:*:*:*:*:*', 'cpe:2.3:a:cisco:integrated_management_controller_supervisor:002.003\\(002.000\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:integrated_management_controller_supervisor:2.3.2.0:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:intersight_virtual_appliance:1.0.9-343:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:mobility_services_engine:-:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:network_assurance_engine:6.0\\(2.1912\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.0\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.1\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.2\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.3\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.4\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.5\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.5\\(2\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:network_dashboard_fabric_controller:11.5\\(3\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:network_insights_for_data_center:6.0\\(2.1914\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:network_services_orchestrator:-:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:optical_network_controller:1.1:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:paging_server:8.3\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:paging_server:8.4\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:paging_server:8.5\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:paging_server:9.0\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:paging_server:9.0\\(2\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:paging_server:9.1\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:paging_server:12.5\\(2\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:paging_server:14.0\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:prime_service_catalog:12.1:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:sd-wan_vmanage:20.3:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:sd-wan_vmanage:20.4:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:sd-wan_vmanage:20.5:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:sd-wan_vmanage:20.6:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:sd-wan_vmanage:20.6.1:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:sd-wan_vmanage:20.7:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:sd-wan_vmanage:20.8:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:smart_phy:3.1.2:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:smart_phy:3.1.3:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:smart_phy:3.1.4:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:smart_phy:3.1.5:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:smart_phy:3.2.1:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:smart_phy:21.3:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:ucs_central_software:2.0:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:ucs_central_software:2.0\\(1a\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:ucs_central_software:2.0\\(1b\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:ucs_central_software:2.0\\(1c\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:ucs_central_software:2.0\\(1d\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:ucs_central_software:2.0\\(1e\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:ucs_central_software:2.0\\(1f\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:ucs_central_software:2.0\\(1g\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:ucs_central_software:2.0\\(1h\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:ucs_central_software:2.0\\(1k\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:ucs_central_software:2.0\\(1l\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1.17900.52\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1.18119.2\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1.18900.97\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1.21900.40\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:unified_communications_manager:11.5\\(1.22900.28\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:unified_communications_manager_im_\\&_presence_service:11.5\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:unified_communications_manager_im_\\&_presence_service:11.5\\(1.22900.6\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:unified_computing_system:006.008\\(001.000\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:unified_contact_center_enterprise:11.6\\(2\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:unified_contact_center_enterprise:12.0\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:unified_contact_center_enterprise:12.5\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:unified_contact_center_enterprise:12.6\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:unified_contact_center_enterprise:12.6\\(2\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\):-:*:*:*:*:*:*', 'cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\):su1:*:*:*:*:*:*', 'cpe:2.3:a:cisco:unified_contact_center_express:12.6\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:unified_contact_center_express:12.6\\(2\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:unified_contact_center_management_portal:12.6\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:unified_customer_voice_portal:11.6\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:unified_customer_voice_portal:12.0\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:unified_customer_voice_portal:12.5\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:unified_customer_voice_portal:12.6\\(1\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:unified_intelligence_center:12.6\\(1\\):-:*:*:*:*:*:*', 'cpe:2.3:a:cisco:unified_intelligence_center:12.6\\(1\\):es01:*:*:*:*:*:*', 'cpe:2.3:a:cisco:unified_intelligence_center:12.6\\(1\\):es02:*:*:*:*:*:*', 'cpe:2.3:a:cisco:unified_intelligence_center:12.6\\(2\\):-:*:*:*:*:*:*', 'cpe:2.3:a:cisco:unified_sip_proxy:010.000\\(000\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:unified_sip_proxy:010.000\\(001\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:unified_sip_proxy:010.002\\(000\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:unified_sip_proxy:010.002\\(001\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:unified_workforce_optimization:11.5\\(1\\):sr7:*:*:*:*:*:*', 'cpe:2.3:a:cisco:unity_connection:11.5:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:unity_connection:11.5\\(1.10000.6\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:video_surveillance_manager:7.14\\(1.26\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:video_surveillance_manager:7.14\\(2.26\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:video_surveillance_manager:7.14\\(3.025\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:video_surveillance_manager:7.14\\(4.018\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:virtual_topology_system:2.6.6:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:wan_automation_engine:7.1.3:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:wan_automation_engine:7.2.1:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:wan_automation_engine:7.2.2:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:wan_automation_engine:7.2.3:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:wan_automation_engine:7.3:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:wan_automation_engine:7.4:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:wan_automation_engine:7.5:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:wan_automation_engine:7.6:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:webex_meetings_server:3.0:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:webex_meetings_server:4.0:*:*:*:*:*:*:*', 'cpe:2.3:a:snowsoftware:snow_commander:*:*:*:*:*:*:*:*', 'cpe:2.3:a:snowsoftware:vm_access_proxy:*:*:*:*:*:*:*:*', 'cpe:2.3:a:bentley:synchro:*:*:*:*:pro:*:*:*', 'cpe:2.3:a:bentley:synchro_4d:*:*:*:*:pro:*:*:*', 'cpe:2.3:a:percussion:rhythmyx:*:*:*:*:*:*:*:*', 'cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:*']",3,0
CVE-2022-34152,Intel,0.00044,6.7,0.0,1.0,0.0,1.0,1,2022-11-11,1.0,2022-11-08,,,1.0,"Improper input validation in BIOS firmware for some Intel(R) NUC Boards, Intel(R) NUC Kits before version TY0070 may allow a privileged user to potentially enable escalation of privilege via local access.",CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.8,5.9,['CWE-20'],"['cpe:2.3:o:intel:nuc_board_de3815tybe_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_board_de3815tybe:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:nuc_kit_de3815tykhe_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:nuc_kit_de3815tykhe:-:*:*:*:*:*:*:*']",0,0
CVE-2017-5696,Intel,0.0007,7.8,0.0,0.0,1.0,0.0,0,2018-01-18,1.0,2018-01-16,,,1.0,"Untrusted search path in Intel Graphics Driver 15.40.x.x, 15.45.x.x, and 21.20.x.x allows unprivileged user to elevate privileges via local access.",CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-426'],"['cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:graphics_driver:15.40.1.64.4256:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:graphics_driver:15.40.4.64.4256:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:graphics_driver:15.40.7.64.4279:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:graphics_driver:15.40.14.4352:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:graphics_driver:15.40.26.4474:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:graphics_driver:15.40.34.4624:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:graphics_driver:15.40.36.4703:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:graphics_driver:15.40.37.4835:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:graphics_driver:15.45.18.4664:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:graphics_driver:15.45.19.4678:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:graphics_driver:15.45.21.4821:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:graphics_driver:15.45.23.4860:*:*:*:*:*:*:*']",0,0
CVE-2017-5727,Intel,0.00044,7.8,0.0,0.0,1.0,0.0,0,2018-02-02,1.0,2018-01-30,,,1.0,"Pointer dereference in subsystem in Intel Graphics Driver 15.40.x.x, 15.45.x.x, 15.46.x.x allows unprivileged user to elevate privileges via local access.",CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-476'],"['cpe:2.3:a:intel:graphics_driver:15.40.1.64.4256:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:graphics_driver:15.40.4.64.4256:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:graphics_driver:15.40.7.64.4279:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:graphics_driver:15.40.14.4352:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:graphics_driver:15.40.26.4474:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:graphics_driver:15.40.34.4624:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:graphics_driver:15.40.36.4703:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:graphics_driver:15.40.37.4835:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:graphics_driver:15.45.18.4664:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:graphics_driver:15.45.19.4678:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:graphics_driver:15.45.21.4821:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:graphics_driver:15.45.23.4860:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:graphics_driver:15.46.02.4729:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:graphics_driver:15.46.05.4771:*:*:*:*:*:*:*']",0,0
CVE-2018-12173,Intel,0.0013,7.6,0.0,1.0,0.0,1.0,0,2018-10-10,1.0,2018-10-09,,,1.0,"Insufficient access protection in firmware in Intel Server Board, Intel Server System and Intel Compute Module before firmware version 00.01.0014 may allow an unauthenticated attacker to potentially execute arbitrary code resulting in information disclosure, escalation of privilege and/or denial of service via local access.",CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H,PHYSICAL,LOW,NONE,NONE,CHANGED,HIGH,HIGH,HIGH,HIGH,0.9,6.0,['CWE-732'],"['cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:server_board_s2600bp:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:server_board_s2600wf:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:server_board_s2600st:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:server_board_s2600bpr_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:server_board_s2600bpr:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:server_board_s2600wfr_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:server_board_s2600wfr:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:server_board_s2600str_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:server_board_s2600str:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:compute_module_hns2600bp:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:compute_module_hns2600bpr_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:compute_module_hns2600bpr:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:server_system_r2000wf:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:server_system_r1000wf:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:server_system_r1000wfr_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:server_system_r1000wfr:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:server_system_r2000wfr_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:server_system_r2000wfr:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:server_system_h2000g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:server_system_h2000g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:server_system_h2000gr_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:server_system_h2000gr:-:*:*:*:*:*:*:*']",0,0
CVE-2018-12174,Intel,0.00044,7.8,0.0,0.0,1.0,0.0,0,2018-11-14,1.0,2018-11-13,,,1.0,Heap overflow in Intel Trace Analyzer 2018 in Intel Parallel Studio XE 2018 Update 3 may allow an authenticated user to potentially escalate privileges via local access.,CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-787'],['cpe:2.3:a:intel:parallel_studio_xe:2018:3:*:*:*:*:*:*'],0,0
CVE-2018-12177,Intel,0.00044,7.8,0.0,1.0,1.0,0.0,0,2019-01-10,1.0,2019-01-08,,,1.0,Improper directory permissions in the ZeroConfig service in Intel(R) PROSet/Wireless WiFi Software before version 20.90.0.7 may allow an authorized user to potentially enable escalation of privilege via local access.,CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-732'],"['cpe:2.3:h:intel:dual_band_wireless-ac_3160:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:dual_band_wireless-ac_7260:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:dual_band_wireless-ac_7260_for_desktop:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:dual_band_wireless-ac_7265\\(rev_c\\):-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:dual_band_wireless-ac_7265_\\(rev_d\\):-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:dual_band_wireless-ac_8265_desktop_kit:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:dual_band_wireless-n_7260:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:dual_band_wireless-n_7265_\\(rev_c\\):-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:dual_band_wireless-n_7265_\\(rev_d\\):-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:tri-band_wireless-ac_17265:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:tri-band_wireless-ac_18260:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:tri-band_wireless-ac_18265:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:wireless-n_7260:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:wireless-n_7265_\\(rev_c\\):-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:wireless-n_7265_\\(rev_d\\):-:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:proset\\/wireless_software:*:*:*:*:*:*:*:*']",0,0
CVE-2018-3611,Intel,0.00086,6.5,0.0,0.0,1.0,0.0,0,2018-05-15,0.0,,1.0,2018-05-14,,Bounds check vulnerability in User Mode Driver in Intel Graphics Driver 15.40.x.4 and 21.20.x.x allows unprivileged user to cause a denial of service via local access.,CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.8,3.6,['CWE-20'],"['cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*']",0,0
CVE-2018-3641,Intel,0.00212,9.8,0.0,1.0,0.0,1.0,0,2018-04-03,0.0,,1.0,2018-04-03,,Escalation of privilege in all versions of the Intel Remote Keyboard allows a network attacker to inject keystrokes as a local user.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:intel:remote_keyboard_mobile_app:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:remote_keyboard:-:*:*:*:*:*:*:*']",0,0
CVE-2018-3661,Intel,0.00042,5.5,0.0,0.0,1.0,0.0,0,2018-05-15,1.0,2018-05-15,,,1.0,Buffer overflow in Intel system Configuration utilities selview.exe and syscfg.exe before version 14 build 11 allows a local user to crash these services potentially resulting in a denial of service.,CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,1.8,3.6,['CWE-119'],"['cpe:2.3:a:intel:syscfg:*:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:selview:*:*:*:*:*:*:*:*']",0,0
CVE-2018-3686,Intel,0.00044,6.7,0.0,0.0,1.0,0.0,0,2018-09-12,1.0,2018-09-11,,,1.0,Code injection vulnerability in INTEL-SA-00086 Detection Tool before version 1.2.7.0 may allow a privileged user to potentially execute arbitrary code via local access.,CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.8,5.9,['CWE-94'],['cpe:2.3:a:intel:sa-00086_detection_tool:*:*:*:*:*:*:*:*'],0,0
CVE-2019-0127,Intel,0.00042,3.9,0.0,0.0,1.0,0.0,0,2019-02-18,1.0,2019-02-12,,,1.0,Logic error in the installer for Intel(R) OpenVINO(TM) 2018 R3 and before for Linux may allow a privileged user to potentially enable information disclosure via local access.,CVSS:3.0/AV:P/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N,PHYSICAL,LOW,HIGH,NONE,UNCHANGED,HIGH,NONE,NONE,LOW,0.3,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:a:intel:openvino:2018:r1.1:*:*:*:*:*:*', 'cpe:2.3:a:intel:openvino:2018:r1.2:*:*:*:*:*:*', 'cpe:2.3:a:intel:openvino:2018:r2:*:*:*:*:*:*', 'cpe:2.3:a:intel:openvino:2018:r3:*:*:*:*:*:*', 'cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*']",0,0
CVE-2019-0134,Intel,0.00044,7.8,0.0,0.0,1.0,0.0,0,2019-12-16,1.0,2019-12-10,,,1.0,Improper permissions in the Intel(R) Dynamic Platform and Thermal Framework v8.3.10208.5643 and before may allow an authenticated user to potentially execute code at an elevated level of privilege.,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-276'],['cpe:2.3:a:intel:dynamic_platform_and_thermal_framework:*:*:*:*:*:*:*:*'],0,0
CVE-2019-0158,Intel,0.00044,7.8,0.0,0.0,1.0,0.0,0,2019-04-17,1.0,2019-04-09,,,1.0,Insufficient path checking in the installation package for Intel(R) Graphics Performance Analyzer for Linux version 18.4 and before may allow an authenticated user to potentially enable escalation of privilege via local access.,CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['NVD-CWE-noinfo'],['cpe:2.3:a:intel:graphics_performance_analyzer:*:*:*:*:*:linux:*:*'],0,0
CVE-2019-11135,Intel,0.00065,6.5,0.0,1.0,0.0,1.0,0,2019-11-14,1.0,2020-09-29,,,0.0,TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N,LOCAL,LOW,LOW,NONE,CHANGED,HIGH,NONE,NONE,MEDIUM,2.0,4.0,['NVD-CWE-noinfo'],"['cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*', 'cpe:2.3:a:slackware:slackware:14.2:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:apollo_4200_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:apollo_4200:gen10:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:apollo_2000_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:apollo_2000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:proliant_bl460c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:proliant_bl460c:gen10:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:proliant_dl580_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:proliant_dl580:gen10:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:proliant_dl560_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:proliant_dl560:gen10:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:proliant_dl380_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:proliant_dl380:gen10:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:proliant_dl360_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:proliant_dl360:gen10:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:proliant_dl180_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:proliant_dl180:gen10:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:proliant_dl160_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:proliant_dl160:gen10:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:proliant_dl120_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:proliant_dl120:gen10:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:proliant_dl20_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:proliant_dl20:gen10:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:proliant_ml350_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:proliant_ml350:gen10:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:proliant_ml110_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:proliant_ml110:gen10:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:proliant_ml30_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:proliant_ml30:gen10:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:proliant_xl450_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:proliant_xl450:gen10:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:proliant_xl270d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:proliant_xl270d:gen10:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:proliant_xl230k_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:proliant_xl230k:gen10:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:proliant_xl190r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:proliant_xl190r:gen10:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:proliant_xl170r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:proliant_xl170r:gen10:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:synergy_480_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:synergy_480:gen10:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:synergy_660_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:synergy_660:gen10:*:*:*:*:*:*:*', 'cpe:2.3:o:hp:proliant_e910_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:proliant_e910:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-10510y_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-10310y_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-10210y_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-10110y_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-10110y:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8500y_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8310y_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8210y_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8200y_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_m3-8100y_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_8253_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_8253:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_8256_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_8256:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_8260_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_8260:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_8260l_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_8260l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_8260m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_8260m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_8260y_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_8260y:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_8268_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_8268:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_8270_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_8270:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_8276_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_8276:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_8276l_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_8276l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_8276m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_8276m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_8280_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_8280:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_8280l_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_8280l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_8280m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_8280m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_9220_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_9220:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_9221_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_9221:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_9222_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_9222:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_9242_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_9242:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_9282_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_9282:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_5215_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_5215:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_5215l_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_5215l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_5215m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_5215m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_5215r_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_5215r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_5217_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_5217:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_5218_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_5218:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_5218b_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_5218b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_5218n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_5218n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_5218t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_5218t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_5220_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_5220:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_5220r_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_5220r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_5220s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_5220s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_5220t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_5220t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_5222_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_5222:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_6222v_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_6222v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_6226_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_6226:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_6230_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_6230:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_6230n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_6230n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_6230t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_6230t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_6234_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_6234:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_6238_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_6238:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_6238l_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_6238l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_6238m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_6238m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_6238t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_6238t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_6240_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_6240:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_6240l_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_6240l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_6240m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_6240m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_6240y_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_6240y:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_6242_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_6242:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_6244_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_6244:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_6246_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_6246:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_6248_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_6248:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_6252_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_6252:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_6252n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_6252n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_6254_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_6254:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_6262v_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_6262v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_4208_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_4208:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_4208r_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_4208r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_4209t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_4209t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_4210_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_4210:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_4210r_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_4210r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_4214_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_4214:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_4214c_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_4214c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_4214r_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_4214r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_4214y_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_4214y:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_4215_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_4215:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_4216_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_4216:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_4216r_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_4216r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_3204_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_3204:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_3206r_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_3206r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w-3275m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w-3275_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w-3265m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w-3265_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w-3245m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w-3245_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w-3235_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3235:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w-3225_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w-3223_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w-2295_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2295:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w-2275_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2275:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w-2265_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2265:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w-2255_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2255:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w-2245_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2245:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w-2235_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2235:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w-2225_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2225:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_w-2223_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2223:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i9-9980hk_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-9980hk:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i9-9880h_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-9880h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-9850h_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-9750hf_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-9750hf:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-9400h_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-9400h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-9300h_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-9300h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i9-9900k_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i9-9900kf_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-9900kf:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-9700k_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-9700kf_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-9700kf:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-9600k_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-9600k:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-9600kf_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-9600kf:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-9400_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-9400:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-9400f_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-9400f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2288g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2286m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2278gel_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2278ge_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2278g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-10510u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-10210u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:pentium_6405u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_6405u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_5305u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_5305u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8565u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8665u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8365u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8265u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*', 'cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:codeready_linux_builder:8.0:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:codeready_linux_builder_eus:8.1:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:codeready_linux_builder_eus:8.2:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:codeready_linux_builder_eus:8.4:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:codeready_linux_builder_eus:8.6:*:*:*:*:*:*:*', 'cpe:2.3:a:redhat:virtualization_manager:4.2:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*']",0,0
CVE-2019-11137,Intel,0.00044,8.2,0.0,1.0,0.0,1.0,0,2019-11-14,1.0,2019-11-12,,,1.0,"Insufficient input validation in system firmware for Intel(R) Xeon(R) Scalable Processors, Intel(R) Xeon(R) Processors D Family, Intel(R) Xeon(R) Processors E5 v4 Family, Intel(R) Xeon(R) Processors E7 v4 Family and Intel(R) Atom(R) processor C Series may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access.",CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H,LOCAL,LOW,HIGH,NONE,CHANGED,HIGH,HIGH,HIGH,HIGH,1.5,6.0,['CWE-20'],"['cpe:2.3:o:intel:xeon_platinum_8253_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8256_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8260_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8276_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8276m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8276m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8276l_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8280l_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8260l_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8280m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8280m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8260m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8260m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8280_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8260y_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8268_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8270_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8274_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8274:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8284_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8284:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_9242_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_9282_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8153_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8153:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8156_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8156:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8158_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8158:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8176_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8176:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8160_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8160:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8164_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8164:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8168_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8168:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8170_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8170:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8180_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8180:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8160t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8160t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8160f_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8160f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8176f_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8176f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6210u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6244_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6212u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6240_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5218_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6230_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5222_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6238t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6248_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6252_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6242_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6240y_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5217_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6238m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6238m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5218n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6226_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6254_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5220_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6238l_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5218b_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6240l_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6238_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6240m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6240m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5220s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5215_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6222v_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6252n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5215m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5215m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6246_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5215l_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5218t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5220t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6209u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6262v_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5122_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5122:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6138_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6138:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6148_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6148:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5120t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5120t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6136_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6136:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6150_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6150:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6152_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6152:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6130_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6130:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6128_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6128:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5118_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5118:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6134_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6134:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6126_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6126:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5120_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5120:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5115_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5115:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6154_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6154:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6140_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6140:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6140m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6140m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6132_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6132:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6138t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6138t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6142f_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6142f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6130t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6130t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6138f_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6138f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6130f_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6130f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6126t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6126t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6126f_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6126f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6148f_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6148f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6146_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6146:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6144_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6144:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_silver_4209t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_silver_4210_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_silver_4214_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_silver_4214y_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_silver_4215_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_silver_4208_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_silver_4216_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_silver_4116_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4116:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_silver_4109t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4109t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_silver_4114_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4114:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_silver_4112_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4112:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_silver_4108_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4108:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_silver_4110_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4110:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_bronze_3204_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_bronze_3106_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_bronze_3104_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1602_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1602:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1653n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1653n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1622_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1622:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1623n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1623n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1627_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1627:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1637_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1637:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1633n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1633n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1649n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1649n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2141i_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2177nt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2161i_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2143it_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2146nt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2145nt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2123it_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2173it_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2191_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2191:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2187nt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2142it_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2163it_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2183it_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2166nt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1533n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1533n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1513n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1513n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1543n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1543n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1523n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1523n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1553n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1553n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1539_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1539:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1529_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1529:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1559_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1559:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1557_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1557:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1567_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1567:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1577_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1577:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1571_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1571:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1528_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1528:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1541_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1541:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1518_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1518:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1521_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1521:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1531_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1531:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1548_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1548:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1527_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1527:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1537_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1537:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1520_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1520:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1540_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1540:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2699a_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2699a_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4627_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4627_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4610_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4610_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4620_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4620_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4628l_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4628l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4660_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4660_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4640_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4640_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4669_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4669_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4667_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4667_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4655_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4655_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4650_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4650_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-1660_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1660_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-1630_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1630_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-1620_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1620_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-1680_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1680_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-1650_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1650_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2687w_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2687w_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2695_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2695_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2690_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2690_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2699_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2699_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2650l_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2650l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2658_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2658_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2698_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2698_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2660_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2660_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2680_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2680_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2697_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2697_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2683_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2683_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2628l_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2628l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2650_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2650_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2697a_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2697a_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2648l_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2648l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2620_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2620_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2630l_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2630l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2608l_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2608l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2667_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2667_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2643_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2643_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2623_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2623_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2609_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2609_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2630_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2630_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2618l_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2618l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2637_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2637_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2603_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2603_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2640_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2640_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8894_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8894_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8893_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8893_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8891_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8891_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8890_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8890_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8880_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8880_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8870_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8870_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8867_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8867_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8860_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8860_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-4850_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-4850_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-4830_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-4830_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-4820_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-4820_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-4809_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-4809_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3308_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3308:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3336_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3336:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3338_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3338:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3508_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3508:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3538_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3538:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3558_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3558:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3708_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3708:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3750_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3750:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3758_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3758:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3808_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3808:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3850_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3850:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3858_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3858:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3830_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3830:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3950_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3950:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3955_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3955:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3958_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3958:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2758_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2758:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2738_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2738:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2718_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2718:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2558_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2558:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2538_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2538:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2518_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2518:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2508_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2508:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2358_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2358:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2338_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2338:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2308_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2308:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2750_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2750:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2730_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2730:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2550_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2550:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2530_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2530:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2516_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2516:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2350_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2350:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2316_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2316:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:apollo_4200_gen10_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:apollo_4200_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_bl460c_gen10_server_blade_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl580_gen10_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl560_gen10_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl380_gen10_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl360_gen10_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl180_gen10_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl160_gen10_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl120_gen10_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl120_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_ml350_gen10_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_ml110_gen10_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_xl450_gen10_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_xl270d_gen10_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_xl230k_gen10_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_xl190r_gen10_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_xl170r_gen10_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_e910_server_blade_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:synergy_660_gen10_compute_module_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:synergy_660_gen10_compute_module:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:synergy_480_gen10_compute_module_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:synergy_480_gen10_compute_module:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_bl660c_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_bl660c_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_bl460c_gen9_server_blade_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_bl460c_gen9_server_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl580_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl580_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl560_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl560_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl380_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl380_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl360_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl360_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl180_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl180_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl160_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl160_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl120_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl120_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl80_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl80_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl60_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl60_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_xl730f_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl730f_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_xl450_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl450_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_xl250a_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl250a_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_xl230a_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl230a_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_xl190r_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl190r_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_xl170r_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl170r_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:synergy_680_gen9_compute_module_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:synergy_680_gen9_compute_module:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:synergy_620_gen9_compute_module_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:synergy_620_gen9_compute_module:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:synergy_480_gen9_compute_module_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:synergy_480_gen9_compute_module:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_ml150_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ml150_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_ml110_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ml110_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:apollo_4200_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:apollo_4200_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_ml350_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ml350_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_ws460c_gen9_graphics_server_blade_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ws460c_gen9_graphics_server_blade:-:*:*:*:*:*:*:*']",0,0
CVE-2019-11156,Intel,0.00042,7.8,0.0,1.0,1.0,0.0,0,2019-11-14,1.0,2019-11-12,,,1.0,"Logic errors in Intel(R) PROSet/Wireless WiFi Software before version 21.40 may allow an authenticated user to potentially enable escalation of privilege, denial of service, and information disclosure via local access.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:dual_band_wireless-ac_3165:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:dual_band_wireless-ac_3168:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:dual_band_wireless-ac_7265_\\(rev_d\\):-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:dual_band_wireless-ac_8260:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:dual_band_wireless-ac_8265:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:dual_band_wireless-n_7265_\\(rev_d\\):-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:wireless-ac_9260:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:wireless-ac_9461:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:wireless-ac_9462:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:wireless-ac_9560:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*']",0,0
CVE-2019-11166,Intel,0.00044,6.7,0.0,0.0,1.0,0.0,0,2019-09-16,1.0,2019-09-10,,,1.0,Improper file permissions in the installer for Intel(R) Easy Streaming Wizard before version 2.1.0731 may allow an authenticated user to potentially enable escalation of privilege via local attack.,CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.8,5.9,['CWE-732'],['cpe:2.3:a:intel:easy_streaming_wizard:*:*:*:*:*:*:*:*'],0,0
CVE-2019-14615,Intel,0.001,5.5,0.0,1.0,0.0,1.0,0,2020-01-17,1.0,2020-01-29,,,0.0,Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.8,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_e3805:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_e3815:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_e3825:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_e3826:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_e3827:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_e3845:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_e620:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_e620t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_e640:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_e640t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_e660:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_e660t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_e680:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_e680t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_x3-c3130:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_x3-c3200rk:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_x3-c3230rk:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_x3-c3405:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_x3-c3445:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_x5-z8300:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_x5-z8330:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_x5-z8500:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_x7-z8700:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z2420:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z2460:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z2480:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z2520:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z2560:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z2580:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z2760:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z3460:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z3480:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z3530:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z3560:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z3570:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z3580:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z3590:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z3735d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z3735e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z3735f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z3735g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z3736f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z3736g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z3740:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z3740d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z3745:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z3745d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z3770:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z3770d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z3775:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z3775d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z3785:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z3795:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron:j4005:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron:j4105:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron:n4000:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron:n4100:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g3900:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g3930:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g3930t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g3950:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g4900:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g4900t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g4920:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g4930:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g4930t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g4950:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j:j1750:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j:j1800:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j:j1850:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j:j1900:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j:j3060:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j:j3160:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j:j3355:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j1750:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j1800:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j1850:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j1900:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j3355e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j4025:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j4125:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n2805:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n2806:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n2807:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n2808:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n2810:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n2815:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n2820:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n2830:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n2840:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n2910:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n2920:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n2930:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n2940:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n3000:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n3010:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n3050:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n3060:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n3150:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n3160:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n3350:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n4000:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n4100:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n2805:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n2806:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n2807:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n2808:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n2810:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n2815:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n2820:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n2910:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n2920:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n3010:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n3050:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n3060:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n3150:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n3160:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1585:5:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1585_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1585l:5:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1585l_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1578l:5:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1578l_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1575m:5:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1575m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1565l:5:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1565l_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1558l:5:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1558l_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1545m:5:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1545m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1535m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1535m:5:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1515m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1515m:5:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1505m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1505m:5:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1505l_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1505l:5:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1280_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1280:5:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1275_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1275:5:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1270_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1270:5:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1268l_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1268l:5:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1260l_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1260l:5:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1245_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1245:5:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1240l_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1240l:5:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1240_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1240:5:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1235l_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1235l:5:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1230_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1230:5:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1225_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1225:5:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1220_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1220:5:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1535m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1535m:6:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1505m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1505m:6:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1505l_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1505l:6:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1501l_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1501l:6:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1501m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1501m:6:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1285_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1285:6:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1280_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1280:6:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1275_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1275:6:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1270_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1270:6:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1245_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1245:6:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1240_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1240:6:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1230_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1230:6:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1225_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1225:6:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e3-1220_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e3-1220:6:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-6300_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-6300:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-6300t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-6300t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-6320_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-6320:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-6100e_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-6100e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-6100h_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-6100h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-6100u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-6100u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-6102e_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-6102e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-6157u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-6157u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-6167u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-6167u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-6100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-6100_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-6100t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-6100t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-6100te:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-6100te_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-6006u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-6006u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-6098p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-6098p_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-6600:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-6600_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-6685r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-6685r_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-6600k_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-6600k:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-6600t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-6600t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-6585r_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-6585r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-6500_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-6500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-6500t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-6500t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-6500te_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-6500te:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-6402p_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-6402p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-6400_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-6400:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-6400t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-6400t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-6440eq_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-6440eq:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-6440hq_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-6440hq:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-6442eq_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-6442eq:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-6360u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-6360u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-6350hq_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-6350hq:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-6300hq_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-6300hq:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-6300u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-6300u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-6200u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-6200u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-6260u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-6260u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-6267u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-6267u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-6287u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-6287u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-6970hq_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6970hq:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-6920hq_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6920hq:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-6870hq_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6870hq:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-6822eq_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6822eq:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-6820hq_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6820hq:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-6820hk_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6820hk:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-6820eq_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6820eq:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-6785r_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6785r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-6700k_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6700k:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-6700t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6700t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-6700te_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6700te:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-6700_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6700:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-6770hq_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6770hq:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-6700hq_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6700hq:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-6660u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6660u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-6650u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6650u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-6600u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6600u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-6567u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6567u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-6560u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6560u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-6500u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-6500u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8600t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8600k_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8600_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8500t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8500b_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8500_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8400t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8400h_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8400b_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8400_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8365ue_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8365ue:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8365u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8350u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8310y_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8305g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8300h_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8279u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8279u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8269u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8265u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8259u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8257u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8257u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8250u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8210y_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8200y_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8665ue_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8665u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8557u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8850h_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8809g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8750h_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8709g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8706g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8706g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8705g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8700t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8700k_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8700b_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8700_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8569u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8650u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8565u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8559u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8550u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8500y_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8086k_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-8350k_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-8300_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-8300t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-8145ue_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-8145u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-8130u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-8109u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-8100h_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-8100b_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-8100_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-8100t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8600t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8600k_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8600_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8500t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8500b_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8500_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8400t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8400h_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8400b_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8400_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8365ue_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8365ue:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8365u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8350u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8310y_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8305g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8300h_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8279u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8279u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8269u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8265u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8259u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8257u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8257u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8250u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8210y_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-8200y_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8665ue_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8665u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8557u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8850h_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8809g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8750h_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8709g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8706g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8706g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8705g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8700t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8700k_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8700b_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8700_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8569u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8650u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8565u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8559u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8550u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8500y_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-8086k_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-8350k_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-8300_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-8300t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-8145ue_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-8145u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-8130u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-8109u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-8100h_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-8100b_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-8100_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-8100t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-7350k_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-7350k:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-7320_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-7320:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-7300_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-7300:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-7300t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-7300t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-7130u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-7130u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-7102e_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-7102e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-7101e_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-7101e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-7101te_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-7101te:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-7100t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-7100t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-7100e_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-7100e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-7100_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-7100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-7167u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-7167u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-7100u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-7100u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-7100h_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-7100h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-7020u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-7020u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-7600k_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-7600k:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-7600t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-7600t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-7600_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-7600:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-7500_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-7500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-7500t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-7500t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-7442eq_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-7442eq:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-7440hq_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-7440hq:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-7440eq_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-7440eq:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-7400t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-7400t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-7400_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-7400:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-7360u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-7360u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-7300u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-7300u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-7300hq_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-7300hq:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-7287u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-7287u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-7267u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-7267u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-7260u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-7260u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-7200u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-7200u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-7y54_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-7y54:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-7y57_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-7y57:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-7920hq_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-7820hq_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-7820hk_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-7820eq_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-7700hq_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-7700_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-7700k_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-7700t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-7660u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-7600u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-7567u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-7560u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-7500u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-7y75_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-1035g7_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-1035g4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-1035g1_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-10310y_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-1030g7_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-1030g4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-10210u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-10210y_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-10110u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-10110y_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-1000g4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-1000g1_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-1005g1_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-10710u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-1065g7_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-1060g7_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-10510u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-10510y_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-9350kf_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-9350kf:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-9350k_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-9350k:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-9320_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-9320:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-9300t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-9300t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-9300_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-9300:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-9100te_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-9100te:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-9100t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-9100t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-9100hl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-9100hl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-9100f_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-9100f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-9100e_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-9100e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i3-9100_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-9100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-9850hl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-9850hl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-9850he_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-9850he:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-9850h_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-9750hf_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-9750hf:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-9750h_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-9750h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-9700te_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-9700te:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-9700t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-9700t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-9700kf_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-9700kf:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-9700k_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-9700f_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-9700f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-9700e_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-9700e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i7-9700_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-9700:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-9600t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-9600t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-9600k_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-9600k:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-9600kf_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-9600kf:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-9600_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-9600:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-9500te_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-9500te:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-9500t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-9500t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-9500f_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-9500f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-9500e_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-9500e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-9500_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-9500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-9400f_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-9400f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-9400t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-9400t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-9400h_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-9400h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-9400_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-9400:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-9300hf_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-9300hf:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:core_i5-9300h_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-9300h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2186g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2176g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2146g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2126g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2104g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2104g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2124g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2144g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2174g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2134_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2136_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2124_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2288g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2278g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2286g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2276g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2246g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2236_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2226g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2274g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2244g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2234_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2224g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e-2224_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_e3805_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_e3805:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_e3815_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_e3815:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_e3825_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_e3825:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_e3826_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_e3826:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_e3827_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_e3827:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_e3845_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_e3845:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_e620_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_e620:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_e620t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_e620t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_e640_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_e640:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_e640t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_e640t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_e660_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_e660:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_e660t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_e660t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_e680_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_e680:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_e680t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_e680t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_x3-c3130_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_x3-c3130:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_x3-c3200rk_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_x3-c3200rk:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_x3-c3230rk_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_x3-c3230rk:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_x3-c3405_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_x3-c3405:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_x3-c3445_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_x3-c3445:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_x5-z8300_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_x5-z8300:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_x5-z8330_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_x5-z8330:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_x5-z8500_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_x5-z8500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_x7-z8700_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_x7-z8700:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_z2420_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z2420:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_z2460_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z2460:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_z2480_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z2480:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_z2520_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z2520:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_z2560_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z2560:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_z2580_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z2580:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_z2760_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z2760:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_z3460_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z3460:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_z3480_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z3480:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_z3530_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z3530:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_z3560_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z3560:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_z3570_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z3570:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_z3580_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z3580:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_z3590_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z3590:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_z3735d_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z3735d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_z3735e_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z3735e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_z3735f_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z3735f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_z3735g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z3735g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_z3736f_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z3736f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_z3736g_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z3736g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_z3740_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z3740:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_z3740d_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z3740d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_z3745_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z3745:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_z3745d_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z3745d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_z3770_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z3770:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_z3770d_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z3770d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_z3775_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z3775:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_z3775d_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z3775d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_z3785_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z3785:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_z3795_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_z3795:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron:j4005:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron:j4105:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron:n4000:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron:n4100:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_g3900_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g3900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_g3930_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g3930:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_g3930t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g3930t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_g3950_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g3950:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_g4900_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g4900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_g4900t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g4900t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_g4920_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g4920:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_g4930_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g4930:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_g4930t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g4930t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_g4950_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g4950:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_j_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j:j1750:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_j_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j:j1800:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_j_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j:j1850:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_j_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j:j1900:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_j_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j:j3060:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_j_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j:j3160:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_j_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j:j3355:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_j_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_j_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_j_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_j1750_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j1750:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_j1800_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j1800:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_j1850_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j1850:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_j1900_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j1900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_j3355e_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j3355e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_j4025_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j4025:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_j4125_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j4125:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n2805:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n2806:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n2807:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n2808:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n2810:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n2815:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n2820:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n2830:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n2840:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n2910:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n2920:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n2930:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n2940:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n3000:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n3010:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n3050:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n3060:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n3150:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n3160:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n3350:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n4000:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n:n4100:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n2805:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_n2805_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n2806:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_n2806_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n2807:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_n2807_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_n2808_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n2808:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_n2810_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n2810:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_n2815_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n2815:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_n2820_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n2820:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_n2910_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n2910:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_n2920_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n2920:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_n3010_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n3010:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_n3050_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n3050:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_n3060_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n3060:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_n3150_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n3150:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_n3160_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n3160:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_n3350e_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_n4020_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:celeron_n4120_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*']",0,0
CVE-2020-0502,Intel,0.00044,5.3,0.0,0.0,1.0,0.0,0,2020-03-12,1.0,2020-06-12,,,0.0,Improper access control in Intel(R) Graphics Drivers before version 26.20.100.6912 may allow an authenticated user to potentially enable escalation of privilege via local access.,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,LOCAL,LOW,LOW,NONE,UNCHANGED,LOW,LOW,LOW,MEDIUM,1.8,3.4,['NVD-CWE-noinfo'],['cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*'],0,0
CVE-2020-0504,Intel,0.00044,7.8,0.0,0.0,1.0,0.0,0,2020-03-12,1.0,2020-03-17,,,0.0,"Buffer overflow in Intel(R) Graphics Drivers before versions 15.40.44.5107, 15.45.30.5103, and 26.20.100.7158 may allow an authenticated user to potentially enable escalation of privilege and denial of service via local access.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-120'],"['cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*']",0,0
CVE-2020-0517,Intel,0.00044,5.3,0.0,0.0,1.0,0.0,0,2020-03-12,1.0,2020-03-10,,,1.0,Out-of-bounds write in Intel(R) Graphics Drivers before version 15.36.38.5117 may allow an authenticated user to potentially enable escalation of privilege or denial of service via local access.,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L,LOCAL,LOW,LOW,NONE,UNCHANGED,LOW,LOW,LOW,MEDIUM,1.8,3.4,['CWE-787'],['cpe:2.3:a:intel:graphics_driver:*:*:*:*:*:*:*:*'],0,0
CVE-2020-0555,Intel,0.00044,7.8,0.0,1.0,0.0,1.0,0,2020-08-13,1.0,2020-08-11,,,1.0,Improper input validation for some Intel(R) Wireless Bluetooth(R) products may allow an authenticated user to potentially enable escalation of privilege via local access.,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-20'],"['cpe:2.3:o:intel:ax201_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:ax201:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:ax200_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:ax200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:ac_9560_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:ac_9560:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:ac_9462_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:ac_9462:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:ac_9461_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:ac_9461:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:ac_9260_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:ac_9260:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:ac_8265_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:ac_8265:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:ac_8260_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:ac_8260:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:ac_3168_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:ac_3168:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:ac_7265_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:ac_7265:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:ac_3165_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:ac_3165:-:*:*:*:*:*:*:*']",0,0
CVE-2020-0561,Intel,0.00044,7.8,0.0,0.0,1.0,0.0,0,2020-02-13,1.0,2020-02-11,,,1.0,Improper initialization in the Intel(R) SGX SDK before v2.6.100.1 may allow an authenticated user to potentially enable escalation of privilege via local access.,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-665'],"['cpe:2.3:a:intel:software_guard_extensions_sdk:*:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:software_guard_extensions_sdk:*:*:*:*:*:*:*:*', 'cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:backports:sle-15:sp1:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*']",0,0
CVE-2020-0583,Intel,0.00044,8.8,0.0,1.0,1.0,0.0,0,2020-03-12,1.0,2020-03-10,,,1.0,"Improper access control in the subsystem for Intel(R) Smart Sound Technology may allow an authenticated user to potentially enable escalation of privilege via local access. This affects Intel® Smart Sound Technology before versions: 10th Generation Intel® Core™ i7 Processors, version 3431 and 8th Generation Intel® Core™ Processors, version 3349.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,CHANGED,HIGH,HIGH,HIGH,HIGH,2.0,6.0,['NVD-CWE-noinfo'],"['cpe:2.3:h:intel:core_i7:1060g7:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:1065g7:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:10510u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:10510y:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:10710u:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:smart_sound_technology:3431:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:8100b:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:8100h:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:8100t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:8109u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:8130u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:8145u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:8145ue:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:8300:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:8300t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8200y:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8210y:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8257u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8259u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8265u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8269u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8300h:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8305g:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8365u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8365ue:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8400b:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8400h:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8400t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8500:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8500b:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8500t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8600:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5:8600t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8086k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8500y:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8557u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8559u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8565u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8569u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8665u:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8665ue:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8700b:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8700t:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8705g:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8706g:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8709g:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8750h:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8809g:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7:8850h:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9:8950hk:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_m3:8100y:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:smart_sound_technology:3349:*:*:*:*:*:*:*']",0,0
CVE-2020-0598,Intel,0.00063,7.8,0.0,0.0,1.0,0.0,0,2020-04-15,0.0,,1.0,2020-04-14,,"Uncontrolled search path in the installer for the Intel(R) Binary Configuration Tool for Windows, all versions, may allow an authenticated user to potentially enable escalation of privilege via local access.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-426'],['cpe:2.3:a:intel:binary_configuration_tool:*:*:*:*:*:windows:*:*'],0,0
CVE-2020-12301,Intel,0.00044,8.2,0.0,1.0,0.0,1.0,0,2020-08-13,1.0,2020-08-11,,,1.0,"Improper initialization in BIOS firmware for Intel(R) Server Board Families S2600ST, S2600BP and S2600WF may allow a privileged user to potentially enable escalation of privilege via local access.",CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H,LOCAL,LOW,HIGH,NONE,CHANGED,HIGH,HIGH,HIGH,HIGH,1.5,6.0,['CWE-665'],"['cpe:2.3:o:intel:s2600wftr_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:s2600wftr:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:s2600wf0r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:s2600wf0r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:s2600wfqr_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:s2600wfqr:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:s2600bpsr_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:s2600bpsr:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:s2600bpbr_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:s2600bpbr:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:s2600bpqr_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:s2600bpqr:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:s2600stqr_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:s2600stqr:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:s2600stbr_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:s2600stbr:-:*:*:*:*:*:*:*']",0,0
CVE-2020-24458,Intel,0.00044,5.2,0.0,1.0,1.0,0.0,0,2021-02-17,1.0,2021-02-09,,,1.0,Incomplete cleanup in some Intel(R) PROSet/Wireless WiFi and Killer (TM) drivers before version 22.0 may allow a privileged user to potentially enable information disclosure and denial of service via adjacent access.,CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L,ADJACENT_NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,NONE,LOW,MEDIUM,0.9,4.2,['CWE-459'],"['cpe:2.3:a:intel:proset\\/wireless_wifi:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:ac_9461:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:ac_9462:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:ac_9560:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:ax200:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:ax201:-:*:*:*:*:*:*:*', 'cpe:2.3:a:intel:killer:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:ac_1550:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:ax1650:-:*:*:*:*:*:*:*']",0,0
CVE-2020-24482,Intel,0.0011,7.5,0.0,1.0,0.0,0.0,0,2021-02-17,1.0,2021-02-09,,,1.0,Improper buffer restrictions in firmware for Intel(R) 7360 Cell Modem before UDE version 9.4.370 may allow unauthenticated user to potentially enable denial of service via network access.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:h:intel:xmm_7360:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xmm_7360_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2020-8675,Intel,0.0007,6.8,0.0,1.0,0.0,0.0,0,2020-06-15,1.0,2020-06-09,,,1.0,Insufficient control flow management in firmware build and signing tool for Intel(R) Innovation Engine before version 1.0.859 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.,CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,PHYSICAL,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.9,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:h:intel:innovation_engine:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:innovation_engine_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2020-8684,Intel,0.00044,6.7,0.0,1.0,1.0,0.0,0,2020-08-13,1.0,2020-08-11,,,1.0,Improper access control in firmware for Intel(R) PAC with Arria(R) 10 GX FPGA before Intel Acceleration Stack version 1.2.1 may allow a privileged user to potentially enable escalation of privilege via local access.,CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.8,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:a:intel:acceleration_stack:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:programmable_acceleration_card_with_arria_10_gx_fpga:-:*:*:*:*:*:*:*']",0,0
CVE-2020-8702,Intel,0.00044,7.3,0.0,0.0,1.0,0.0,0,2021-06-09,1.0,2021-06-08,,,1.0,Uncontrolled search path element in the Intel(R) Processor Diagnostic Tool before version 4.1.5.37 may allow an authenticated user to potentially enable escalation of privilege via local access.,CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.3,5.9,['CWE-427'],['cpe:2.3:a:intel:processor_diagnostic_tool:*:*:*:*:*:*:*:*'],0,0
CVE-2021-0055,Intel,0.00044,7.8,0.0,1.0,0.0,1.0,0,2021-06-09,1.0,2021-06-08,,,1.0,Insecure inherited permissions for some Intel(R) NUC 9 Extreme Laptop Kit LAN Drivers before version 10.42 may allow an authenticated user to potentially enable escalation of privilege via local access.,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-732'],"['cpe:2.3:o:intel:lapqc71a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:lapqc71a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:lapqc71b_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:lapqc71b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:lapqc71c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:lapqc71c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:lapqc71d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:lapqc71d:-:*:*:*:*:*:*:*']",0,0
CVE-2021-0077,Intel,0.00044,7.8,0.0,0.0,1.0,0.0,0,2021-06-09,1.0,2021-06-08,,,1.0,Insecure inherited permissions in the installer for the Intel(R) VTune(TM) Profiler before version 2021.1.1 may allow an authenticated user to potentially enable escalation of privilege via local access.,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-732'],['cpe:2.3:a:intel:vtune_profiler:*:*:*:*:*:*:*:*'],0,0
CVE-2021-0113,Intel,0.00062,6.5,0.0,1.0,0.0,0.0,0,2021-06-09,1.0,2021-06-08,,,1.0,"Out of bounds write in the BMC firmware for Intel(R) Server Board M10JNP2SB before version EFI BIOS 7215, BMC 8100.01.08 may allow an unauthenticated user to potentially enable a denial of service via adjacent access.",CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.8,3.6,['CWE-787'],"['cpe:2.3:o:intel:efi_bios_7215:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:server_board_m10jnp2sb:-:*:*:*:*:*:*:*']",0,0
CVE-2022-0001,Intel,0.00048,6.5,0.0,1.0,0.0,0.0,0,2022-03-11,0.0,,1.0,2022-08-03,,Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N,LOCAL,LOW,LOW,NONE,CHANGED,HIGH,NONE,NONE,MEDIUM,2.0,4.0,['NVD-CWE-noinfo'],"['cpe:2.3:h:intel:atom_p5921b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_p5931b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_p5942b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_p5962b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_x6200fe:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_x6211e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_x6212re:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_x6413e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_x6425e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_x6425re:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_x6427fe:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_5305u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_6305:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_6305e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_6600he:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g5205u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g5305u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g5900:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g5900t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g5905:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g5905t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g5920:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g5925:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g6900:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_g6900t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j4005:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j4025:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j4105:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j4125:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_j6413:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n4500:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n4504:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n5100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n5105:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:celeron_n6211:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-11100he:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-1115g4e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-1115gre:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-12100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-12100f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-12100t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-1220p:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-12300:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-12300t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i3-l13g4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-10110y:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-11260h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-11300h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-11320h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-11400:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-11400f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-11400h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-11400t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-1140g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-1145g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-1145g7e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-1145gre:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-11500:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-11500h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-11500t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-1155g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-11600:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-11600k:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-11600kf:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-11600t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-12400:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-12400f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-12400t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-1240p:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-12450h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-12500:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-12500h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-12500t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-1250p:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-12600:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-12600h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-12600k:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-12600kf:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-12600t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-9300h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-9400:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-9400f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-9400h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-9600k:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-9600kf:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i5-l16g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-11390h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-11850he:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1260p:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-12650h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-12700:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-12700f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-12700h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-12700k:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-12700kf:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-12700t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1270p:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-12800h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-1280p:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7640x:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7740x:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7800x:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-7820x:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-9700kf:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-9750hf:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-10850h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-10900x:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-10920x:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-10940x:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-11900:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-11900f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-11900h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-11900k:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-11900kf:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-11900t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-11950h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-11980hk:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-12900:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-12900f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-12900h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-12900hk:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-12900k:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-12900kf:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-12900t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-7900x:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-7920x:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-7940x:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-7960x:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-9800x:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-9820x:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-9880h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-9900kf:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-9900x:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-9920x:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-9940x:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-9960x:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_i9-9980hk:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_gold_g6405u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_gold_g7400:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_gold_g7400t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_j6425:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_n6415:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_silver_j5005:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_silver_j5040:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_silver_n5000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_silver_n5030:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_silver_n6000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:pentium_silver_n6005:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_bronze_3206r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d1700:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d2700:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2314:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2324g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2334:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2336:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2356g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2374g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2378:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2378g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2386g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e-2388g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5218r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5220r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5315y:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5317:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5318h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5318n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5318s:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5318y:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5320:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5320h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5320t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6208u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6226r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6230n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6230r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6230t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6234:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6238r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6240r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6242r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6246r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6248r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6250:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6250l:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6256:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6258r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6312u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6314u:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6326:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6328h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6328hl:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6330:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6330h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6330n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6334:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6336y:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6338:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6338n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6338t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6342:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6346:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6348:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6348h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6354:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8351n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8352m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8352s:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8352v:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8352y:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8353h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8354h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8356h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8358:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8358p:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8360h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8360hl:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8360y:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8362:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8368:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8368q:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8376h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8376hl:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8380:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8380h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8380hl:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_9221:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_9222:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4210r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4210t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4214r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4215r:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4309y:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4310:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4310t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4314:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4316:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-10855:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-11155mle:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-11155mre:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-11555mle:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-11555mre:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-11855m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-11865mld:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-11865mre:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-11955m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1270p:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1290e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1290te:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1300:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1350:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1350p:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1370:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1370p:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1390:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1390p:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-1390t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2223:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2225:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2235:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2245:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2255:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2265:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2275:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-2295:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3235:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.3:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.1.1:*:*:*:*:*:*:*', 'cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.2.0:*:*:*:*:*:*:*']",0,0
CVE-2022-28709,Intel,0.00044,4.4,0.0,1.0,0.0,1.0,0,2022-08-18,1.0,2022-08-18,,,1.0,Improper access control in the firmware for some Intel(R) E810 Ethernet Controllers before version 1.6.1.9 may allow a privileged user to potentially enable denial of service via local access.,CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H,LOCAL,LOW,HIGH,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,0.8,3.6,['NVD-CWE-Other'],"['cpe:2.3:o:intel:ethernet_controller_e810_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:ethernet_controller_e810:-:*:*:*:*:*:*:*']",0,0
CVE-2017-5900,Netcomm,0.00081,5.4,0.0,1.0,0.0,1.0,1,2017-03-29,0.0,,0.0,,,Cross-site scripting (XSS) vulnerability in the NetComm NB16WV-02 router with firmware NB16WV_R0.09 allows remote authenticated users to inject arbitrary web script or HTML via the S801F0334 parameter to hdd.htm.,CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,LOW,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.3,2.7,['CWE-79'],"['cpe:2.3:h:netcomm:nb16wv-02:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netcomm:nb16wv-02_firmware:nb16wv_r0.09:*:*:*:*:*:*:*']",0,0
CVE-2018-14782,Netcomm,0.00098,7.5,0.0,1.0,0.0,1.0,1,2018-08-10,1.0,2018-08-09,,,1.0,NetComm Wireless G LTE Light Industrial M2M Router (NWL-25) with firmware 2.0.29.11 and prior. The device allows access to configuration files and profiles without authenticating the user.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,"['CWE-287', 'CWE-200']","['cpe:2.3:o:netcommwireless:nwl-25_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:netcommwireless:nwl-25:-:*:*:*:*:*:*:*']",0,0
CVE-2018-14783,Netcomm,0.00095,8.8,0.0,1.0,0.0,1.0,1,2018-08-10,1.0,2018-08-09,,,1.0,"NetComm Wireless G LTE Light Industrial M2M Router (NWL-25) with firmware 2.0.29.11 and prior. A cross-site request forgery condition can occur, allowing an attacker to change passwords of the device remotely.",CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-352'],"['cpe:2.3:o:netcommwireless:nwl-25_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:netcommwireless:nwl-25:-:*:*:*:*:*:*:*']",0,0
CVE-2018-14784,Netcomm,0.00069,6.1,0.0,1.0,0.0,1.0,1,2018-08-10,1.0,2018-08-09,,,1.0,"NetComm Wireless G LTE Light Industrial M2M Router (NWL-25) with firmware 2.0.29.11 and prior. The device is vulnerable to several cross-site scripting attacks, allowing a remote attacker to run arbitrary code on the device.",CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:netcommwireless:nwl-25_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:netcommwireless:nwl-25:-:*:*:*:*:*:*:*']",0,0
CVE-2018-14785,Netcomm,0.001,7.5,0.0,1.0,0.0,1.0,1,2018-08-10,1.0,2018-08-09,,,1.0,NetComm Wireless G LTE Light Industrial M2M Router (NWL-25) with firmware 2.0.29.11 and prior. The directory of the device is listed openly without authentication.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,"['CWE-200', 'CWE-548']","['cpe:2.3:o:netcommwireless:nwl-25_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:netcommwireless:nwl-25:-:*:*:*:*:*:*:*']",0,0
CVE-2017-6297,Mikrotik,0.00173,5.9,0.0,0.0,0.0,1.0,1,2017-02-27,0.0,,1.0,2017-02-23,,"The L2TP Client in MikroTik RouterOS versions 6.83.3 and 6.37.4 does not enable IPsec encryption after a reboot, which allows man-in-the-middle attackers to view transmitted data unencrypted and gain access to networks on the L2TP server by monitoring the packets for the transmitted data and obtaining the L2TP secret.",CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,HIGH,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,2.2,3.6,['CWE-311'],"['cpe:2.3:o:mikrotik:routeros:6.37.4:*:*:*:*:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.83.3:*:*:*:*:*:*:*']",0,0
CVE-2017-6444,Mikrotik,0.01557,7.5,1.0,1.0,0.0,1.0,1,2017-03-12,0.0,,0.0,,,"The MikroTik Router hAP Lite 6.25 has no protection mechanism for unsolicited TCP ACK packets in the case of a fast network connection, which allows remote attackers to cause a denial of service (CPU consumption) by sending many ACK packets. After the attacker stops the exploit, the CPU usage is 100% and the router requires a reboot for normal operation.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-400'],"['cpe:2.3:o:mikrotik:routeros:6.25:*:*:*:*:*:*:*', 'cpe:2.3:h:mikrotik:router_hap_lite:-:*:*:*:*:*:*:*']",1,0
CVE-2017-7285,Mikrotik,0.01187,7.5,1.0,0.0,0.0,1.0,1,2017-03-29,0.0,,0.0,,,"A vulnerability in the network stack of MikroTik Version 6.38.5 released 2017-03-09 could allow an unauthenticated remote attacker to exhaust all available CPU via a flood of TCP RST packets, preventing the affected router from accepting new TCP connections.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-400'],['cpe:2.3:o:mikrotik:routeros:6.38.5:*:*:*:*:*:*:*'],1,0
CVE-2017-8338,Mikrotik,0.00934,7.5,0.0,0.0,0.0,1.0,1,2017-05-18,0.0,,0.0,,,"A vulnerability in MikroTik Version 6.38.5 could allow an unauthenticated remote attacker to exhaust all available CPU via a flood of UDP packets on port 500 (used for L2TP over IPsec), preventing the affected router from accepting new connections; all devices will be disconnected from the router and all logs removed automatically.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-400'],['cpe:2.3:o:mikrotik:routeros:6.38.5:*:*:*:*:*:*:*'],0,0
CVE-2018-1156,Mikrotik,0.02262,8.8,0.0,0.0,0.0,1.0,1,2018-08-23,1.0,2018-08-22,,,1.0,Mikrotik RouterOS before 6.42.7 and 6.40.9 is vulnerable to stack buffer overflow through the license upgrade interface. This vulnerability could theoretically allow a remote authenticated attacker execute arbitrary code on the system.,CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-787'],"['cpe:2.3:o:mikrotik:routeros:*:*:*:*:ltr:*:*:*', 'cpe:2.3:o:mikrotik:routeros:*:*:*:*:*:*:*:*']",0,0
CVE-2018-1158,Mikrotik,0.00511,6.5,0.0,0.0,0.0,1.0,1,2018-08-23,1.0,2018-08-22,,,1.0,Mikrotik RouterOS before 6.42.7 and 6.40.9 is vulnerable to a stack exhaustion vulnerability. An authenticated remote attacker can crash the HTTP server via recursive parsing of JSON.,CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.8,3.6,['CWE-674'],"['cpe:2.3:o:mikrotik:routeros:*:*:*:*:*:*:*:*', 'cpe:2.3:o:mikrotik:routeros:*:*:*:*:ltr:*:*:*']",0,0
CVE-2018-14847,Mikrotik,0.97442,9.1,1.0,0.0,0.0,1.0,1,2018-08-02,0.0,,0.0,,,MikroTik RouterOS through 6.42 allows unauthenticated remote attackers to read arbitrary files and remote authenticated attackers to write arbitrary files due to a directory traversal vulnerability in the WinBox interface.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,NONE,CRITICAL,3.9,5.2,['CWE-22'],['cpe:2.3:o:mikrotik:routeros:*:*:*:*:*:*:*:*'],1,0
CVE-2018-5951,Mikrotik,0.00115,7.5,0.0,0.0,0.0,1.0,1,2020-03-02,0.0,,0.0,,,An issue was discovered in Mikrotik RouterOS. Crafting a packet that has a size of 1 byte and sending it to an IPv6 address of a RouterOS box with IP Protocol 97 will cause RouterOS to reboot imminently. All versions of RouterOS that supports EoIPv6 are vulnerable to this attack.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['NVD-CWE-noinfo'],['cpe:2.3:o:mikrotik:routeros:*:*:*:*:*:*:*:*'],0,0
CVE-2018-7445,Mikrotik,0.82209,9.8,1.0,0.0,0.0,1.0,1,2018-03-19,1.0,2018-03-12,,,1.0,"A buffer overflow was found in the MikroTik RouterOS SMB service when processing NetBIOS session request messages. Remote attackers with access to the service can exploit this vulnerability and gain code execution on the system. The overflow occurs before authentication takes place, so it is possible for an unauthenticated remote attacker to exploit it. All architectures and all devices running RouterOS before versions 6.41.3/6.42rc27 are vulnerable.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-119'],"['cpe:2.3:o:mikrotik:routeros:*:*:*:*:*:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.4.2:rc11:*:*:*:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.4.2:rc12:*:*:*:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.4.2:rc14:*:*:*:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.4.2:rc15:*:*:*:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.4.2:rc18:*:*:*:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.4.2:rc2:*:*:*:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.4.2:rc20:*:*:*:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.4.2:rc23:*:*:*:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.4.2:rc24:*:*:*:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.4.2:rc27:*:*:*:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.4.2:rc5:*:*:*:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.4.2:rc6:*:*:*:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.4.2:rc9:*:*:*:*:*:*']",1,0
CVE-2019-13954,Mikrotik,0.00078,6.5,0.0,0.0,0.0,1.0,1,2019-07-26,1.0,2019-07-20,,,1.0,"Mikrotik RouterOS before 6.44.5 (long-term release tree) is vulnerable to memory exhaustion. By sending a crafted HTTP request, an authenticated remote attacker can crash the HTTP server and in some circumstances reboot the system. Malicious code cannot be injected.",CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.8,3.6,['CWE-770'],"['cpe:2.3:o:mikrotik:routeros:*:*:*:*:*:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.45:*:*:*:*:*:*:*']",0,0
CVE-2019-13955,Mikrotik,0.00078,6.5,0.0,0.0,0.0,1.0,1,2019-07-26,1.0,2019-07-20,,,1.0,"Mikrotik RouterOS before 6.44.5 (long-term release tree) is vulnerable to stack exhaustion. By sending a crafted HTTP request, an authenticated remote attacker can crash the HTTP server via recursive parsing of JSON. Malicious code cannot be injected.",CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.8,3.6,['CWE-674'],"['cpe:2.3:o:mikrotik:routeros:*:*:*:*:*:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.45:*:*:*:*:*:*:*']",0,0
CVE-2019-16160,Mikrotik,0.00635,7.5,0.0,0.0,0.0,1.0,1,2020-10-07,1.0,2019-08-26,,,1.0,An integer underflow in the SMB server of MikroTik RouterOS before 6.45.5 allows remote unauthenticated attackers to crash the service.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-191'],['cpe:2.3:o:mikrotik:routeros:*:*:*:*:*:*:*:*'],0,0
CVE-2019-3943,Mikrotik,0.00779,8.1,0.0,0.0,0.0,1.0,1,2019-04-10,1.0,2019-02-13,,,1.0,"MikroTik RouterOS versions Stable 6.43.12 and below, Long-term 6.42.12 and below, and Testing 6.44beta75 and below are vulnerable to an authenticated, remote directory traversal via the HTTP or Winbox interfaces. An authenticated, remote attack can use this vulnerability to read and write files outside of the sandbox directory (/rw/disk).",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,NONE,HIGH,2.8,5.2,"['CWE-22', 'CWE-23']","['cpe:2.3:o:mikrotik:routeros:*:*:*:*:ltr:*:*:*', 'cpe:2.3:o:mikrotik:routeros:*:*:*:*:-:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.41:rc31:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.41:rc32:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.41:rc34:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.41:rc37:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.41:rc38:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.41:rc44:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.41:rc47:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.41:rc50:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.41:rc52:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.41:rc56:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.41:rc61:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.41:rc66:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.42:rc11:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.42:rc12:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.42:rc14:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.42:rc15:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.42:rc18:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.42:rc2:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.42:rc20:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.42:rc23:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.42:rc24:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.42:rc27:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.42:rc28:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.42:rc30:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.42:rc35:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.42:rc37:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.42:rc39:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.42:rc41:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.42:rc43:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.42:rc46:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.42:rc48:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.42:rc49:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.42:rc5:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.42:rc52:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.42:rc56:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.42:rc6:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.42:rc9:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.43:rc11:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.43:rc12:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.43:rc14:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.43:rc17:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.43:rc19:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.43:rc21:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.43:rc23:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.43:rc27:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.43:rc29:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.43:rc3:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.43:rc32:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.43:rc34:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.43:rc4:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.43:rc40:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.43:rc42:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.43:rc44:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.43:rc45:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.43:rc5:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.43:rc51:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.43:rc56:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.43:rc6:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.43:rc64:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.43:rc66:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.43:rc7:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.44:beta14:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.44:beta17:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.44:beta20:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.44:beta28:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.44:beta39:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.44:beta40:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.44:beta50:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.44:beta54:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.44:beta6:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.44:beta61:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.44:beta75:*:*:testing:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.44:beta9:*:*:testing:*:*:*']",0,0
CVE-2019-3976,Mikrotik,0.00128,8.8,0.0,0.0,0.0,1.0,1,2019-10-29,1.0,2019-10-28,,,1.0,"RouterOS 6.45.6 Stable, RouterOS 6.44.5 Long-term, and below are vulnerable to an arbitrary directory creation vulnerability via the upgrade package's name field. If an authenticated user installs a malicious package then a directory could be created and the developer shell could be enabled.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,"['CWE-22', 'CWE-23']","['cpe:2.3:o:mikrotik:routeros:*:*:*:*:ltr:*:*:*', 'cpe:2.3:o:mikrotik:routeros:*:*:*:*:-:*:*:*']",0,0
CVE-2019-3978,Mikrotik,0.01228,7.5,1.0,0.0,0.0,1.0,1,2019-10-29,1.0,2019-10-28,,,1.0,"RouterOS versions 6.45.6 Stable, 6.44.5 Long-term, and below allow remote unauthenticated attackers to trigger DNS queries via port 8291. The queries are sent from the router to a server of the attacker's choice. The DNS responses are cached by the router, potentially resulting in cache poisoning",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,HIGH,NONE,HIGH,3.9,3.6,['CWE-306'],"['cpe:2.3:o:mikrotik:routeros:*:*:*:*:ltr:*:*:*', 'cpe:2.3:o:mikrotik:routeros:*:*:*:*:-:*:*:*']",1,0
CVE-2020-10364,Mikrotik,0.00819,7.5,0.0,1.0,0.0,1.0,1,2020-03-23,0.0,,0.0,,,"The SSH daemon on MikroTik routers through v6.44.3 could allow remote attackers to generate CPU activity, trigger refusal of new authorized connections, and cause a reboot via connect and write system calls, because of uncontrolled resource management.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-770'],"['cpe:2.3:o:mikrotik:routeros:*:*:*:*:*:*:*:*', 'cpe:2.3:h:mikrotik:ccr1009-7g-1c-1s\\+:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mikrotik:ccr1009-7g-1c-1s\\+pc:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mikrotik:ccr1009-7g-1c-pc:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mikrotik:ccr1016-12g:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mikrotik:ccr1016-12s-1s\\+:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mikrotik:ccr1036-12g-4s:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mikrotik:ccr1036-12g-4s-em:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mikrotik:ccr1036-8g-2s\\+:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mikrotik:ccr1036-8g-2s\\+em:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mikrotik:ccr1072-1g-8s\\+:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mikrotik:hex:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mikrotik:hex_lite:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mikrotik:hex_poe:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mikrotik:hex_poe_lite:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mikrotik:hex_s:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mikrotik:powerbox:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mikrotik:powerbox_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mikrotik:rb1100ahx4:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mikrotik:rb1100ahx4:-:*:dude:*:*:*:*:*', 'cpe:2.3:h:mikrotik:rb2011il-in:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mikrotik:rb2011il-rm:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mikrotik:rb2011ils-in:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mikrotik:rb2011uias-in:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mikrotik:rb2011uias-rm:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mikrotik:rb3011uias-rm:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mikrotik:rb4011igs\\+rm:-:*:*:*:*:*:*:*']",0,0
CVE-2020-13118,Mikrotik,0.0278,9.8,1.0,0.0,1.0,0.0,1,2020-05-16,0.0,,0.0,,,An issue was discovered in Mikrotik-Router-Monitoring-System through 2018-10-22. SQL Injection exists in check_community.php via the parameter community.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-89'],['cpe:2.3:a:mikrotik-router-monitoring-system_project:mikrotik-router-monitoring-system:*:*:*:*:*:*:*:*'],1,0
CVE-2020-20212,Mikrotik,0.00144,6.5,0.0,0.0,0.0,1.0,1,2021-07-07,0.0,,0.0,,,Mikrotik RouterOs 6.44.5 (long-term tree) suffers from a memory corruption vulnerability in the /nova/bin/console process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference).,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.8,3.6,['CWE-476'],['cpe:2.3:o:mikrotik:routeros:6.44.5:*:*:*:ltr:*:*:*'],0,0
CVE-2020-20213,Mikrotik,0.00365,6.5,0.0,0.0,0.0,1.0,1,2021-07-07,1.0,2021-05-04,,,1.0,Mikrotik RouterOs 6.44.5 (long-term tree) suffers from an stack exhaustion vulnerability in the /nova/bin/net process. An authenticated remote attacker can cause a Denial of Service due to overloading the systems CPU.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.8,3.6,['CWE-674'],['cpe:2.3:o:mikrotik:routeros:6.44.5:*:*:*:ltr:*:*:*'],0,0
CVE-2020-20214,Mikrotik,0.00411,6.5,0.0,0.0,0.0,1.0,1,2021-05-18,0.0,,0.0,,,Mikrotik RouterOs 6.44.6 (long-term tree) suffers from an assertion failure vulnerability in the btest process. An authenticated remote attacker can cause a Denial of Service due to an assertion failure via a crafted packet.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.8,3.6,['CWE-617'],['cpe:2.3:o:mikrotik:routeros:6.44.6:*:*:*:ltr:*:*:*'],0,0
CVE-2020-20216,Mikrotik,0.00142,6.5,0.0,0.0,0.0,1.0,1,2021-07-07,1.0,2021-05-04,,,1.0,Mikrotik RouterOs 6.44.6 (long-term tree) suffers from a memory corruption vulnerability in the /nova/bin/graphing process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference).,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.8,3.6,['CWE-476'],['cpe:2.3:o:mikrotik:routeros:6.44.6:*:*:*:ltr:*:*:*'],0,0
CVE-2020-20219,Mikrotik,0.00201,6.5,0.0,0.0,0.0,1.0,1,2021-07-21,1.0,2021-05-04,,,1.0,Mikrotik RouterOs 6.44.6 (long-term tree) suffers from a memory corruption vulnerability in the /nova/bin/igmp-proxy process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference).,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.8,3.6,['CWE-787'],['cpe:2.3:o:mikrotik:routeros:6.44.6:*:*:*:ltr:*:*:*'],0,0
CVE-2020-20252,Mikrotik,0.00201,6.5,0.0,0.0,0.0,1.0,1,2021-07-13,1.0,2020-06-02,,,1.0,Mikrotik RouterOs before stable version 6.47 suffers from a memory corruption vulnerability in the /nova/bin/lcdstat process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference).,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.8,3.6,['CWE-476'],['cpe:2.3:o:mikrotik:routeros:*:*:*:*:*:*:*:*'],0,0
CVE-2020-20265,Mikrotik,0.0014,6.5,0.0,0.0,0.0,1.0,1,2021-05-11,1.0,2021-05-05,,,1.0,Mikrotik RouterOs before 6.47 (stable tree) suffers from a memory corruption vulnerability in the /ram/pckg/wireless/nova/bin/wireless process. An authenticated remote attacker can cause a Denial of Service due via a crafted packet.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.8,3.6,['CWE-787'],['cpe:2.3:o:mikrotik:routeros:*:*:*:*:*:*:*:*'],0,0
CVE-2020-5720,Mikrotik,0.00072,5.9,0.0,0.0,0.0,1.0,1,2020-02-06,1.0,2020-02-06,,,1.0,MikroTik WinBox before 3.21 is vulnerable to a path traversal vulnerability that allows creation of arbitrary files wherevere WinBox has write permissions. WinBox is vulnerable to this attack if it connects to a malicious endpoint or if an attacker mounts a man in the middle attack.,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N,NETWORK,HIGH,NONE,NONE,UNCHANGED,NONE,HIGH,NONE,MEDIUM,2.2,3.6,['CWE-22'],['cpe:2.3:o:mikrotik:winbox:*:*:*:*:*:*:*:*'],0,0
CVE-2017-20149,Mikrotik,0.00405,9.8,0.0,0.0,0.0,1.0,0,2022-10-15,1.0,2017-09-28,,,1.0,"The Mikrotik RouterOS web server allows memory corruption in releases before Stable 6.38.5 and Long-term 6.37.5, aka Chimay-Red. A remote and unauthenticated user can trigger the vulnerability by sending a crafted HTTP request. An attacker can use this vulnerability to execute arbitrary code on the affected system, as exploited in the wild in mid-2017 and later.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:o:mikrotik:routeros:*:*:*:*:ltr:*:*:*', 'cpe:2.3:o:mikrotik:routeros:*:*:*:*:*:*:*:*']",0,0
CVE-2020-22844,Mikrotik,0.00109,7.5,0.0,0.0,0.0,1.0,0,2022-02-28,1.0,2020-07-17,,,1.0,A buffer overflow in Mikrotik RouterOS 6.47 allows unauthenticated attackers to cause a denial of service (DOS) via crafted SMB requests.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-401'],['cpe:2.3:o:mikrotik:routeros:6.47:*:*:*:*:*:*:*'],0,0
CVE-2020-22845,Mikrotik,0.00109,7.5,0.0,0.0,0.0,1.0,0,2022-02-28,1.0,2020-07-17,,,1.0,A buffer overflow in Mikrotik RouterOS 6.47 allows unauthenticated attackers to cause a denial of service (DOS) via crafted FTP requests.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-120'],['cpe:2.3:o:mikrotik:routeros:6.47:*:*:*:*:*:*:*'],0,0
CVE-2021-36613,Mikrotik,0.00103,6.5,0.0,0.0,0.0,1.0,0,2022-05-11,1.0,2022-05-30,,,0.0,Mikrotik RouterOs before stable 6.48.2 suffers from a memory corruption vulnerability in the ptp process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference).,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.8,3.6,['CWE-476'],['cpe:2.3:o:mikrotik:routeros:*:*:*:*:*:*:*:*'],0,0
CVE-2021-36614,Mikrotik,0.00103,6.5,0.0,0.0,0.0,1.0,0,2022-05-11,1.0,2022-05-30,,,0.0,Mikrotik RouterOs before stable 6.48.2 suffers from a memory corruption vulnerability in the tr069-client process. An authenticated remote attacker can cause a Denial of Service (NULL pointer dereference).,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.8,3.6,['CWE-476'],['cpe:2.3:o:mikrotik:routeros:*:*:*:*:*:*:*:*'],0,0
CVE-2021-41987,Mikrotik,0.00385,8.1,0.0,0.0,0.0,1.0,0,2022-03-16,0.0,,0.0,,,"In the SCEP Server of RouterOS in certain Mikrotik products, an attacker can trigger a heap-based buffer overflow that leads to remote code execution. The attacker must know the scep_server_name value. This affects RouterOS 6.46.8, 6.47.9, and 6.47.10.",CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,HIGH,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.2,5.9,['CWE-787'],"['cpe:2.3:o:mikrotik:routeros:6.46.8:*:*:*:*:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.47.9:*:*:*:*:*:*:*', 'cpe:2.3:o:mikrotik:routeros:6.47.10:*:*:*:*:*:*:*']",0,0
CVE-2022-34960,Mikrotik,0.00326,9.8,0.0,0.0,0.0,1.0,0,2022-08-25,1.0,2022-08-05,,,1.0,"The container package in MikroTik RouterOS 7.4beta4 allows an attacker to create mount points pointing to symbolic links, which resolve to locations on the host device. This allows the attacker to mount any arbitrary file to any location on the host.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-59'],['cpe:2.3:o:mikrotik:routeros:7.4:beta4:*:*:-:*:*:*'],0,0
CVE-2022-36522,Mikrotik,0.00066,6.5,0.0,0.0,0.0,1.0,0,2022-08-26,0.0,,0.0,,,Mikrotik RouterOs through stable v6.48.3 was discovered to contain an assertion failure in the component /advanced-tools/nova/bin/netwatch. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.8,3.6,['CWE-617'],['cpe:2.3:o:mikrotik:routeros:*:*:*:*:*:*:*:*'],0,0
CVE-2017-6552,Sagemcom,0.02453,7.5,1.0,1.0,0.0,1.0,1,2017-03-09,0.0,,0.0,,,"Livebox 3 Sagemcom SG30_sip-fr-5.15.8.1 devices have an insufficiently large default value for the maximum IPv6 routing table size: it can be filled within minutes. An attacker can exploit this issue to render the affected system unresponsive, resulting in a denial-of-service condition for telephone, Internet, and TV services.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-400'],"['cpe:2.3:o:sagemcom:livebox_firmware:5.15.8.1:*:*:*:*:*:*:*', 'cpe:2.3:h:sagemcom:livebox:-:*:*:*:*:*:*:*']",1,0
CVE-2019-19494,Sagemcom,0.15168,8.8,0.0,1.0,0.0,1.0,1,2020-01-09,0.0,,0.0,,,"Broadcom based cable modems across multiple vendors are vulnerable to a buffer overflow, which allows a remote attacker to execute arbitrary code at the kernel level via JavaScript run in a victim's browser. Examples of affected products include Sagemcom F@st 3890 prior to 50.10.21_T4, Sagemcom F@st 3890 prior to 05.76.6.3f, Sagemcom F@st 3686 3.428.0, Sagemcom F@st 3686 4.83.0, NETGEAR CG3700EMR 2.01.05, NETGEAR CG3700EMR 2.01.03, NETGEAR C6250EMR 2.01.05, NETGEAR C6250EMR 2.01.03, Technicolor TC7230 STEB 01.25, COMPAL 7284E 5.510.5.11, and COMPAL 7486E 5.510.5.11.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-120'],"['cpe:2.3:o:sagemcom:f\\@st_3890_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:sagemcom:f\\@st_3890:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sagemcom:f\\@st_3890_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:sagemcom:f\\@st_3890:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sagemcom:f\\@st_3686_firmware:3.428.0:*:*:*:*:*:*:*', 'cpe:2.3:o:sagemcom:f\\@st_3686_firmware:4.83.0:*:*:*:*:*:*:*', 'cpe:2.3:h:sagemcom:f\\@st_3686:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netgear:cg3700emr_firmware:2.01.03:*:*:*:*:*:*:*', 'cpe:2.3:o:netgear:cg3700emr_firmware:2.01.05:*:*:*:*:*:*:*', 'cpe:2.3:h:netgear:cg3700emr:-:*:*:*:*:*:*:*', 'cpe:2.3:o:netgear:c6250emr_firmware:2.01.03:*:*:*:*:*:*:*', 'cpe:2.3:o:netgear:c6250emr_firmware:2.01.05:*:*:*:*:*:*:*', 'cpe:2.3:h:netgear:c6250emr:-:*:*:*:*:*:*:*', 'cpe:2.3:o:technicolor:tc7230_steb_firmware:01.25:*:*:*:*:*:*:*', 'cpe:2.3:h:technicolor:tc7230_steb:-:*:*:*:*:*:*:*', 'cpe:2.3:o:compal:7284e_firmware:5.510.5.11:*:*:*:*:*:*:*', 'cpe:2.3:h:compal:7284e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:compal:7486e_firmware:5.510.5.11:*:*:*:*:*:*:*', 'cpe:2.3:h:compal:7486e:-:*:*:*:*:*:*:*']",0,0
CVE-2020-24034,Sagemcom,0.0106,8.8,0.0,1.0,0.0,1.0,1,2020-09-01,0.0,,0.0,,,"Sagemcom F@ST 5280 routers using firmware version 1.150.61 have insecure deserialization that allows any authenticated user to perform a privilege escalation to any other user. By making a request with valid sess_id, nonce, and ha1 values inside of the serialized session cookie, an attacker may alter the user value inside of this cookie, and assume the role and permissions of the user specified. By assuming the role of the user internal, which is inaccessible to end users by default, the attacker gains the permissions of the internal account, which includes the ability to flash custom firmware to the router, allowing the attacker to achieve a complete compromise.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-502'],"['cpe:2.3:h:sagemcom:f\\@st_5280_router:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sagemcom:f\\@st_5280_router_firmware:1.150.61:*:*:*:*:*:*:*']",0,0
CVE-2019-9555,Sagemcom,0.00084,5.3,0.0,1.0,0.0,1.0,0,2019-03-05,0.0,,1.0,2019-03-04,,"Sagemcom F@st 5260 routers using firmware version 0.4.39, in WPA mode, default to using a PSK that is generated from a 2-part wordlist of known values and a nonce with insufficient entropy. The number of possible PSKs is about 1.78 billion, which is too small.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,LOW,NONE,NONE,MEDIUM,3.9,1.4,['CWE-331'],"['cpe:2.3:o:sagemcom:f\\@st_5260_firmware:0.4.39:*:*:*:*:*:*:*', 'cpe:2.3:h:sagemcom:f\\@st_5260:-:*:*:*:*:*:*:*']",0,0
CVE-2020-21733,Sagemcom,0.00178,6.1,0.0,1.0,0.0,1.0,0,2020-09-14,0.0,,0.0,,,"Sagemcom F@ST3686 v1.0 HUN 3.97.0 has XSS via RgDiagnostics.asp, RgDdns.asp, RgFirewallEL.asp, RgVpnL2tpPptp.asp.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:sagemcom:f\\@st_3686_firmware:1.0_hun_3.97.0:*:*:*:*:*:*:*', 'cpe:2.3:h:sagemcom:f\\@st_3686:-:*:*:*:*:*:*:*']",0,0
CVE-2020-29138,Sagemcom,0.00162,5.3,0.0,1.0,0.0,1.0,0,2020-11-27,0.0,,0.0,,,"Incorrect Access Control in the configuration backup path in SAGEMCOM F@ST3486 NET DOCSIS 3.0, software NET_4.109.0, allows remote unauthenticated users to download the router configuration file via the /backupsettings.conf URI, when any valid session is running.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,LOW,NONE,NONE,MEDIUM,3.9,1.4,['CWE-306'],"['cpe:2.3:o:sagemcom:f\\@st_3486_router_firmware:4.109.0:*:*:*:*:*:*:*', 'cpe:2.3:h:sagemcom:f\\@st_3486_router:3.0:*:*:*:*:*:*:*']",0,0
CVE-2021-3304,Sagemcom,0.00367,9.8,0.0,1.0,0.0,1.0,0,2021-01-26,0.0,,0.0,,,Sagemcom F@ST 3686 v2 3.495 devices have a buffer overflow via a long sessionKey to the goform/login URI.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-120'],"['cpe:2.3:h:sagemcom:f\\@st_3686:v2:*:*:*:*:*:*:*', 'cpe:2.3:o:sagemcom:f\\@st_3686_firmware:3.495:*:*:*:*:*:*:*']",0,0
CVE-2017-8087,AVM,0.00076,2.4,0.0,1.0,0.0,1.0,1,2019-10-22,0.0,,1.0,2019-10-17,,Information Leakage in PPPoE Packet Padding in AVM Fritz!Box 7490 with Firmware versions Fritz!OS 6.80 and 6.83 allows physically proximate attackers to view slices of previously transmitted packets or portions of memory via via unspecified vectors.,CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,PHYSICAL,LOW,NONE,NONE,UNCHANGED,LOW,NONE,NONE,LOW,0.9,1.4,['CWE-200'],"['cpe:2.3:h:avm:fritz\\!box_7490:-:*:*:*:*:*:*:*', 'cpe:2.3:o:avm:fritz\\!os:6.80:*:*:*:*:*:*:*', 'cpe:2.3:o:avm:fritz\\!os:6.83:*:*:*:*:*:*:*']",0,0
CVE-2020-26887,AVM,0.0012,7.8,1.0,1.0,0.0,1.0,1,2020-10-23,1.0,2020-08-06,,,1.0,FRITZ!OS before 7.21 on FRITZ!Box devices allows a bypass of a DNS Rebinding protection mechanism.,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:avm:fritz\\!box_7490_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:avm:fritz\\!box_7490:-:*:*:*:*:*:*:*']",1,0
CVE-2017-9828,Vivotek,0.01521,9.8,0.0,1.0,0.0,1.0,1,2017-06-23,0.0,,0.0,,,"'/cgi-bin/admin/testserver.cgi' of the web service in most of the VIVOTEK Network Cameras is vulnerable to shell command injection, which allows remote attackers to execute any shell command as root via a crafted HTTP request. This vulnerability is already verified on VIVOTEK Network Camera IB8369/FD8164/FD816BA; most others have similar firmware that may be affected. An attack uses shell metacharacters in the senderemail parameter.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-78'],"['cpe:2.3:o:vivotek:network_camera_ib8369_firmware:ib8369-vvtk-0102a:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:network_camera_ib8369:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:network_camera_fd8164_firmware:fd8164-_vvtk-0200b:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:network_camera_fd8164:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:network_camera_fd816ba_firmware:fd816ba-vvtk-010101.:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:network_camera_fd816ba:-:*:*:*:*:*:*:*']",0,0
CVE-2017-9829,Vivotek,0.27642,7.5,0.0,1.0,0.0,1.0,1,2017-06-23,0.0,,0.0,,,"'/cgi-bin/admin/downloadMedias.cgi' of the web service in most of the VIVOTEK Network Cameras is vulnerable, which allows remote attackers to read any file on the camera's Linux filesystem via a crafted HTTP request containing "".."" sequences. This vulnerability is already verified on VIVOTEK Network Camera IB8369/FD8164/FD816BA; most others have similar firmware that may be affected.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-22'],"['cpe:2.3:o:vivotek:network_camera_ib8369_firmware:ib8369-vvtk-0102a:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:network_camera_ib8369:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:network_camera_fd8164_firmware:fd8164-_vvtk-0200b:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:network_camera_fd8164:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:network_camera_fd816ba_firmware:fd816ba-vvtk-010101.:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:network_camera_fd816ba:-:*:*:*:*:*:*:*']",0,0
CVE-2018-14494,Vivotek,0.00327,9.8,0.0,1.0,0.0,1.0,1,2019-07-10,0.0,,0.0,,,"Vivotek FD8136 devices allow Remote Command Injection, related to BusyBox and wget. NOTE: the vendor sent a clarification on 2019-09-17 explaining that, although this CVE was first populated in July 2019, it is a historical vulnerability that does not apply to any current or recent Vivotek hardware or firmware",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-78'],"['cpe:2.3:o:vivotek:fd8136_firmware:0301a:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8136:-:*:*:*:*:*:*:*']",0,0
CVE-2018-14495,Vivotek,0.081,9.8,0.0,1.0,0.0,1.0,1,2019-07-10,0.0,,0.0,,,"Vivotek FD8136 devices allow Remote Command Injection, aka ""another command injection vulnerability in our target device,"" a different issue than CVE-2018-14494. NOTE: The vendor has disputed this as a vulnerability and states that the issue does not cause a web server crash or have any other affect on it's performance",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-78'],"['cpe:2.3:o:vivotek:fd8136_firmware:0301a:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8136:-:*:*:*:*:*:*:*']",0,0
CVE-2018-14496,Vivotek,0.11267,9.8,0.0,1.0,0.0,1.0,1,2019-07-10,0.0,,0.0,,,"Vivotek FD8136 devices allow remote memory corruption and remote code execution because of a stack-based buffer overflow, related to sprintf, vlocal_buff_4326, and set_getparam.cgi. NOTE: The vendor has disputed this as a vulnerability and states that the issue does not cause a web server crash or have any other affect on it's performance",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:o:vivotek:fd8136_firmware:0301a:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8136:-:*:*:*:*:*:*:*']",0,0
CVE-2018-14768,Vivotek,0.00316,8.8,0.0,1.0,0.0,0.0,1,2018-08-29,1.0,2018-08-24,,,1.0,"Various VIVOTEK FD8*, FD9*, FE9*, IB8*, IB9*, IP9*, IZ9*, MS9*, SD9*, and other devices before XXXXXX-VVTK-xx06a allow remote attackers to execute arbitrary code.",CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['NVD-CWE-noinfo'],['cpe:2.3:h:vivotek:camera:-:*:*:*:*:*:*:*'],0,0
CVE-2018-14769,Vivotek,0.00071,8.8,0.0,1.0,0.0,0.0,1,2018-09-05,1.0,2018-08-24,,,1.0,VIVOTEK FD8177 devices before XXXXXX-VVTK-xx06a allow CSRF.,CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-352'],['cpe:2.3:h:vivotek:camera:-:*:*:*:*:*:*:*'],0,0
CVE-2018-14770,Vivotek,0.04214,8.8,0.0,1.0,0.0,0.0,1,2018-09-05,1.0,2018-08-24,,,1.0,"VIVOTEK FD8177 devices before XXXXXX-VVTK-xx06a allow remote attackers to execute arbitrary code (issue 1 of 2) via the ONVIF interface, (/onvif/device_service).",CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['NVD-CWE-noinfo'],['cpe:2.3:h:vivotek:camera:-:*:*:*:*:*:*:*'],0,0
CVE-2018-14771,Vivotek,0.04214,8.8,0.0,1.0,0.0,0.0,1,2018-09-05,1.0,2018-08-24,,,1.0,VIVOTEK FD8177 devices before XXXXXX-VVTK-xx06a allow remote attackers to execute arbitrary code (issue 2 of 2) via eventscript.cgi.,CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['NVD-CWE-noinfo'],['cpe:2.3:h:vivotek:camera:-:*:*:*:*:*:*:*'],0,0
CVE-2018-18004,Vivotek,0.00193,5.3,0.0,1.0,0.0,0.0,1,2019-01-03,1.0,2018-12-28,,,1.0,Incorrect Access Control in mod_inetd.cgi in VIVOTEK Network Camera Series products with firmware before XXXXXX-VVTK-0X09a allows remote attackers to enable arbitrary system services via a URL parameter.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,LOW,NONE,MEDIUM,3.9,1.4,['CWE-862'],['cpe:2.3:h:vivotek:camera:-:*:*:*:*:*:*:*'],0,0
CVE-2018-18005,Vivotek,0.00168,6.1,0.0,1.0,0.0,0.0,1,2019-01-03,1.0,2018-12-28,,,1.0,Cross-site scripting in event_script.js in VIVOTEK Network Camera Series products with firmware 0x06x to 0x08x allows remote attackers to execute arbitrary JavaScript via a URL query string parameter.,CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],['cpe:2.3:h:vivotek:camera:-:*:*:*:*:*:*:*'],0,0
CVE-2018-18244,Vivotek,0.00168,6.1,0.0,1.0,0.0,0.0,1,2019-01-03,1.0,2018-12-28,,,1.0,Cross-site scripting in syslog.html in VIVOTEK Network Camera Series products with firmware 0x06x to 0x08x allows remote attackers to execute arbitrary JavaScript code via an HTTP Referer Header.,CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],['cpe:2.3:h:vivotek:camera:-:*:*:*:*:*:*:*'],0,0
CVE-2019-10256,Vivotek,0.00244,9.8,0.0,1.0,0.0,0.0,1,2019-09-10,1.0,2019-07-24,,,1.0,An authentication bypass vulnerability in VIVOTEK IPCam versions prior to 0x13a was found.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['NVD-CWE-noinfo'],['cpe:2.3:h:vivotek:camera:-:*:*:*:*:*:*:*'],0,0
CVE-2019-14457,Vivotek,0.00356,9.8,0.0,1.0,0.0,0.0,1,2019-09-10,1.0,2019-09-17,,,0.0,VIVOTEK IP Camera devices with firmware before 0x20x have a stack-based buffer overflow via a crafted HTTP header.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],['cpe:2.3:h:vivotek:camera:-:*:*:*:*:*:*:*'],0,0
CVE-2019-14458,Vivotek,0.00223,7.5,0.0,1.0,0.0,0.0,1,2019-09-18,1.0,2019-09-17,,,1.0,VIVOTEK IP Camera devices with firmware before 0x20x allow a denial of service via a crafted HTTP header.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['NVD-CWE-noinfo'],['cpe:2.3:h:vivotek:camera:-:*:*:*:*:*:*:*'],0,0
CVE-2020-11949,Vivotek,0.00065,6.5,0.0,1.0,0.0,1.0,1,2020-05-28,1.0,2020-05-26,,,1.0,"testserver.cgi of the web service on VIVOTEK Network Cameras before XXXXX-VVTK-2.2002.xx.01x (and before XXXXX-VVTK-0XXXX_Beta2) allows an authenticated user to obtain arbitrary files from a camera's local filesystem. For example, this affects IT9388-HT devices.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,2.8,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:vivotek:cc9381-hv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:cc9381-hv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9360-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9360-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9368-htv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9368-htv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9380-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9380-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9388-htv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9388-htv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9360-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9360-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9368-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9368-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9380-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9380-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9388-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9388-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:it9360-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:it9360-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:it9380-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:it9380-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:it9388-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:it9388-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:md9560-dh_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:md9560-dh:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:md9560-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:md9560-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9366-hv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9366-hv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9166-hn_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9166-hn:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fe9380-hv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fe9380-hv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:cc8160_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:cc8160:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:cc8160\\(hs\\)_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:cc8160\\(hs\\):-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:cc8370-hv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:cc8370-hv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:cc8371-hv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:cc8371-hv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:cd8371-hntv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:cd8371-hntv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:cd8371-hnvf2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:cd8371-hnvf2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd8166a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8166a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd8166a-n_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8166a-n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd8167a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8167a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd8169a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8169a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd8367a-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8367a-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd8369a-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8369a-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd816ba-hf2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd816ba-hf2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd836ba-hvf2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd836ba-hvf2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd836ba-htv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd836ba-htv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd836ba-ehvf2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd836ba-ehvf2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd816ba-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd816ba-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd836ba-ehtv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd836ba-ehtv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib836ba-ehf3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib836ba-ehf3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib836ba-eht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib836ba-eht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib836ba-hf3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib836ba-hf3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib836ba-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib836ba-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd816b-hf2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd816b-hf2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd816b-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd816b-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd836b-ehtv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd836b-ehtv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd836b-ehvf2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd836b-ehvf2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd836b-htv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd836b-htv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd836b-hvf2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd836b-hvf2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib836b-ehf3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib836b-ehf3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib836b-eht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib836b-eht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib836b-hf3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib836b-hf3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib836b-hrf3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib836b-hrf3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib836b-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib836b-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd816ca-hf2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd816ca-hf2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd816c-hf2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd816c-hf2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd8182-f1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8182-f1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd8182-f2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8182-f2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd8182-t_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8182-t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd8382-etv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8382-etv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd8382-evf2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8382-evf2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd8382-tv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8382-tv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd8382-vf2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8382-vf2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib8382-ef3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib8382-ef3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib8382-et_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib8382-et:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib8382-f3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib8382-f3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib8382-t_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib8382-t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd8366-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8366-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib8367a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib8367a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib8369a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib8369a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ip8166_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ip8166:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:md8563-deh_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:md8563-deh:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:md8563-eh_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:md8563-eh:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:md8564-eh_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:md8564-eh:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:md8565-n_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:md8565-n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:vc8101_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:vc8101:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:vs8100-v2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:vs8100-v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ip8160_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ip8160:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ip8160-w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ip8160-w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib8360_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib8360:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib8360-w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib8360-w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ip9171-hp_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ip9171-hp:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ip9181-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ip9181-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9371-ehtv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9371-ehtv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9381-ehtv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9381-ehtv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9371-eht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9371-eht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9381-eht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9381-eht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9171-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9171-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9181-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9181-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fe9181-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fe9181-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fe9182-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fe9182-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fe9381-ehv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fe9381-ehv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fe9382-ehv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fe9382-ehv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fe9180-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fe9180-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fe9582-ehnv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fe9582-ehnv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:sd9161-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:sd9161-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:sd9361-ehl_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:sd9361-ehl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:sd9362-ehl_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:sd9362-ehl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:sd9362-eh_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:sd9362-eh:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:sd9363-ehl_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:sd9363-ehl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:sd9364-eh_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:sd9364-eh:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:sd9364-ehl_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:sd9364-ehl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:sd9363-ehl-v2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:sd9363-ehl-v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:sd9364-ehl-v2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:sd9364-ehl-v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:sd9362-eh-v2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:sd9362-eh-v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:sd9364-eh-v2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:sd9364-eh-v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:sd9366-eh-v2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:sd9366-eh-v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:sd9366-ehl_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:sd9366-ehl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:sd9366-eh_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:sd9366-eh:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:sd9365-ehl_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:sd9365-ehl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:iz9361-eh_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:iz9361-eh:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9187-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9187-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9187-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9187-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9387-ehtv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9387-ehtv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9387-ehv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9387-ehv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9387-htv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9387-htv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9387-hv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9387-hv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9387-eh_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9387-eh:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9387-eht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9387-eht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9387-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9387-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9387-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9387-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9189-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9189-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9189-hm_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9189-hm:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9189-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9189-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9389-hv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9389-hv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9389-hmv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9389-hmv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9389-htv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9389-htv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9389-ehmv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9389-ehmv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9389-ehtv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9389-ehtv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9389-ehv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9389-ehv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9389-eh:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9389-eh_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9389-ehm:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9389-ehm_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9389-eht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9389-eht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9389-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9389-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9389-hm_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9389-hm:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9389-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9389-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9165-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9165-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9365-ehtv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9365-ehtv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9365-htv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9365-htv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9365-htvl_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9365-htvl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9365-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9365-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9365-eht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9365-eht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ip9165-hp_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ip9165-hp:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ip9165-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ip9165-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ip9165-lpc_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ip9165-lpc:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9391-ehtv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9391-ehtv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fe9191_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fe9191:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ip9191-hp_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ip9191-hp:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ip9191-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ip9191-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fe9391-ev_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fe9391-ev:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9391-eht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9391-eht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ip9172-lpc\\(freeway\\)_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ip9172-lpc\\(freeway\\):-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:it9389-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:it9389-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:it9389-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:it9389-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:md9561-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:md9561-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:md9581-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:md9581-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ms9390-hv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ms9390-hv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:tb9330-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:tb9330-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:tb9331-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:tb9331-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:sd9374-ehl_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:sd9374-ehl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9167-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9167-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9167-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9167-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9367-ehtv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9367-ehtv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9367-htv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9367-htv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9367-hv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9367-hv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9367-htv\\(epoc\\)_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9367-htv\\(epoc\\):-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9367-eh_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9367-eh:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9367-eht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9367-eht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9367-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9367-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9367-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9367-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ip9167-hp_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ip9167-hp:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ip9167-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ip9167-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ma9321-ehtv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ma9321-ehtv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ms9321-ehv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ms9321-ehv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ma9322-ehtv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ma9322-ehtv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd8177-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8177-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd8377-hv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8377-hv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd8177-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8177-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd8377-ehtv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8377-ehtv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd8377-htv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8377-htv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd8179-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8179-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd8379-hv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8379-hv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib8377-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib8377-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib8377-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib8377-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib8377-eht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib8377-eht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9165-ht-a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9165-ht-a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9365-htv-a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9365-htv-a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9365-ehtv-a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9365-ehtv-a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9187-ht-a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9187-ht-a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9387-htv-a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9387-htv-a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9387-ehtv-a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9387-ehtv-a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9365-eht-a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9365-eht-a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9365-ht-a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9365-ht-a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9387-eht-a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9387-eht-a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9387-ht-a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9387-ht-a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ip9164-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ip9164-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ip9164-lpc_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ip9164-lpc:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ip9165-lpc\\(i-cs_kit\\)_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ip9165-lpc\\(i-cs_kit\\):-:*:*:*:*:*:*:*']",0,0
CVE-2020-11950,Vivotek,0.00116,8.8,0.0,1.0,0.0,1.0,1,2020-05-28,1.0,2020-05-26,,,1.0,"VIVOTEK Network Cameras before XXXXX-VVTK-2.2002.xx.01x (and before XXXXX-VVTK-0XXXX_Beta2) allows an authenticated user to upload and execute a script (with resultant execution of OS commands). For example, this affects IT9388-HT devices.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-78'],"['cpe:2.3:o:vivotek:cc9381-hv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:cc9381-hv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9360-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9360-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9368-htv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9368-htv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9380-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9380-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9388-htv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9388-htv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9360-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9360-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9368-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9368-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9380-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9380-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9388-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9388-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:it9360-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:it9360-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:it9380-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:it9380-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:it9388-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:it9388-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:md9560-dh_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:md9560-dh:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:md9560-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:md9560-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9366-hv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9366-hv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9166-hn_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9166-hn:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fe9380-hv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fe9380-hv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:cc8160_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:cc8160:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:cc8160\\(hs\\)_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:cc8160\\(hs\\):-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:cc8370-hv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:cc8370-hv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:cc8371-hv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:cc8371-hv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:cd8371-hntv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:cd8371-hntv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:cd8371-hnvf2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:cd8371-hnvf2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd8166a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8166a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd8166a-n_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8166a-n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd8167a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8167a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd8167a-s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8167a-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd8169a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8169a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd8169a-s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8169a-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd8367a-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8367a-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd8369a-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8369a-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd816ba-hf2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd816ba-hf2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd836ba-hvf2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd836ba-hvf2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd836ba-htv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd836ba-htv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd836ba-ehvf2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd836ba-ehvf2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd816ba-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd816ba-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd836ba-ehtv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd836ba-ehtv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib836ba-ehf3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib836ba-ehf3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib836ba-eht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib836ba-eht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib836ba-hf3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib836ba-hf3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib836ba-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib836ba-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd816b-hf2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd816b-hf2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd816b-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd816b-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd836b-ehtv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd836b-ehtv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd836b-ehvf2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd836b-ehvf2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd836b-htv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd836b-htv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd836b-hvf2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd836b-hvf2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd836b-ehtv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd836b-ehtv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd836b-ehvf2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd836b-ehvf2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd836b-htv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd836b-htv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd836b-hvf2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd836b-hvf2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib836b-ehf3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib836b-ehf3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib836b-eht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib836b-eht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib836b-hf3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib836b-hf3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib836b-hrf3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib836b-hrf3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib836b-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib836b-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd816ca-hf2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd816ca-hf2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd816c-hf2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd816c-hf2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fe8182_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fe8182:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd8182-f1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8182-f1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd8182-f2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8182-f2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd8182-t_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8182-t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd8382-etv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8382-etv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd8382-evf2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8382-evf2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd8382-tv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8382-tv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd8382-vf2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8382-vf2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib8382-ef3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib8382-ef3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib8382-et_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib8382-et:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib8382-f3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib8382-f3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib8382-rf3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib8382-rf3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib8382-rt_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib8382-rt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib8382-t_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib8382-t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd8366-v_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8366-v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib8367a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib8367a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib8369a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib8369a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ip8166_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ip8166:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:md8563-deh_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:md8563-deh:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:md8563-eh_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:md8563-eh:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:md8564-eh_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:md8564-eh:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:md8565-n_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:md8565-n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:vc8101_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:vc8101:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:vs8100-v2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:vs8100-v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ip8160_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ip8160:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ip8160-w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ip8160-w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib8360_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib8360:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib8360-w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib8360-w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ip9171-hp_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ip9171-hp:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ip9181-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ip9181-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9371-\\(e\\)htv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9371-\\(e\\)htv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9381-\\(e\\)htv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9381-\\(e\\)htv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9371-\\(e\\)ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9371-\\(e\\)ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9381-\\(e\\)ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9381-\\(e\\)ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9171-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9171-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9181-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9181-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fe9181-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fe9181-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fe9182-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fe9182-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fe9381-ehv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fe9381-ehv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fe9382-ehv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fe9382-ehv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fe9180-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fe9180-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fe9582-ehnv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fe9582-ehnv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:sd9161-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:sd9161-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:sd9361-ehl_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:sd9361-ehl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:sd9362-ehl_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:sd9362-ehl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:sd9362-eh_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:sd9362-eh:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:sd9363-ehl_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:sd9363-ehl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:sd9364-eh_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:sd9364-eh:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:sd9364-ehl_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:sd9364-ehl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:sd9363-ehl-v2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:sd9363-ehl-v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:sd9364-ehl-v2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:sd9364-ehl-v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:sd9362-eh-v2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:sd9362-eh-v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:sd9364-eh-v2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:sd9364-eh-v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:sd9366-eh-v2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:sd9366-eh-v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:sd9366-ehl_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:sd9366-ehl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:sd9366-eh_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:sd9366-eh:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:sd9365-ehl_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:sd9365-ehl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:iz9361-eh_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:iz9361-eh:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9187-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9187-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9187-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9187-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9387-ehtv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9387-ehtv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9387-ehv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9387-ehv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9387-htv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9387-htv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9387-hv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9387-hv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9387-eh_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9387-eh:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9387-eht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9387-eht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9387-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9387-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9387-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9387-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9189-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9189-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9189-hm_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9189-hm:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9189-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9189-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9389-hv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9389-hv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9389-hmv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9389-hmv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9389-htv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9389-htv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9389-ehmv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9389-ehmv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9389-ehtv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9389-ehtv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9389-ehv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9389-ehv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9389-eh_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9389-eh:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9389-ehm_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9389-ehm:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9389-eht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9389-eht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9389-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9389-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9389-hm_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9389-hm:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9389-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9389-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9165-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9165-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9365-ehtv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9365-ehtv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9365-htv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9365-htv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9365-htvl_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9365-htvl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9365-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9365-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9365-eht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9365-eht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ip9165-hp_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ip9165-hp:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ip9165-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ip9165-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ip9165-lpc_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ip9165-lpc:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9391-ehtv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9391-ehtv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fe9191_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fe9191:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ip9191-hp_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ip9191-hp:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ip9191-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ip9191-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fe9391-ev_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fe9391-ev:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9391-eht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9391-eht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ip9172-lpc_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ip9172-lpc:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:it9389-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:it9389-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:it9389-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:it9389-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:md9561-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:md9561-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:md9581-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:md9581-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ms9390-hv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ms9390-hv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:tb9330-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:tb9330-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:tb9331-e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:tb9331-e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:sd9374-ehl\\(x\\)_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:sd9374-ehl\\(x\\):-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9167-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9167-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9167-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9167-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9367-ehtv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9367-ehtv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9367-htv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9367-htv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9367-hv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9367-hv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9367-htv\\(epoc\\)_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9367-htv\\(epoc\\):-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9367-eh_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9367-eh:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9367-eht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9367-eht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9367-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9367-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9367-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9367-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ip9167-hp_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ip9167-hp:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ip9167-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ip9167-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ip9167-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ip9167-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ma9321-ehtv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ma9321-ehtv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ms9321-ehv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ms9321-ehv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ma9322-ehtv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ma9322-ehtv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd8177-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8177-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd8377-hv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8377-hv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd8177-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8177-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd8377-hv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8377-hv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd8177-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8177-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd8377-ehtv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8377-ehtv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd8377-htv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8377-htv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd8179-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8179-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd8379-hv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd8379-hv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib8377-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib8377-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib8379-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib8379-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib8377-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib8377-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib8377-eht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib8377-eht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9165-ht-a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9165-ht-a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9365-htv-a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9365-htv-a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9365-ehtv-a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9365-ehtv-a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9187-ht-a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9187-ht-a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9387-htv-a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9387-htv-a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:fd9387-ehtv-a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:fd9387-ehtv-a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9365-eht-a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9365-eht-a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9365-ht-a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9365-ht-a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9387-eht-a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9387-eht-a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ib9387-ht-a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ib9387-ht-a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ip9164-ht_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ip9164-ht:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ip9164-lpc_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ip9164-lpc:-:*:*:*:*:*:*:*', 'cpe:2.3:o:vivotek:ip9165-lpc\\(i-cs_kit\\)_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vivotek:ip9165-lpc\\(i-cs_kit\\):-:*:*:*:*:*:*:*']",0,0
CVE-2017-9851,SMA Solar Technology,0.00215,7.5,0.0,0.0,1.0,0.0,1,2017-08-05,0.0,,0.0,,,"An issue was discovered in SMA Solar Technology products. By sending nonsense data or setting up a TELNET session to the database port of Sunny Explorer, the application can be crashed. NOTE: the vendor reports that the maximum possible damage is a communication failure. Also, only Sunny Boy TLST-21 and TL-21 and Sunny Tripower TL-10 and TL-30 could potentially be affected",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['NVD-CWE-noinfo'],['cpe:2.3:a:sma:sunny_explorer:-:*:*:*:*:*:*:*'],0,0
CVE-2017-9852,SMA Solar Technology,0.00315,9.8,0.0,1.0,0.0,1.0,1,2017-08-05,0.0,,0.0,,,"An Incorrect Password Management issue was discovered in SMA Solar Technology products. Default passwords exist that are rarely changed. User passwords will almost always be default. Installer passwords are expected to be default or similar across installations installed by the same company (but are sometimes changed). Hidden user accounts have (at least in some cases, though more research is required to test this for all hidden user accounts) a fixed password for all devices; it can never be changed by a user. Other vulnerabilities exist that allow an attacker to get the passwords of these hidden user accounts. NOTE: the vendor reports that it has no influence on the allocation of passwords, and that global hardcoded master passwords do not exist. Also, only Sunny Boy TLST-21 and TL-21 and Sunny Tripower TL-10 and TL-30 could potentially be affected",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-798'],"['cpe:2.3:o:sma:sunny_boy_3600_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3600:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_5000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_5000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_core1_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_core1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_15000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_15000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_20000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_20000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_25000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_25000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_5000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_5000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_12000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_12000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_60_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3600tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3600tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_4000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_4000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_5000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_5000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_1.5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_1.5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_2.5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_2.5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3.0_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3.0:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3.6_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3.6:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_4.0_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_4.0:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_5.0_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_5.0:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_2200_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_2200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_1000cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_1000cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_800cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_800cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_850cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_850cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_900cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_900cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_500cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_500cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_630cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_630cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_720cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_720cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_760cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_760cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_500_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_630:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_630_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_720_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_720:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_760_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_760:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_800_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_800:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_850_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_850:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_900_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_1000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_1000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_2200_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_2200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_2500-ev_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_2500-ev:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_storage_2.5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_storage_2.5:-:*:*:*:*:*:*:*']",0,0
CVE-2017-9853,SMA Solar Technology,0.00315,9.8,0.0,1.0,0.0,1.0,1,2017-08-05,0.0,,0.0,,,"An issue was discovered in SMA Solar Technology products. All inverters have a very weak password policy for the user and installer password. No complexity requirements or length requirements are set. Also, strong passwords are impossible due to a maximum of 12 characters and a limited set of characters. NOTE: the vendor reports that the 12-character limit provides ""a very high security standard."" Also, only Sunny Boy TLST-21 and TL-21 and Sunny Tripower TL-10 and TL-30 could potentially be affected",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-521'],"['cpe:2.3:o:sma:sunny_boy_3600_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3600:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_5000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_5000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_core1_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_core1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_15000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_15000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_20000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_20000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_25000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_25000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_5000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_5000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_12000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_12000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_60_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3600tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3600tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_4000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_4000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_5000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_5000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_1.5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_1.5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_2.5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_2.5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3.0_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3.0:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3.6_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3.6:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_4.0_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_4.0:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_5.0_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_5.0:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_2200_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_2200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_1000cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_1000cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_800cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_800cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_850cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_850cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_900cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_900cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_500cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_500cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_630cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_630cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_720cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_720cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_760cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_760cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_500_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_630_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_630:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_720_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_720:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_760_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_760:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_800_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_800:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_850_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_850:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_900_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_1000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_1000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_2200_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_2200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_2500-ev_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_2500-ev:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_storage_2.5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_storage_2.5:-:*:*:*:*:*:*:*']",0,0
CVE-2017-9854,SMA Solar Technology,0.00315,9.8,0.0,1.0,0.0,1.0,1,2017-08-05,0.0,,0.0,,,"An issue was discovered in SMA Solar Technology products. By sniffing for specific packets on the localhost, plaintext passwords can be obtained as they are typed into Sunny Explorer by the user. These passwords can then be used to compromise the overall device. NOTE: the vendor reports that exploitation likelihood is low because these packets are usually sent only once during installation. Also, only Sunny Boy TLST-21 and TL-21 and Sunny Tripower TL-10 and TL-30 could potentially be affected",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-311'],"['cpe:2.3:o:sma:sunny_boy_3600_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3600:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_5000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_5000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_core1_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_core1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_15000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_15000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_20000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_20000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_25000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_25000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_5000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_5000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_12000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_12000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_60_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3600tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3600tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_4000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_4000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_5000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_5000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_1.5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_1.5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_2.5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_2.5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3.0_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3.0:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3.6_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3.6:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_4.0_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_4.0:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_5.0_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_5.0:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_2200_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_2200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_1000cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_1000cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_800cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_800cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_850cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_850cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_900cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_900cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_500cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_500cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_630cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_630cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_720cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_720cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_760cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_760cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_500_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_630_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_630:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_720_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_720:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_760_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_760:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_800_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_800:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_850_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_850:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_900_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_1000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_1000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_2200_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_2200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_2500-ev_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_2500-ev:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_storage_2.5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_storage_2.5:-:*:*:*:*:*:*:*']",0,0
CVE-2017-9855,SMA Solar Technology,0.00283,9.8,0.0,1.0,0.0,1.0,1,2017-08-05,0.0,,0.0,,,"An issue was discovered in SMA Solar Technology products. A secondary authentication system is available for Installers called the Grid Guard system. This system uses predictable codes, and a single Grid Guard code can be used on any SMA inverter. Any such code, when combined with the installer account, allows changing very sensitive parameters. NOTE: the vendor reports that Grid Guard is not an authentication feature; it is only a tracing feature. Also, only Sunny Boy TLST-21 and TL-21 and Sunny Tripower TL-10 and TL-30 could potentially be affected",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,"['NVD-CWE-noinfo', 'CWE-284']","['cpe:2.3:o:sma:sunny_boy_3600_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3600:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_5000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_5000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_core1_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_core1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_15000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_15000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_20000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_20000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_25000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_25000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_5000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_5000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_12000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_12000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_60_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3600tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3600tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_4000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_4000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_5000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_5000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_1.5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_1.5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_2.5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_2.5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3.0_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3.0:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3.6_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3.6:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_4.0_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_4.0:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_5.0_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_5.0:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_2200_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_2200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_1000cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_1000cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_800cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_800cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_850cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_850cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_900cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_900cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_500cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_500cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_630cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_630cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_720cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_720cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_760cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_760cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_500_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_630_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_630:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_720_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_720:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_760_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_760:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_800_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_800:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_850_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_850:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_900_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_1000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_1000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_2200_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_2200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_2500-ev_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_2500-ev:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_storage_2.5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_storage_2.5:-:*:*:*:*:*:*:*']",0,0
CVE-2017-9856,SMA Solar Technology,0.00245,9.8,0.0,1.0,0.0,1.0,1,2017-08-05,0.0,,0.0,,,"An issue was discovered in SMA Solar Technology products. Sniffed passwords from SMAdata2+ communication can be decrypted very easily. The passwords are ""encrypted"" using a very simple encryption algorithm. This enables an attacker to find the plaintext passwords and authenticate to the device. NOTE: the vendor reports that only Sunny Boy TLST-21 and TL-21 and Sunny Tripower TL-10 and TL-30 could potentially be affected",CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N,NETWORK,HIGH,NONE,REQUIRED,CHANGED,LOW,NONE,NONE,LOW,1.6,1.4,"['NVD-CWE-noinfo', 'CWE-256']","['cpe:2.3:o:sma:sunny_boy_3600_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3600:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_5000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_5000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_core1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_core1_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_15000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_15000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_20000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_20000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_25000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_25000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_5000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_5000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_12000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_12000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_60_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3600tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3600tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_4000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_4000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_5000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_5000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_1.5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_1.5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_2.5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_2.5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3.0_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3.0:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3.6_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3.6:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_4.0_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_4.0:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_5.0_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_5.0:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_2200_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_2200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_1000cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_1000cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_800cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_800cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_850cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_850cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_900cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_900cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_500cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_500cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_630cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_630cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_720cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_720cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_760cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_760cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_500_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_630_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_630:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_720_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_720:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_760_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_760:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_800_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_800:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_850_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_850:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_900_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_1000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_1000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_2200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_2200_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_2500-ev:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_2500-ev_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_storage_2.5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_storage_2.5_firmware:-:*:*:*:*:*:*:*']",0,0
CVE-2017-9857,SMA Solar Technology,0.00137,8.1,0.0,1.0,0.0,1.0,1,2017-08-05,0.0,,0.0,,,"An issue was discovered in SMA Solar Technology products. The SMAdata2+ communication protocol does not properly use authentication with encryption: it is vulnerable to man in the middle, packet injection, and replay attacks. Any setting change, authentication packet, scouting packet, etc. can be replayed, injected, or used for a man in the middle session. All functionalities available in Sunny Explorer can effectively be done from anywhere within the network as long as an attacker gets the packet setup correctly. This includes the authentication process for all (including hidden) access levels and the changing of settings in accordance with the gained access rights. Furthermore, because the SMAdata2+ communication channel is unencrypted, an attacker capable of understanding the protocol can eavesdrop on communications. NOTE: the vendor's position is that authentication with encryption is not required on an isolated subnetwork. Also, only Sunny Boy TLST-21 and TL-21 and Sunny Tripower TL-10 and TL-30 could potentially be affected",CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,HIGH,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.2,5.9,['CWE-287'],"['cpe:2.3:o:sma:sunny_boy_3600_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3600:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_5000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_5000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_core1_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_core1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_15000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_15000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_20000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_20000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_25000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_25000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_5000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_5000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_12000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_12000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_60_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3600tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3600tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_4000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_4000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_5000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_5000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_1.5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_1.5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_2.5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_2.5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3.0_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3.0:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3.6_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3.6:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_4.0_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_4.0:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_5.0_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_5.0:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_2200_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_2200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_1000cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_1000cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_800cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_800cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_850cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_850cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_900cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_900cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_500cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_500cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_630cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_630cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_720cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_720cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_760cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_760cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_500_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_630_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_630:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_720_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_720:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_760_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_760:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_800_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_800:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_850_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_850:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_900_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_1000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_1000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_2200_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_2200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_2500-ev_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_2500-ev:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_storage_2.5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_storage_2.5:-:*:*:*:*:*:*:*']",0,0
CVE-2017-9858,SMA Solar Technology,0.00182,7.5,0.0,1.0,0.0,1.0,1,2017-08-05,0.0,,0.0,,,"An issue was discovered in SMA Solar Technology products. By sending crafted packets to an inverter and observing the response, active and inactive user accounts can be determined. This aids in further attacks (such as a brute force attack) as one now knows exactly which users exist and which do not. NOTE: the vendor's position is that this ""is not a security gap per se."" Also, only Sunny Boy TLST-21 and TL-21 and Sunny Tripower TL-10 and TL-30 could potentially be affected",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-200'],"['cpe:2.3:o:sma:sunny_boy_3600_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3600:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_5000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_5000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_core1_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_core1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_15000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_15000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_20000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_20000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_25000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_25000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_5000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_5000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_12000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_12000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_60_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3600tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3600tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_4000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_4000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_5000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_5000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_1.5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_1.5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_2.5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_2.5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3.0_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3.0:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3.6_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3.6:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_4.0_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_4.0:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_5.0_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_5.0:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_2200_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_2200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_1000cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_1000cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_800cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_800cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_850cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_850cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_900cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_900cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_500cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_500cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_630cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_630cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_720cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_720cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_760cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_760cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_500_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_630_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_630:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_720_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_720:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_760_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_760:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_800_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_800:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_850_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_850:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_900_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_1000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_1000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_2200_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_2200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_2500-ev_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_2500-ev:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_storage_2.5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_storage_2.5:-:*:*:*:*:*:*:*']",0,0
CVE-2017-9859,SMA Solar Technology,0.00315,9.8,0.0,1.0,0.0,1.0,1,2017-08-05,0.0,,0.0,,,"An issue was discovered in SMA Solar Technology products. The inverters make use of a weak hashing algorithm to encrypt the password for REGISTER requests. This hashing algorithm can be cracked relatively easily. An attacker will likely be able to crack the password using offline crackers. This cracked password can then be used to register at the SMA servers. NOTE: the vendor's position is that ""we consider the probability of the success of such manipulation to be extremely low."" Also, only Sunny Boy TLST-21 and TL-21 and Sunny Tripower TL-10 and TL-30 could potentially be affected",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-327'],"['cpe:2.3:o:sma:sunny_boy_3600_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3600:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_5000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_5000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_core1_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_core1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_15000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_15000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_20000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_20000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_25000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_25000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_5000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_5000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_12000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_12000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_60_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3600tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3600tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_4000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_4000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_5000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_5000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_1.5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_1.5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_2.5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_2.5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3.0_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3.0:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3.6_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3.6:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_4.0_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_4.0:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_5.0_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_5.0:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_2200_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_2200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_1000cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_1000cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_800cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_800cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_850cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_850cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_900cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_900cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_500cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_500cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_630cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_630cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_720cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_720cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_760cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_760cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_500_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_630_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_630:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_720_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_720:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_760_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_760:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_800_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_800:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_850_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_850:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_900_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_1000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_1000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_2200_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_2200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_2500-ev_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_2500-ev:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_storage_2.5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_storage_2.5:-:*:*:*:*:*:*:*']",0,0
CVE-2017-9860,SMA Solar Technology,0.00315,9.8,0.0,1.0,0.0,1.0,1,2017-08-05,0.0,,0.0,,,"An issue was discovered in SMA Solar Technology products. An attacker can use Sunny Explorer or the SMAdata2+ network protocol to update the device firmware without ever having to authenticate. If an attacker is able to create a custom firmware version that is accepted by the inverter, the inverter is compromised completely. This allows the attacker to do nearly anything: for example, giving access to the local OS, creating a botnet, using the inverters as a stepping stone into companies, etc. NOTE: the vendor reports that this attack has always been blocked by ""a final integrity and compatibility check."" Also, only Sunny Boy TLST-21 and TL-21 and Sunny Tripower TL-10 and TL-30 could potentially be affected",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-287'],"['cpe:2.3:o:sma:sunny_boy_3600_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3600:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_5000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_5000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_core1_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_core1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_15000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_15000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_20000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_20000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_25000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_25000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_5000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_5000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_12000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_12000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_60_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3600tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3600tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_4000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_4000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_5000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_5000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_1.5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_1.5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_2.5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_2.5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3.0_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3.0:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3.6_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3.6:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_4.0_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_4.0:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_5.0_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_5.0:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_2200_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_2200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_1000cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_1000cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_800cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_800cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_850cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_850cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_900cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_900cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_500cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_500cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_630cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_630cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_720cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_720cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_760cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_760cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_500_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_630_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_630:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_720_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_720:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_760_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_760:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_800_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_800:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_850_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_850:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_900_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_1000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_1000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_2200_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_2200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_2500-ev_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_2500-ev:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_storage_2.5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_storage_2.5:-:*:*:*:*:*:*:*']",0,0
CVE-2017-9861,SMA Solar Technology,0.00137,9.8,0.0,1.0,0.0,1.0,1,2017-08-05,0.0,,0.0,,,"An issue was discovered in SMA Solar Technology products. The SIP implementation does not properly use authentication with encryption: it is vulnerable to replay attacks, packet injection attacks, and man in the middle attacks. An attacker is able to successfully use SIP to communicate with the device from anywhere within the LAN. An attacker may use this to crash the device, stop it from communicating with the SMA servers, exploit known SIP vulnerabilities, or find sensitive information from the SIP communications. Furthermore, because the SIP communication channel is unencrypted, an attacker capable of understanding the protocol can eavesdrop on communications. For example, passwords can be extracted. NOTE: the vendor's position is that authentication with encryption is not required on an isolated subnetwork. Also, only Sunny Boy TLST-21 and TL-21 and Sunny Tripower TL-10 and TL-30 could potentially be affected",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-74'],"['cpe:2.3:o:sma:sunny_boy_3600_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3600:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_5000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_5000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_core1_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_core1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_15000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_15000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_20000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_20000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_25000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_25000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_5000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_5000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_12000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_12000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_60_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3600tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3600tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_4000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_4000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_5000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_5000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_1.5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_1.5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_2.5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_2.5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3.0_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3.0:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3.6_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3.6:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_4.0_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_4.0:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_5.0_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_5.0:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_2200_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_2200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_1000cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_1000cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_800cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_800cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_850cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_850cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_900cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_900cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_500cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_500cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_630cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_630cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_720cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_720cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_760cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_760cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_500_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_630_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_630:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_720_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_720:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_760_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_760:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_800_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_800:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_850_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_850:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_900_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_1000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_1000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_2200_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_2200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_2500-ev_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_2500-ev:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_storage_2.5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_storage_2.5:-:*:*:*:*:*:*:*']",0,0
CVE-2017-9862,SMA Solar Technology,0.00182,7.5,0.0,0.0,1.0,0.0,1,2017-08-05,0.0,,0.0,,,"An issue was discovered in SMA Solar Technology products. When signed into Sunny Explorer with a wrong password, it is possible to create a debug report, disclosing information regarding the application and allowing the attacker to create and save a .txt file with contents to his liking. An attacker may use this for information disclosure, or to write a file to normally unavailable locations on the local system. NOTE: the vendor reports that ""the information contained in the debug report is of marginal significance."" Also, only Sunny Boy TLST-21 and TL-21 and Sunny Tripower TL-10 and TL-30 could potentially be affected",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-200'],['cpe:2.3:a:sma:sunny_explorer:-:*:*:*:*:*:*:*'],0,0
CVE-2017-9863,SMA Solar Technology,0.00125,8.8,0.0,1.0,1.0,1.0,1,2017-08-05,0.0,,0.0,,,"An issue was discovered in SMA Solar Technology products. If a user simultaneously has Sunny Explorer running and visits a malicious host, cross-site request forgery can be used to change settings in the inverters (for example, issuing a POST request to change the user password). All Sunny Explorer settings available to the authenticated user are also available to the attacker. (In some cases, this also includes changing settings that the user has no access to.) This may result in complete compromise of the device. NOTE: the vendor reports that exploitation is unlikely because Sunny Explorer is used only rarely. Also, only Sunny Boy TLST-21 and TL-21 and Sunny Tripower TL-10 and TL-30 could potentially be affected",CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-352'],"['cpe:2.3:o:sma:sunny_boy_3600_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3600:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_5000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_5000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_core1_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_core1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_15000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_15000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_20000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_20000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_25000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_25000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_5000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_5000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_12000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_12000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_60_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3600tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3600tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_4000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_4000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_5000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_5000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_1.5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_1.5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_2.5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_2.5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3.0_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3.0:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3.6_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3.6:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_4.0_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_4.0:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_5.0_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_5.0:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_2200_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_2200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_1000cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_1000cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_800cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_800cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_850cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_850cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_900cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_900cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_500cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_500cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_630cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_630cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_720cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_720cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_760cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_760cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_500_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_630_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_630:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_720_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_720:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_760_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_760:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_800_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_800:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_850_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_850:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_900_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_1000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_1000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_2200_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_2200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_2500-ev_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_2500-ev:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_storage_2.5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_storage_2.5:-:*:*:*:*:*:*:*', 'cpe:2.3:a:sma:sunny_explorer:-:*:*:*:*:*:*:*']",0,0
CVE-2017-9864,SMA Solar Technology,0.00147,7.5,0.0,1.0,0.0,1.0,1,2017-08-05,0.0,,0.0,,,"An issue was discovered in SMA Solar Technology products. An attacker can change the plant time even when not authenticated in any way. This changes the system time, possibly affecting lockout policies and random-number generators based on timestamps, and makes timestamps for data analysis unreliable. NOTE: the vendor reports that this is largely irrelevant because it only affects log-entry timestamps, and because the plant time would later be reset via NTP. (It has never been the case that a lockout policy or random-number generator was affected.) Also, only Sunny Boy TLST-21 and TL-21 and Sunny Tripower TL-10 and TL-30 could potentially be affected",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,HIGH,NONE,HIGH,3.9,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:sma:sunny_boy_3600_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3600:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_5000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_5000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_core1_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_core1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_15000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_15000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_20000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_20000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_25000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_25000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_5000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_5000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_12000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_12000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_tripower_60_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower_60:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3600tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3600tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_4000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_4000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_5000tl_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_5000tl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_1.5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_1.5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_2.5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_2.5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3.0_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3.0:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_3.6_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_3.6:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_4.0_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_4.0:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_5.0_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_5.0:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_2200_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_2200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_1000cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_1000cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_800cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_800cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_850cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_850cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_900cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_900cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_500cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_500cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_630cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_630cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_720cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_720cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_760cp_xt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_760cp_xt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_500_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_630_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_630:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_720_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_720:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_760_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_760:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_800_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_800:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_850_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_850:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_900_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_1000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_1000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_2200_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_2200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_central_storage_2500-ev_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_central_storage_2500-ev:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_boy_storage_2.5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_boy_storage_2.5:-:*:*:*:*:*:*:*']",0,0
CVE-2019-13529,SMA Solar Technology,0.00143,8.8,1.0,1.0,0.0,1.0,1,2019-10-09,0.0,,1.0,2019-10-08,,"An attacker could send a malicious link to an authenticated operator, which may allow remote attackers to perform actions with the permissions of the user on the Sunny WebBox Firmware Version 1.6 and prior. This device uses IP addresses to maintain communication after a successful login, which would increase the ease of exploitation.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-352'],"['cpe:2.3:h:sma:sunny_webbox:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sma:sunny_webbox_firmware:*:*:*:*:*:*:*:*']",1,0
CVE-2021-46416,SMA Solar Technology,0.00921,8.1,1.0,1.0,0.0,1.0,0,2022-04-07,0.0,,0.0,,,Insecure direct object reference in SUNNY TRIPOWER 5.0 Firmware version 3.10.16.R leads to unauthorized user groups accessing due to insecure cookie handling.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,NONE,HIGH,2.8,5.2,['CWE-639'],"['cpe:2.3:o:sma:sunny_tripower_firmware:3.10.16.r:*:*:*:*:*:*:*', 'cpe:2.3:h:sma:sunny_tripower:5.0:*:*:*:*:*:*:*']",1,0
CVE-2018-0628,NEC Corporation,0.00118,7.2,0.0,0.0,0.0,1.0,1,2019-01-09,1.0,2018-07-12,,,1.0,Aterm WG1200HP firmware Ver1.0.31 and earlier allows attacker with administrator rights to execute arbitrary OS commands via HTTP request and response.,CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.2,5.9,['CWE-78'],"['cpe:2.3:o:nec:aterm_wg1200hp_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:aterm_wg1200hp:-:*:*:*:*:*:*:*']",0,0
CVE-2018-0634,NEC Corporation,0.00118,7.2,0.0,1.0,0.0,1.0,1,2019-01-09,1.0,2018-07-12,,,1.0,Aterm HC100RC Ver1.0.1 and earlier allows attacker with administrator rights to execute arbitrary OS commands via FactoryPassword parameter or bootmode parameter of a certain URL.,CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.2,5.9,['CWE-78'],"['cpe:2.3:o:nec:aterm_hc100rc_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_hc100rc:-:*:*:*:*:*:*:*']",0,0
CVE-2018-0636,NEC Corporation,0.00118,7.2,0.0,1.0,0.0,1.0,1,2019-01-09,1.0,2018-07-12,,,1.0,"Aterm HC100RC Ver1.0.1 and earlier allows attacker with administrator rights to execute arbitrary OS commands via FactoryPassword parameter of a certain URL, different URL from CVE-2018-0634.",CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.2,5.9,['CWE-78'],"['cpe:2.3:o:nec:aterm_hc100rc_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_hc100rc:-:*:*:*:*:*:*:*']",0,0
CVE-2018-0637,NEC Corporation,0.00118,7.2,0.0,1.0,0.0,1.0,1,2019-01-09,1.0,2018-07-12,,,1.0,Aterm HC100RC Ver1.0.1 and earlier allows attacker with administrator rights to execute arbitrary OS commands via export.cgi encKey parameter.,CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.2,5.9,['CWE-78'],"['cpe:2.3:o:nec:aterm_hc100rc_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_hc100rc:-:*:*:*:*:*:*:*']",0,0
CVE-2018-0639,NEC Corporation,0.00118,7.2,0.0,1.0,0.0,1.0,1,2019-01-09,1.0,2018-07-12,,,1.0,"Aterm HC100RC Ver1.0.1 and earlier allows attacker with administrator rights to execute arbitrary OS commands via tools_firmware.cgi date parameter, time parameter, and offset parameter.",CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.2,5.9,['CWE-78'],"['cpe:2.3:o:nec:aterm_hc100rc_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_hc100rc:-:*:*:*:*:*:*:*']",0,0
CVE-2018-0640,NEC Corporation,0.00115,7.2,0.0,1.0,0.0,1.0,1,2019-01-09,1.0,2018-07-12,,,1.0,"Buffer overflow in Aterm HC100RC Ver1.0.1 and earlier allows attacker with administrator rights to execute arbitrary code via netWizard.cgi date parameter, time parameter, and offset parameter.",CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.2,5.9,['CWE-119'],"['cpe:2.3:o:nec:aterm_hc100rc_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_hc100rc:-:*:*:*:*:*:*:*']",0,0
CVE-2018-0641,NEC Corporation,0.00115,7.2,0.0,1.0,0.0,1.0,1,2019-01-09,1.0,2018-07-12,,,1.0,"Buffer overflow in Aterm HC100RC Ver1.0.1 and earlier allows attacker with administrator rights to execute arbitrary code via tools_system.cgi date parameter, time parameter, and offset parameter.",CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.2,5.9,['CWE-119'],"['cpe:2.3:o:nec:aterm_hc100rc_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_hc100rc:-:*:*:*:*:*:*:*']",0,0
CVE-2018-11741,NEC Corporation,0.10084,9.8,1.0,1.0,0.0,1.0,1,2018-12-26,0.0,,0.0,,,NEC Univerge Sv9100 WebPro 6.00.00 devices have Predictable Session IDs that result in Account Information Disclosure via Home.htm?sessionId=#####&GOTO(8) URIs.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-200'],"['cpe:2.3:o:nec:univerge_sv9100_webpro_firmware:6.00.00:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:univerge_sv9100_webpro:-:*:*:*:*:*:*:*']",1,0
CVE-2018-11742,NEC Corporation,0.07121,9.8,1.0,1.0,0.0,1.0,1,2018-12-26,0.0,,0.0,,,NEC Univerge Sv9100 WebPro 6.00.00 devices have Cleartext Password Storage in the Web UI.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-522'],"['cpe:2.3:o:nec:univerge_sv9100_webpro_firmware:6.00.00:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:univerge_sv9100_webpro:-:*:*:*:*:*:*:*']",1,0
CVE-2018-16192,NEC Corporation,0.00074,6.5,0.0,1.0,0.0,1.0,1,2019-01-09,1.0,2018-12-14,,,1.0,"Aterm WF1200CR and Aterm WG1200CR (Aterm WF1200CR firmware Ver1.1.1 and earlier, Aterm WG1200CR firmware Ver1.0.1 and earlier) allow an attacker on the same network segment to obtain information registered on the device via unspecified vectors.",CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,2.8,3.6,['CWE-200'],"['cpe:2.3:o:nec:aterm_wf1200cr_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_wf1200cr:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:aterm_wg1200cr_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_wg1200cr:-:*:*:*:*:*:*:*']",0,0
CVE-2018-16193,NEC Corporation,0.00054,5.4,0.0,1.0,0.0,1.0,1,2019-01-09,1.0,2018-12-14,,,1.0,"Cross-site scripting vulnerability in Aterm WF1200CR and Aterm WG1200CR (Aterm WF1200CR firmware Ver1.1.1 and earlier, Aterm WG1200CR firmware Ver1.0.1 and earlier) allows authenticated attackers to inject arbitrary web script or HTML via unspecified vectors.",CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,LOW,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.3,2.7,['CWE-79'],"['cpe:2.3:o:nec:aterm_wf1200cr_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_wf1200cr:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:aterm_wg1200cr_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_wg1200cr:-:*:*:*:*:*:*:*']",0,0
CVE-2018-16194,NEC Corporation,0.00118,7.2,0.0,1.0,0.0,1.0,1,2019-01-09,1.0,2018-12-14,,,1.0,"Aterm WF1200CR and Aterm WG1200CR (Aterm WF1200CR firmware Ver1.1.1 and earlier, Aterm WG1200CR firmware Ver1.0.1 and earlier) allows authenticated attackers to execute arbitrary OS commands via unspecified vectors.",CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.2,5.9,['CWE-78'],"['cpe:2.3:o:nec:aterm_wf1200cr_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_wf1200cr:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:aterm_wg1200cr_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_wg1200cr:-:*:*:*:*:*:*:*']",0,0
CVE-2018-16195,NEC Corporation,0.00078,8.8,0.0,1.0,0.0,1.0,1,2019-01-09,1.0,2018-12-14,,,1.0,"Aterm WF1200CR and Aterm WG1200CR (Aterm WF1200CR firmware Ver1.1.1 and earlier, Aterm WG1200CR firmware Ver1.0.1 and earlier) allows an attacker on the same network segment to execute arbitrary OS commands via SOAP interface of UPnP.",CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-78'],"['cpe:2.3:o:nec:aterm_wf1200cr_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_wf1200cr:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:aterm_wg1200cr_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_wg1200cr:-:*:*:*:*:*:*:*']",0,0
CVE-2020-10917,NEC Corporation,0.01791,9.8,0.0,0.0,1.0,0.0,1,2020-07-22,1.0,2020-06-01,,,1.0,"This vulnerability allows remote attackers to execute arbitrary code on affected installations of NEC ESMPRO Manager 6.42. Authentication is not required to exploit this vulnerability. The specific flaw exists within the RMI service. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-10007.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-502'],['cpe:2.3:a:nec:esmpro_manager:6.42:*:*:*:*:*:*:*'],0,0
CVE-2020-12695,NEC Corporation,0.00547,7.5,0.0,1.0,0.0,0.0,1,2020-06-08,0.0,,0.0,,,"The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on a different network segment than the fully qualified event-subscription URL, aka the CallStranger issue.",CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:H,NETWORK,HIGH,NONE,NONE,CHANGED,LOW,NONE,HIGH,HIGH,2.2,4.7,['CWE-276'],"['cpe:2.3:a:ui:unifi_controller:-:*:*:*:*:*:*:*', 'cpe:2.3:a:w1.fi:hostapd:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-n11:-:*:*:*:*:*:*:*', 'cpe:2.3:h:broadcom:adsl:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:selphy_cp1200:-:*:*:*:*:*:*:*', 'cpe:2.3:h:cisco:wap131:-:*:*:*:*:*:*:*', 'cpe:2.3:h:cisco:wap150:-:*:*:*:*:*:*:*', 'cpe:2.3:h:cisco:wap351:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dlink:dvg-n5412sp:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dell:b1165nfw:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ep-101:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ew-m970a3t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:m571t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-2101:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-2105:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-241:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-320:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-330:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-340:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-4100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-4105:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-440:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-620:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-630:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-702:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-8500:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-8600:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-960:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-970:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:5020_z4a69a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:5030_m2u92b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:5030_z4a70a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:5034_z4a74a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:5660_f8b04a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_3456_a9t84c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_3545_a9t81a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_3545_a9t81c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_3545_a9t83b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_3546_a9t82a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_3548_a9t81b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_4515:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_4518:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_4535_f0v64a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_4535_f0v64b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_4535_f0v64c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_4536_f0v65a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_4538_f0v66b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_4675_f1h97a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_4675_f1h97b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_4675_f1h97c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_4676_f1h98a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_4678_f1h99b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_5575_g0v48b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_5575_g0v48c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_100_cn517a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_100_cn517b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_100_cn517c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_100_cn518a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_100_cn519a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_100_cn519b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_110_cq809a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_110_cq809b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_110_cq809c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_110_cq809d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_110_cq812c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_111_cq810a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_114_cq811a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_114_cq811b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_114_cq812a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_120_cz022a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_120_cz022b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_120_cz022c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4500_a9t80a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4500_a9t80b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4500_a9t89a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4500_d3p93a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4501_c8d05a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4502_a9t85a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4502_a9t87b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4503_e6g71b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4504_a9t88b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4504_c8d04a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4505_a9t86a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4507_e6g70b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4508_e6g72b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4509_d3p94a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4509_d3p94b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4511_k9h50a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4512_k9h49a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4513_k9h51a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4516_k9h52a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4520_e6g67a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4520_e6g67b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4520_f0v63a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4520_f0v63b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4520_f0v69a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4521_k9t10b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4522_f0v67a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4523_j6u60b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4524_f0v71b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4524_f0v72b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4524_k9t01a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4525_k9t09b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4526_k9t05b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4527_j6u61b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4528_k9t08b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5000_m2u85a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5000_m2u85b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5000_m2u91a:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5000_m2u91a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5000_m2u94b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5000_z4a54a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5000_z4a74a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5020_m2u91b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5530:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5531:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5532:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5534:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5535:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5536:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5539:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5540_f2e72a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5540_g0v47a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5540_g0v51a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5540_g0v52a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5540_g0v53a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5540_k7c85a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5541_k7g89a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5542_k7c88a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5543_n9u88a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5544_k7c89a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5544_k7c93a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5545_g0v50a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5546_k7c90a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5547_j6u64a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5548_k7g87a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5640_b9s56a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5640_b9s58a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5642_b9s64a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5643_b9s63a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5644_b9s65a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5646_f8b05a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5664_f8b08a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5665_f8b06a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_6020_5se16b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_6020_5se17a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_6020_6wd35a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_6020_7cz37a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_6052_5se18a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_6055_5se16a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_6540_b9s59a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_7640:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_7644_e4w46a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_7645_e4w44a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_6200_k7g18a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_6200_k7g26b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_6200_k7s21b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_6200_y0k13d_:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_6200_y0k15a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_6220_k7g20d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_6220_k7g21b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_6222_y0k13d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_6222_y0k14d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_6230_k7g25b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_6232_k7g26b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_6234_k7s21b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_6252_k7g22a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7100_3xd89a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7100_k7g93a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7100_k7g99a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7100_z3m37a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7100_z3m52a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7120_z3m41d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7155_z3m52a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7164_k7g99a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7800_k7r96a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7800_k7s00a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7800_k7s10d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7800_y0g42d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7800_y0g52b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7822_y0g42d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7822_y0g43d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7830_y0g50b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_pro_6420_5se45b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_pro_6420_5se46a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_pro_6420_6wd14a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_pro_6420_6wd16a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_pro_6452_5se47a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_pro_6455_5se45a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:officejet_4650_e6g87a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:officejet_4650_f1h96a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:officejet_4650_f1h96b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:officejet_4652_f1j02a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:officejet_4652_f1j05b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:officejet_4652_k9v84b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:officejet_4654_f1j06b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:officejet_4654_f1j07b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:officejet_4655_f1j00a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:officejet_4655_k9v79a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:officejet_4655_k9v82b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:officejet_4656_k9v81b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:officejet_4657_v6d29b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:officejet_4658_v6d30b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:hg255s:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:hg532e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:wr8165n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netgear:wnhde111:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ruckussecurity:zonedirector_1200:-:*:*:*:*:*:*:*', 'cpe:2.3:h:tp-link:archer_c50:-:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxv10_w300:-:*:*:*:*:*:*:*', 'cpe:2.3:h:zyxel:amg1202-t10b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:zyxel:vmg8324-b10a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:xbox_one:10.0.19041.2494:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*']",0,0
CVE-2020-27859,NEC Corporation,0.03066,7.5,0.0,0.0,1.0,0.0,1,2021-01-20,1.0,2020-11-10,,,1.0,This vulnerability allows remote attackers to disclose sensitive information on affected installations of NEC ESMPRO Manager 6.42. Authentication is not required to exploit this vulnerability. The specific flaw exists within the GetEuaLogDownloadAction class. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of SYSTEM. Was ZDI-CAN-9607.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-22'],['cpe:2.3:a:nec:esmpro_manager:6.42:*:*:*:*:*:*:*'],0,0
CVE-2020-5524,NEC Corporation,0.00068,8.8,0.0,1.0,0.0,1.0,1,2020-02-21,1.0,2020-02-19,,,1.0,"Aterm series (Aterm WF1200C firmware Ver1.2.1 and earlier, Aterm WG1200CR firmware Ver1.2.1 and earlier, Aterm WG2600HS firmware Ver1.3.2 and earlier) allows an attacker on the same network segment to execute arbitrary OS commands with root privileges via UPnP function.",CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-78'],"['cpe:2.3:h:nec:aterm_wg2600hs:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:aterm_wg2600hs_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_wf1200c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:aterm_wf1200c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_wg1200cr:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:aterm_wg1200cr_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2020-5525,NEC Corporation,0.00044,8.0,0.0,1.0,0.0,1.0,1,2020-02-21,0.0,,0.0,,,"Aterm series (Aterm WF1200C firmware Ver1.2.1 and earlier, Aterm WG1200CR firmware Ver1.2.1 and earlier, Aterm WG2600HS firmware Ver1.3.2 and earlier) allows an authenticated attacker on the same network segment to execute arbitrary OS commands with root privileges via management screen.",CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.1,5.9,['CWE-78'],"['cpe:2.3:o:nec:aterm_wg2600hs_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_wg2600hs:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:aterm_wf1200c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_wf1200c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:aterm_wg1200cr_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_wg1200cr:-:*:*:*:*:*:*:*']",0,0
CVE-2020-5533,NEC Corporation,0.00092,6.1,0.0,1.0,0.0,1.0,1,2020-02-21,1.0,2020-02-19,,,1.0,Cross-site scripting vulnerability in Aterm WG2600HS firmware Ver1.3.2 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:nec:aterm_wg2600hs_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_wg2600hs:-:*:*:*:*:*:*:*']",0,0
CVE-2020-5534,NEC Corporation,0.00044,8.0,0.0,1.0,0.0,1.0,1,2020-02-21,1.0,2020-02-19,,,1.0,Aterm WG2600HS firmware Ver1.3.2 and earlier allows an authenticated attacker on the same network segment to execute arbitrary OS commands with root privileges via unspecified vectors.,CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.1,5.9,['CWE-78'],"['cpe:2.3:o:nec:aterm_wg2600hs_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_wg2600hs:-:*:*:*:*:*:*:*']",0,0
CVE-2021-20680,NEC Corporation,0.00124,6.1,0.0,1.0,0.0,1.0,1,2021-04-26,1.0,2021-04-09,,,1.0,"Cross-site scripting vulnerability in NEC Aterm devices (Aterm WG1900HP2 firmware Ver.1.3.1 and earlier, Aterm WG1900HP firmware Ver.2.5.1 and earlier, Aterm WG1800HP4 firmware Ver.1.3.1 and earlier, Aterm WG1800HP3 firmware Ver.1.5.1 and earlier, Aterm WG1200HS2 firmware Ver.2.5.0 and earlier, Aterm WG1200HP3 firmware Ver.1.3.1 and earlier, Aterm WG1200HP2 firmware Ver.2.5.0 and earlier, Aterm W1200EX firmware Ver.1.3.1 and earlier, Aterm W1200EX-MS firmware Ver.1.3.1 and earlier, Aterm WG1200HS firmware all versions Aterm WG1200HP firmware all versions Aterm WF800HP firmware all versions Aterm WF300HP2 firmware all versions Aterm WR8165N firmware all versions Aterm W500P firmware all versions, and Aterm W300P firmware all versions) allows remote attackers to inject arbitrary script or HTML via unspecified vectors.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:nec:aterm_wg1900hp2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_wg1900hp2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:aterm_wg1900hp_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_wg1900hp:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:aterm_wg1800hp4_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_wg1800hp4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:aterm_wg1800hp3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_wg1800hp3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:aterm_wg1200hs3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_wg1200hs3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:aterm_wg1200hs2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_wg1200hs2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:aterm_wg1200hp3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_wg1200hp3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:aterm_wg1200hp2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_wg1200hp2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:aterm_w1200ex_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_w1200ex:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:aterm_w1200ex-ms_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_w1200ex-ms:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:aterm_wg1200hs_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_wg1200hs:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:aterm_wg1200hp_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_wg1200hp:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:aterm_wf800hp_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_wf800hp:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:aterm_wf300hp2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_wf300hp2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:aterm_wr8165n_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_wr8165n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:aterm_w500p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_w500p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:aterm_w300p_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_w300p:-:*:*:*:*:*:*:*']",0,0
CVE-2021-20708,NEC Corporation,0.00118,7.2,0.0,1.0,0.0,1.0,1,2021-04-26,1.0,2021-04-09,,,1.0,"NEC Aterm devices (Aterm WF1200CR firmware Ver1.3.2 and earlier, Aterm WG1200CR firmware Ver1.3.3 and earlier, and Aterm WG2600HS firmware Ver1.5.1 and earlier) allow authenticated attackers to execute arbitrary OS commands by sending a specially crafted request to a specific URL.",CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.2,5.9,['CWE-78'],"['cpe:2.3:o:nec:aterm_wf1200cr_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_wf1200cr:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:aterm_wg1200cr_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_wg1200cr:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:aterm_wg2600hs_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_wg2600hs:-:*:*:*:*:*:*:*']",0,0
CVE-2021-20709,NEC Corporation,0.00104,7.2,0.0,1.0,0.0,1.0,1,2021-04-26,1.0,2021-04-09,,,1.0,"Improper validation of integrity check value vulnerability in NEC Aterm WF1200CR firmware Ver1.3.2 and earlier, Aterm WG1200CR firmware Ver1.3.3 and earlier, and Aterm WG2600HS firmware Ver1.5.1 and earlier allows an attacker with an administrative privilege to execute arbitrary OS commands by sending a specially crafted request to a specific URL.",CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.2,5.9,['CWE-354'],"['cpe:2.3:o:nec:aterm_wf1200cr_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_wf1200cr:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:aterm_wg1200cr_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_wg1200cr:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:aterm_wg2600hs_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_wg2600hs:-:*:*:*:*:*:*:*']",0,0
CVE-2021-20711,NEC Corporation,0.00246,9.8,0.0,1.0,0.0,1.0,1,2021-04-26,1.0,2021-04-09,,,1.0,Aterm WG2600HS firmware Ver1.5.1 and earlier allows an attacker to execute arbitrary OS commands via unspecified vectors.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-78'],"['cpe:2.3:o:nec:aterm_wg2600hs_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_wg2600hs:-:*:*:*:*:*:*:*']",0,0
CVE-2021-20712,NEC Corporation,0.0009,5.3,0.0,1.0,0.0,1.0,1,2021-04-26,1.0,2021-04-09,,,1.0,"Improper access control vulnerability in NEC Aterm WG2600HS firmware Ver1.5.1 and earlier, and Aterm WX3000HP firmware Ver1.1.2 and earlier allows a device connected to the LAN side to be accessed from the WAN side due to the defect in the IPv6 firewall function.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,LOW,NONE,NONE,MEDIUM,3.9,1.4,['NVD-CWE-Other'],"['cpe:2.3:o:nec:aterm_wg2600hs_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_wg2600hs:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:aterm_wx3000hp_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:aterm_wx3000hp:-:*:*:*:*:*:*:*']",0,0
CVE-2016-1145,NEC Corporation,0.00377,7.5,0.0,0.0,1.0,0.0,0,2016-01-30,1.0,2016-01-29,,,1.0,Directory traversal vulnerability in WebManager in NEC EXPRESSCLUSTER X through 3.3 11.31 on Windows and through 3.3 3.3.1-1 on Linux and Solaris allows remote attackers to read arbitrary files via unspecified vectors.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-22'],"['cpe:2.3:a:nec:expresscluster_x:3.3:*:*:*:*:linux_kernel:*:*', 'cpe:2.3:a:nec:expresscluster_x:3.3:*:*:*:*:windows:*:*']",0,0
CVE-2019-20025,NEC Corporation,0.00667,9.8,0.0,1.0,0.0,1.0,0,2020-07-29,0.0,,0.0,,,"Certain builds of NEC SV9100 software could allow an unauthenticated, remote attacker to log into a device running an affected release with a hardcoded username and password, aka a Static Credential Vulnerability. The vulnerability is due to an undocumented user account with manufacturer privilege level. An attacker could exploit this vulnerability by using this account to remotely log into an affected device. A successful exploit could allow the attacker to log into the device with manufacturer level access. This vulnerability affects SV9100 PBXes that are running software release 6.0 or higher. This vulnerability does not affect SV9100 software releases prior to 6.0.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-798'],"['cpe:2.3:h:nec:sv9100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:sv9100_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2019-20026,NEC Corporation,0.00176,7.5,0.0,1.0,0.0,1.0,0,2020-07-29,0.0,,0.0,,,The WebPro interface in NEC SV9100 software releases 7.0 or higher allows unauthenticated remote attackers to reset all existing usernames and passwords to default values via a crafted request.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,HIGH,NONE,HIGH,3.9,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:nec:sv9100_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:sv9100:-:*:*:*:*:*:*:*']",0,0
CVE-2019-20027,NEC Corporation,0.00309,9.8,0.0,1.0,0.0,1.0,0,2020-07-29,0.0,,0.0,,,"Aspire-derived NEC PBXes, including the SV8100, SV9100, SL1100 and SL2100 with software releases 7.0 or higher contain the possibility if incorrectly configured to allow a blank username and password combination to be entered as a valid, successfully authenticating account.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-287'],"['cpe:2.3:h:nec:sv8100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:sv8100_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:sv9100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:sv9100_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:sl1100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:sl1100_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:sl2100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:sl2100_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2019-20028,NEC Corporation,0.00168,7.5,0.0,1.0,0.0,1.0,0,2020-07-29,0.0,,0.0,,,"Aspire-derived NEC PBXes operating InMail software, including all versions of SV8100, SV9100, SL1100 and SL2100 devices allow unauthenticated read-only access to voicemails, greetings, and voice response system content through a system's WebPro administration interface.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:nec:sv8100_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:sv8100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:sv9100_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:sv9100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:sl1100_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:sl1100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:sl2100_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:sl2100:-:*:*:*:*:*:*:*']",0,0
CVE-2019-20030,NEC Corporation,0.00044,7.8,0.0,1.0,0.0,1.0,0,2020-07-29,0.0,,0.0,,,An attacker with knowledge of the modem access number on a NEC UM8000 voicemail system may use SSH tunneling or standard Linux utilities to gain access to the system's LAN port. All versions are affected.,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:nec:um8000_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:um8000:-:*:*:*:*:*:*:*']",0,0
CVE-2019-20031,NEC Corporation,0.00168,9.1,0.0,1.0,0.0,1.0,0,2020-07-29,0.0,,0.0,,,"NEC UM8000, UM4730 and prior non-InMail voicemail systems with all known software versions may permit an infinite number of login attempts in the telephone user interface (TUI), effectively allowing brute force attacks.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,NONE,CRITICAL,3.9,5.2,['CWE-307'],"['cpe:2.3:o:nec:um8000_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:um8000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:um4730_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:um4730:-:*:*:*:*:*:*:*']",0,0
CVE-2019-20033,NEC Corporation,0.00309,9.8,0.0,1.0,0.0,1.0,0,2020-07-29,0.0,,0.0,,,"On Aspire-derived NEC PBXes, including all versions of SV8100 devices, a set of documented, static login credentials may be used to access the DIM interface.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-287'],"['cpe:2.3:o:nec:sv8100_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:sv8100:-:*:*:*:*:*:*:*']",0,0
CVE-2020-17408,NEC Corporation,0.05037,7.5,0.0,0.0,1.0,0.0,0,2020-09-10,1.0,2020-08-28,,,1.0,"This vulnerability allows remote attackers to disclose sensitive information on affected installations of NEC ExpressCluster 4.1. Authentication is not required to exploit this vulnerability. The specific flaw exists within the clpwebmc executable. Due to the improper restriction of XML External Entity (XXE) references, a specially-crafted document specifying a URI causes the XML parser to access the URI and embed the contents back into the XML document for further processing. An attacker can leverage this vulnerability to disclose information in the context of SYSTEM. Was ZDI-CAN-10801.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-611'],"['cpe:2.3:a:nec:expresscluster_x:4.1:*:*:*:*:windows:*:*', 'cpe:2.3:a:nec:expresscluster_x:4.2:*:*:*:*:windows:*:*']",0,0
CVE-2020-5632,NEC Corporation,0.00044,7.8,0.0,0.0,1.0,0.0,0,2020-10-06,1.0,2020-09-30,,,1.0,"InfoCage SiteShell series (Host type SiteShell for IIS V1.4, V1.5, and V1.6, Host type SiteShell for IIS prior to revision V2.0.0.6, V2.1.0.7, V2.1.1.6, V3.0.0.11, V4.0.0.6, V4.1.0.5, and V4.2.0.1, Host type SiteShell for Apache Windows V1.4, V1.5, and V1.6, and Host type SiteShell for Apache Windows prior to revision V2.0.0.6, V2.1.0.7, V2.1.1.6, V3.0.0.11, V4.0.0.6, V4.1.0.5, and V4.2.0.1) allow authenticated attackers to bypass access restriction and to execute arbitrary code with an elevated privilege via a specially crafted executable files.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:a:nec:infocage_siteshell:*:*:*:*:*:apache_windows:*:*', 'cpe:2.3:a:nec:infocage_siteshell:*:*:*:*:*:iis:*:*', 'cpe:2.3:a:nec:infocage_siteshell:*:*:*:*:*:apache_windows:*:*', 'cpe:2.3:a:nec:infocage_siteshell:*:*:*:*:*:iis:*:*', 'cpe:2.3:a:nec:infocage_siteshell:*:*:*:*:*:apache_windows:*:*', 'cpe:2.3:a:nec:infocage_siteshell:*:*:*:*:*:iis:*:*', 'cpe:2.3:a:nec:infocage_siteshell:*:*:*:*:*:apache_windows:*:*', 'cpe:2.3:a:nec:infocage_siteshell:*:*:*:*:*:iis:*:*', 'cpe:2.3:a:nec:infocage_siteshell:*:*:*:*:*:apache_windows:*:*', 'cpe:2.3:a:nec:infocage_siteshell:*:*:*:*:*:iis:*:*', 'cpe:2.3:a:nec:infocage_siteshell:*:*:*:*:*:apache_windows:*:*', 'cpe:2.3:a:nec:infocage_siteshell:*:*:*:*:*:iis:*:*', 'cpe:2.3:a:nec:infocage_siteshell:*:*:*:*:*:apache_windows:*:*', 'cpe:2.3:a:nec:infocage_siteshell:*:*:*:*:*:iis:*:*', 'cpe:2.3:a:nec:infocage_siteshell:1.4:*:*:*:*:apache_windows:*:*', 'cpe:2.3:a:nec:infocage_siteshell:1.4:*:*:*:*:iis:*:*', 'cpe:2.3:a:nec:infocage_siteshell:1.5:*:*:*:*:apache_windows:*:*', 'cpe:2.3:a:nec:infocage_siteshell:1.5:*:*:*:*:iis:*:*', 'cpe:2.3:a:nec:infocage_siteshell:1.6:*:*:*:*:apache_windows:*:*', 'cpe:2.3:a:nec:infocage_siteshell:1.6:*:*:*:*:iis:*:*']",0,0
CVE-2020-5635,NEC Corporation,0.00151,8.8,0.0,1.0,0.0,1.0,0,2020-12-14,1.0,2020-12-11,,,1.0,"Aterm SA3500G firmware versions prior to Ver. 3.5.9 allows an attacker on the adjacent network to send a specially crafted request to a specific URL, which may result in an arbitrary command execution.",CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-78'],"['cpe:2.3:h:necplatforms:aterm_sa3500g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:necplatforms:aterm_sa3500g_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2020-5684,NEC Corporation,0.00065,4.8,0.0,1.0,1.0,0.0,0,2020-12-24,1.0,2020-12-18,,,1.0,"iSM client versions from V5.1 prior to V12.1 running on NEC Storage Manager or NEC Storage Manager Express does not verify a server certificate properly, which allows a man-in-the-middle attacker to eavesdrop on an encrypted communication or alter the communication via a crafted certificate.",CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N,NETWORK,HIGH,NONE,NONE,UNCHANGED,LOW,LOW,NONE,MEDIUM,2.2,2.5,['CWE-295'],"['cpe:2.3:a:nec:ism_server:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:m120:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:m12e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:m320:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:m320f:-:*:*:*:*:*:*:*']",0,0
CVE-2020-5685,NEC Corporation,0.00246,9.8,0.0,1.0,0.0,1.0,0,2021-01-13,1.0,2021-01-14,,,0.0,UNIVERGE SV9500 series from V1 to V7and SV8500 series from S6 to S8 allows an attacker to execute arbitrary OS commands or cause a denial-of-service (DoS) condition by sending a specially crafted request to a specific URL.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-78'],"['cpe:2.3:o:nec:univerge_sv9500_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:univerge_sv9500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:univerge_sv8500_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:univerge_sv8500:-:*:*:*:*:*:*:*']",0,0
CVE-2020-5686,NEC Corporation,0.00174,7.5,0.0,1.0,0.0,1.0,0,2021-01-13,1.0,2021-01-04,,,1.0,Incorrect implementation of authentication algorithm issue in UNIVERGE SV9500 series from V1 to V7and SV8500 series from S6 to S8 allows an attacker to access the remote system maintenance feature and obtain the information by sending a specially crafted request to a specific URL.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-287'],"['cpe:2.3:o:nec:univerge_sv9500_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:univerge_sv9500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:univerge_sv8500_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:univerge_sv8500:-:*:*:*:*:*:*:*']",0,0
CVE-2021-20653,NEC Corporation,0.00114,5.3,0.0,1.0,0.0,1.0,0,2021-02-17,1.0,2021-02-15,,,1.0,"Calsos CSDJ (CSDJ-B 01.08.00 and earlier, CSDJ-H 01.08.00 and earlier, CSDJ-D 01.08.00 and earlier, and CSDJ-A 03.08.00 and earlier) allows remote attackers to bypass access restriction and to obtain unauthorized historical data without access privileges via unspecified vectors.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,LOW,NONE,NONE,MEDIUM,3.9,1.4,['CWE-276'],"['cpe:2.3:o:nec:csdj-b_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:csdj-b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:csdj-h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:csdj-h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:csdj-d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:csdj-d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:csdj-a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:csdj-a:-:*:*:*:*:*:*:*']",0,0
CVE-2021-20677,NEC Corporation,0.00109,3.1,0.0,1.0,0.0,0.0,0,2021-03-26,1.0,2021-03-22,,,1.0,"UNIVERGE Aspire series PBX (UNIVERGE Aspire WX from 1.00 to 3.51, UNIVERGE Aspire UX from 1.00 to 9.70, UNIVERGE SV9100 from 1.00 to 10.70, and SL2100 from 1.00 to 3.00) allows a remote authenticated attacker to cause system down and a denial of service (DoS) condition by sending a specially crafted command.",CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L,NETWORK,HIGH,LOW,NONE,UNCHANGED,NONE,NONE,LOW,LOW,1.6,1.4,['NVD-CWE-noinfo'],"['cpe:2.3:o:necplatforms:univerge_aspire_wx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:necplatforms:univerge_aspire_wx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:necplatforms:univerge_aspire_ux_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:necplatforms:univerge_aspire_ux:-:*:*:*:*:*:*:*', 'cpe:2.3:o:necplatforms:univerge_sv9100_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:necplatforms:univerge_sv9100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:necplatforms:sl2100_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:necplatforms:sl2100:-:*:*:*:*:*:*:*']",0,0
CVE-2021-20701,NEC Corporation,0.00659,9.8,0.0,0.0,1.0,0.0,0,2021-11-03,1.0,2022-04-15,,,0.0,"Buffer overflow vulnerability in the Disk Agent CLUSTERPRO X 4.3 for Windows and earlier, EXPRESSCLUSTER X 4.3 for Windows and earlier, CLUSTERPRO X 4.3 SingleServerSafe for Windows and earlier, EXPRESSCLUSTER X 4.3 SingleServerSafe for Windows and earlier allows attacker to remote code execution via a network.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-120'],"['cpe:2.3:a:nec:clusterpro_x:*:*:*:*:*:windows:*:*', 'cpe:2.3:a:nec:clusterpro_x_singleserversafe:*:*:*:*:*:windows:*:*', 'cpe:2.3:a:nec:expresscluster_x:*:*:*:*:*:windows:*:*', 'cpe:2.3:a:nec:expresscluster_x_singleserversafe:*:*:*:*:*:windows:*:*']",0,0
CVE-2021-20703,NEC Corporation,0.00659,9.8,0.0,0.0,1.0,0.0,0,2021-11-03,1.0,2022-04-15,,,0.0,"Buffer overflow vulnerability in the Transaction Server CLUSTERPRO X 4.3 for Windows and earlier, EXPRESSCLUSTER X 4.3 for Windows and earlier, CLUSTERPRO X 4.3 SingleServerSafe for Windows and earlier, EXPRESSCLUSTER X 4.3 SingleServerSafe for Windows and earlier allows attacker to remote code execution via a network.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-120'],"['cpe:2.3:a:nec:clusterpro_x:*:*:*:*:*:windows:*:*', 'cpe:2.3:a:nec:clusterpro_x_singleserversafe:*:*:*:*:*:windows:*:*', 'cpe:2.3:a:nec:expresscluster_x:*:*:*:*:*:windows:*:*', 'cpe:2.3:a:nec:expresscluster_x_singleserversafe:*:*:*:*:*:windows:*:*']",0,0
CVE-2021-20704,NEC Corporation,0.00659,9.8,0.0,0.0,1.0,0.0,0,2021-11-03,1.0,2022-04-15,,,0.0,"Buffer overflow vulnerability in the compatible API with previous versions CLUSTERPRO X 4.3 for Windows and earlier, EXPRESSCLUSTER X 4.3 for Windows and earlier, CLUSTERPRO X 4.3 SingleServerSafe for Windows and earlier, EXPRESSCLUSTER X 4.3 SingleServerSafe for Windows and earlier allows attacker to remote code execution via a network.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-120'],"['cpe:2.3:a:nec:clusterpro_x:*:*:*:*:*:windows:*:*', 'cpe:2.3:a:nec:clusterpro_x_singleserversafe:*:*:*:*:*:windows:*:*', 'cpe:2.3:a:nec:expresscluster_x:*:*:*:*:*:windows:*:*', 'cpe:2.3:a:nec:expresscluster_x_singleserversafe:*:*:*:*:*:windows:*:*']",0,0
CVE-2021-20705,NEC Corporation,0.00172,7.5,0.0,0.0,1.0,0.0,0,2021-11-03,1.0,2022-04-15,,,0.0,"Improper input validation vulnerability in the WebManager CLUSTERPRO X 4.3 for Windows and earlier, EXPRESSCLUSTER X 4.3 for Windows and earlier, CLUSTERPRO X 4.3 SingleServerSafe for Windows and earlier, EXPRESSCLUSTER X 4.3 SingleServerSafe for Windows and earlier allows attacker to remote file upload via network.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,HIGH,NONE,HIGH,3.9,3.6,['CWE-20'],"['cpe:2.3:a:nec:clusterpro_x:*:*:*:*:*:windows:*:*', 'cpe:2.3:a:nec:clusterpro_x_singleserversafe:*:*:*:*:*:windows:*:*', 'cpe:2.3:a:nec:expresscluster_x:*:*:*:*:*:windows:*:*', 'cpe:2.3:a:nec:expresscluster_x_singleserversafe:*:*:*:*:*:windows:*:*']",0,0
CVE-2021-20706,NEC Corporation,0.00172,7.5,0.0,0.0,1.0,0.0,0,2021-11-03,1.0,2022-04-15,,,0.0,"Improper input validation vulnerability in the WebManager CLUSTERPRO X 4.3 for Windows and earlier, EXPRESSCLUSTER X 4.3 for Windows and earlier, CLUSTERPRO X 4.3 SingleServerSafe for Windows and earlier, EXPRESSCLUSTER X 4.3 SingleServerSafe for Windows and earlier allows attacker to remote file upload via network.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,HIGH,NONE,HIGH,3.9,3.6,['CWE-20'],"['cpe:2.3:a:nec:clusterpro_x:*:*:*:*:*:windows:*:*', 'cpe:2.3:a:nec:clusterpro_x_singleserversafe:*:*:*:*:*:windows:*:*', 'cpe:2.3:a:nec:expresscluster_x:*:*:*:*:*:windows:*:*', 'cpe:2.3:a:nec:expresscluster_x_singleserversafe:*:*:*:*:*:windows:*:*']",0,0
CVE-2021-20707,NEC Corporation,0.00168,7.5,0.0,0.0,1.0,0.0,0,2021-11-03,1.0,2022-04-15,,,0.0,"Improper input validation vulnerability in the Transaction Server CLUSTERPRO X 4.3 for Windows and earlier, EXPRESSCLUSTER X 4.3 for Windows and earlier, CLUSTERPRO X 4.3 SingleServerSafe for Windows and earlier, EXPRESSCLUSTER X 4.3 SingleServerSafe for Windows and earlier allows attacker to read files upload via network..",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-20'],"['cpe:2.3:a:nec:clusterpro_x:*:*:*:*:*:windows:*:*', 'cpe:2.3:a:nec:clusterpro_x_singleserversafe:*:*:*:*:*:windows:*:*', 'cpe:2.3:a:nec:expresscluster_x:*:*:*:*:*:windows:*:*', 'cpe:2.3:a:nec:expresscluster_x_singleserversafe:*:*:*:*:*:windows:*:*']",0,0
CVE-2021-20740,NEC Corporation,0.00724,8.8,0.0,1.0,0.0,1.0,0,2021-06-28,1.0,2021-06-18,,,1.0,"Hitachi Virtual File Platform Versions prior to 5.5.3-09 and Versions prior to 6.4.3-09, and NEC Storage M Series NAS Gateway Nh4a/Nh8a versions prior to FOS 5.5.3-08(NEC2.5.4a) and Nh4b/Nh8b, Nh4c/Nh8c versions prior to FOS 6.4.3-08(NEC3.4.2) allow remote authenticated attackers to execute arbitrary OS commands with root privileges via unspecified vectors.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-78'],"['cpe:2.3:a:hitachi:virtual_file_platform:*:*:*:*:*:*:*:*', 'cpe:2.3:a:hitachi:virtual_file_platform:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:nas_gateway_nh4a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:nas_gateway_nh4a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:nas_gateway_nh8a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:nas_gateway_nh8a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:nas_gateway_nh4b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:nas_gateway_nh4b_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:nas_gateway_nh8b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:nas_gateway_nh8b_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:nas_gateway_nh4c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:nas_gateway_nh4c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:nas_gateway_nh8c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:nas_gateway_nh8c:-:*:*:*:*:*:*:*']",0,0
CVE-2022-25621,NEC Corporation,0.00435,9.8,0.0,1.0,0.0,1.0,0,2022-03-11,1.0,2022-03-09,,,1.0,"UUNIVERGE WA 1020 Ver8.2.11 and prior, UNIVERGE WA 1510 Ver8.2.11 and prior, UNIVERGE WA 1511 Ver8.2.11 and prior, UNIVERGE WA 1512 Ver8.2.11 and prior, UNIVERGE WA 2020 Ver8.2.11 and prior, UNIVERGE WA 2021 Ver8.2.11 and prior, UNIVERGE WA 2610-AP Ver8.2.11 and prior, UNIVERGE WA 2611-AP Ver8.2.11 and prior, UNIVERGE WA 2611E-AP Ver8.2.11 and prior, UNIVERGE WA WA2612-AP Ver8.2.11 and prior allows a remote attacker to execute arbitrary OS commands.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-78'],"['cpe:2.3:o:nec:univerge_wa1020_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:univerge_wa1020:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:univerge_wa1510_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:univerge_wa1510:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:univerge_wa1511_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:univerge_wa1511:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:univerge_wa1512_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:univerge_wa1512:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:univerge_wa2020_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:univerge_wa2020:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:univerge_wa2021_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:univerge_wa2021:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:univerge_wa2610-ap_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:univerge_wa2610-ap:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:univerge_wa2611-ap_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:univerge_wa2611-ap:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:univerge_wa2611e-ap_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:univerge_wa2611e-ap:-:*:*:*:*:*:*:*', 'cpe:2.3:o:nec:univerge_wa2612-ap_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:univerge_wa2612-ap:-:*:*:*:*:*:*:*']",0,0
CVE-2022-34822,NEC Corporation,0.00405,9.8,0.0,0.0,1.0,0.0,0,2022-11-08,1.0,2022-11-04,,,1.0,"Path traversal vulnerability in CLUSTERPRO X 5.0 for Windows and earlier, EXPRESSCLUSTER X 5.0 for Windows and earlier, CLUSTERPRO X 5.0 SingleServerSafe for Windows and earlier, EXPRESSCLUSTER X 5.0 SingleServerSafe for Windows and earlier allows a remote unauthenticated attacker to overwrite existing files on the file system and to potentially execute arbitrary code.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-22'],"['cpe:2.3:a:nec:expresscluster_x:*:*:*:*:*:windows:*:*', 'cpe:2.3:a:nec:expresscluster_x_singleserversafe:*:*:*:*:*:windows:*:*']",0,0
CVE-2018-10544,Meross,0.00434,9.8,0.0,1.0,0.0,1.0,1,2018-05-02,1.0,2018-04-28,,,1.0,Meross MSS110 devices through 1.1.24 contain an unauthenticated admin.htm administrative interface.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-287'],"['cpe:2.3:h:meross:mss110:-:*:*:*:*:*:*:*', 'cpe:2.3:o:meross:mss110_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2018-6401,Meross,0.00659,9.8,0.0,1.0,0.0,1.0,1,2018-05-02,1.0,2018-04-28,,,1.0,Meross MSS110 devices before 1.1.24 contain a TELNET listener providing access for an undocumented admin account with a blank password.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-798'],"['cpe:2.3:o:meross:mss110_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:meross:mss110:-:*:*:*:*:*:*:*']",0,0
CVE-2021-3774,Meross,0.00216,6.5,0.0,1.0,0.0,1.0,0,2021-11-05,1.0,2021-11-04,,,1.0,"Meross Smart Wi-Fi 2 Way Wall Switch (MSS550X), on its 3.1.3 version and before, creates an open Wi-Fi Access Point without the required security measures in its initial setup. This could allow a remote attacker to obtain the Wi-Fi SSID as well as the password configured by the user from Meross app via Http/JSON plain request.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,NONE,NONE,MEDIUM,2.8,3.6,['CWE-319'],"['cpe:2.3:o:meross:mss550x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:meross:mss550x:-:*:*:*:*:*:*:*']",1,0
CVE-2018-11314,Roku,0.00316,9.6,0.0,1.0,0.0,0.0,1,2018-07-03,0.0,,0.0,,,The External Control API in Roku and Roku TV products allow unauthorized access via a DNS Rebind attack. This can result in remote device control and privileged device and network information to be exfiltrated by an attacker.,CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,CHANGED,HIGH,HIGH,HIGH,CRITICAL,2.8,6.0,['CWE-20'],"['cpe:2.3:h:roku:roku_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:roku:roku:-:*:*:*:*:*:*:*']",0,0
CVE-2022-27152,Roku,0.00044,5.7,0.0,1.0,0.0,1.0,0,2022-04-08,0.0,,0.0,,,Roku devices running RokuOS v9.4.0 build 4200 or earlier that uses a Realtek WiFi chip is vulnerable to Arbitrary file modification.,CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N,ADJACENT_NETWORK,LOW,LOW,NONE,UNCHANGED,NONE,HIGH,NONE,MEDIUM,2.1,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:roku:roku_os:*:*:*:*:*:*:*:*', 'cpe:2.3:h:roku:express:-:*:*:*:*:*:*:*', 'cpe:2.3:h:roku:express_4k\\+:-:*:*:*:*:*:*:*', 'cpe:2.3:h:roku:roku_tv:-:*:*:*:*:*:*:*', 'cpe:2.3:h:roku:streambar:-:*:*:*:*:*:*:*', 'cpe:2.3:h:roku:streambar_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:h:roku:streaming_stick_4k:-:*:*:*:*:*:*:*', 'cpe:2.3:h:roku:streaming_stick_4k\\+:-:*:*:*:*:*:*:*', 'cpe:2.3:h:roku:ultra:-:*:*:*:*:*:*:*', 'cpe:2.3:h:roku:wireless_speakers:-:*:*:*:*:*:*:*', 'cpe:2.3:h:roku:wireless_subwoofer:-:*:*:*:*:*:*:*']",0,0
CVE-2018-11316,Sonos,0.0022,9.6,0.0,1.0,0.0,1.0,1,2018-07-03,0.0,,0.0,,,The UPnP HTTP server on Sonos wireless speaker products allow unauthorized access via a DNS rebinding attack. This can result in remote device control and privileged device and network information to be exfiltrated by an attacker.,CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,CHANGED,HIGH,HIGH,HIGH,CRITICAL,2.8,6.0,['CWE-20'],"['cpe:2.3:o:sonos:sonos_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:sonos:sonos:-:*:*:*:*:*:*:*']",0,0
CVE-2020-9285,Sonos,0.00081,6.8,0.0,1.0,0.0,1.0,0,2022-10-20,1.0,2020-08-06,,,1.0,Some versions of Sonos One (1st and 2nd generation) allow partial or full memory access via attacker controlled hardware that can be attached to the Mini-PCI Express slot on the motherboard that hosts the WiFi card on the device.,CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,PHYSICAL,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.9,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:h:sonos:one:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sonos:one_firmware:-:*:*:*:*:*:*:*']",0,0
CVE-2022-24046,Sonos,0.00146,8.8,0.0,1.0,1.0,0.0,0,2022-02-18,1.0,2022-02-14,,,1.0,"This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Sonos One Speaker prior to 3.4.1 (S2 systems) and 11.2.13 build 57923290 (S1 systems). Authentication is not required to exploit this vulnerability. The specific flaw exists within the anacapd daemon. The issue results from the lack of proper validation of user-supplied data, which can result in an integer underflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15828.",CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-191'],"['cpe:2.3:a:sonos:s1:*:*:*:*:*:*:*:*', 'cpe:2.3:a:sonos:s2:*:*:*:*:*:*:*:*', 'cpe:2.3:h:sonos:one:-:*:*:*:*:*:*:*']",0,0
CVE-2022-24049,Sonos,0.0195,9.8,0.0,1.0,1.0,0.0,0,2022-02-18,1.0,2022-02-10,,,1.0,This vulnerability allows remote attackers to execute arbitrary code on affected installations of Sonos One Speaker prior to 3.4.1 (S2 systems) and 11.2.13 build 57923290 (S1 systems). Authentication is not required to exploit this vulnerability. The specific flaw exists within the ALAC audio codec. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15798.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,"['CWE-787', 'CWE-121']","['cpe:2.3:a:sonos:s1:*:*:*:*:*:*:*:*', 'cpe:2.3:a:sonos:s2:*:*:*:*:*:*:*:*', 'cpe:2.3:h:sonos:one:-:*:*:*:*:*:*:*']",0,0
CVE-2018-11629,Lutron,0.00514,9.8,0.0,1.0,0.0,1.0,1,2018-06-02,0.0,,0.0,,,"Default and unremovable support credentials (user:lutron password:integration) allow attackers to gain total super user control of an IoT device through a TELNET session to products using the HomeWorks QS Lutron integration protocol Revision M to Revision Y. NOTE: The vendor disputes this id as not being a vulnerability because what can be done through the ports revolve around controlling lighting, not code execution. A certain set of commands are listed, which bear some similarity to code, but they are not arbitrary and do not allow admin-level control of a machine",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-798'],"['cpe:2.3:o:lutron:stanza_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:lutron:stanza:-:*:*:*:*:*:*:*', 'cpe:2.3:o:lutron:radiora_2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:lutron:radiora_2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:lutron:homeworks_qs_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:lutron:homeworks_qs:-:*:*:*:*:*:*:*']",0,0
CVE-2018-11681,Lutron,0.00514,9.8,0.0,1.0,0.0,1.0,1,2018-06-02,0.0,,0.0,,,"Default and unremovable support credentials (user:nwk password:nwk2) allow attackers to gain total super user control of an IoT device through a TELNET session to products using the RadioRA 2 Lutron integration protocol Revision M to Revision Y. NOTE: The vendor disputes this id as not being a vulnerability because what can be done through the ports revolve around controlling lighting, not code execution. A certain set of commands are listed, which bear some similarity to code, but they are not arbitrary and do not allow admin-level control of a machine",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-798'],"['cpe:2.3:o:lutron:stanza_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:lutron:stanza:-:*:*:*:*:*:*:*', 'cpe:2.3:o:lutron:radiora_2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:lutron:radiora_2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:lutron:homeworks_qs_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:lutron:homeworks_qs:-:*:*:*:*:*:*:*']",0,0
CVE-2018-11682,Lutron,0.00514,9.8,0.0,1.0,0.0,1.0,1,2018-06-02,0.0,,0.0,,,"Default and unremovable support credentials allow attackers to gain total super user control of an IoT device through a TELNET session to products using the Stanza Lutron integration protocol Revision M to Revision Y. NOTE: The vendor disputes this id as not being a vulnerability because what can be done through the ports revolve around controlling lighting, not code execution. A certain set of commands are listed, which bear some similarity to code, but they are not arbitrary and do not allow admin-level control of a machine",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-798'],"['cpe:2.3:o:lutron:stanza_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:lutron:stanza:-:*:*:*:*:*:*:*', 'cpe:2.3:o:lutron:radiora_2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:lutron:radiora_2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:lutron:homeworks_qs_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:lutron:homeworks_qs:-:*:*:*:*:*:*:*']",0,0
CVE-2018-7276,Lutron,0.00802,7.5,0.0,1.0,0.0,1.0,1,2018-02-21,0.0,,0.0,,,"An issue was discovered on Lutron Quantum BACnet Integration 2.0 (firmware 3.2.243) devices. Remote attackers can obtain potentially sensitive information via a /DbXmlInfo.xml request, as demonstrated by the Latitude/Longitude of the device.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-200'],"['cpe:2.3:o:lutron:quantum_bacnet_integration_firmware:3.2.243:*:*:*:*:*:*:*', 'cpe:2.3:h:lutron:quantum_bacnet_integration:2.0:*:*:*:*:*:*:*']",0,0
CVE-2018-8880,Lutron,0.04009,7.5,1.0,1.0,0.0,1.0,1,2018-04-23,0.0,,0.0,,,"Lutron Quantum BACnet Integration 2.0 (firmware 3.2.243) doesn't check for correct user authentication before showing the /deviceIP information, which leads to internal network information disclosure.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-200'],"['cpe:2.3:o:lutron:quantum_bacnet_integration_firmware:3.2.243:*:*:*:*:*:*:*', 'cpe:2.3:h:lutron:quantum_bacnet_integration:2.0:*:*:*:*:*:*:*']",1,0
CVE-2018-11692,Canon,0.00321,9.8,0.0,1.0,0.0,1.0,1,2018-06-04,0.0,,0.0,,,"An issue was discovered on Canon LBP6650, LBP3370, LBP3460, and LBP7750C devices. It is possible to bypass the Administrator Mode authentication for /tlogin.cgi via vectors involving frame.cgi?page=DevStatus. NOTE: the vendor reportedly responded that this issue occurs when a customer keeps the default settings without using the countermeasures and best practices shown in the documentation",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-287'],"['cpe:2.3:o:canon:lbp3370_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:lbp3370:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:lbp3460_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:lbp3460:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:lbp7750c_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:lbp7750c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:lbp6650_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:lbp6650:-:*:*:*:*:*:*:*']",0,0
CVE-2018-11711,Canon,0.00968,9.8,0.0,1.0,0.0,1.0,1,2018-06-04,0.0,,0.0,,,A remote attacker can bypass the System Manager Mode on the Canon MF210 and MF220 web interface without knowing the PIN for /login.html via vectors involving /portal_top.html to get full access to the device. NOTE: the vendor reportedly responded that this issue occurs when a customer keeps the default settings without using the countermeasures and best practices shown in the documentation,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-287'],"['cpe:2.3:o:canon:mf210_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf210:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:mf220_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf220:-:*:*:*:*:*:*:*']",0,0
CVE-2018-12048,Canon,0.00968,9.8,0.0,1.0,0.0,1.0,1,2018-06-08,0.0,,0.0,,,A remote attacker can bypass the Management Mode on the Canon LBP7110Cw web interface without a PIN for /checkLogin.cgi via vectors involving /portal_top.html to get full access to the device. NOTE: the vendor reportedly responded that this issue occurs when a customer keeps the default settings without using the countermeasures and best practices shown in the documentation,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-287'],"['cpe:2.3:o:canon:lbp7110cw_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:lbp7110cw:-:*:*:*:*:*:*:*']",0,0
CVE-2018-12049,Canon,0.00968,9.8,0.0,1.0,0.0,1.0,1,2018-06-08,0.0,,0.0,,,A remote attacker can bypass the System Manager Mode on the Canon LBP6030w web interface without a PIN for /checkLogin.cgi via vectors involving /portal_top.html to get full access to the device. NOTE: the vendor reportedly responded that this issue occurs when a customer keeps the default settings without using the countermeasures and best practices shown in the documentation,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-287'],"['cpe:2.3:o:canon:lbp6030w_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:lbp6030w:-:*:*:*:*:*:*:*']",0,0
CVE-2019-5994,Canon,0.00915,8.8,0.0,1.0,0.0,1.0,1,2019-08-06,1.0,2019-08-06,,,1.0,"Buffer overflow in PTP (Picture Transfer Protocol) of EOS series digital cameras (EOS-1D X firmware version 2.1.0 and earlier, EOS-1D X MKII firmware version 1.1.6 and earlier, EOS-1D C firmware version 1.4.1 and earlier, EOS 5D MARK III firmware version 1.3.5 and earlier, EOS 5D MARK IV firmware version 1.2.0 and earlier, EOS 5DS firmware version 1.1.2 and earlier, EOS 5DS R firmware version 1.1.2 and earlier, EOS 6D firmware version 1.1.8 and earlier, EOS 6D MARK II firmware version 1.0.4 and earlier, EOS 7D MARK II firmware version 1.1.2 and earlier, EOS 70 D firmware version 1.1.2 and earlier, EOS 80 D firmware version 1.0.2 and earlier, EOS KISS X7I / EOS D REBEL T5I / EOS 700D firmware version 1.1.5 and earlier, EOS KISS X8I / EOS D REBEL T6I / EOS 750D firmware version 1.0.0 and earlier, EOS KISS X9I / EOS D REBEL T7I / EOS 800D firmware version 1.0.1 and earlier, EOS KISS X7 / EOS D REBEL SL1 / EOS 100D firmware version 1.0.1 and earlier, EOS KISS X9 / EOS D REBEL SL2 / EOS 200D firmware version 1.0.1 and earlier, EOS KISS X10 / EOS D REBEL SL3 / EOS 200D / EOS 250D firmware version 1.0.1 and earlier, EOS 8000D / EOS D REBEL T6S / EOS 760D firmware version 1.0.0 and earlier, EOS 9000D / EOS 77D firmware version 1.0.2 and earlier, EOS KISS X70 / EOS D REBEL T5 / EOS 1200D firmware version 1.0.2 and earlier, EOS D REBEL T5 RE / EOS 1200D MG / EOS HI firmware version 1.0.2 and earlier, EOS KISS X80 / EOS D REBEL T6 / EOS 1300D firmware version 1.1.0 and earlier, EOS KISS X90 / EOS D REBEL T7 / EOS 1500D / EOS 2000D firmware version 1.0.0 and earlier, EOS D REBEL T100 / EOS 3000D / EOS 4000D firmware version 1.0.0 and earlier, EOS R firmware version 1.3.0 and earlier, EOS RP firmware version 1.2.0 and earlier, EOS RP GOLD firmware version 1.2.0 and earlier, EOS M2 firmware version 1.0.3 and earlier, EOS M3 firmware version 1.2.0 and earlier, EOS M5 firmware version 1.0.1 and earlier, EOS M6 firmware version 1.0.1 and earlier, EOS M6(China) firmware version 5.0.0 and earlier, EOS M10 firmware version 1.1.0 and earlier, EOS M100 firmware version 1.0.0 and earlier, EOS KISS M / EOS M50 firmware version 1.0.2 and earlier) and PowerShot SX740 HS firmware version 1.0.1 and earlier, PowerShot SX70 HS firmware version 1.1.0 and earlier, and PowerShot G5Xmark II firmware version 1.0.1 and earlier allows an attacker on the same network segment to trigger the affected product being unresponsive or to execute arbitrary code on the affected product via SendObjectInfo command.",CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-119'],"['cpe:2.3:o:canon:eos-1d_x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos-1d_x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos-1d_x_mkii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos-1d_x_mkii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos-1d_c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos-1d_c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_5d_mark_iii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_5d_mark_iii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_5d_mark_iv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_5d_mark_iv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_5ds_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_5ds:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_5ds_r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_5ds_r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_6d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_6d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_7d_mark_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_7d_mark_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_70d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_70d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_80d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_80d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x7i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x7i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t5i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t5i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_700d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_700d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x8i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x8i:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t6i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t6i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_750d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_750d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x9i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x9i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t7i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t7i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_800d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_800d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x7:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x7_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_sl1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_sl1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_100d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_100d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x9_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x9:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_sl2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_sl2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_200d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_200d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x10_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x10:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_sl3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_sl3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_200d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_200d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_250d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_250d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_8000d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_8000d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t6s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t6s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_760d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_760d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_9000d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_9000d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_77d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_77d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x70_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x70:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t5_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_1200d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_1200d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t5_re_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t5_re:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_1200d_mg_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_1200d_mg:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_hi_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_hi:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x80_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x80:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t6_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t6:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_1300d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_1300d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x90_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x90:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t7_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t7:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_1500d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_1500d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_2000d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_2000d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t100_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_3000d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_3000d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_4000d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_4000d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_rp_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_rp:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_rp_gold_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_rp_gold:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m5_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m6_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m6:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m6\\(china\\)_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m6\\(china\\):-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m10_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m10:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m100_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_m_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m50_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m50:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:powershot_sx740_hs_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:powershot_sx740_hs:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:powershot_sx70_hs_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:powershot_sx70_hs:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:powershot_g5xmark_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:powershot_g5xmark_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_6d_mark_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_6d_mark_ii:-:*:*:*:*:*:*:*']",0,0
CVE-2019-5995,Canon,0.00254,6.5,0.0,1.0,0.0,1.0,1,2019-08-06,1.0,2019-08-06,,,1.0,"Missing authorization vulnerability exists in EOS series digital cameras (EOS-1D X firmware version 2.1.0 and earlier, EOS-1D X MKII firmware version 1.1.6 and earlier, EOS-1D C firmware version 1.4.1 and earlier, EOS 5D MARK III firmware version 1.3.5 and earlier, EOS 5D MARK IV firmware version 1.2.0 and earlier, EOS 5DS firmware version 1.1.2 and earlier, EOS 5DS R firmware version 1.1.2 and earlier, EOS 6D firmware version 1.1.8 and earlier, EOS 6D MARK II firmware version 1.0.4 and earlier, EOS 7D MARK II firmware version 1.1.2 and earlier, EOS 70 D firmware version 1.1.2 and earlier, EOS 80 D firmware version 1.0.2 and earlier, EOS KISS X7I / EOS D REBEL T5I / EOS 700D firmware version 1.1.5 and earlier, EOS KISS X8I / EOS D REBEL T6I / EOS 750D firmware version 1.0.0 and earlier, EOS KISS X9I / EOS D REBEL T7I / EOS 800D firmware version 1.0.1 and earlier, EOS KISS X7 / EOS D REBEL SL1 / EOS 100D firmware version 1.0.1 and earlier, EOS KISS X9 / EOS D REBEL SL2 / EOS 200D firmware version 1.0.1 and earlier, EOS KISS X10 / EOS D REBEL SL3 / EOS 200D / EOS 250D firmware version 1.0.1 and earlier, EOS 8000D / EOS D REBEL T6S / EOS 760D firmware version 1.0.0 and earlier, EOS 9000D / EOS 77D firmware version 1.0.2 and earlier, EOS KISS X70 / EOS D REBEL T5 / EOS 1200D firmware version 1.0.2 and earlier, EOS D REBEL T5 RE / EOS 1200D MG / EOS HI firmware version 1.0.2 and earlier, EOS KISS X80 / EOS D REBEL T6 / EOS 1300D firmware version 1.1.0 and earlier, EOS KISS X90 / EOS D REBEL T7 / EOS 1500D / EOS 2000D firmware version 1.0.0 and earlier, EOS D REBEL T100 / EOS 3000D / EOS 4000D firmware version 1.0.0 and earlier, EOS R firmware version 1.3.0 and earlier, EOS RP firmware version 1.2.0 and earlier, EOS RP GOLD firmware version 1.2.0 and earlier, EOS M2 firmware version 1.0.3 and earlier, EOS M3 firmware version 1.2.0 and earlier, EOS M5 firmware version 1.0.1 and earlier, EOS M6 firmware version 1.0.1 and earlier, EOS M6(China) firmware version 5.0.0 and earlier, EOS M10 firmware version 1.1.0 and earlier, EOS M100 firmware version 1.0.0 and earlier, EOS KISS M / EOS M50 firmware version 1.0.2 and earlier) and PowerShot SX740 HS firmware version 1.0.1 and earlier, PowerShot SX70 HS firmware version 1.1.0 and earlier, and PowerShot G5Xmark II firmware version 1.0.1 and earlier. A successful exploitation may result in a specially crafted firmware update or unofficial firmware update being applied without user's consent via unspecified vector.",CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,HIGH,NONE,MEDIUM,2.8,3.6,['CWE-862'],"['cpe:2.3:o:canon:eos-1d_x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos-1d_x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos-1d_x_mkii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos-1d_x_mkii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos-1d_c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos-1d_c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_5d_mark_iii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_5d_mark_iii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_5d_mark_iv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_5d_mark_iv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_5ds_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_5ds:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_5ds_r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_5ds_r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_6d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_6d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_7d_mark_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_7d_mark_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_70d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_70d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_80d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_80d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x7i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x7i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t5i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t5i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_700d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_700d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x8i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x8i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t6i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t6i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_750d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_750d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x9i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x9i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t7i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t7i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_800d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_800d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x7_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x7:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_sl1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_sl1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_100d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_100d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x9_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x9:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_sl2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_sl2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_200d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_200d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x10_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x10:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_sl3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_sl3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_200d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_200d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_250d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_250d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_8000d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_8000d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t6s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t6s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_760d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_760d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_9000d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_9000d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_77d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_77d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x70_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x70:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t5_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_1200d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_1200d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t5_re_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t5_re:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_1200d_mg_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_1200d_mg:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_hi_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_hi:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x80_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x80:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t6_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t6:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_1300d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_1300d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x90_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x90:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t7_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t7:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_1500d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_1500d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_2000d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_2000d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t100_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_3000d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_3000d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_4000d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_4000d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_rp_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_rp:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_rp_gold_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_rp_gold:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m5_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m6_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m6:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m6\\(china\\)_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m6\\(china\\):-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m10_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m10:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m100_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_m_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m50_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m50:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:powershot_sx740_hs_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:powershot_sx740_hs:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:powershot_sx70_hs_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:powershot_sx70_hs:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:powershot_g5xmark_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:powershot_g5xmark_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_6d_mark_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_6d_mark_ii:-:*:*:*:*:*:*:*']",0,0
CVE-2019-5998,Canon,0.00646,8.8,0.0,1.0,0.0,1.0,1,2019-08-06,1.0,2019-08-06,,,1.0,"Buffer overflow in PTP (Picture Transfer Protocol) of EOS series digital cameras (EOS-1D X firmware version 2.1.0 and earlier, EOS-1D X MKII firmware version 1.1.6 and earlier, EOS-1D C firmware version 1.4.1 and earlier, EOS 5D MARK III firmware version 1.3.5 and earlier, EOS 5D MARK IV firmware version 1.2.0 and earlier, EOS 5DS firmware version 1.1.2 and earlier, EOS 5DS R firmware version 1.1.2 and earlier, EOS 6D firmware version 1.1.8 and earlier, EOS 6D MARK II firmware version 1.0.4 and earlier, EOS 7D MARK II firmware version 1.1.2 and earlier, EOS 70 D firmware version 1.1.2 and earlier, EOS 80 D firmware version 1.0.2 and earlier, EOS KISS X7I / EOS D REBEL T5I / EOS 700D firmware version 1.1.5 and earlier, EOS KISS X8I / EOS D REBEL T6I / EOS 750D firmware version 1.0.0 and earlier, EOS KISS X9I / EOS D REBEL T7I / EOS 800D firmware version 1.0.1 and earlier, EOS KISS X7 / EOS D REBEL SL1 / EOS 100D firmware version 1.0.1 and earlier, EOS KISS X9 / EOS D REBEL SL2 / EOS 200D firmware version 1.0.1 and earlier, EOS KISS X10 / EOS D REBEL SL3 / EOS 200D / EOS 250D firmware version 1.0.1 and earlier, EOS 8000D / EOS D REBEL T6S / EOS 760D firmware version 1.0.0 and earlier, EOS 9000D / EOS 77D firmware version 1.0.2 and earlier, EOS KISS X70 / EOS D REBEL T5 / EOS 1200D firmware version 1.0.2 and earlier, EOS D REBEL T5 RE / EOS 1200D MG / EOS HI firmware version 1.0.2 and earlier, EOS KISS X80 / EOS D REBEL T6 / EOS 1300D firmware version 1.1.0 and earlier, EOS KISS X90 / EOS D REBEL T7 / EOS 1500D / EOS 2000D firmware version 1.0.0 and earlier, EOS D REBEL T100 / EOS 3000D / EOS 4000D firmware version 1.0.0 and earlier, EOS R firmware version 1.3.0 and earlier, EOS RP firmware version 1.2.0 and earlier, EOS RP GOLD firmware version 1.2.0 and earlier, EOS M2 firmware version 1.0.3 and earlier, EOS M3 firmware version 1.2.0 and earlier, EOS M5 firmware version 1.0.1 and earlier, EOS M6 firmware version 1.0.1 and earlier, EOS M6(China) firmware version 5.0.0 and earlier, EOS M10 firmware version 1.1.0 and earlier, EOS M100 firmware version 1.0.0 and earlier, EOS KISS M / EOS M50 firmware version 1.0.2 and earlier) and PowerShot SX740 HS firmware version 1.0.1 and earlier, PowerShot SX70 HS firmware version 1.1.0 and earlier, and PowerShot G5Xmark II firmware version 1.0.1 and earlier allows an attacker on the same network segment to trigger the affected product being unresponsive or to execute arbitrary code on the affected product via notifybtstatus command.",CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-787'],"['cpe:2.3:o:canon:eos-1d_x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos-1d_x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos-1d_x_mkii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos-1d_x_mkii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos-1d_c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos-1d_c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_5d_mark_iii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_5d_mark_iii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_5d_mark_iv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_5d_mark_iv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_5ds_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_5ds:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_5ds_r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_5ds_r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_6d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_6d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_7d_mark_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_7d_mark_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_70d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_70d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_80d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_80d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x7i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x7i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t5i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t5i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_700d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_700d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x8i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x8i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t6i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t6i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_750d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_750d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x9i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x9i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t7i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t7i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_800d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_800d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x7_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x7:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_sl1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_sl1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_100d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_100d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x9_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x9:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_sl2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_sl2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_200d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_200d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x10_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x10:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_sl3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_sl3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_200d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_200d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_250d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_250d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_8000d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_8000d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t6s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t6s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_760d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_760d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_9000d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_9000d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_77d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_77d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x70_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x70:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t5_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_1200d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_1200d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t5_re_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t5_re:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_1200d_mg_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_1200d_mg:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_hi_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_hi:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x80_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x80:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t6_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t6:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_1300d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_1300d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x90_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x90:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t7_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t7:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_1500d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_1500d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_2000d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_2000d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t100_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_3000d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_3000d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_4000d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_4000d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_rp_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_rp:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_rp_gold_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_rp_gold:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m5_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m6_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m6:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m6\\(china\\)_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m6\\(china\\):-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m10_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m10:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m100_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_m_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m50_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m50:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:powershot_sx740_hs_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:powershot_sx740_hs:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:powershot_sx70_hs_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:powershot_sx70_hs:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:powershot_g5xmark_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:powershot_g5xmark_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_6d_mark_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_6d_mark_ii:-:*:*:*:*:*:*:*']",0,0
CVE-2019-5999,Canon,0.00646,8.8,0.0,1.0,0.0,1.0,1,2019-08-06,1.0,2019-08-06,,,1.0,"Buffer overflow in PTP (Picture Transfer Protocol) of EOS series digital cameras (EOS-1D X firmware version 2.1.0 and earlier, EOS-1D X MKII firmware version 1.1.6 and earlier, EOS-1D C firmware version 1.4.1 and earlier, EOS 5D MARK III firmware version 1.3.5 and earlier, EOS 5D MARK IV firmware version 1.2.0 and earlier, EOS 5DS firmware version 1.1.2 and earlier, EOS 5DS R firmware version 1.1.2 and earlier, EOS 6D firmware version 1.1.8 and earlier, EOS 6D MARK II firmware version 1.0.4 and earlier, EOS 7D MARK II firmware version 1.1.2 and earlier, EOS 70 D firmware version 1.1.2 and earlier, EOS 80 D firmware version 1.0.2 and earlier, EOS KISS X7I / EOS D REBEL T5I / EOS 700D firmware version 1.1.5 and earlier, EOS KISS X8I / EOS D REBEL T6I / EOS 750D firmware version 1.0.0 and earlier, EOS KISS X9I / EOS D REBEL T7I / EOS 800D firmware version 1.0.1 and earlier, EOS KISS X7 / EOS D REBEL SL1 / EOS 100D firmware version 1.0.1 and earlier, EOS KISS X9 / EOS D REBEL SL2 / EOS 200D firmware version 1.0.1 and earlier, EOS KISS X10 / EOS D REBEL SL3 / EOS 200D / EOS 250D firmware version 1.0.1 and earlier, EOS 8000D / EOS D REBEL T6S / EOS 760D firmware version 1.0.0 and earlier, EOS 9000D / EOS 77D firmware version 1.0.2 and earlier, EOS KISS X70 / EOS D REBEL T5 / EOS 1200D firmware version 1.0.2 and earlier, EOS D REBEL T5 RE / EOS 1200D MG / EOS HI firmware version 1.0.2 and earlier, EOS KISS X80 / EOS D REBEL T6 / EOS 1300D firmware version 1.1.0 and earlier, EOS KISS X90 / EOS D REBEL T7 / EOS 1500D / EOS 2000D firmware version 1.0.0 and earlier, EOS D REBEL T100 / EOS 3000D / EOS 4000D firmware version 1.0.0 and earlier, EOS R firmware version 1.3.0 and earlier, EOS RP firmware version 1.2.0 and earlier, EOS RP GOLD firmware version 1.2.0 and earlier, EOS M2 firmware version 1.0.3 and earlier, EOS M3 firmware version 1.2.0 and earlier, EOS M5 firmware version 1.0.1 and earlier, EOS M6 firmware version 1.0.1 and earlier, EOS M6(China) firmware version 5.0.0 and earlier, EOS M10 firmware version 1.1.0 and earlier, EOS M100 firmware version 1.0.0 and earlier, EOS KISS M / EOS M50 firmware version 1.0.2 and earlier) and PowerShot SX740 HS firmware version 1.0.1 and earlier, PowerShot SX70 HS firmware version 1.1.0 and earlier, and PowerShot G5Xmark II firmware version 1.0.1 and earlier allows an attacker on the same network segment to trigger the affected product being unresponsive or to execute arbitrary code on the affected product via blerequest command.",CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-787'],"['cpe:2.3:o:canon:eos-1d_x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos-1d_x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos-1d_x_mkii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos-1d_x_mkii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos-1d_c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos-1d_c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_5d_mark_iii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_5d_mark_iii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_5d_mark_iv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_5d_mark_iv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_5ds_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_5ds:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_5ds_r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_5ds_r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_6d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_6d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_7d_mark_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_7d_mark_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_70d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_70d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_80d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_80d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x7i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x7i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t5i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t5i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_700d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_700d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x8i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x8i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t6i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t6i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_750d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_750d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x9i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x9i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t7i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t7i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_800d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_800d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x7_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x7:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_sl1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_sl1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_100d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_100d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x9_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x9:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_sl2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_sl2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_200d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_200d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x10_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x10:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_sl3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_sl3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_200d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_200d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_250d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_250d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_8000d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_8000d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t6s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t6s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_760d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_760d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_9000d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_9000d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_77d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_77d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x70_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x70:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t5_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_1200d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_1200d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t5_re_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t5_re:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_1200d_mg_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_1200d_mg:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_hi_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_hi:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x80_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x80:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t6_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t6:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_1300d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_1300d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x90_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x90:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t7_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t7:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_1500d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_1500d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_2000d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_2000d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t100_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_3000d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_3000d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_4000d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_4000d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_rp_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_rp:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_rp_gold_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_rp_gold:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m5_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m6_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m6:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m6\\(china\\)_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m6\\(china\\):-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m10_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m10:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m100_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_m_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m50_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m50:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:powershot_sx740_hs_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:powershot_sx740_hs:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:powershot_sx70_hs_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:powershot_sx70_hs:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:powershot_g5xmark_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:powershot_g5xmark_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_6d_mark_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_6d_mark_ii:-:*:*:*:*:*:*:*']",0,0
CVE-2019-6000,Canon,0.00646,8.8,0.0,1.0,0.0,1.0,1,2019-08-06,1.0,2019-08-06,,,1.0,"Buffer overflow in PTP (Picture Transfer Protocol) of EOS series digital cameras (EOS-1D X firmware version 2.1.0 and earlier, EOS-1D X MKII firmware version 1.1.6 and earlier, EOS-1D C firmware version 1.4.1 and earlier, EOS 5D MARK III firmware version 1.3.5 and earlier, EOS 5D MARK IV firmware version 1.2.0 and earlier, EOS 5DS firmware version 1.1.2 and earlier, EOS 5DS R firmware version 1.1.2 and earlier, EOS 6D firmware version 1.1.8 and earlier, EOS 6D MARK II firmware version 1.0.4 and earlier, EOS 7D MARK II firmware version 1.1.2 and earlier, EOS 70 D firmware version 1.1.2 and earlier, EOS 80 D firmware version 1.0.2 and earlier, EOS KISS X7I / EOS D REBEL T5I / EOS 700D firmware version 1.1.5 and earlier, EOS KISS X8I / EOS D REBEL T6I / EOS 750D firmware version 1.0.0 and earlier, EOS KISS X9I / EOS D REBEL T7I / EOS 800D firmware version 1.0.1 and earlier, EOS KISS X7 / EOS D REBEL SL1 / EOS 100D firmware version 1.0.1 and earlier, EOS KISS X9 / EOS D REBEL SL2 / EOS 200D firmware version 1.0.1 and earlier, EOS KISS X10 / EOS D REBEL SL3 / EOS 200D / EOS 250D firmware version 1.0.1 and earlier, EOS 8000D / EOS D REBEL T6S / EOS 760D firmware version 1.0.0 and earlier, EOS 9000D / EOS 77D firmware version 1.0.2 and earlier, EOS KISS X70 / EOS D REBEL T5 / EOS 1200D firmware version 1.0.2 and earlier, EOS D REBEL T5 RE / EOS 1200D MG / EOS HI firmware version 1.0.2 and earlier, EOS KISS X80 / EOS D REBEL T6 / EOS 1300D firmware version 1.1.0 and earlier, EOS KISS X90 / EOS D REBEL T7 / EOS 1500D / EOS 2000D firmware version 1.0.0 and earlier, EOS D REBEL T100 / EOS 3000D / EOS 4000D firmware version 1.0.0 and earlier, EOS R firmware version 1.3.0 and earlier, EOS RP firmware version 1.2.0 and earlier, EOS RP GOLD firmware version 1.2.0 and earlier, EOS M2 firmware version 1.0.3 and earlier, EOS M3 firmware version 1.2.0 and earlier, EOS M5 firmware version 1.0.1 and earlier, EOS M6 firmware version 1.0.1 and earlier, EOS M6(China) firmware version 5.0.0 and earlier, EOS M10 firmware version 1.1.0 and earlier, EOS M100 firmware version 1.0.0 and earlier, EOS KISS M / EOS M50 firmware version 1.0.2 and earlier) and PowerShot SX740 HS firmware version 1.0.1 and earlier, PowerShot SX70 HS firmware version 1.1.0 and earlier, and PowerShot G5Xmark II firmware version 1.0.1 and earlier allows an attacker on the same network segment to trigger the affected product being unresponsive or to execute arbitrary code on the affected product via sendhostinfo command.",CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-787'],"['cpe:2.3:o:canon:eos-1d_x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos-1d_x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos-1d_x_mkii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos-1d_x_mkii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos-1d_c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos-1d_c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_5d_mark_iii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_5d_mark_iii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_5d_mark_iv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_5d_mark_iv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_5ds_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_5ds:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_5ds_r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_5ds_r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_6d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_6d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_7d_mark_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_7d_mark_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_70d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_70d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_80d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_80d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x7i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x7i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t5i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t5i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_700d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_700d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x8i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x8i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t6i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t6i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_750d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_750d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x9i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x9i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t7i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t7i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_800d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_800d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x7_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x7:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_sl1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_sl1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_100d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_100d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x9_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x9:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_sl2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_sl2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_200d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_200d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x10_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x10:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_sl3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_sl3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_200d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_200d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_250d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_250d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_8000d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_8000d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t6s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t6s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_760d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_760d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_9000d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_9000d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_77d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_77d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x70_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x70:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t5_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_1200d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_1200d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t5_re_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t5_re:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_1200d_mg_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_1200d_mg:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_hi_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_hi:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x80_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x80:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t6_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t6:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_1300d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_1300d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x90_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x90:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t7_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t7:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_1500d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_1500d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_2000d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_2000d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t100_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_3000d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_3000d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_4000d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_4000d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_rp_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_rp:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_rp_gold_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_rp_gold:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m5_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m6_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m6:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m6\\(china\\)_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m6\\(china\\):-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m10_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m10:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m100_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_m_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m50_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m50:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:powershot_sx740_hs_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:powershot_sx740_hs:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:powershot_sx70_hs_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:powershot_sx70_hs:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:powershot_g5xmark_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:powershot_g5xmark_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_6d_mark_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_6d_mark_ii:-:*:*:*:*:*:*:*']",0,0
CVE-2019-6001,Canon,0.00647,6.8,0.0,1.0,0.0,1.0,1,2019-08-06,1.0,2019-08-06,,,1.0,"Buffer overflow in PTP (Picture Transfer Protocol) of EOS series digital cameras (EOS-1D X firmware version 2.1.0 and earlier, EOS-1D X MKII firmware version 1.1.6 and earlier, EOS-1D C firmware version 1.4.1 and earlier, EOS 5D MARK III firmware version 1.3.5 and earlier, EOS 5D MARK IV firmware version 1.2.0 and earlier, EOS 5DS firmware version 1.1.2 and earlier, EOS 5DS R firmware version 1.1.2 and earlier, EOS 6D firmware version 1.1.8 and earlier, EOS 6D MARK II firmware version 1.0.4 and earlier, EOS 7D MARK II firmware version 1.1.2 and earlier, EOS 70 D firmware version 1.1.2 and earlier, EOS 80 D firmware version 1.0.2 and earlier, EOS KISS X7I / EOS D REBEL T5I / EOS 700D firmware version 1.1.5 and earlier, EOS KISS X8I / EOS D REBEL T6I / EOS 750D firmware version 1.0.0 and earlier, EOS KISS X9I / EOS D REBEL T7I / EOS 800D firmware version 1.0.1 and earlier, EOS KISS X7 / EOS D REBEL SL1 / EOS 100D firmware version 1.0.1 and earlier, EOS KISS X9 / EOS D REBEL SL2 / EOS 200D firmware version 1.0.1 and earlier, EOS KISS X10 / EOS D REBEL SL3 / EOS 200D / EOS 250D firmware version 1.0.1 and earlier, EOS 8000D / EOS D REBEL T6S / EOS 760D firmware version 1.0.0 and earlier, EOS 9000D / EOS 77D firmware version 1.0.2 and earlier, EOS KISS X70 / EOS D REBEL T5 / EOS 1200D firmware version 1.0.2 and earlier, EOS D REBEL T5 RE / EOS 1200D MG / EOS HI firmware version 1.0.2 and earlier, EOS KISS X80 / EOS D REBEL T6 / EOS 1300D firmware version 1.1.0 and earlier, EOS KISS X90 / EOS D REBEL T7 / EOS 1500D / EOS 2000D firmware version 1.0.0 and earlier, EOS D REBEL T100 / EOS 3000D / EOS 4000D firmware version 1.0.0 and earlier, EOS R firmware version 1.3.0 and earlier, EOS RP firmware version 1.2.0 and earlier, EOS RP GOLD firmware version 1.2.0 and earlier, EOS M2 firmware version 1.0.3 and earlier, EOS M3 firmware version 1.2.0 and earlier, EOS M5 firmware version 1.0.1 and earlier, EOS M6 firmware version 1.0.1 and earlier, EOS M6(China) firmware version 5.0.0 and earlier, EOS M10 firmware version 1.1.0 and earlier, EOS M100 firmware version 1.0.0 and earlier, EOS KISS M / EOS M50 firmware version 1.0.2 and earlier) and PowerShot SX740 HS firmware version 1.0.1 and earlier, PowerShot SX70 HS firmware version 1.1.0 and earlier, and PowerShot G5Xmark II firmware version 1.0.1 and earlier allows an attacker on the same network segment to trigger the affected product being unresponsive or to execute arbitrary code on the affected product via setadapterbatteryreport command.",CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,PHYSICAL,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.9,5.9,['CWE-119'],"['cpe:2.3:o:canon:eos-1d_x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos-1d_x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos-1d_x_mkii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos-1d_x_mkii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos-1d_c_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos-1d_c:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_5d_mark_iii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_5d_mark_iii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_5d_mark_iv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_5d_mark_iv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_5ds_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_5ds:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_5ds_r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_5ds_r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_6d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_6d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_7d_mark_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_7d_mark_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_70d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_70d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_80d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_80d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x7i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x7i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t5i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t5i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_700d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_700d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x8i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x8i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t6i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t6i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_750d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_750d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x9i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x9i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t7i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t7i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_800d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_800d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x7:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x7_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_sl1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_sl1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_100d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_100d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x9:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x9_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_sl2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_sl2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_200d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_200d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x10:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x10_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_sl3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_sl3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_200d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_200d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_250d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_250d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_8000d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_8000d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t6s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t6s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_760d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_760d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_9000d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_9000d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_77d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_77d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x70_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x70:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t5_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_1200d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_1200d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t5_re_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t5_re:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_1200d_mg_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_1200d_mg:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_hi_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_hi:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x80_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x80:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t6_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t6:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_1300d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_1300d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_x90_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_x90:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t7_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t7:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_1500d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_1500d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_2000d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_2000d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_d_rebel_t100_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_d_rebel_t100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_3000d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_3000d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_4000d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_4000d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_r:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_rp_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_rp:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_rp_gold_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_rp_gold:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m5_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m6_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m6:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m6\\(china\\)_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m6\\(china\\):-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m10_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m10:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m100_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m100:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_kiss_m_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_kiss_m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_m50_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_m50:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:powershot_sx740_hs_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:powershot_sx740_hs:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:powershot_sx70_hs_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:powershot_sx70_hs:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:powershot_g5xmark_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:powershot_g5xmark_ii:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:eos_6d_mark_ii_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:eos_6d_mark_ii:-:*:*:*:*:*:*:*']",0,0
CVE-2020-10667,Canon,0.00543,6.1,0.0,1.0,0.0,1.0,1,2020-03-19,0.0,,0.0,,,The web application exposed by the Canon Oce Colorwave 500 4.0.0.0 printer is vulnerable to Stored XSS in /TemplateManager/indexExternalLocation.jsp. The vulnerable parameter is map(template_name). NOTE: this is fixed in the latest version.,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:canon:oce_colorwave_500_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:oce_colorwave_500:-:*:*:*:*:*:*:*']",0,0
CVE-2020-10668,Canon,0.00543,6.1,0.0,1.0,0.0,1.0,1,2020-03-19,0.0,,0.0,,,The web application exposed by the Canon Oce Colorwave 500 4.0.0.0 printer is vulnerable to Reflected XSS in /home.jsp. The vulnerable parameter is openSI. NOTE: this is fixed in the latest version.,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:canon:oce_colorwave_500_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:oce_colorwave_500:-:*:*:*:*:*:*:*']",0,0
CVE-2020-10669,Canon,0.17782,7.5,0.0,1.0,0.0,1.0,1,2020-03-19,0.0,,0.0,,,The web application exposed by the Canon Oce Colorwave 500 4.0.0.0 printer is vulnerable to authentication bypass on the page /home.jsp. An unauthenticated attacker able to connect to the device's web interface can get a copy of the documents uploaded by any users. NOTE: this is fixed in the latest version.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-287'],"['cpe:2.3:o:canon:oce_colorwave_500_firmware:4.0.0.0:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:oce_colorwave_500:-:*:*:*:*:*:*:*']",0,0
CVE-2020-10670,Canon,0.00215,6.1,0.0,1.0,0.0,1.0,1,2020-03-19,0.0,,0.0,,,The web application exposed by the Canon Oce Colorwave 500 4.0.0.0 printer is vulnerable to Reflected XSS in the parameter settingId of the settingDialogContent.jsp page. NOTE: this is fixed in the latest version.,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:canon:oce_colorwave_500_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:oce_colorwave_500:-:*:*:*:*:*:*:*']",0,0
CVE-2020-10671,Canon,0.00389,8.8,0.0,1.0,0.0,1.0,1,2020-03-19,0.0,,0.0,,,The Canon Oce Colorwave 500 4.0.0.0 printer's web application is missing any form of CSRF protections. This is a system-wide issue. An attacker could perform administrative actions by targeting a logged-in administrative user. NOTE: this is fixed in the latest version.,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-352'],"['cpe:2.3:o:canon:oce_colorwave_500_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:oce_colorwave_500:-:*:*:*:*:*:*:*']",0,0
CVE-2020-12695,Canon,0.00547,7.5,0.0,1.0,0.0,0.0,1,2020-06-08,1.0,2020-06-08,,,1.0,"The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on a different network segment than the fully qualified event-subscription URL, aka the CallStranger issue.",CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:H,NETWORK,HIGH,NONE,NONE,CHANGED,LOW,NONE,HIGH,HIGH,2.2,4.7,['CWE-276'],"['cpe:2.3:a:ui:unifi_controller:-:*:*:*:*:*:*:*', 'cpe:2.3:a:w1.fi:hostapd:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-n11:-:*:*:*:*:*:*:*', 'cpe:2.3:h:broadcom:adsl:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:selphy_cp1200:-:*:*:*:*:*:*:*', 'cpe:2.3:h:cisco:wap131:-:*:*:*:*:*:*:*', 'cpe:2.3:h:cisco:wap150:-:*:*:*:*:*:*:*', 'cpe:2.3:h:cisco:wap351:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dlink:dvg-n5412sp:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dell:b1165nfw:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ep-101:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ew-m970a3t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:m571t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-2101:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-2105:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-241:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-320:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-330:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-340:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-4100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-4105:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-440:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-620:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-630:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-702:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-8500:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-8600:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-960:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-970:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:5020_z4a69a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:5030_m2u92b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:5030_z4a70a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:5034_z4a74a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:5660_f8b04a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_3456_a9t84c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_3545_a9t81a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_3545_a9t81c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_3545_a9t83b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_3546_a9t82a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_3548_a9t81b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_4515:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_4518:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_4535_f0v64a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_4535_f0v64b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_4535_f0v64c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_4536_f0v65a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_4538_f0v66b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_4675_f1h97a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_4675_f1h97b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_4675_f1h97c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_4676_f1h98a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_4678_f1h99b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_5575_g0v48b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_5575_g0v48c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_100_cn517a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_100_cn517b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_100_cn517c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_100_cn518a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_100_cn519a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_100_cn519b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_110_cq809a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_110_cq809b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_110_cq809c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_110_cq809d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_110_cq812c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_111_cq810a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_114_cq811a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_114_cq811b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_114_cq812a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_120_cz022a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_120_cz022b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_120_cz022c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4500_a9t80a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4500_a9t80b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4500_a9t89a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4500_d3p93a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4501_c8d05a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4502_a9t85a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4502_a9t87b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4503_e6g71b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4504_a9t88b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4504_c8d04a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4505_a9t86a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4507_e6g70b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4508_e6g72b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4509_d3p94a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4509_d3p94b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4511_k9h50a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4512_k9h49a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4513_k9h51a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4516_k9h52a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4520_e6g67a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4520_e6g67b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4520_f0v63a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4520_f0v63b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4520_f0v69a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4521_k9t10b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4522_f0v67a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4523_j6u60b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4524_f0v71b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4524_f0v72b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4524_k9t01a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4525_k9t09b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4526_k9t05b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4527_j6u61b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4528_k9t08b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5000_m2u85a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5000_m2u85b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5000_m2u91a:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5000_m2u91a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5000_m2u94b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5000_z4a54a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5000_z4a74a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5020_m2u91b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5530:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5531:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5532:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5534:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5535:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5536:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5539:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5540_f2e72a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5540_g0v47a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5540_g0v51a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5540_g0v52a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5540_g0v53a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5540_k7c85a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5541_k7g89a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5542_k7c88a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5543_n9u88a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5544_k7c89a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5544_k7c93a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5545_g0v50a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5546_k7c90a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5547_j6u64a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5548_k7g87a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5640_b9s56a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5640_b9s58a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5642_b9s64a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5643_b9s63a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5644_b9s65a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5646_f8b05a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5664_f8b08a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5665_f8b06a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_6020_5se16b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_6020_5se17a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_6020_6wd35a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_6020_7cz37a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_6052_5se18a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_6055_5se16a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_6540_b9s59a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_7640:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_7644_e4w46a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_7645_e4w44a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_6200_k7g18a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_6200_k7g26b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_6200_k7s21b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_6200_y0k13d_:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_6200_y0k15a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_6220_k7g20d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_6220_k7g21b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_6222_y0k13d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_6222_y0k14d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_6230_k7g25b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_6232_k7g26b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_6234_k7s21b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_6252_k7g22a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7100_3xd89a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7100_k7g93a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7100_k7g99a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7100_z3m37a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7100_z3m52a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7120_z3m41d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7155_z3m52a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7164_k7g99a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7800_k7r96a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7800_k7s00a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7800_k7s10d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7800_y0g42d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7800_y0g52b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7822_y0g42d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7822_y0g43d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7830_y0g50b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_pro_6420_5se45b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_pro_6420_5se46a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_pro_6420_6wd14a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_pro_6420_6wd16a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_pro_6452_5se47a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_pro_6455_5se45a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:officejet_4650_e6g87a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:officejet_4650_f1h96a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:officejet_4650_f1h96b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:officejet_4652_f1j02a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:officejet_4652_f1j05b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:officejet_4652_k9v84b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:officejet_4654_f1j06b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:officejet_4654_f1j07b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:officejet_4655_f1j00a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:officejet_4655_k9v79a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:officejet_4655_k9v82b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:officejet_4656_k9v81b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:officejet_4657_v6d29b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:officejet_4658_v6d30b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:hg255s:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:hg532e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:wr8165n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netgear:wnhde111:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ruckussecurity:zonedirector_1200:-:*:*:*:*:*:*:*', 'cpe:2.3:h:tp-link:archer_c50:-:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxv10_w300:-:*:*:*:*:*:*:*', 'cpe:2.3:h:zyxel:amg1202-t10b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:zyxel:vmg8324-b10a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:xbox_one:10.0.19041.2494:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*']",0,0
CVE-2020-16849,Canon,0.00178,7.5,0.0,1.0,0.0,1.0,1,2020-11-30,1.0,2020-10-29,,,1.0,"An issue was discovered on Canon MF237w 06.07 devices. An ""Improper Handling of Length Parameter Inconsistency"" issue in the IPv4/ICMPv4 component, when handling a packet sent by an unauthenticated network attacker, may expose Sensitive Information.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['NVD-CWE-Other'],"['cpe:2.3:h:canon:mf237w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:mf237w_firmware:06.07:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf113w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:mf113w_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf212w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:mf212w_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf216n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:mf216n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf217w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:mf217w_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf226dn:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:mf226dn_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf229dw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:mf229dw_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf231:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:mf231_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:mf232w_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf232w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:mf244dw_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf244dw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:mf247dw_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf247dw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:mf249dw_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf249dw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:mf264dw_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf264dw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:mf267dw_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf267dw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:mf269dw_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf269dw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:mf4570dn_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf4570dn:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:mf4580dn_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf4580dn:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:mf4780w_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf4780w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:mf4870dn_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf4870dn:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:mf4890dw_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf4890dw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:lbp113w_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:lbp113w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:lbp151dw_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:lbp151dw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:lbp162dw_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:lbp162dw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:ir2202n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:ir2202n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:ir2204n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:ir2204n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:ir2204f_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:ir2204f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:ir2206n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:ir2206n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:ir2206if_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:ir2206if:-:*:*:*:*:*:*:*']",0,0
CVE-2021-43471,Canon,0.00115,7.5,0.0,1.0,0.0,1.0,1,2021-12-06,0.0,,0.0,,,"In Canon LBP223 printers, the System Manager Mode login does not require an account password or PIN. An attacker can remotely shut down the device after entering the background, creating a denial of service vulnerability.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-521'],"['cpe:2.3:h:canon:lbp223dw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canon:lbp223dw_firmware:-:*:*:*:*:*:*:*']",0,0
CVE-2018-12111,Canon,0.00103,6.1,1.0,0.0,1.0,0.0,0,2018-06-11,0.0,,0.0,,,Cross-site scripting (XSS) vulnerability in the Canon PrintMe EFI webinterface allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO to the /wt3/mydocs.php URI.,CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],['cpe:2.3:a:canon:efi_printme:*:*:*:*:*:*:*:*'],1,0
CVE-2019-14339,Canon,0.00089,5.5,1.0,0.0,1.0,0.0,0,2019-09-05,0.0,,0.0,,,The ContentProvider in the Canon PRINT jp.co.canon.bsd.ad.pixmaprint 2.5.5 application for Android does not properly restrict canon.ij.printer.capability.data data access. This allows an attacker's malicious application to obtain sensitive information including factory passwords for the administrator web interface and WPA2-PSK key.,CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.8,3.6,['NVD-CWE-noinfo'],['cpe:2.3:a:canon:print:2.5.5:*:*:*:*:android:*:*'],1,0
CVE-2020-26508,Canon,0.00222,9.8,0.0,1.0,0.0,1.0,0,2020-11-16,0.0,,0.0,,,"The WebTools component on Canon Oce ColorWave 3500 5.1.1.0 devices allows attackers to retrieve stored SMB credentials via the export feature, even though these are intentionally inaccessible in the UI.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-522'],"['cpe:2.3:o:canon:oce_colorwave_3500_firmware:5.1.1.0:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:oce_colorwave_3500:-:*:*:*:*:*:*:*']",0,0
CVE-2021-20877,Canon,0.00211,4.8,0.0,1.0,0.0,0.0,0,2022-02-08,1.0,2021-12-21,,,1.0,"Cross-site scripting vulnerability in Canon laser printers and small office multifunctional printers (LBP162L/LBP162, MF4890dw, MF269dw/MF265dw/MF264dw/MF262dw, MF249dw/MF245dw/MF244dw/MF242dw/MF232w, and MF229dw/MF224dw/MF222dw sold in Japan, imageCLASS MF Series (MF113W/MF212W/MF217W/MF227DW/MF229DW, MF232W/MF244DW/MF247DW/MF249DW, MF264DW/MF267DW/MF269DW/MF269DW VP, and MF4570DN/MF4570DW/MF4770N/MF4880DW/MF4890DW) and imageCLASS LBP Series (LBP113W/LBP151DW/LBP162DW ) sold in the US, and iSENSYS (LBP162DW, LBP113W, LBP151DW, MF269dw, MF267dw, MF264dw, MF113w, MF249dw, MF247dw, MF244dw, MF237w, MF232w, MF229dw, MF217w, MF212w, MF4780w, and MF4890dw) and imageRUNNER (2206IF, 2204N, and 2204F) sold in Europe) allows remote attackers to inject an arbitrary script via unspecified vectors.",CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,HIGH,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,1.7,2.7,['CWE-79'],"['cpe:2.3:h:canon:2204f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:2204n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:2206if:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:lbp113w:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:lbp151dw:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:lbp162:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:lbp162dw:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:lbp162l:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf113w:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf212w:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf217w:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf222dw:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf224dw:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf227dw:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf229dw:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf232w:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf237w:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf242dw:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf244dw:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf245dw:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf247dw:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf249dw:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf262dw:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf264dw:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf265dw:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf267dw:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf269dw:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf269dw_vp:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf4570dn:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf4570dw:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf4770n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf4780w:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf4880dw:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:mf4890dw:-:*:*:*:*:*:*:*']",0,0
CVE-2021-38085,Canon,0.00053,7.8,0.0,1.0,0.0,1.0,0,2021-08-11,0.0,,0.0,,,"The Canon TR150 print driver through 3.71.2.10 is vulnerable to a privilege escalation issue. During the add printer process, a local attacker can overwrite CNMurGE.dll and, if timed properly, the overwritten DLL will be loaded into a SYSTEM process resulting in escalation of privileges. This occurs because the driver drops a world-writable DLL into a CanonBJ %PROGRAMDATA% location that gets loaded by printisolationhost (a system process).",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-732'],"['cpe:2.3:o:canon:pixma_tr150_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:pixma_tr150:-:*:*:*:*:*:*:*']",0,0
CVE-2021-39367,Canon,0.0009,5.3,0.0,0.0,1.0,0.0,0,2021-08-23,0.0,,0.0,,,Canon Oce Print Exec Workgroup 1.3.2 allows Host header injection.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,LOW,NONE,MEDIUM,3.9,1.4,['CWE-116'],['cpe:2.3:a:canon:oce_print_exec_workgroup:1.3.2:*:*:*:*:*:*:*'],0,0
CVE-2021-39368,Canon,0.00087,6.1,0.0,0.0,1.0,0.0,0,2021-08-23,0.0,,0.0,,,Canon Oce Print Exec Workgroup 1.3.2 allows XSS via the lang parameter.,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],['cpe:2.3:a:canon:oce_print_exec_workgroup:1.3.2:*:*:*:*:*:*:*'],0,0
CVE-2022-26111,Canon,0.00463,8.8,0.0,0.0,1.0,0.0,0,2022-04-25,1.0,2022-03-14,,,1.0,"The BeanShell components of IRISNext through 9.8.28 allow execution of arbitrary commands on the target server by creating a custom search (or editing an existing/predefined search) of the documents. The search components permit adding BeanShell expressions that result in Remote Code Execution in the context of the IRISNext application user, running on the web server.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-917'],['cpe:2.3:a:canon:irisnext:*:*:*:*:*:*:*:*'],0,0
CVE-2018-12041,MediaTek,0.00126,7.5,0.0,1.0,0.0,1.0,1,2018-06-08,0.0,,0.0,,,An issue was discovered on the MediaTek AWUS036NH wireless USB adapter through 5.1.25.0. Attackers can remotely deny service by sending specially constructed 802.11 frames.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-20'],"['cpe:2.3:o:mediatek:awus036nh_firmware:5.1.25.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:awus036nh:-:*:*:*:*:*:*:*']",0,0
CVE-2019-15027,MediaTek,0.00986,9.8,0.0,1.0,0.0,1.0,1,2019-08-14,0.0,,0.0,,,"The MediaTek Embedded Multimedia Card (eMMC) subsystem for Android on MT65xx, MT66xx, and MT8163 SoC devices allows attackers to execute arbitrary commands as root via shell metacharacters in a filename under /data, because clear_emmc_nomedia_entry in platform/mt6577/external/meta/emmc/meta_clr_emmc.c invokes 'system(""/system/bin/rm -r /data/' followed by this filename upon an eMMC clearance from a Meta Mode boot. NOTE: compromise of Fire OS on the Amazon Echo Dot would require a second hypothetical vulnerability that allows creation of the required file under /data.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-78'],"['cpe:2.3:o:mediatek:mt8163_firmware:-:*:*:*:*:android:*:*', 'cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:android:*:*', 'cpe:2.3:o:mediatek:mt6625_firmware:-:*:*:*:*:android:*:*', 'cpe:2.3:h:mediatek:mt6625:-:*:*:*:*:android:*:*', 'cpe:2.3:o:mediatek:mt6577_firmware:-:*:*:*:*:android:*:*', 'cpe:2.3:h:mediatek:mt6577:-:*:*:*:*:android:*:*']",0,0
CVE-2019-18989,MediaTek,0.00058,5.4,0.0,1.0,0.0,1.0,1,2020-09-30,1.0,2019-09-25,,,1.0,"A partial authentication bypass vulnerability exists on Mediatek MT7620N 1.06 devices. The vulnerability allows sending an unencrypted data frame to a WPA2-protected WLAN router where the packet is routed through the network. If successful, a response is sent back as an encrypted frame, which would allow an attacker to discern information or potentially modify data.",CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.5,['CWE-290'],"['cpe:2.3:h:mediatek:mt7620n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7620n_firmware:1.06:*:*:*:*:*:*:*']",0,0
CVE-2022-20083,MediaTek,0.00541,9.8,0.0,1.0,0.0,1.0,1,2022-07-06,1.0,2022-07-04,,,1.0,"In Modem 2G/3G CC, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution when decoding combined FACILITY with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00803883; Issue ID: MOLY00803883.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:o:mediatek:lr11:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:lr12:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:lr12a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:lr13:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:lr9:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt2731:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6297:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6725:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6757p:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6762d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6762m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6765t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6767:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6769t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6769z:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6775:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6783:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6785t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8735a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*']",0,0
CVE-2022-21744,MediaTek,0.00541,9.8,0.0,1.0,0.0,1.0,1,2022-07-06,1.0,2022-07-04,,,1.0,"In Modem 2G RR, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution when decoding GPRS Packet Neighbour Cell Data (PNCD) improper neighbouring cell size with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00810064; Issue ID: ALPS06641626.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:o:mediatek:lr11:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:lr12:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:lr12a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:lr13:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:lr9:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt2731:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6297:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6725:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6757p:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6762d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6762m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6765t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6767:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6769t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6769z:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6775:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6783:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6785t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8735a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*']",0,0
CVE-2022-21766,MediaTek,0.00042,6.7,0.0,1.0,0.0,0.0,1,2022-07-06,1.0,2022-07-04,,,1.0,"In CCCI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06641673; Issue ID: ALPS06641653.",CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.8,5.9,['CWE-787'],"['cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*']",0,0
CVE-2022-21767,MediaTek,0.00048,8.8,0.0,1.0,0.0,0.0,1,2022-07-06,1.0,2022-07-04,,,1.0,"In Bluetooth, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06784430; Issue ID: ALPS06784430.",CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-787'],"['cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*']",0,0
CVE-2022-21768,MediaTek,0.00048,8.8,0.0,1.0,0.0,0.0,1,2022-07-06,1.0,2022-07-04,,,1.0,"In Bluetooth, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06784351; Issue ID: ALPS06784351.",CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-787'],"['cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*']",0,0
CVE-2022-21776,MediaTek,0.00042,6.4,0.0,1.0,0.0,0.0,1,2022-07-06,1.0,2022-07-04,,,1.0,"In MDP, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06545450; Issue ID: ALPS06545450.",CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H,LOCAL,HIGH,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.5,5.9,['CWE-362'],"['cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*']",0,0
CVE-2022-21777,MediaTek,0.00042,7.8,0.0,1.0,0.0,0.0,1,2022-07-06,1.0,2022-07-04,,,1.0,"In Autoboot, there is a possible permission bypass due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06713894; Issue ID: ALPS06713894.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-862'],"['cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*']",0,0
CVE-2022-21779,MediaTek,0.00042,6.7,0.0,1.0,0.0,0.0,1,2022-07-06,1.0,2022-07-04,,,1.0,"In WLAN driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06704526; Issue ID: ALPS06704393.",CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.8,5.9,['CWE-787'],"['cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8696:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*']",0,0
CVE-2022-21786,MediaTek,0.00042,6.7,0.0,1.0,0.0,0.0,1,2022-07-06,1.0,2022-07-04,,,1.0,"In audio DSP, there is a possible memory corruption due to improper casting. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06558822; Issue ID: ALPS06558822.",CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.8,5.9,['CWE-704'],"['cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*']",0,0
CVE-2022-21787,MediaTek,0.00042,6.7,0.0,1.0,0.0,0.0,1,2022-07-06,1.0,2022-07-04,,,1.0,"In audio DSP, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06558844; Issue ID: ALPS06558844.",CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.8,5.9,['CWE-787'],"['cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*']",0,0
CVE-2022-26446,MediaTek,0.00173,7.5,0.0,1.0,0.0,1.0,1,2022-11-08,1.0,2022-11-07,,,1.0,"In Modem 4G RRC, there is a possible system crash due to improper input validation. This could lead to remote denial of service, when concatenating improper SIB12 (CMAS message), with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00867883; Issue ID: ALPS07274118.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-617'],"['cpe:2.3:o:mediatek:lr12a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:lr13:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt2731:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6297:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6725:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6762d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6762m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6765t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6767:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6769t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6769z:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6783:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6785t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*']",0,0
CVE-2022-26471,MediaTek,0.00042,7.8,0.0,1.0,0.0,0.0,1,2022-10-07,1.0,2022-10-03,,,1.0,"In telephony, there is a possible escalation of privilege due to a parcel format mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07319121; Issue ID: ALPS07319121.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-502'],"['cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*']",0,0
CVE-2022-26472,MediaTek,0.00042,7.8,0.0,1.0,0.0,0.0,1,2022-10-07,1.0,2022-10-03,,,1.0,"In ims, there is a possible escalation of privilege due to a parcel format mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07319095; Issue ID: ALPS07319095.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-502'],"['cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*']",0,0
CVE-2018-21054,MediaTek,0.00119,9.8,0.0,1.0,0.0,0.0,0,2020-04-08,0.0,,0.0,,,"An issue was discovered on Samsung mobile devices with M(6.0), N(7.x) and O(8.x) except exynos9610/9820 in all Platforms, M(6.0) except MSM8909 SC77xx/9830 exynos3470/5420, N(7.0) except MSM8939, N(7.1) except MSM8996 SDM6xx/M6737T software. There is an integer underflow with a resultant buffer overflow in eCryptFS. The Samsung ID is SVE-2017-11857 (September 2018).",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-190'],"['cpe:2.3:h:samsung:exynos_9610:-:*:*:*:*:*:*:*', 'cpe:2.3:h:samsung:exynos_9820:-:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:7.1.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*', 'cpe:2.3:h:qualcomm:msm8909:-:*:*:*:*:*:*:*', 'cpe:2.3:h:qualcomm:msm9830:-:*:*:*:*:*:*:*', 'cpe:2.3:h:samsung:exynos_3470:-:*:*:*:*:*:*:*', 'cpe:2.3:h:samsung:exynos_5420:-:*:*:*:*:*:*:*', 'cpe:2.3:h:unisoc:sc7715:-:*:*:*:*:*:*:*', 'cpe:2.3:h:unisoc:sc7730:-:*:*:*:*:*:*:*', 'cpe:2.3:h:unisoc:sc7731:-:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*', 'cpe:2.3:h:qualcomm:msm8939:-:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:m6737t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:qualcomm:msm8996:-:*:*:*:*:*:*:*', 'cpe:2.3:h:qualcomm:sdm6xx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:7.1:*:*:*:*:*:*:*']",0,0
CVE-2021-0422,MediaTek,0.00042,5.5,0.0,1.0,0.0,0.0,0,2021-09-27,1.0,2021-09-01,,,1.0,"In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05381071.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,1.8,3.6,['CWE-770'],"['cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6582_90:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6582e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6582h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6582t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6582w:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6589:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6589td:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6592_90:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6592e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6592h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6592t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6592w:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*']",0,0
CVE-2021-0425,MediaTek,0.00042,5.5,0.0,1.0,0.0,0.0,0,2021-09-27,1.0,2022-01-13,,,0.0,"In memory management driver, there is a possible side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05400059.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.8,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6582_90:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6582e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6582h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6582t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6582w:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6589:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6589td:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6592_90:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6592e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6592h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6592t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6592w:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*']",0,0
CVE-2021-0610,MediaTek,0.00043,7.8,0.0,1.0,0.0,0.0,0,2021-09-27,1.0,2021-09-01,,,1.0,"In memory management driver, there is a possible memory corruption due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05411456.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-190'],"['cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6582_90:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6582e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6582h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6582t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6582w:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6589:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6589td:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6592_90:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6592e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6592h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6592t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6592w:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*']",0,0
CVE-2021-0612,MediaTek,0.00042,7.8,0.0,1.0,0.0,0.0,0,2021-09-27,1.0,2021-09-01,,,1.0,"In m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425834.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-416'],"['cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6582_90:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6582e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6582h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6582t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6582w:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6589:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6589td:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6592_90:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6592e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6592h:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6592t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6592w:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*']",0,0
CVE-2021-0619,MediaTek,0.00042,5.5,0.0,1.0,0.0,0.0,0,2021-11-18,1.0,2021-11-11,,,1.0,"In ape extractor, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05561395; Issue ID: ALPS05561395.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.8,3.6,['CWE-125'],"['cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*']",0,0
CVE-2021-0657,MediaTek,0.00042,6.7,0.0,1.0,0.0,0.0,0,2021-11-18,1.0,2021-11-11,,,1.0,"In apusys, there is a possible out of bounds write due to a stack-based buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05672103; Issue ID: ALPS05672103.",CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.8,5.9,['CWE-787'],"['cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*']",0,0
CVE-2021-0669,MediaTek,0.00042,6.7,0.0,1.0,0.0,0.0,0,2021-11-18,1.0,2021-11-11,,,1.0,"In apusys, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05681550; Issue ID: ALPS05681550.",CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.8,5.9,['CWE-416'],"['cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9970:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9980:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9981:-:*:*:*:*:*:*:*']",0,0
CVE-2021-0678,MediaTek,0.00044,6.7,0.0,1.0,0.0,0.0,0,2021-12-17,1.0,2021-12-01,,,1.0,"In apusys, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05672107; Issue ID: ALPS05722511.",CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.8,5.9,['CWE-787'],"['cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*']",0,0
CVE-2021-0894,MediaTek,0.00044,6.7,0.0,1.0,0.0,0.0,0,2021-12-17,1.0,2021-12-01,,,1.0,"In apusys, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05672107; Issue ID: ALPS05672038.",CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.8,5.9,['CWE-787'],"['cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*']",0,0
CVE-2021-0900,MediaTek,0.00044,4.4,0.0,1.0,0.0,0.0,0,2021-12-17,1.0,2021-12-01,,,1.0,"In apusys, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05672107; Issue ID: ALPS05672055.",CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N,LOCAL,LOW,HIGH,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,0.8,3.6,['CWE-125'],"['cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*']",0,0
CVE-2021-25477,MediaTek,0.001,4.9,0.0,1.0,0.0,0.0,0,2021-10-06,0.0,,0.0,,,An improper error handling in Mediatek RRC Protocol stack prior to SMR Oct-2021 Release 1 allows modem crash and remote denial of service.,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,1.2,3.6,['CWE-415'],"['cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*']",0,0
CVE-2021-32467,MediaTek,0.00116,7.5,0.0,1.0,0.0,1.0,0,2021-12-26,1.0,2022-01-03,,,0.0,"MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle the WPS (Wi-Fi Protected Setup) protocol. (Affected Chipsets MT7603E, MT7610, MT7612, MT7613, MT7615, MT7620, MT7622, MT7628, MT7629, MT7915; Affected Software Versions 7.4.0.0; Out-of-bounds read).",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-125'],"['cpe:2.3:h:mediatek:mt7603e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7603e_firmware:7.4.0.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7612:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7612_firmware:7.4.0.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7613:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7613_firmware:7.4.0.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7615:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7615_firmware:7.4.0.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7622:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7622_firmware:7.4.0.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7628:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7628_firmware:7.4.0.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7629:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7629_firmware:7.4.0.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7915:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7915_firmware:7.4.0.0:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7620_firmware:7.4.0.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7620:-:*:*:*:*:*:*:*']",0,0
CVE-2021-35055,MediaTek,0.0022,8.8,0.0,1.0,0.0,1.0,0,2021-12-26,1.0,2022-01-03,,,0.0,"MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle the WPS (Wi-Fi Protected Setup) protocol. (Affected Chipsets MT7603E, MT7610, MT7612, MT7613, MT7615, MT7620, MT7622, MT7628, MT7629, MT7915; Affected Software Versions 7.4.0.0; Out-of-bounds write).",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-787'],"['cpe:2.3:h:mediatek:mt7603e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7603e_firmware:7.4.0.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7612:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7612_firmware:7.4.0.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7613:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7613_firmware:7.4.0.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7615:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7615_firmware:7.4.0.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7622:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7622_firmware:7.4.0.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7628:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7628_firmware:7.4.0.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7629:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7629_firmware:7.4.0.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7915:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7915_firmware:7.4.0.0:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7620_firmware:7.4.0.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7620:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7610_firmware:7.4.0.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7610:-:*:*:*:*:*:*:*']",0,0
CVE-2021-37564,MediaTek,0.00116,7.5,0.0,1.0,0.0,1.0,0,2021-12-26,1.0,2022-01-03,,,0.0,"MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle IEEE 1905 protocols. (Affected Chipsets MT7603E, MT7613, MT7615, MT7622, MT7628, MT7629, MT7915; Affected Software Versions 2.0.2; Out-of-bounds read).",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-125'],"['cpe:2.3:o:mediatek:mt7603e_firmware:2.0.2:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7603e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7613_firmware:2.0.2:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7613:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7615_firmware:2.0.2:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7615:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7622_firmware:2.0.2:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7622:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7628_firmware:2.0.2:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7628:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7629_firmware:2.0.2:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7629:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7915_firmware:2.0.2:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7915:-:*:*:*:*:*:*:*']",0,0
CVE-2021-37570,MediaTek,0.00116,7.5,0.0,1.0,0.0,1.0,0,2021-12-26,1.0,2022-01-03,,,0.0,"MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle IEEE 1905 protocols. (Affected Chipsets MT7603E, MT7613, MT7615, MT7622, MT7628, MT7629, MT7915; Affected Software Versions 2.0.2; Out-of-bounds read).",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-125'],"['cpe:2.3:o:mediatek:mt7603e_firmware:2.0.2:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7603e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7613_firmware:2.0.2:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7613:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7615_firmware:2.0.2:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7615:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7622_firmware:2.0.2:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7622:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7628_firmware:2.0.2:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7628:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7629_firmware:2.0.2:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7629:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7915_firmware:2.0.2:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7915:-:*:*:*:*:*:*:*']",0,0
CVE-2021-41788,MediaTek,0.00166,7.5,0.0,1.0,0.0,1.0,0,2021-12-26,1.0,2022-01-03,,,0.0,"MediaTek microchips, as used in NETGEAR devices through 2021-12-13 and other devices, mishandle attempts at Wi-Fi authentication flooding. (Affected Chipsets MT7603E, MT7612, MT7613, MT7615, MT7622, MT7628, MT7629, MT7915; Affected Software Versions 7.4.0.0).",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-20'],"['cpe:2.3:h:mediatek:mt7603e:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7603e_firmware:7.4.0.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7612:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7612_firmware:7.4.0.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7613:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7613_firmware:7.4.0.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7615:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7615_firmware:7.4.0.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7622:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7622_firmware:7.4.0.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7628:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7628_firmware:7.4.0.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7629:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7629_firmware:7.4.0.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7915:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7915_firmware:7.4.0.0:*:*:*:*:*:*:*']",0,0
CVE-2022-20028,MediaTek,0.00042,7.8,0.0,1.0,0.0,0.0,0,2022-02-09,1.0,2022-02-07,,,1.0,"In Bluetooth, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06198663; Issue ID: ALPS06198663.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-787'],"['cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*']",0,0
CVE-2022-20047,MediaTek,0.00042,7.8,0.0,1.0,0.0,0.0,0,2022-03-10,1.0,2022-03-07,,,1.0,"In video decoder, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05917489; Issue ID: ALPS05917489.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-787'],"['cpe:2.3:h:mediatek:mt5816:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt5835:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9900:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9901:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9950:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9969:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9970:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9980:-:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*']",0,0
CVE-2022-20052,MediaTek,0.00043,6.5,0.0,1.0,0.0,0.0,0,2022-04-11,1.0,2022-04-06,,,1.0,"In mdp, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS05836642; Issue ID: ALPS05836642.",CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,HIGH,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.6,5.9,['CWE-416'],"['cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8735a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*']",0,0
CVE-2022-20054,MediaTek,0.00042,7.8,0.0,1.0,0.0,0.0,0,2022-03-10,1.0,2022-03-07,,,1.0,"In ims service, there is a possible AT command injection due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06219083; Issue ID: ALPS06219083.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-862'],"['cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*']",0,0
CVE-2022-20055,MediaTek,0.00045,6.8,0.0,1.0,0.0,0.0,0,2022-03-10,1.0,2022-03-07,,,1.0,"In preloader (usb), there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS06160806; Issue ID: ALPS06160830.",CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,PHYSICAL,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.9,5.9,['CWE-787'],"['cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8735a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8735b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*']",0,0
CVE-2022-20064,MediaTek,0.00042,6.7,0.0,1.0,0.0,0.0,0,2022-04-11,1.0,2022-04-06,,,1.0,"In ccci, there is a possible leak of kernel pointer due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06108617; Issue ID: ALPS06108617.",CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.8,5.9,['CWE-125'],"['cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*']",0,0
CVE-2022-20087,MediaTek,0.00042,6.7,0.0,1.0,0.0,0.0,0,2022-05-03,1.0,2022-05-03,,,1.0,"In ccu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06477970; Issue ID: ALPS06477970.",CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.8,5.9,['CWE-787'],"['cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*']",0,0
CVE-2022-20106,MediaTek,0.00042,6.7,0.0,1.0,0.0,0.0,0,2022-05-03,1.0,2022-05-03,,,1.0,"In MM service, there is a possible out of bounds write due to a heap-based buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03330460; Issue ID: DTV03330460.",CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.8,5.9,['CWE-787'],"['cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9215:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9220:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9285:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9600:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9611:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9670:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*', 'cpe:2.3:o:linux:linux_kernel:4.9:*:*:*:*:*:*:*', 'cpe:2.3:o:linux:linux_kernel:4.19:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9215:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9220:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9285:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9600:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9611:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9670:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*']",0,0
CVE-2022-20111,MediaTek,0.00048,8.4,0.0,1.0,0.0,0.0,0,2022-05-03,1.0,2022-05-03,,,1.0,"In ion, there is a possible use after free due to incorrect error handling. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06366069; Issue ID: ALPS06366069.",CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.5,5.9,['CWE-755'],"['cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8695:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8696:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*']",0,0
CVE-2022-21758,MediaTek,0.00042,6.7,0.0,1.0,0.0,0.0,0,2022-06-06,1.0,2022-06-06,,,1.0,"In ccu, there is a possible memory corruption due to a double free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06439600; Issue ID: ALPS06439600.",CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.8,5.9,['CWE-415'],"['cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*']",0,0
CVE-2022-21765,MediaTek,0.00042,6.7,0.0,1.0,0.0,0.0,0,2022-07-06,1.0,2022-07-04,,,1.0,"In CCCI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06641673; Issue ID: ALPS06641673.",CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.8,5.9,['CWE-787'],"['cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*']",0,0
CVE-2022-21771,MediaTek,0.00042,6.7,0.0,1.0,0.0,0.0,0,2022-07-06,1.0,2022-07-04,,,1.0,"In GED driver, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06641585; Issue ID: ALPS06641585.",CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.8,5.9,['CWE-362'],"['cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*']",0,0
CVE-2022-21772,MediaTek,0.00042,6.7,0.0,1.0,0.0,0.0,0,2022-07-06,1.0,2022-07-04,,,1.0,"In TEEI driver, there is a possible type confusion due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06493842; Issue ID: ALPS06493842.",CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.8,5.9,['CWE-362'],"['cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8785:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*']",0,0
CVE-2022-21778,MediaTek,0.00042,6.7,0.0,1.0,0.0,0.0,0,2022-11-08,1.0,2022-11-07,,,1.0,"In vpu, there is a possible information disclosure due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06382421; Issue ID: ALPS06382421.",CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.8,5.9,['CWE-125'],"['cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*']",0,0
CVE-2022-21785,MediaTek,0.00042,6.7,0.0,1.0,0.0,0.0,0,2022-07-06,1.0,2022-07-04,,,1.0,"In WLAN driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06807363; Issue ID: ALPS06807363.",CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.8,5.9,['CWE-787'],"['cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8695:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8696:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*']",0,0
CVE-2022-26438,MediaTek,0.00042,6.7,0.0,1.0,0.0,1.0,0,2022-08-01,1.0,2022-08-01,,,1.0,"In wifi driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: GN20220420013; Issue ID: GN20220420013.",CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.8,5.9,['CWE-787'],"['cpe:2.3:o:mediatek:mt7603_firmware:7.6.2.3:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7603:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7610_firmware:7.6.2.3:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7610:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7612_firmware:7.6.2.3:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7612:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7613_firmware:7.6.2.3:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7613:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7615_firmware:7.6.2.3:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7615:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7620_firmware:7.6.2.3:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7620:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7622_firmware:7.6.2.3:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7622:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7628_firmware:7.6.2.3:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7628:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7629_firmware:7.6.2.3:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7629:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7915_firmware:7.6.2.3:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7915:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7916_firmware:7.6.2.3:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7916:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt7986_firmware:7.6.2.3:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7986:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mediatek:mt8981_firmware:7.6.2.3:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8981:-:*:*:*:*:*:*:*']",0,0
CVE-2022-26473,MediaTek,0.00042,6.7,0.0,1.0,0.0,0.0,0,2022-10-07,1.0,2022-10-03,,,1.0,"In vdec fmt, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07342197; Issue ID: ALPS07342197.",CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.8,5.9,['CWE-667'],"['cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8695:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8696:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*']",0,0
CVE-2022-32589,MediaTek,0.00103,7.5,0.0,1.0,0.0,0.0,0,2022-10-07,1.0,2022-10-03,,,1.0,"In Wi-Fi driver, there is a possible way to disconnect Wi-Fi due to an improper resource release. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07030600; Issue ID: ALPS07030600.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-404'],"['cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7663:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7668:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7902:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt7921:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8512a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8518:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8532:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*', 'cpe:2.3:a:linuxfoundation:yocto:3.1:*:*:*:*:*:*:*', 'cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*', 'cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*']",0,0
CVE-2018-12228,Sangoma,0.00197,6.5,0.0,0.0,1.0,0.0,1,2018-06-12,1.0,2018-06-11,,,1.0,"An issue was discovered in Asterisk Open Source 15.x before 15.4.1. When connected to Asterisk via TCP/TLS, if the client abruptly disconnects, or sends a specially crafted message, then Asterisk gets caught in an infinite loop while trying to read the data stream. This renders the system unusable.",CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.8,3.6,['CWE-835'],['cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*'],0,0
CVE-2021-37706,Sangoma,0.02164,9.8,0.0,0.0,1.0,0.0,1,2021-12-22,1.0,2022-10-31,,,0.0,"PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In affected versions if the incoming STUN message contains an ERROR-CODE attribute, the header length is not checked before performing a subtraction operation, potentially resulting in an integer underflow scenario. This issue affects all users that use STUN. A malicious actor located within the victim’s network may forge and send a specially crafted UDP (STUN) message that could remotely execute arbitrary code on the victim’s machine. Users are advised to upgrade as soon as possible. There are no known workarounds.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-191'],"['cpe:2.3:a:teluu:pjsip:*:*:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:*:*:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:16.8.0:*:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert1:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert10:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert11:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert12:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert2:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert3:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert4:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert5:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert6:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert7:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert8:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert9:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*']",0,0
CVE-2022-21723,Sangoma,0.00664,9.1,0.0,0.0,1.0,0.0,1,2022-01-27,1.0,2022-03-04,,,0.0,"PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions 2.11.1 and prior, parsing an incoming SIP message that contains a malformed multipart can potentially cause out-of-bound read access. This issue affects all PJSIP users that accept SIP multipart. The patch is available as commit in the `master` branch. There are no known workarounds.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,HIGH,CRITICAL,3.9,5.2,['CWE-125'],"['cpe:2.3:a:teluu:pjsip:*:*:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:16.8.0:*:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert1:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert10:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert11:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert12:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert2:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert3:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert4:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert5:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert6:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert7:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert8:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert9:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*']",0,0
CVE-2022-23608,Sangoma,0.01272,9.8,0.0,0.0,1.0,0.0,1,2022-02-22,1.0,2022-10-31,,,0.0,"PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions up to and including 2.11.1 when in a dialog set (or forking) scenario, a hash key shared by multiple UAC dialogs can potentially be prematurely freed when one of the dialogs is destroyed . The issue may cause a dialog set to be registered in the hash table multiple times (with different hash keys) leading to undefined behavior such as dialog list collision which eventually leading to endless loop. A patch is available in commit db3235953baa56d2fb0e276ca510fefca751643f which will be included in the next release. There are no known workarounds for this issue.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-416'],"['cpe:2.3:a:teluu:pjsip:*:*:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:*:*:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert1:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert10:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert11:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert12:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert2:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert3:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert4:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert5:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert6:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert7:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert8:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert9:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*']",0,0
CVE-2017-9358,Sangoma,0.00827,7.5,0.0,0.0,1.0,0.0,0,2017-06-02,0.0,,1.0,2017-04-13,,"A memory exhaustion vulnerability exists in Asterisk Open Source 13.x before 13.15.1 and 14.x before 14.4.1 and Certified Asterisk 13.13 before 13.13-cert4, which can be triggered by sending specially crafted SCCP packets causing an infinite loop and leading to memory exhaustion (by message logging in that loop).",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-835'],"['cpe:2.3:a:sangoma:asterisk:13.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:13.1.0:*:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:13.1.0:rc1:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:13.1.0:rc2:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:13.2.0:*:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:13.2.0:rc1:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:13.3.0:rc1:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:13.4.0:*:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:13.4.0:rc1:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:13.5.0:*:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:13.5.0:rc1:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:13.6.0:rc1:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:13.7.0:*:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:13.7.0:rc1:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:13.8.0:*:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:13.8.0:rc1:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:13.8.1:*:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:13.8.2:*:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:13.9.0:*:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:13.9.0:rc1:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:13.10.0:rc1:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:13.11.0:rc1:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:13.12.0:*:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:13.12.0:rc1:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:13.12.1:*:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:13.12.2:*:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:13.13.0:rc1:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:13.14.0:rc1:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:13.15.0:rc1:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:13.13.0:*:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert1:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert1-rc1:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert1-rc2:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert1-rc3:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert1-rc4:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert2:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:13.13.0:cert3:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:13.13.0:rc1:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:13.13.0:rc2:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:14.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:14.0.0:beta1:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:14.0.0:beta2:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:14.0.0:rc1:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:14.1.0:rc1:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:14.2.0:*:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:14.2.0:rc1:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:14.2.0:rc2:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:14.2.1:*:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:14.3.0:rc1:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:14.4.0:rc1:*:*:*:*:*:*']",0,0
CVE-2020-28242,Sangoma,0.00442,6.5,0.0,0.0,1.0,0.0,0,2020-11-06,1.0,2020-11-05,,,1.0,"An issue was discovered in Asterisk Open Source 13.x before 13.37.1, 16.x before 16.14.1, 17.x before 17.8.1, and 18.x before 18.0.1 and Certified Asterisk before 16.8-cert5. If Asterisk is challenged on an outbound INVITE and the nonce is changed in each response, Asterisk will continually send INVITEs in a loop. This causes Asterisk to consume more and more memory since the transaction will never terminate (even if the call is hung up), ultimately leading to a restart or shutdown of Asterisk. Outbound authentication must be configured on the endpoint for this to occur.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.8,3.6,['CWE-674'],"['cpe:2.3:a:asterisk:certified_asterisk:*:*:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*']",0,0
CVE-2020-28327,Sangoma,0.00088,5.3,0.0,0.0,1.0,0.0,0,2020-11-06,1.0,2020-11-05,,,1.0,"A res_pjsip_session crash was discovered in Asterisk Open Source 13.x before 13.37.1, 16.x before 16.14.1, 17.x before 17.8.1, and 18.x before 18.0.1. and Certified Asterisk before 16.8-cert5. Upon receiving a new SIP Invite, Asterisk did not return the created dialog locked or referenced. This caused a gap between the creation of the dialog object, and its next use by the thread that created it. Depending on some off-nominal circumstances and timing, it was possible for another thread to free said dialog in this gap. Asterisk could then crash when the dialog object, or any of its dependent objects, were dereferenced or accessed next by the initial-creation thread. Note, however, that this crash can only occur when using a connection-oriented protocol (e.g., TCP or TLS, but not UDP) for SIP transport. Also, the remote client must be authenticated, or Asterisk must be configured for anonymous calling.",CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H,NETWORK,HIGH,LOW,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,1.6,3.6,['CWE-404'],"['cpe:2.3:a:digium:certified_asterisk:16.8:-:*:*:*:*:*:*', 'cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc1:*:*:*:*:*:*', 'cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc2:*:*:*:*:*:*', 'cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc3:*:*:*:*:*:*', 'cpe:2.3:a:digium:certified_asterisk:16.8:cert1-rc4:*:*:*:*:*:*', 'cpe:2.3:a:digium:certified_asterisk:16.8:cert2:*:*:*:*:*:*', 'cpe:2.3:a:digium:certified_asterisk:16.8:cert3:*:*:*:*:*:*', 'cpe:2.3:a:digium:certified_asterisk:16.8:cert4:*:*:*:*:*:*', 'cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc1:*:*:*:*:*:*', 'cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc2:*:*:*:*:*:*', 'cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc3:*:*:*:*:*:*', 'cpe:2.3:a:digium:certified_asterisk:16.8:cert4-rc4:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*', 'cpe:2.3:a:sangoma:asterisk:*:*:*:*:*:*:*:*']",0,0
CVE-2021-46837,Sangoma,0.00109,6.5,0.0,0.0,1.0,0.0,0,2022-08-30,1.0,2021-03-04,,,1.0,"res_pjsip_t38 in Sangoma Asterisk 16.x before 16.16.2, 17.x before 17.9.3, and 18.x before 18.2.2, and Certified Asterisk before 16.8-cert7, allows an attacker to trigger a crash by sending an m=image line and zero port in a response to a T.38 re-invite initiated by Asterisk. This is a re-occurrence of the CVE-2019-15297 symptoms but not for exactly the same reason. The crash occurs because there is an append operation relative to the active topology, but this should instead be a replace operation.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.8,3.6,['CWE-476'],"['cpe:2.3:a:asterisk:certified_asterisk:16.8.0:-:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert1:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert2:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert3:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert4:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert5:*:*:*:*:*:*', 'cpe:2.3:a:asterisk:certified_asterisk:16.8.0:cert6:*:*:*:*:*:*', 'cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*', 'cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*', 'cpe:2.3:a:digium:asterisk:*:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*']",0,0
CVE-2018-12920,FLiR,0.00286,7.5,0.0,1.0,0.0,1.0,1,2018-06-28,0.0,,0.0,,,Brickstream 2300 devices allow remote attackers to obtain potentially sensitive information via a direct request for the basic.html#ipsettings or basic.html#datadelivery URI.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-200'],"['cpe:2.3:o:flir:brickstream_2300_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:flir:brickstream_2300:-:*:*:*:*:*:*:*']",0,0
CVE-2018-3813,FLiR,0.00913,9.8,0.0,1.0,0.0,1.0,1,2018-01-01,0.0,,0.0,,,"getConfigExportFile.cgi on FLIR Brickstream 2300 devices 2.0 4.1.53.166 has Incorrect Access Control, as demonstrated by reading the AVI_USER_ID and AVI_USER_PASSWORD fields via a direct request.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-200'],"['cpe:2.3:o:flir:brickstream_2300_2d_firmware:2.0_4.1.53.166:*:*:*:*:*:*:*', 'cpe:2.3:h:flir:brickstream_2300_2d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:flir:brickstream_2300_3d_firmware:2.0_4.1.53.166:*:*:*:*:*:*:*', 'cpe:2.3:h:flir:brickstream_2300_3d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:flir:brickstream_2300_3d\\+_firmware:2.0_4.1.53.166:*:*:*:*:*:*:*', 'cpe:2.3:h:flir:brickstream_2300_3d\\+:-:*:*:*:*:*:*:*']",0,0
CVE-2022-37060,FLiR,0.51074,7.5,0.0,1.0,0.0,1.0,1,2022-08-18,0.0,,1.0,2018-08-29,,"FLIR AX8 thermal sensor cameras version up to and including 1.46.16 is vulnerable to Directory Traversal due to an improper access restriction. An unauthenticated, remote attacker can exploit this by sending a URI that contains directory traversal characters to disclose the contents of files located outside of the server's restricted path.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-22'],"['cpe:2.3:o:flir:flir_ax8_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:flir:flir_ax8:-:*:*:*:*:*:*:*']",0,0
CVE-2022-37061,FLiR,0.97481,9.8,0.0,1.0,0.0,1.0,1,2022-08-18,0.0,,1.0,2018-08-29,,All FLIR AX8 thermal sensor cameras version up to and including 1.46.16 are vulnerable to Remote Command Injection. This can be exploited to inject and execute arbitrary shell commands as the root user through the id HTTP POST parameter in the res.php endpoint. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the root privileges.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-78'],"['cpe:2.3:h:flir:flir_ax8:-:*:*:*:*:*:*:*', 'cpe:2.3:o:flir:flir_ax8_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2022-37062,FLiR,0.00523,7.5,0.0,1.0,0.0,1.0,1,2022-08-18,0.0,,1.0,2018-08-29,,"All FLIR AX8 thermal sensor cameras version up to and including 1.46.16 are affected by an insecure design vulnerability due to an improper directory access restriction. An unauthenticated, remote attacker can exploit this by sending a URI that contains the path of the SQLite users database and download it. A successful exploit could allow the attacker to extract usernames and hashed passwords.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-306'],"['cpe:2.3:h:flir:flir_ax8:-:*:*:*:*:*:*:*', 'cpe:2.3:o:flir:flir_ax8_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2022-37063,FLiR,0.00091,5.4,0.0,1.0,0.0,1.0,1,2022-08-18,0.0,,1.0,2018-08-29,,All FLIR AX8 thermal sensor cameras versions up to and including 1.46.16 are vulnerable to Cross Site Scripting (XSS) due to improper input sanitization. An authenticated remote attacker can execute arbitrary JavaScript code in the web management interface. A successful exploit could allow the attacker to insert malicious JavaScript code.,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,LOW,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.3,2.7,['CWE-79'],"['cpe:2.3:o:flir:flir_ax8_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:flir:flir_ax8:-:*:*:*:*:*:*:*']",0,0
CVE-2018-13022,Xiaomi,0.00107,6.1,0.0,1.0,0.0,1.0,1,2018-11-27,0.0,,0.0,,,Cross-site scripting vulnerability in the API 404 page on Xiaomi Mi Router 3 version 2.22.15 allows attackers to execute arbitrary JavaScript via a modified URL path.,CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:mi:miwifi_os:2.22.15:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:mi_router_3:-:*:*:*:*:*:*:*']",0,0
CVE-2018-16130,Xiaomi,0.0105,8.8,0.0,1.0,0.0,1.0,1,2018-11-27,0.0,,0.0,,,"System command injection in request_mitv in Xiaomi Mi Router 3 version 2.22.15 allows attackers to execute arbitrary system commands via the ""payload"" URL parameter.",CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-78'],"['cpe:2.3:o:mi:miwifi_os:2.22.15:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:mi_router_3:-:*:*:*:*:*:*:*']",0,0
CVE-2018-19939,Xiaomi,0.0009,7.5,0.0,1.0,0.0,0.0,1,2018-12-07,0.0,,0.0,,,The Goodix GT9xx touchscreen driver for custom Linux kernels on Xiaomi daisy-o-oss and daisy-p-oss as used in Mi A2 Lite and RedMi6 pro devices through 2018-08-27 has a NULL pointer dereference in kfree after a kmalloc failure in gtp_read_Color in drivers/input/touchscreen/gt917d/gt9xx.c.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-476'],"['cpe:2.3:h:mi:mi_a2_lite:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mi:mi_a2_lite_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:redmi_6:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mi:redmi_6_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2018-20523,Xiaomi,0.01172,5.3,1.0,1.0,1.0,1.0,1,2019-06-07,1.0,2018-12-27,,,1.0,"Xiaomi Stock Browser 10.2.4.g on Xiaomi Redmi Note 5 Pro devices and other Redmi Android phones allows content provider injection. In other words, a third-party application can read the user's cleartext browser history via an app.provider.query content://com.android.browser.searchhistory/searchhistory request.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,LOW,NONE,NONE,MEDIUM,3.9,1.4,['CWE-77'],"['cpe:2.3:a:mi:stock_browser:10.2.4g:*:*:*:*:*:*:*', 'cpe:2.3:o:mi:redmi_7_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:redmi_7:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mi:redmi_note_7_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:redmi_note_7:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mi:redmi_note_6_pro_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:redmi_note_6_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mi:redmi_6_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:redmi_6:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mi:redmi_6a_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:redmi_6a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mi:redmi_s2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:redmi_s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mi:redmi_note_5_pro_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:redmi_note_5_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mi:redmi_k20_pro_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:redmi_k20_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mi:redmi_k20_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:redmi_k20:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mi:redmi_7a_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:redmi_7a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mi:redmi_go_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:redmi_go:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mi:redmi_note_5_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:redmi_note_5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mi:redmi_y3_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:redmi_y3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mi:redmi_note_7s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:redmi_note_7s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mi:redmi_s2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:redmi_s2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mi:redmi_4a_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:redmi_4a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mi:redmi_note_4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:redmi_note_4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mi:redmi_5_plus_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:redmi_5_plus:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mi:redmi_note_5a_prime_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:redmi_note_5a_prime:-:*:*:*:*:*:*:*']",1,0
CVE-2019-15340,Xiaomi,0.00044,3.3,0.0,1.0,0.0,1.0,1,2019-11-14,0.0,,0.0,,,"The Xiaomi Redmi 6 Pro Android device with a build fingerprint of xiaomi/sakura_india/sakura_india:8.1.0/OPM1.171019.019/V9.6.4.0.ODMMIFD:user/release-keys contains a pre-installed app with a package name of com.huaqin.factory app (versionCode=1, versionName=QL1715_201805292006) that allows any app co-located on the device to programmatically disable and enable Wi-Fi, Bluetooth, and GPS without the corresponding access permission through an exported interface.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N,LOCAL,LOW,LOW,NONE,UNCHANGED,NONE,LOW,NONE,LOW,1.8,1.4,['CWE-732'],"['cpe:2.3:o:mi:redmi_6_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:redmi_6:-:*:*:*:*:*:*:*']",0,0
CVE-2019-15428,Xiaomi,0.00044,3.3,0.0,1.0,0.0,1.0,1,2019-11-14,0.0,,0.0,,,"The Xiaomi Mi Note 2 Android device with a build fingerprint of Xiaomi/scorpio/scorpio:6.0.1/MXB48T/7.1.5:user/release-keys contains a pre-installed app with a package name of com.miui.powerkeeper app (versionCode=40000, versionName=4.0.00) that allows unauthorized wireless settings modification via a confused deputy attack. This capability can be accessed by any app co-located on the device.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N,LOCAL,LOW,LOW,NONE,UNCHANGED,NONE,LOW,NONE,LOW,1.8,1.4,['CWE-610'],"['cpe:2.3:o:mi:note_2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:note_2:-:*:*:*:*:*:*:*']",0,0
CVE-2019-15466,Xiaomi,0.00044,3.3,0.0,1.0,0.0,1.0,1,2019-11-14,0.0,,0.0,,,"The Xiaomi Redmi 6 Pro Android device with a build fingerprint of xiaomi/sakura_india/sakura_india:8.1.0/OPM1.171019.019/V10.2.6.0.ODMMIXM:user/release-keys contains a pre-installed app with a package name of com.huaqin.factory app (versionCode=1, versionName=QL1715_201812191721) that allows unauthorized wireless settings modification via a confused deputy attack. This capability can be accessed by any app co-located on the device.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N,LOCAL,LOW,LOW,NONE,UNCHANGED,NONE,LOW,NONE,LOW,1.8,1.4,['CWE-610'],"['cpe:2.3:o:mi:redmi_6_pro_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:redmi_6_pro:-:*:*:*:*:*:*:*']",0,0
CVE-2019-15467,Xiaomi,0.00044,3.3,0.0,1.0,0.0,1.0,1,2019-11-14,0.0,,0.0,,,"The Xiaomi Mi Mix 2S Android device with a build fingerprint of Xiaomi/polaris/polaris:8.0.0/OPR1.170623.032/V9.5.19.0.ODGMIFA:user/release-keys contains a pre-installed app with a package name of com.huaqin.factory app (versionCode=1, versionName=A2060_201801032053) that allows unauthorized wireless settings modification via a confused deputy attack. This capability can be accessed by any app co-located on the device.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N,LOCAL,LOW,LOW,NONE,UNCHANGED,NONE,LOW,NONE,LOW,1.8,1.4,['CWE-610'],"['cpe:2.3:o:mi:mix_2s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:mix_2s:-:*:*:*:*:*:*:*']",0,0
CVE-2019-15470,Xiaomi,0.00044,5.5,0.0,1.0,0.0,1.0,1,2019-11-14,0.0,,0.0,,,"The Xiaomi Redmi Note 6 Pro Android device with a build fingerprint of xiaomi/tulip/tulip:8.1.0/OPM1.171019.011/V10.2.2.0.OEKMIXM:user/release-keys contains a pre-installed app with a package name of com.qualcomm.qti.callenhancement app (versionCode=27, versionName=8.1.0) that allows other pre-installed apps to perform microphone audio recording via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that export their capabilities to other pre-installed app. This app allows a third-party app to use its open interface to record telephone calls to external storage.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.8,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:mi:redmi_note_6_pro_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:redmi_note_6_pro:-:*:*:*:*:*:*:*']",0,0
CVE-2019-15915,Xiaomi,0.00114,7.5,0.0,1.0,0.0,1.0,1,2019-12-20,0.0,,0.0,,,"An issue was discovered on Xiaomi DGNWG03LM, ZNCZ03LM, MCCGQ01LM, RTCGQ01LM devices. Attackers can utilize the ""discover ZigBee network procedure"" to perform a denial of service attack.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-20'],"['cpe:2.3:o:mi:dgnwg03lm_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:dgnwg03lm:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mi:zncz03lm_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:zncz03lm:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mi:mccgq01lm_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:mccgq01lm:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mi:rtcgq01lm_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:rtcgq01lm:-:*:*:*:*:*:*:*']",0,0
CVE-2019-18371,Xiaomi,0.03112,7.5,0.0,1.0,0.0,1.0,1,2019-10-23,0.0,,0.0,,,"An issue was discovered on Xiaomi Mi WiFi R3G devices before 2.28.23-stable. There is a directory traversal vulnerability to read arbitrary files via a misconfigured NGINX alias, as demonstrated by api-third-party/download/extdisks../etc/config/account. With this vulnerability, the attacker can bypass authentication.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-22'],"['cpe:2.3:o:mi:millet_router_3g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:millet_router_3g:-:*:*:*:*:*:*:*']",0,0
CVE-2020-10262,Xiaomi,0.00218,6.8,0.0,1.0,0.0,0.0,1,2020-04-08,0.0,,0.0,,,"An issue was discovered on XIAOMI XIAOAI speaker Pro LX06 1.58.10. Attackers can activate the failsafe mode during the boot process, and use the mi_console command cascaded by the SN code shown on the product to get the root shell password, and then the attacker can (i) read Wi-Fi SSID or password, (ii) read the dialogue text files between users and XIAOMI XIAOAI speaker Pro LX06, (iii) use Text-To-Speech tools pretend XIAOMI speakers' voice achieve social engineering attacks, (iv) eavesdrop on users and record what XIAOMI XIAOAI speaker Pro LX06 hears, (v) modify system files, (vi) use commands to send any IR code through IR emitter on XIAOMI XIAOAI Speaker Pro (LX06), (vii) stop voice assistant service, (viii) enable the XIAOMI XIAOAI Speaker Pro’s SSH or TELNET service as a backdoor, (IX) tamper with the router configuration of the router in the local area networks.",CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,PHYSICAL,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.9,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:mi:xiaomi_xiaoai_speaker_pro_lx06_firmware:1.58.10:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:xiaomi_xiaoai_speaker_pro_lx06:-:*:*:*:*:*:*:*']",0,0
CVE-2020-10263,Xiaomi,0.00218,6.8,0.0,1.0,0.0,1.0,1,2020-04-08,0.0,,0.0,,,"An issue was discovered on XIAOMI XIAOAI speaker Pro LX06 1.52.4. Attackers can get root shell by accessing the UART interface and then they can (i) read Wi-Fi SSID or password, (ii) read the dialogue text files between users and XIAOMI XIAOAI speaker Pro LX06, (iii) use Text-To-Speech tools pretend XIAOMI speakers' voice achieve social engineering attacks, (iv) eavesdrop on users and record what XIAOMI XIAOAI speaker Pro LX06 hears, (v) modify system files, (vi) use commands to send any IR code through IR emitter on XIAOMI XIAOAI Speaker Pro LX06, (vii) stop voice assistant service, (viii) enable the XIAOMI XIAOAI Speaker Pro’ SSH or TELNET service as a backdoor, (IX) tamper with the router configuration of the router in the local area networks.",CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,PHYSICAL,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.9,5.9,['CWE-306'],"['cpe:2.3:o:mi:xiaomi_xiaoai_speaker_pro_lx06_firmware:1.52.4:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:xiaomi_xiaoai_speaker_pro_lx06:-:*:*:*:*:*:*:*']",0,0
CVE-2020-10561,Xiaomi,0.0022,9.8,0.0,1.0,0.0,0.0,1,2020-06-24,0.0,,0.0,,,"An issue was discovered on Xiaomi Mi Jia ink-jet printer < 3.4.6_0138. Injecting parameters to ippserver through the web management background, resulting in command execution vulnerabilities.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-77'],"['cpe:2.3:o:mi:mijia_inkjet_printer_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:mijia_inkjet_printer:-:*:*:*:*:*:*:*']",0,0
CVE-2020-14094,Xiaomi,0.01044,9.8,0.0,1.0,0.0,0.0,1,2020-06-24,0.0,,0.0,,,"In Xiaomi router R3600, ROM version<1.0.20, the connection service can be injected through the web interface, resulting in stack overflow or remote code execution.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:h:mi:xiaomi_r3600:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mi:xiaomi_r3600_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2020-14095,Xiaomi,0.00528,9.8,0.0,1.0,0.0,0.0,1,2020-06-24,0.0,,0.0,,,"In Xiaomi router R3600, ROM version<1.0.20, a connect service suffers from an injection vulnerability through the web interface, leading to a stack overflow or remote code execution.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:h:mi:xiaomi_r3600:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mi:xiaomi_r3600_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2020-14100,Xiaomi,0.01754,9.8,0.0,1.0,0.0,0.0,1,2020-09-11,0.0,,0.0,,,"In Xiaomi router R3600 ROM version<1.0.66, filters in the set_WAN6 interface can be bypassed, causing remote code execution. The router administrator can gain root access from this vulnerability.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-77'],"['cpe:2.3:h:mi:r3600:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mi:r3600_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2020-14103,Xiaomi,0.00066,5.5,0.0,1.0,0.0,1.0,1,2021-04-08,0.0,,0.0,,,"The application in the mobile phone can read the SNO information of the device, Xiaomi 10 MIUI < 2020.01.15.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.8,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:mi:miui:*:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:mi_10:-:*:*:*:*:*:*:*']",0,0
CVE-2020-14106,Xiaomi,0.00066,5.5,0.0,0.0,0.0,1.0,1,2021-04-08,0.0,,0.0,,,"The application in the mobile phone can unauthorized access to the list of running processes in the mobile phone, Xiaomi Mobile Phone MIUI < 2021.01.26.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.8,3.6,['CWE-863'],['cpe:2.3:o:mi:miui:*:*:*:*:*:*:*:*'],0,0
CVE-2020-14111,Xiaomi,0.00044,7.8,0.0,1.0,0.0,1.0,1,2022-03-10,0.0,,0.0,,,A command injection vulnerability exists in the Xiaomi Router AX3600. The vulnerability is caused by a lack of inspection for incoming data detection. Attackers can exploit this vulnerability to execute code.,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-345'],"['cpe:2.3:h:mi:ax3600:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mi:ax3600_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2020-14112,Xiaomi,0.00073,5.3,0.0,1.0,0.0,1.0,1,2022-03-10,1.0,2022-03-07,,,1.0,Information Leak Vulnerability exists in the Xiaomi Router AX6000. The vulnerability is caused by incorrect routing configuration. Attackers can exploit this vulnerability to download part of the files in Xiaomi Router AX6000.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,LOW,NONE,NONE,MEDIUM,3.9,1.4,['CWE-200'],"['cpe:2.3:h:mi:ax6000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mi:ax6000_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2020-14119,Xiaomi,0.00207,9.8,0.0,1.0,0.0,0.0,1,2021-09-16,1.0,2021-08-25,,,1.0,"There is command injection in the addMeshNode interface of xqnetwork.lua, which leads to command execution under administrator authority on Xiaomi router AX3600 with rom versionrom< 1.1.12",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-77'],"['cpe:2.3:h:mi:ax3600:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mi:ax3600:*:*:*:*:*:*:*:*']",0,0
CVE-2020-14124,Xiaomi,0.00384,9.8,0.0,1.0,0.0,1.0,1,2021-09-16,1.0,2021-08-25,,,1.0,"There is a buffer overflow in librsa.so called by getwifipwdurl interface, resulting in code execution on Xiaomi router AX3600 with ROM version =rom< 1.1.12.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-120'],"['cpe:2.3:h:mi:ax3600:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mi:ax3600_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2020-8994,Xiaomi,0.00353,6.8,0.0,1.0,0.0,1.0,1,2020-03-05,0.0,,0.0,,,"An issue was discovered on XIAOMI AI speaker MDZ-25-DT 1.34.36, and 1.40.14. Attackers can get root shell by accessing the UART interface and then they can read Wi-Fi SSID or password, read the dialogue text files between users and XIAOMI AI speaker, use Text-To-Speech tools pretend XIAOMI speakers' voice achieve social engineering attacks, eavesdrop on users and record what XIAOMI AI speaker hears, delete the entire XIAOMI AI speaker system, modify system files, stop voice assistant service, start the XIAOMI AI speaker’s SSH service as a backdoor",CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,PHYSICAL,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.9,5.9,['CWE-287'],"['cpe:2.3:h:mi:mdz-25-dt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mi:mdz-25-dt_firmware:1.34.36:*:*:*:*:*:*:*', 'cpe:2.3:o:mi:mdz-25-dt_firmware:1.40.14:*:*:*:*:*:*:*']",0,0
CVE-2020-9530,Xiaomi,0.00317,6.5,0.0,0.0,0.0,1.0,1,2020-03-06,1.0,2020-03-12,,,0.0,"An issue was discovered on Xiaomi MIUI V11.0.5.0.QFAEUXM devices. The export component of GetApps(com.xiaomi.mipicks) mishandles the functionality of opening other components. Attackers need to induce users to open specific web pages in a specific network environment. By jumping to the WebView component of Messaging(com.android.MMS) and loading malicious web pages, information leakage can occur. This is fixed on version: 2001122; 11.0.1.54.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,NONE,NONE,MEDIUM,2.8,3.6,['CWE-94'],['cpe:2.3:o:mi:miui_firmware:11.0.5.0.qfaeuxm:*:*:*:*:*:*:*'],0,0
CVE-2020-9531,Xiaomi,0.00304,7.3,0.0,1.0,0.0,1.0,1,2020-03-06,1.0,2020-03-12,,,0.0,"An issue was discovered on Xiaomi MIUI V11.0.5.0.QFAEUXM devices. In the Web resources of GetApps(com.xiaomi.mipicks), the parameters passed in are read and executed. After reading the resource files, relevant components open the link of the incoming URL. Although the URL is safe and can pass security detection, the data carried in the parameters are loaded and executed. An attacker can use NFC tools to get close enough to a user's unlocked phone to cause apps to be installed and information to be leaked. This is fixed on version: 2001122.",CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N,ADJACENT_NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,NONE,HIGH,2.1,5.2,['NVD-CWE-noinfo'],"['cpe:2.3:o:mi:miui_firmware:11.0.5.0.qfaeuxm:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:miui:-:*:*:*:*:*:*:*']",0,0
CVE-2018-6065,Xiaomi,0.96458,8.8,1.0,0.0,1.0,0.0,0,2018-11-14,1.0,2019-06-14,,,0.0,Integer overflow in computing the required allocation size when instantiating a new javascript object in V8 in Google Chrome prior to 65.0.3325.146 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-190'],"['cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:a:mi:mi6_browser:-:*:*:*:*:*:*:*']",1,1
CVE-2019-10875,Xiaomi,0.00763,6.5,0.0,0.0,1.0,0.0,0,2019-04-05,1.0,2019-04-08,,,0.0,"A URL spoofing vulnerability was found in all international versions of Xiaomi Mi browser 10.5.6-g (aka the MIUI native browser) and Mint Browser 1.5.3 due to the way they handle the ""q"" query parameter. The portion of an https URL before the ?q= substring is not shown to the user.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,NONE,HIGH,NONE,MEDIUM,2.8,3.6,['CWE-290'],"['cpe:2.3:a:mi:mi_browser:10.5.6-g:*:*:*:*:*:*:*', 'cpe:2.3:a:mi:mint_browser:1.5.3:*:*:*:*:*:*:*']",0,0
CVE-2019-12500,Xiaomi,0.00058,6.5,0.0,1.0,0.0,0.0,0,2019-05-31,0.0,,0.0,,,"The Xiaomi M365 scooter 2019-02-12 before 1.5.1 allows spoofing of ""suddenly accelerate"" commands. This occurs because Bluetooth Low Energy commands have no server-side authentication check. Other affected commands include suddenly braking, locking, and unlocking.",CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,HIGH,NONE,MEDIUM,2.8,3.6,['CWE-306'],"['cpe:2.3:h:mi:m365:2019-02-12:*:*:*:*:*:*:*', 'cpe:2.3:o:mi:m365_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2019-13321,Xiaomi,0.00086,8.0,0.0,0.0,1.0,0.0,0,2020-02-10,1.0,2020-02-10,,,1.0,This vulnerability allows network adjacent attackers to execute arbitrary code on affected installations of Xiaomi Browser Prior to 10.4.0. User interaction is required to exploit this vulnerability in that the target must connect to a malicious access point. The specific flaw exists within the handling of HTTP responses to the Captive Portal. A crafted HTML response can cause the Captive Portal to to open a browser to a specified location without user interaction. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-7467.,CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.1,5.9,['CWE-732'],['cpe:2.3:a:mi:mi_browser:*:*:*:*:*:*:*:*'],0,0
CVE-2019-13322,Xiaomi,0.01129,8.8,0.0,0.0,1.0,0.0,0,2020-02-10,1.0,2020-02-10,,,1.0,"This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Xiaomi Browser Prior to 10.4.0. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the miui.share application. The issue results from the lack of proper validation of user-supplied data, which can result in an arbitrary application download. An attacker can leverage this vulnerability to execute code in the context of the user. Was ZDI-CAN-7483.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,"['CWE-20', 'CWE-356']",['cpe:2.3:a:mi:mi_browser:*:*:*:*:*:*:*:*'],0,0
CVE-2019-6743,Xiaomi,0.01229,8.8,0.0,0.0,1.0,0.0,0,2019-06-03,1.0,2019-06-14,,,0.0,"This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Xiaomi Mi6 Browser prior to 10.4.0. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the WebAssembly.Instance method. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7466.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-787'],['cpe:2.3:a:mi:mi6_browser:*:*:*:*:*:*:*:*'],0,0
CVE-2020-11959,Xiaomi,0.00168,7.5,0.0,1.0,0.0,0.0,0,2020-06-24,0.0,,0.0,,,An unsafe configuration of nginx lead to information leak in Xiaomi router R3600 ROM before 1.0.50.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:mi:xiaomi_r3600_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:xiaomi_r3600:-:*:*:*:*:*:*:*']",0,0
CVE-2020-11960,Xiaomi,0.00222,9.8,0.0,1.0,0.0,0.0,0,2020-06-24,0.0,,0.0,,,"Xiaomi router R3600 ROM before 1.0.50 is affected by a vulnerability when checking backup file in c_upload interface let attacker able to extract malicious file under any location in /tmp, lead to possible RCE and DoS",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:mi:xiaomi_r3600_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:xiaomi_r3600:-:*:*:*:*:*:*:*']",0,0
CVE-2020-11961,Xiaomi,0.00168,7.5,0.0,1.0,0.0,0.0,0,2020-06-24,0.0,,0.0,,,Xiaomi router R3600 ROM before 1.0.50 is affected by a sensitive information leakage caused by an insecure interface get_config_result without authentication,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-306'],"['cpe:2.3:o:mi:xiaomi_r3600_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:xiaomi_r3600:-:*:*:*:*:*:*:*']",0,0
CVE-2020-14096,Xiaomi,0.00222,9.8,0.0,1.0,0.0,1.0,0,2020-09-11,0.0,,0.0,,,Memory overflow in Xiaomi AI speaker Rom version <1.59.6 can happen when the speaker verifying a malicious firmware during OTA process.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-119'],"['cpe:2.3:o:mi:xiaomi_ai_speaker_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:xiaomi_ai_speaker:-:*:*:*:*:*:*:*']",0,0
CVE-2020-14097,Xiaomi,0.00084,7.5,0.0,1.0,0.0,1.0,0,2021-01-13,0.0,,0.0,,,"Wrong nginx configuration, causing specific paths to be downloaded without authorization. This affects Xiaomi router AX6 ROM version < 1.0.18.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,HIGH,NONE,HIGH,3.9,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:h:mi:redmi_ax6:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mi:redmi_ax6_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2020-14098,Xiaomi,0.00073,7.5,0.0,1.0,0.0,1.0,0,2021-01-13,0.0,,0.0,,,The login verification can be bypassed by using the problem that the time is not synchronized after the router restarts. This affects Xiaomi router AX1800rom version < 1.0.336 and Xiaomi route RM1800 root version < 1.0.26.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,HIGH,NONE,HIGH,3.9,3.6,['CWE-662'],"['cpe:2.3:o:mi:ax1800_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:ax1800:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mi:rm1800_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:rm1800:-:*:*:*:*:*:*:*']",0,0
CVE-2020-14099,Xiaomi,0.00107,7.5,0.0,1.0,0.0,1.0,0,2021-04-08,0.0,,0.0,,,"On Xiaomi router AX1800 rom version < 1.0.336 and RM1800 root version < 1.0.26, the encryption scheme for a user's backup files uses hard-coded keys, which can expose sensitive information such as a user's password.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-798'],"['cpe:2.3:h:mi:ax1800:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mi:ax1800_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:rm1800:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mi:rm1800_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2020-14101,Xiaomi,0.0019,7.5,0.0,1.0,0.0,1.0,0,2021-01-13,0.0,,0.0,,,The data collection SDK of the router web management interface caused the leakage of the token. This affects Xiaomi router AX1800rom version < 1.0.336 and Xiaomi route RM1800 root version < 1.0.26.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:mi:ax1800_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:ax1800:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mi:rm1800_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:rm1800:-:*:*:*:*:*:*:*']",0,0
CVE-2020-14102,Xiaomi,0.0011,7.2,0.0,1.0,0.0,1.0,0,2021-01-13,0.0,,0.0,,,"There is command injection when ddns processes the hostname, which causes the administrator user to obtain the root privilege of the router. This affects Xiaomi router AX1800rom version < 1.0.336 and Xiaomi route RM1800 root version < 1.0.26.",CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.2,5.9,['CWE-77'],"['cpe:2.3:o:mi:ax1800_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:ax1800:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mi:rm1800_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:rm1800:-:*:*:*:*:*:*:*']",0,0
CVE-2020-14110,Xiaomi,0.00044,7.8,0.0,1.0,0.0,1.0,0,2022-01-18,0.0,,0.0,,,AX3600 router sensitive information leaked.There is an unauthorized interface through luci to obtain sensitive information and log in to the web background.,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-863'],"['cpe:2.3:h:mi:ax3600:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mi:ax3600_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2020-14116,Xiaomi,0.00073,7.5,0.0,0.0,1.0,0.0,0,2022-04-21,0.0,,0.0,,,An intent redirection vulnerability in the Mi Browser product. This vulnerability is caused by the Mi Browser does not verify the validity of the incoming data. Attackers can perform sensitive operations by exploiting this.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,HIGH,NONE,HIGH,3.9,3.6,['CWE-345'],['cpe:2.3:a:mi:mi_browser:*:*:*:*:*:*:*:*'],0,0
CVE-2020-14120,Xiaomi,0.00201,8.8,0.0,0.0,0.0,1.0,0,2022-04-21,1.0,2022-04-14,,,1.0,"Some Xiaomi models have a vulnerability in a certain application. The vulnerability is caused by the lack of checksum when using a three-party application to pass in parameters, and attackers can induce users to install a malicious app and use the vulnerability to achieve elevated privileges, making the normal services of the system affected.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-354'],['cpe:2.3:o:mi:miui:12.5:*:*:*:*:*:*:*'],0,0
CVE-2020-14121,Xiaomi,0.00042,5.5,0.0,0.0,1.0,0.0,0,2022-04-21,1.0,2022-04-14,,,1.0,"A business logic vulnerability exists in Mi App Store. The vulnerability is caused by incomplete permission checks of the products being bypassed, and an attacker can exploit the vulnerability to perform a local silent installation.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N,LOCAL,LOW,LOW,NONE,UNCHANGED,NONE,HIGH,NONE,MEDIUM,1.8,3.6,['CWE-863'],['cpe:2.3:a:mi:mi_app_store:4.12.2:*:*:*:*:*:*:*'],0,0
CVE-2020-14122,Xiaomi,0.00044,5.5,0.0,0.0,0.0,1.0,0,2022-04-21,1.0,2022-04-14,,,1.0,"Some Xiaomi phones have information leakage vulnerabilities, and some of them may be able to forge a specific identity due to the lack of parameter verification, resulting in user information leakage.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.8,3.6,['CWE-345'],['cpe:2.3:o:mi:miui:12.5.2:*:*:*:*:*:*:*'],0,0
CVE-2020-14123,Xiaomi,0.00089,7.5,0.0,0.0,0.0,1.0,0,2022-04-22,1.0,2022-04-22,,,1.0,"There is a pointer double free vulnerability in Some MIUI Services. When a function is called, the memory pointer is copied to two function modules, and an attacker can cause the pointer to be repeatedly released through malicious operations, resulting in the affected module crashing and affecting normal functionality, and if successfully exploited the vulnerability can cause elevation of privileges.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-415'],['cpe:2.3:o:mi:miui:12.5.2:*:*:*:*:*:*:*'],0,0
CVE-2020-14125,Xiaomi,0.00089,7.5,0.0,0.0,0.0,1.0,0,2022-06-08,1.0,2022-06-06,,,1.0,A denial of service vulnerability exists in some Xiaomi models of phones. The vulnerability is caused by out-of-bound read/write and can be exploited by attackers to make denial of service.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-125'],"['cpe:2.3:h:mi:redmi_note_11:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:redmi_note_9t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mi:miui:*:*:*:*:*:*:*:*']",0,0
CVE-2020-14127,Xiaomi,0.00178,7.5,0.0,1.0,0.0,1.0,0,2022-07-14,1.0,2022-06-06,,,1.0,A denial of service vulnerability exists in some Xiaomi models of phones. The vulnerability is caused by heap overflow and can be exploited by attackers to make remote denial of service.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-787'],"['cpe:2.3:o:mi:miui:*:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:redmi_k40:-:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:redmi_note_10_pro:-:*:*:*:*:*:*:*']",0,0
CVE-2021-31610,Xiaomi,0.00091,6.5,0.0,1.0,0.0,1.0,0,2021-09-07,0.0,,0.0,,,"The Bluetooth Classic implementation on AB32VG1 devices does not properly handle the reception of continuous unsolicited LMP responses, allowing attackers in radio range to trigger a denial of service (either restart or deadlock the device) by flooding a device with LMP_AU_rand data.",CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.8,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:h:mi:mi_true_wireless_earbuds_basic_2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:mi:mi_true_wireless_earbuds_basic_2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:bluetrum:ab5376t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:bluetrum:ab5376t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:bluetrum:bt8896a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:bluetrum:bt8896a_firmware:-:*:*:*:*:*:*:*']",0,0
CVE-2022-31277,Xiaomi,0.00081,8.8,0.0,1.0,0.0,1.0,0,2022-06-16,0.0,,0.0,,,Xiaomi Lamp 1 v2.0.4_0066 was discovered to be vulnerable to replay attacks. This allows attackers to to bypass the expected access restrictions and gain control of the switch and other functions via a crafted POST request.,CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-294'],"['cpe:2.3:o:mi:xiaomi_lamp_1_firmware:2.0.4_0066:*:*:*:*:*:*:*', 'cpe:2.3:h:mi:xiaomi_lamp_1:-:*:*:*:*:*:*:*']",0,0
CVE-2018-14899,Seiko Epson,0.00152,6.1,0.0,1.0,0.0,1.0,1,2018-08-30,0.0,,0.0,,,"On the EPSON WF-2750 printer with firmware JP02I2, the Web interface AirPrint Setup page is vulnerable to HTML Injection that can redirect users to malicious sites.",CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:epson:wf-2750_firmware:jp02l2:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:wf-2750:-:*:*:*:*:*:*:*']",0,0
CVE-2018-14900,Seiko Epson,0.00209,7.5,0.0,1.0,0.0,1.0,1,2018-08-30,0.0,,0.0,,,"On EPSON WF-2750 printers with firmware JP02I2, there is no filtering of print jobs. Remote attackers can send print jobs directly to the printer via TCP port 9100.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,HIGH,NONE,HIGH,3.9,3.6,['CWE-417'],"['cpe:2.3:o:epson:wf-2750_firmware:jp02l2:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:wf-2750:-:*:*:*:*:*:*:*']",0,0
CVE-2018-14903,Seiko Epson,0.00209,7.5,0.0,1.0,0.0,1.0,1,2018-08-30,0.0,,0.0,,,"EPSON WF-2750 printers with firmware JP02I2 do not properly validate files before running updates, which allows remote attackers to cause a printer malfunction or send malicious data to the printer.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,HIGH,NONE,HIGH,3.9,3.6,['CWE-346'],"['cpe:2.3:o:epson:wf-2750_firmware:jp02l2:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:wf-2750:-:*:*:*:*:*:*:*']",0,0
CVE-2018-18959,Seiko Epson,0.00161,7.5,0.0,1.0,0.0,1.0,1,2018-12-24,0.0,,0.0,,,"An issue was discovered on Epson WorkForce WF-2861 10.48 LQ22I3, 10.51.LQ20I6 and 10.52.LQ17IA devices. On the 'Air Print Setting' web page, if the data for 'Bonjour Service Location' at /PRESENTATION/BONJOUR is more than 251 bytes when sending data for Air Print Setting, then the device no longer functions until a reboot.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-119'],"['cpe:2.3:o:epson:epson_workforce_wf-2861_firmware:10.48_lq22i3:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:epson_workforce_wf-2861_firmware:10.51.lq20i6:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:epson_workforce_wf-2861_firmware:10.52.lq17ia:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:epson_workforce_wf-2861:-:*:*:*:*:*:*:*']",0,0
CVE-2018-18960,Seiko Epson,0.00161,5.9,0.0,1.0,0.0,1.0,1,2018-12-24,0.0,,0.0,,,"An issue was discovered on Epson WorkForce WF-2861 10.48 LQ22I3, 10.51.LQ20I6 and 10.52.LQ17IA devices. They use SNMP to find certain devices on the network, but the default version is v2c, allowing an amplification attack.",CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,HIGH,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.2,3.6,['CWE-400'],"['cpe:2.3:o:epson:epson_workforce_wf-2861_firmware:10.48_lq22i3:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:epson_workforce_wf-2861_firmware:10.51.lq20i6:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:epson_workforce_wf-2861_firmware:10.52.lq17ia:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:epson_workforce_wf-2861:-:*:*:*:*:*:*:*']",0,0
CVE-2018-19232,Seiko Epson,0.00232,7.5,0.0,1.0,0.0,1.0,1,2018-12-24,0.0,,0.0,,,"The web service on Epson WorkForce WF-2861 10.48 LQ22I3(Recovery-mode), WF-2861 10.51.LQ20I6, and WF-2861 10.52.LQ17IA devices allows remote attackers to cause a denial of service via a FIRMWAREUPDATE GET request, as demonstrated by the /DOWN/FIRMWAREUPDATE/ROM1 URI.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:epson:epson_workforce_wf-2861_firmware:10.48_lq22i3:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:epson_workforce_wf-2861_firmware:10.51.lq20i6:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:epson_workforce_wf-2861_firmware:10.52.lq17ia:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:epson_workforce_wf-2861:-:*:*:*:*:*:*:*']",0,0
CVE-2018-19248,Seiko Epson,0.00249,9.1,0.0,1.0,0.0,1.0,1,2018-12-24,0.0,,0.0,,,"The web service on Epson WorkForce WF-2861 10.48 LQ22I3(Recovery-mode), WF-2861 10.51.LQ20I6, and WF-2861 10.52.LQ17IA devices allows remote attackers to upload a firmware file and reset the printer without authentication by making a request to the /DOWN/FIRMWAREUPDATE/ROM1 URI and a POST request to the /FIRMWAREUPDATE URI.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,HIGH,HIGH,CRITICAL,3.9,5.2,['CWE-306'],"['cpe:2.3:o:epson:epson_workforce_wf-2861_firmware:10.48_lq22i3:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:epson_workforce_wf-2861_firmware:10.51.lq20i6:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:epson_workforce_wf-2861_firmware:10.52.lq17ia:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:epson_workforce_wf-2861:-:*:*:*:*:*:*:*']",0,0
CVE-2020-12695,Seiko Epson,0.00547,7.5,0.0,1.0,0.0,0.0,1,2020-06-08,0.0,,0.0,,,"The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on a different network segment than the fully qualified event-subscription URL, aka the CallStranger issue.",CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:H,NETWORK,HIGH,NONE,NONE,CHANGED,LOW,NONE,HIGH,HIGH,2.2,4.7,['CWE-276'],"['cpe:2.3:a:ui:unifi_controller:-:*:*:*:*:*:*:*', 'cpe:2.3:a:w1.fi:hostapd:*:*:*:*:*:*:*:*', 'cpe:2.3:h:asus:rt-n11:-:*:*:*:*:*:*:*', 'cpe:2.3:h:broadcom:adsl:-:*:*:*:*:*:*:*', 'cpe:2.3:h:canon:selphy_cp1200:-:*:*:*:*:*:*:*', 'cpe:2.3:h:cisco:wap131:-:*:*:*:*:*:*:*', 'cpe:2.3:h:cisco:wap150:-:*:*:*:*:*:*:*', 'cpe:2.3:h:cisco:wap351:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dlink:dvg-n5412sp:-:*:*:*:*:*:*:*', 'cpe:2.3:h:dell:b1165nfw:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ep-101:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ew-m970a3t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:m571t:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-2101:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-2105:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-241:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-320:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-330:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-340:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-4100:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-4105:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-440:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-620:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-630:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-702:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-8500:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-8600:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-960:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:xp-970:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:5020_z4a69a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:5030_m2u92b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:5030_z4a70a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:5034_z4a74a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:5660_f8b04a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_3456_a9t84c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_3545_a9t81a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_3545_a9t81c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_3545_a9t83b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_3546_a9t82a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_3548_a9t81b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_4515:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_4518:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_4535_f0v64a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_4535_f0v64b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_4535_f0v64c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_4536_f0v65a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_4538_f0v66b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_4675_f1h97a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_4675_f1h97b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_4675_f1h97c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_4676_f1h98a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_4678_f1h99b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_5575_g0v48b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:deskjet_ink_advantage_5575_g0v48c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_100_cn517a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_100_cn517b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_100_cn517c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_100_cn518a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_100_cn519a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_100_cn519b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_110_cq809a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_110_cq809b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_110_cq809c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_110_cq809d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_110_cq812c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_111_cq810a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_114_cq811a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_114_cq811b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_114_cq812a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_120_cz022a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_120_cz022b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_120_cz022c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4500_a9t80a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4500_a9t80b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4500_a9t89a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4500_d3p93a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4501_c8d05a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4502_a9t85a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4502_a9t87b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4503_e6g71b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4504_a9t88b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4504_c8d04a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4505_a9t86a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4507_e6g70b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4508_e6g72b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4509_d3p94a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4509_d3p94b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4511_k9h50a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4512_k9h49a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4513_k9h51a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4516_k9h52a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4520_e6g67a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4520_e6g67b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4520_f0v63a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4520_f0v63b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4520_f0v69a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4521_k9t10b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4522_f0v67a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4523_j6u60b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4524_f0v71b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4524_f0v72b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4524_k9t01a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4525_k9t09b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4526_k9t05b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4527_j6u61b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_4528_k9t08b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5000_m2u85a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5000_m2u85b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5000_m2u91a:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5000_m2u91a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5000_m2u94b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5000_z4a54a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5000_z4a74a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5020_m2u91b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5530:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5531:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5532:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5534:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5535:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5536:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5539:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5540_f2e72a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5540_g0v47a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5540_g0v51a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5540_g0v52a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5540_g0v53a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5540_k7c85a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5541_k7g89a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5542_k7c88a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5543_n9u88a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5544_k7c89a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5544_k7c93a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5545_g0v50a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5546_k7c90a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5547_j6u64a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5548_k7g87a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5640_b9s56a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5640_b9s58a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5642_b9s64a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5643_b9s63a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5644_b9s65a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5646_f8b05a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5664_f8b08a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_5665_f8b06a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_6020_5se16b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_6020_5se17a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_6020_6wd35a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_6020_7cz37a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_6052_5se18a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_6055_5se16a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_6540_b9s59a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_7640:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_7644_e4w46a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_7645_e4w44a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_6200_k7g18a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_6200_k7g26b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_6200_k7s21b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_6200_y0k13d_:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_6200_y0k15a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_6220_k7g20d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_6220_k7g21b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_6222_y0k13d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_6222_y0k14d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_6230_k7g25b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_6232_k7g26b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_6234_k7s21b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_6252_k7g22a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7100_3xd89a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7100_k7g93a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7100_k7g99a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7100_z3m37a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7100_z3m52a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7120_z3m41d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7155_z3m52a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7164_k7g99a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7800_k7r96a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7800_k7s00a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7800_k7s10d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7800_y0g42d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7800_y0g52b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7822_y0g42d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7822_y0g43d:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_photo_7830_y0g50b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_pro_6420_5se45b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_pro_6420_5se46a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_pro_6420_6wd14a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_pro_6420_6wd16a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_pro_6452_5se47a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:envy_pro_6455_5se45a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:officejet_4650_e6g87a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:officejet_4650_f1h96a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:officejet_4650_f1h96b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:officejet_4652_f1j02a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:officejet_4652_f1j05b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:officejet_4652_k9v84b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:officejet_4654_f1j06b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:officejet_4654_f1j07b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:officejet_4655_f1j00a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:officejet_4655_k9v79a:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:officejet_4655_k9v82b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:officejet_4656_k9v81b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:officejet_4657_v6d29b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:officejet_4658_v6d30b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:hg255s:-:*:*:*:*:*:*:*', 'cpe:2.3:h:huawei:hg532e:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nec:wr8165n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:netgear:wnhde111:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ruckussecurity:zonedirector_1200:-:*:*:*:*:*:*:*', 'cpe:2.3:h:tp-link:archer_c50:-:*:*:*:*:*:*:*', 'cpe:2.3:h:zte:zxv10_w300:-:*:*:*:*:*:*:*', 'cpe:2.3:h:zyxel:amg1202-t10b:-:*:*:*:*:*:*:*', 'cpe:2.3:h:zyxel:vmg8324-b10a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:xbox_one:10.0.19041.2494:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*']",0,0
CVE-2020-5674,Seiko Epson,0.00148,7.8,0.0,1.0,1.0,1.0,1,2020-11-24,1.0,2020-11-20,,,1.0,Untrusted search path vulnerability in the installers of multiple SEIKO EPSON products allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.,CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-427'],"['cpe:2.3:a:epson:album_print:-:*:*:*:*:update_program:*:*', 'cpe:2.3:a:epson:color_calibration_utility:-:*:*:*:*:*:*:*', 'cpe:2.3:a:epson:colorbase:-:*:*:*:*:*:*:*', 'cpe:2.3:a:epson:colorio_easy_print:-:*:*:*:*:*:*:*', 'cpe:2.3:a:epson:connect:-:*:*:*:*:*:*:*', 'cpe:2.3:a:epson:creativity_suite:-:*:*:*:*:*:*:*', 'cpe:2.3:a:epson:e-photo:-:*:*:*:*:camera_raw:*:*', 'cpe:2.3:a:epson:e-photo:-:*:*:*:*:picture_motion_browser:*:*', 'cpe:2.3:a:epson:easy_photo_print:-:*:*:*:*:-:*:*', 'cpe:2.3:a:epson:easy_photo_print:-:*:*:*:*:camera_raw:*:*', 'cpe:2.3:a:epson:easy_settings:-:*:*:*:*:office:*:*', 'cpe:2.3:a:epson:imaging_workshop:-:*:*:*:*:*:*:*', 'cpe:2.3:a:epson:link2:-:*:*:*:*:*:*:*', 'cpe:2.3:a:epson:multi-print_quicker:-:*:*:*:*:windows:*:*', 'cpe:2.3:a:epson:net_config:-:*:*:*:*:*:*:*', 'cpe:2.3:a:epson:net_config_se:-:*:*:*:*:*:*:*', 'cpe:2.3:a:epson:net_print:-:*:*:*:*:*:*:*', 'cpe:2.3:a:epson:net_software_development_kit:-:*:*:*:*:*:*:*', 'cpe:2.3:a:epson:photolier:-:*:*:*:*:*:*:*', 'cpe:2.3:a:epson:photoquicker:-:*:*:*:*:*:*:*', 'cpe:2.3:a:epson:photostarter:3.1:*:*:*:*:*:*:*', 'cpe:2.3:a:epson:pm-t990_integrated_installer:-:*:*:*:*:windows:*:*', 'cpe:2.3:a:epson:print:-:*:*:*:*:playmemories_home:*:*', 'cpe:2.3:a:epson:print:-:*:*:*:*:silkypix:*:*', 'cpe:2.3:a:epson:print:-:*:*:*:*:viewnx:*:*', 'cpe:2.3:a:epson:print_image_framer_tool:-:*:*:*:*:*:*:*', 'cpe:2.3:a:epson:print_layout:-:*:*:*:*:photoshop:*:*', 'cpe:2.3:a:epson:prolab_print:-:*:*:*:*:*:*:*', 'cpe:2.3:a:epson:prolab_print:-:*:*:*:*:camera_raw:*:*', 'cpe:2.3:a:epson:remote_printer_driver:-:*:*:*:*:*:*:*', 'cpe:2.3:a:epson:scan_icm_updater:-:*:*:*:*:*:*:*', 'cpe:2.3:a:epson:scanner_driver:-:*:*:*:*:*:*:*', 'cpe:2.3:a:epson:web_to_page:-:*:*:*:*:*:*:*', 'cpe:2.3:a:epson:webconfig:-:*:*:*:*:*:*:*', 'cpe:2.3:a:epson:universal_print_driver:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:x64:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:x86:*', 'cpe:2.3:a:epson:status_monitor_2:-:*:*:*:*:*:*:*', 'cpe:2.3:a:epson:status_monitor_3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ec-01_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ec-01:-:*:*:*:*:*:*:*', 'cpe:2.3:a:epson:print_image_framer_tool:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_98:-:*:*:*:*:*:*:*', 'cpe:2.3:o:microsoft:windows_me:-:*:*:*:*:*:*:*']",0,0
CVE-2020-6091,Seiko Epson,0.00233,9.1,0.0,1.0,0.0,1.0,1,2020-05-22,1.0,2020-10-08,,,0.0,An exploitable authentication bypass vulnerability exists in the ESPON Web Control functionality of Epson EB-1470Ui MAIN: 98009273ESWWV107 MAIN2: 8X7325WWV303. A specially crafted series of HTTP requests can cause authentication bypass resulting in information disclosure. An attacker can send an HTTP request to trigger this vulnerability.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,NONE,CRITICAL,3.9,5.2,"['CWE-287', 'CWE-288']","['cpe:2.3:h:epson:eb-1470ui:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:eb-1470ui_firmware:-:*:*:*:*:*:*:*']",0,0
CVE-2017-12860,Seiko Epson,0.00284,9.8,0.0,0.0,1.0,0.0,0,2017-10-10,0.0,,0.0,,,"The Epson ""EasyMP"" software is designed to remotely stream a users computer to supporting projectors.These devices are authenticated using a unique 4-digit code, displayed on-screen - ensuring only those who can view it are streaming.In addition to the password, each projector has a hardcoded ""backdoor"" code (2270), which authenticates to all devices.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-798'],['cpe:2.3:a:epson:easymp:2.86:*:*:*:*:*:*:*'],0,0
CVE-2017-12861,Seiko Epson,0.00308,9.8,0.0,0.0,1.0,0.0,0,2017-10-10,0.0,,0.0,,,"The Epson ""EasyMP"" software is designed to remotely stream a users computer to supporting projectors.These devices are authenticated using a unique 4-digit code, displayed on-screen - ensuring only those who can view it are streaming.All Epson projectors supporting the ""EasyMP"" software are vulnerable to a brute-force vulnerability, allowing any attacker on the network to remotely control and stream to the vulnerable device",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-521'],['cpe:2.3:a:epson:easymp:2.86:*:*:*:*:*:*:*'],0,0
CVE-2017-6443,Seiko Epson,0.0018,6.1,1.0,0.0,1.0,0.0,0,2017-03-15,0.0,,0.0,,,Cross-site scripting (XSS) vulnerability in EPSON TMNet WebConfig 1.00 allows remote attackers to inject arbitrary web script or HTML via the W_AD1 parameter to Forms/oadmin_1.,CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],['cpe:2.3:a:epson:tmnet_webconfig:1.00:*:*:*:*:*:*:*'],1,0
CVE-2018-0688,Seiko Epson,0.00103,6.1,0.0,1.0,0.0,0.0,0,2019-01-09,1.0,2018-12-03,,,1.0,"Open redirect vulnerability in SEIKO EPSON printers and scanners (DS-570W firmware versions released prior to 2018 March 13, DS-780N firmware versions released prior to 2018 March 13, EP-10VA firmware versions released prior to 2017 September 4, EP-30VA firmware versions released prior to 2017 June 19, EP-707A firmware versions released prior to 2017 August 1, EP-708A firmware versions released prior to 2017 August 7, EP-709A firmware versions released prior to 2017 June 12, EP-777A firmware versions released prior to 2017 August 1, EP-807AB/AW/AR firmware versions released prior to 2017 August 1, EP-808AB/AW/AR firmware versions released prior to 2017 August 7, EP-879AB/AW/AR firmware versions released prior to 2017 June 12, EP-907F firmware versions released prior to 2017 August 1, EP-977A3 firmware versions released prior to 2017 August 1, EP-978A3 firmware versions released prior to 2017 August 7, EP-979A3 firmware versions released prior to 2017 June 12, EP-M570T firmware versions released prior to 2017 September 6, EW-M5071FT firmware versions released prior to 2017 November 2, EW-M660FT firmware versions released prior to 2018 April 19, EW-M770T firmware versions released prior to 2017 September 6, PF-70 firmware versions released prior to 2018 April 20, PF-71 firmware versions released prior to 2017 July 18, PF-81 firmware versions released prior to 2017 September 14, PX-048A firmware versions released prior to 2017 July 4, PX-049A firmware versions released prior to 2017 September 11, PX-437A firmware versions released prior to 2017 July 24, PX-M350F firmware versions released prior to 2018 February 23, PX-M5040F firmware versions released prior to 2017 November 20, PX-M5041F firmware versions released prior to 2017 November 20, PX-M650A firmware versions released prior to 2017 October 17, PX-M650F firmware versions released prior to 2017 October 17, PX-M680F firmware versions released prior to 2017 June 29, PX-M7050F firmware versions released prior to 2017 October 13, PX-M7050FP firmware versions released prior to 2017 October 13, PX-M7050FX firmware versions released prior to 2017 November 7, PX-M7070FX firmware versions released prior to 2017 April 27, PX-M740F firmware versions released prior to 2017 December 4, PX-M741F firmware versions released prior to 2017 December 4, PX-M780F firmware versions released prior to 2017 June 29, PX-M781F firmware versions released prior to 2017 June 27, PX-M840F firmware versions released prior to 2017 November 16, PX-M840FX firmware versions released prior to 2017 December 8, PX-M860F firmware versions released prior to 2017 October 25, PX-S05B/W firmware versions released prior to 2018 March 9, PX-S350 firmware versions released prior to 2018 February 23, PX-S5040 firmware versions released prior to 2017 November 20, PX-S7050 firmware versions released prior to 2018 February 21, PX-S7050PS firmware versions released prior to 2018 February 21, PX-S7050X firmware versions released prior to 2017 November 7, PX-S7070X firmware versions released prior to 2017 April 27, PX-S740 firmware versions released prior to 2017 December 3, PX-S840 firmware versions released prior to 2017 November 16, PX-S840X firmware versions released prior to 2017 December 8, PX-S860 firmware versions released prior to 2017 December 7) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the web interface of the affected product.",CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-601'],"['cpe:2.3:h:epson:ds-570w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ds-570w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ds-780n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ds-780n_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ep-10va:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ep-10va_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ep-30va:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ep-30va_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ep-707a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ep-707a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ep-708a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ep-708a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ep-709a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ep-709a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ep-777a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ep-777a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ep-807ab_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ep-807ab:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ep-807aw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ep-807aw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ep-807ar_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ep-807ar:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ep-808ab_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ep-808ab:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ep-808aw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ep-808aw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ep-808ar_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ep-808ar:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ep-879ab_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ep-879ab:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ep-879aw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ep-879aw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ep-879ar_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ep-879ar:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ep-907f_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ep-907f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ep-977a3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ep-977a3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ep-978a3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ep-978a3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ep-979a3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ep-979a3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ep-m570t_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ep-m570t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ew-m5071ft_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ew-m5071ft:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ew-m660ft_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ew-m660ft:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ew-m770t_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ew-m770t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:pf-70_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:pf-70:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:pf-71_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:pf-71:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:pf-81_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:pf-81:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-048a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-048a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-049a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-049a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-437a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-437a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-m350f_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-m350f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-m5040f_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-m5040f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-m5041f_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-m5041f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-m650a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-m650a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-m650f_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-m650f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-m680f_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-m680f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-m7050f_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-m7050f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-m7050fp_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-m7050fp:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-m7050fx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-m7050fx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-m7070fx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-m7070fx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-m740f_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-m740f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-m781f_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-m781f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-m840f_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-m840f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-m840fx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-m840fx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-m860f_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-m860f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-s05b_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-s05b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-s05w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-s05w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-s350_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-s350:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-s5040_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-s5040:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-s7050_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-s7050:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-s7050ps_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-s7050ps:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-s7050x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-s7050x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-s7070x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-s7070x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-s740_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-s740:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-s840_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-s840:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-s840x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-s840x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-s860_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-s860:-:*:*:*:*:*:*:*']",0,0
CVE-2018-0689,Seiko Epson,0.00219,8.8,0.0,1.0,0.0,0.0,0,2019-01-09,1.0,2018-12-03,,,1.0,"HTTP header injection vulnerability in SEIKO EPSON printers and scanners (DS-570W firmware versions released prior to 2018 March 13, DS-780N firmware versions released prior to 2018 March 13, EP-10VA firmware versions released prior to 2017 September 4, EP-30VA firmware versions released prior to 2017 June 19, EP-707A firmware versions released prior to 2017 August 1, EP-708A firmware versions released prior to 2017 August 7, EP-709A firmware versions released prior to 2017 June 12, EP-777A firmware versions released prior to 2017 August 1, EP-807AB/AW/AR firmware versions released prior to 2017 August 1, EP-808AB/AW/AR firmware versions released prior to 2017 August 7, EP-879AB/AW/AR firmware versions released prior to 2017 June 12, EP-907F firmware versions released prior to 2017 August 1, EP-977A3 firmware versions released prior to 2017 August 1, EP-978A3 firmware versions released prior to 2017 August 7, EP-979A3 firmware versions released prior to 2017 June 12, EP-M570T firmware versions released prior to 2017 September 6, EW-M5071FT firmware versions released prior to 2017 November 2, EW-M660FT firmware versions released prior to 2018 April 19, EW-M770T firmware versions released prior to 2017 September 6, PF-70 firmware versions released prior to 2018 April 20, PF-71 firmware versions released prior to 2017 July 18, PF-81 firmware versions released prior to 2017 September 14, PX-048A firmware versions released prior to 2017 July 4, PX-049A firmware versions released prior to 2017 September 11, PX-437A firmware versions released prior to 2017 July 24, PX-M350F firmware versions released prior to 2018 February 23, PX-M5040F firmware versions released prior to 2017 November 20, PX-M5041F firmware versions released prior to 2017 November 20, PX-M650A firmware versions released prior to 2017 October 17, PX-M650F firmware versions released prior to 2017 October 17, PX-M680F firmware versions released prior to 2017 June 29, PX-M7050F firmware versions released prior to 2017 October 13, PX-M7050FP firmware versions released prior to 2017 October 13, PX-M7050FX firmware versions released prior to 2017 November 7, PX-M7070FX firmware versions released prior to 2017 April 27, PX-M740F firmware versions released prior to 2017 December 4, PX-M741F firmware versions released prior to 2017 December 4, PX-M780F firmware versions released prior to 2017 June 29, PX-M781F firmware versions released prior to 2017 June 27, PX-M840F firmware versions released prior to 2017 November 16, PX-M840FX firmware versions released prior to 2017 December 8, PX-M860F firmware versions released prior to 2017 October 25, PX-S05B/W firmware versions released prior to 2018 March 9, PX-S350 firmware versions released prior to 2018 February 23, PX-S5040 firmware versions released prior to 2017 November 20, PX-S7050 firmware versions released prior to 2018 February 21, PX-S7050PS firmware versions released prior to 2018 February 21, PX-S7050X firmware versions released prior to 2017 November 7, PX-S7070X firmware versions released prior to 2017 April 27, PX-S740 firmware versions released prior to 2017 December 3, PX-S840 firmware versions released prior to 2017 November 16, PX-S840X firmware versions released prior to 2017 December 8, PX-S860 firmware versions released prior to 2017 December 7) may allow a remote attackers to lead a user to a phishing site or execute an arbitrary script on the user's web browser.",CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-113'],"['cpe:2.3:h:epson:ds-570w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ds-570w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ds-780n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ds-780n_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ep-10va:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ep-10va_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ep-30va:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ep-30va_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ep-707a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ep-707a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ep-708a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ep-708a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ep-709a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ep-709a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ep-777a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ep-777a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ep-807ab_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ep-807ab:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ep-807aw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ep-807aw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ep-807ar_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ep-807ar:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ep-808ab_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ep-808ab:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ep-808aw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ep-808aw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ep-808ar_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ep-808ar:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ep-879ab_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ep-879ab:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ep-879aw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ep-879aw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ep-879ar_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ep-879ar:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ep-907f_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ep-907f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ep-977a3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ep-977a3:-:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ep-978a3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ep-978a3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ep-979a3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ep-979a3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ep-m570t_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ep-m570t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ew-m5071ft_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ew-m5071ft:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ew-m660ft_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ew-m660ft:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:ew-m770t_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:ew-m770t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:pf-70_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:pf-70:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:pf-71_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:pf-71:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:pf-81_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:pf-81:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-048a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-048a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-049a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-049a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-437a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-437a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-m350f_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-m350f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-m5040f_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-m5040f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-m5041f_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-m5041f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-m650a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-m650a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-m650f_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-m650f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-m680f_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-m680f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-m7050f_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-m7050f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-m7050fp_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-m7050fp:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-m7050fx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-m7050fx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-m7070fx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-m7070fx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-m740f_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-m740f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-m781f_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-m781f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-m840f_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-m840f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-m840fx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-m840fx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-m860f_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-m860f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-s05b_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-s05b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-s05w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-s05w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-s350_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-s350:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-s5040_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-s5040:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-s7050_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-s7050:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-s7050ps_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-s7050ps:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-s7050x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-s7050x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-s7070x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-s7070x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-s740_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-s740:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-s840_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-s840:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-s840x_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-s840x:-:*:*:*:*:*:*:*', 'cpe:2.3:o:epson:px-s860_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:px-s860:-:*:*:*:*:*:*:*']",0,0
CVE-2018-14901,Seiko Epson,0.00832,7.5,0.0,0.0,1.0,0.0,0,2018-08-30,0.0,,0.0,,,"The EPSON iPrint application 6.6.3 for Android contains hard-coded API and Secret keys for the Dropbox, Box, Evernote and OneDrive services.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-798'],['cpe:2.3:a:epson:iprint:6.6.3:*:*:*:*:android:*:*'],0,0
CVE-2018-14902,Seiko Epson,0.00832,7.5,0.0,0.0,1.0,0.0,0,2018-08-30,0.0,,0.0,,,The ContentProvider in the EPSON iPrint application 6.6.3 for Android does not properly restrict data access. This allows an attacker's application to read scanned documents.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-200'],['cpe:2.3:a:epson:iprint:6.6.3:*:*:*:*:android:*:*'],0,0
CVE-2020-28929,Seiko Epson,0.0069,9.8,0.0,1.0,0.0,1.0,0,2020-12-16,0.0,,0.0,,,Unrestricted access to the log downloader functionality in EPSON EPS TSE Server 8 (21.0.11) allows an unauthenticated attacker to remotely retrieve administrative hashed credentials via the maintenance/troubleshoot.php?download=1 URI.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-306'],"['cpe:2.3:o:epson:eps_tse_server_8_firmware:21.0.11:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:eps_tse_server_8:-:*:*:*:*:*:*:*']",0,0
CVE-2020-28930,Seiko Epson,0.00082,5.4,0.0,1.0,0.0,1.0,0,2020-12-16,0.0,,0.0,,,A Cross-Site Scripting (XSS) issue in the 'update user' and 'delete user' functionalities in settings/users.php in EPSON EPS TSE Server 8 (21.0.11) allows an authenticated attacker to inject a JavaScript payload in the user management page that is executed by an administrator.,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,LOW,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.3,2.7,['CWE-79'],"['cpe:2.3:o:epson:eps_tse_server_8_firmware:21.0.11:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:eps_tse_server_8:-:*:*:*:*:*:*:*']",0,0
CVE-2020-28931,Seiko Epson,0.00177,8.8,0.0,1.0,0.0,1.0,0,2020-12-16,0.0,,0.0,,,Lack of an anti-CSRF token in the entire administrative interface in EPSON EPS TSE Server 8 (21.0.11) allows an unauthenticated attacker to force an administrator to execute external POST requests by visiting a malicious website.,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-352'],"['cpe:2.3:o:epson:eps_tse_server_8_firmware:21.0.11:*:*:*:*:*:*:*', 'cpe:2.3:h:epson:eps_tse_server_8:-:*:*:*:*:*:*:*']",0,0
CVE-2020-5681,Seiko Epson,0.00099,7.8,0.0,0.0,1.0,0.0,0,2020-12-24,1.0,2020-12-18,,,1.0,"Untrusted search path vulnerability in self-extracting files created by EpsonNet SetupManager versions 2.2.14 and earlier, and Offirio SynergyWare PrintDirector versions 1.6x/1.6y and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-427'],"['cpe:2.3:a:epson:epsonnet_setupmanager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:epson:offirio_synergyware_printdirector:*:*:*:*:*:*:*:*']",0,0
CVE-2020-9014,Seiko Epson,0.00042,5.5,0.0,0.0,1.0,0.0,0,2021-02-05,0.0,,1.0,2020-03-31,,"In Epson iProjection v2.30, the driver file (EMP_NSAU.sys) allows local users to cause a denial of service (BSOD) via crafted input to the virtual audio device driver with IOCTL 0x9C402402, 0x9C402406, or 0x9C40240A. \Device\EMPNSAUIO and \DosDevices\EMPNSAU are similarly affected.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,1.8,3.6,['NVD-CWE-noinfo'],['cpe:2.3:a:epson:iprojection:*:*:*:*:*:*:*:*'],0,0
CVE-2020-9453,Seiko Epson,0.00042,5.5,0.0,0.0,1.0,0.0,0,2021-02-05,0.0,,1.0,2020-03-31,,"In Epson iProjection v2.30, the driver file EMP_MPAU.sys allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x9C402406 and IOCtl 0x9C40240A. (0x9C402402 has only a NULL pointer dereference.) This affects \Device\EMPMPAUIO and \DosDevices\EMPMPAU.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,1.8,3.6,['CWE-476'],['cpe:2.3:a:epson:iprojection:*:*:*:*:*:*:*:*'],0,0
CVE-2018-15356,Eltex,0.00115,8.8,0.0,1.0,0.0,1.0,1,2018-08-17,1.0,2018-08-17,,,1.0,An authenticated attacker can execute arbitrary code using command ejection in Eltex ESP-200 firmware version 1.2.0.,CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-77'],"['cpe:2.3:o:eltex:esp-200_firmware:1.2.0:*:*:*:*:*:*:*', 'cpe:2.3:h:eltex:esp-200:-:*:*:*:*:*:*:*']",0,0
CVE-2018-15357,Eltex,0.00065,6.5,0.0,1.0,0.0,1.0,1,2018-08-17,1.0,2018-08-17,,,1.0,An authenticated attacker with low privileges can extract password hash information for all users in Eltex ESP-200 firmware version 1.2.0.,CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,2.8,3.6,['CWE-200'],"['cpe:2.3:o:eltex:esp-200_firmware:1.2.0:*:*:*:*:*:*:*', 'cpe:2.3:h:eltex:esp-200:-:*:*:*:*:*:*:*']",0,0
CVE-2018-15358,Eltex,0.00094,8.8,0.0,1.0,0.0,1.0,1,2018-08-17,1.0,2018-08-17,,,1.0,An authenticated attacker with low privileges can activate high privileged user and use it to expand attack surface in Eltex ESP-200 firmware version 1.2.0.,CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-20'],"['cpe:2.3:o:eltex:esp-200_firmware:1.2.0:*:*:*:*:*:*:*', 'cpe:2.3:h:eltex:esp-200:-:*:*:*:*:*:*:*']",0,0
CVE-2018-15359,Eltex,0.00099,8.8,0.0,1.0,0.0,1.0,1,2018-08-17,1.0,2018-08-17,,,1.0,An authenticated attacker with low privileges can use insecure sudo configuration to expand attack surface in Eltex ESP-200 firmware version 1.2.0.,CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:eltex:esp-200_firmware:1.2.0:*:*:*:*:*:*:*', 'cpe:2.3:h:eltex:esp-200:-:*:*:*:*:*:*:*']",0,0
CVE-2018-15360,Eltex,0.00074,7.3,0.0,1.0,0.0,1.0,1,2018-08-17,1.0,2018-08-17,,,1.0,An attacker without authentication can login with default credentials for privileged users in Eltex ESP-200 firmware version 1.2.0.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L,NETWORK,LOW,NONE,NONE,UNCHANGED,LOW,LOW,LOW,HIGH,3.9,3.4,['CWE-798'],"['cpe:2.3:o:eltex:esp-200_firmware:1.2.0:*:*:*:*:*:*:*', 'cpe:2.3:h:eltex:esp-200:-:*:*:*:*:*:*:*']",0,0
CVE-2020-9026,Eltex,0.01346,9.8,0.0,1.0,0.0,1.0,1,2020-02-17,0.0,,0.0,,,ELTEX NTP-RG-1402G 1v10 3.25.3.32 devices allow OS command injection via the PING field of the resource ping.cmd. The NTP-2 device is also affected.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-78'],"['cpe:2.3:o:eltex-co:ntp-2_firmware:3.25.1.1226:*:*:*:*:*:*:*', 'cpe:2.3:h:eltex-co:ntp-2:1v5\\:b\\+10:*:*:*:*:*:*:*', 'cpe:2.3:o:eltex-co:ntp-rg-1402g_firmware:3.25.3.32:*:*:*:*:*:*:*', 'cpe:2.3:h:eltex-co:ntp-rg-1402g:1v10:*:*:*:*:*:*:*']",0,0
CVE-2020-9027,Eltex,0.01346,9.8,0.0,1.0,0.0,1.0,1,2020-02-17,0.0,,0.0,,,ELTEX NTP-RG-1402G 1v10 3.25.3.32 devices allow OS command injection via the TRACE field of the resource ping.cmd. The NTP-2 device is also affected.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-78'],"['cpe:2.3:o:eltex-co:ntp-2_firmware:3.25.1.1226:*:*:*:*:*:*:*', 'cpe:2.3:h:eltex-co:ntp-2:1v5\\:b\\+10:*:*:*:*:*:*:*', 'cpe:2.3:o:eltex-co:ntp-rg-1402g_firmware:3.25.3.32:*:*:*:*:*:*:*', 'cpe:2.3:h:eltex-co:ntp-rg-1402g:1v10:*:*:*:*:*:*:*']",0,0
CVE-2018-15530,XEROX,0.00087,6.1,0.0,1.0,0.0,1.0,1,2019-05-13,1.0,2018-10-09,,,1.0,Cross-site scripting (XSS) in the web interface of the Xerox ColorQube 8580 allows remote persistent injection of custom HTML / JavaScript code.,CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:xerox:colorqube_8580_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:colorqube_8580:-:*:*:*:*:*:*:*']",0,0
CVE-2018-17172,XEROX,0.00271,9.8,0.0,1.0,0.0,1.0,1,2019-01-03,1.0,2019-01-02,,,1.0,"The web application on Xerox AltaLink B80xx before 100.008.028.05200, C8030/C8035 before 100.001.028.05200, C8045/C8055 before 100.002.028.05200, and C8070 before 100.003.028.05200 allows unauthenticated command injection.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-77'],"['cpe:2.3:h:xerox:altalink_c8030:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_c8030_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_c8035:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_c8035_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_c8045:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_c8045_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_c8055:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_c8055_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_c8070:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_c8070_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_b8045:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_b8045_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_b8055_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_b8055:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_b8065_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_b8065:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_b8075:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_b8075_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_b8090:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_b8090_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2019-13165,XEROX,0.00381,9.8,0.0,1.0,0.0,1.0,1,2020-03-13,0.0,,0.0,,,Some Xerox printers (such as the Phaser 3320 V53.006.16.000) were affected by a buffer overflow vulnerability in the request parser of the IPP service. This would allow an unauthenticated attacker to cause a Denial of Service (DoS) and potentially execute arbitrary code on the device.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-120'],"['cpe:2.3:h:xerox:phaser_3320:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:phaser_3320_firmware:v53.006.16.000:*:*:*:*:*:*:*']",0,0
CVE-2019-13166,XEROX,0.00178,7.5,0.0,1.0,0.0,1.0,1,2020-03-13,0.0,,0.0,,,Some Xerox printers (such as the Phaser 3320 V53.006.16.000) did not implement account lockout. Local account credentials may be extracted from the device via brute force guessing attacks.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-307'],"['cpe:2.3:o:xerox:phaser_3320_firmware:v53.006.16.000:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:phaser_3320:-:*:*:*:*:*:*:*']",0,0
CVE-2019-13168,XEROX,0.00381,9.8,0.0,1.0,0.0,1.0,1,2020-03-13,0.0,,0.0,,,Some Xerox printers (such as the Phaser 3320 V53.006.16.000) were affected by a buffer overflow vulnerability in the attributes parser of the IPP service. This would allow an unauthenticated attacker to cause a Denial of Service (DoS) and potentially execute arbitrary code on the device.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-120'],"['cpe:2.3:o:xerox:phaser_3320_firmware:v53.006.16.000:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:phaser_3320:-:*:*:*:*:*:*:*']",0,0
CVE-2019-13169,XEROX,0.00472,9.8,0.0,1.0,0.0,1.0,1,2020-03-13,0.0,,0.0,,,Some Xerox printers (such as the Phaser 3320 V53.006.16.000) were affected by a buffer overflow vulnerability in the Content-Type HTTP Header of the web application that would allow an attacker to execute arbitrary code on the device.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-120'],"['cpe:2.3:o:xerox:phaser_3320_firmware:v53.006.16.000:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:phaser_3320:-:*:*:*:*:*:*:*']",0,0
CVE-2019-13170,XEROX,0.00053,6.5,0.0,1.0,0.0,1.0,1,2020-03-13,0.0,,0.0,,,Some Xerox printers (such as the Phaser 3320 V53.006.16.000) did not implement any mechanism to avoid CSRF attacks. Successful exploitation of this vulnerability can lead to the takeover of a local account on the device.,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,NONE,HIGH,NONE,MEDIUM,2.8,3.6,['CWE-352'],"['cpe:2.3:o:xerox:phaser_3320_firmware:v53.006.16.000:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:phaser_3320:-:*:*:*:*:*:*:*']",0,0
CVE-2019-13171,XEROX,0.00472,9.8,0.0,1.0,0.0,1.0,1,2020-03-13,0.0,,0.0,,,"Some Xerox printers (such as the Phaser 3320 V53.006.16.000) were affected by one or more stack-based buffer overflow vulnerabilities in the Google Cloud Print implementation that would allow an unauthenticated attacker to execute arbitrary code on the device. This was caused by an insecure handling of the register parameters, because the size used within a memcpy() function, which copied the action value into a local variable, was not checked properly.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:o:xerox:phaser_3320_firmware:v53.006.16.000:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:phaser_3320:-:*:*:*:*:*:*:*']",0,0
CVE-2019-13172,XEROX,0.00499,9.8,0.0,1.0,0.0,1.0,1,2020-03-13,0.0,,0.0,,,Some Xerox printers (such as the Phaser 3320 V53.006.16.000) were affected by a buffer overflow vulnerability in the Authentication Cookie of the web application that would allow an attacker to execute arbitrary code on the device.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-120'],"['cpe:2.3:o:xerox:phaser_3320_firmware:v53.006.16.000:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:phaser_3320:-:*:*:*:*:*:*:*']",0,0
CVE-2019-17184,XEROX,0.00244,9.8,0.0,1.0,0.0,1.0,1,2019-10-04,0.0,,0.0,,,Xerox AtlaLink B8045/B8055/B8065/B8075/B8090 C8030/C8035/C8045/C8055/C8070 printers with software before 101.00x.089.22600 allow an attacker to gain privileges.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:xerox:atlalink_firmware:101.008.089.22600:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:atlalink_b8045:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:atlalink_b8055:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:atlalink_b8065:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:atlalink_b8075:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:atlalink_b8090:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:atlalink_firmware:101.001.089.22600:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:atlalink_c8030:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:atlalink_c8035:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:atlalink_firmware:101.002.089.22600:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:atlalink_c8045:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:atlalink_c8055:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:atlalink_firmware:101.003.089.22600:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:atlalink_c8070:-:*:*:*:*:*:*:*']",0,0
CVE-2019-19832,XEROX,0.00118,8.8,0.0,1.0,0.0,1.0,1,2019-12-18,0.0,,0.0,,,Xerox AltaLink C8035 printers allow CSRF. A request to add users is made in the Device User Database form field to the xerox.set URI. (The frmUserName value must have a unique name.),CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-352'],"['cpe:2.3:o:xerox:altalink_c8035_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_c8035:-:*:*:*:*:*:*:*']",0,0
CVE-2016-11061,XEROX,0.00222,9.8,0.0,1.0,0.0,1.0,0,2020-04-29,0.0,,0.0,,,"Xerox WorkCentre 3655, 3655i, 58XX, 58XXi, 59XX, 59XXi, 6655, 6655i, 72XX, 72XXi, 78XX, 78XXi, 7970, and 7970i devices before 073.xxx.086.15410 do not properly escape parameters in the support/remoteUI/configrui.php script, which can allow an unauthenticated attacker to execute OS commands on the device.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-78'],"['cpe:2.3:o:xerox:workcentre_3655_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_3655:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_3655i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_3655i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5865_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5865:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5875_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5875:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5890_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5890:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5865i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5865i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5875i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5875i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5890i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5890i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5945_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5945:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5955_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5955:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5945i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5945i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5955i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5955i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_6655_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_6655:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_6655i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_6655i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7200_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7200i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7200i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7225i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7225i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7830_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7830:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7835_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7835:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7845_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7845:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7855_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7855:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7970_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7970:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7970i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7970i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7225_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7225:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7220_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7220:-:*:*:*:*:*:*:*']",0,0
CVE-2018-20767,XEROX,0.00156,8.8,0.0,1.0,0.0,1.0,0,2019-02-10,0.0,,0.0,,,"An issue was discovered on Xerox WorkCentre 3655, 3655i, 58XX, 58XXi, 59XX, 59XXi, 6655, 6655i, 72XX, 72XXi, 78XX, 78XXi, 7970, 7970i, EC7836, and EC7856 devices before R18-05 073.xxx.0487.15000. There is authenticated remote command execution.",CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-20'],"['cpe:2.3:o:xerox:workcentre_3655i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_3655i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_3655_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_3655:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5890i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5890i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5865i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5865i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5875i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5875i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5845_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5845:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5865_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5865:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5875_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5875:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5890_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5890:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5900_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5900i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5900i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_6655_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_6655:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_6655i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_6655i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7855_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7855:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7225_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7225:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7220_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7220:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7220i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7220i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7225i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7225i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7855i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7855i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7845i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7845i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7835i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7835i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7830i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7830i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7830_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7830:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7835_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7835:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7845_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7845:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7970_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7970:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7970i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7970i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_ec7836_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_ec7836:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_ec7856_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_ec7856:-:*:*:*:*:*:*:*']",0,0
CVE-2018-20768,XEROX,0.00179,9.8,0.0,1.0,0.0,1.0,0,2019-02-10,0.0,,0.0,,,"An issue was discovered on Xerox WorkCentre 3655, 3655i, 58XX, 58XXi, 59XX, 59XXi, 6655, 6655i, 72XX, 72XXi, 78XX, 78XXi, 7970, 7970i, EC7836, and EC7856 devices before R18-05 073.xxx.0487.15000. An attacker can execute PHP code by leveraging a writable file.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-94'],"['cpe:2.3:o:xerox:workcentre_3655i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_3655i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_3655_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_3655:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5890i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5890i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5865i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5865i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5875i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5875i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5845_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5845:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5865_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5865:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5875_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5875:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5890_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5890:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5900_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5900i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5900i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_6655_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_6655:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_6655i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_6655i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7855_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7855:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7225_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7225:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7220_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7220:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7220i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7220i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7225i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7225i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7855i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7855i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7845i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7845i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7835i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7835i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7830i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7830i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7830_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7830:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7835_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7835:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7845_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7845:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7970_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7970:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7970i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7970i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_ec7836_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_ec7836:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_ec7856_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_ec7856:-:*:*:*:*:*:*:*']",0,0
CVE-2018-20769,XEROX,0.00244,7.5,0.0,1.0,0.0,1.0,0,2019-02-10,0.0,,0.0,,,"An issue was discovered on Xerox WorkCentre 3655, 3655i, 58XX, 58XXi, 59XX, 59XXi, 6655, 6655i, 72XX, 72XXi, 78XX, 78XXi, 7970, 7970i, EC7836, and EC7856 devices before R18-05 073.xxx.0487.15000. There is a Local File Inclusion vulnerability.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-22'],"['cpe:2.3:o:xerox:workcentre_3655i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_3655i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_3655_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_3655:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5890i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5890i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5865i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5865i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5875i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5875i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5845_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5845:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5865_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5865:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5875_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5875:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5890_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5890:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5900_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5900i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5900i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_6655_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_6655:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_6655i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_6655i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7855_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7855:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7225_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7225:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7220_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7220:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7220i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7220i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7225i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7225i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7855i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7855i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7845i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7845i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7835i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7835i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7830i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7830i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7830_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7830:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7835_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7835:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7845_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7845:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7970_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7970:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7970i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7970i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_ec7836_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_ec7836:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_ec7856_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_ec7856:-:*:*:*:*:*:*:*']",0,0
CVE-2018-20770,XEROX,0.00138,9.8,0.0,1.0,0.0,1.0,0,2019-02-10,0.0,,0.0,,,"An issue was discovered on Xerox WorkCentre 3655, 3655i, 58XX, 58XXi, 59XX, 59XXi, 6655, 6655i, 72XX, 72XXi, 78XX, 78XXi, 7970, 7970i, EC7836, and EC7856 devices before R18-05 073.xxx.0487.15000. There is Blind SQL Injection.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-89'],"['cpe:2.3:o:xerox:workcentre_3655i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_3655i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_3655_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_3655:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5890i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5890i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5865i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5865i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5875i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5875i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5845_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5845:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5865_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5865:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5875_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5875:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5890_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5890:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5900_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5900i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5900i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_6655_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_6655:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_6655i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_6655i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7855_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7855:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7225_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7225:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7220_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7220:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7220i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7220i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7225i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7225i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7855i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7855i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7845i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7845i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7835i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7835i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7830i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7830i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7830_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7830:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7835_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7835:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7845_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7845:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7970_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7970:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7970i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7970i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_ec7836_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_ec7836:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_ec7856_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_ec7856:-:*:*:*:*:*:*:*']",0,0
CVE-2018-20771,XEROX,0.00555,9.8,0.0,1.0,0.0,1.0,0,2019-02-10,0.0,,0.0,,,"An issue was discovered on Xerox WorkCentre 3655, 3655i, 58XX, 58XXi, 59XX, 59XXi, 6655, 6655i, 72XX, 72XXi, 78XX, 78XXi, 7970, 7970i, EC7836, and EC7856 devices before R18-05 073.xxx.0487.15000. There is unauthenticated Remote Command Execution.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-20'],"['cpe:2.3:o:xerox:workcentre_3655i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_3655i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_3655_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_3655:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5890i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5890i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5865i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5865i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5875i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5875i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5845_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5845:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5865_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5865:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5875_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5875:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5890_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5890:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5900_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5900i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5900i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_6655_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_6655:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_6655i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_6655i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7855_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7855:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7225_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7225:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7220_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7220:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7220i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7220i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7225i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7225i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7855i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7855i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7845i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7845i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7835i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7835i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7830i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7830i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7830_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7830:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7835_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7835:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7845_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7845:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7970_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7970:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7970i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7970i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_ec7836_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_ec7836:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_ec7856_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_ec7856:-:*:*:*:*:*:*:*']",0,0
CVE-2019-10880,XEROX,0.00213,9.8,0.0,1.0,0.0,1.0,0,2019-04-12,0.0,,0.0,,,"Within multiple XEROX products a vulnerability allows remote command execution on the Linux system, as the ""nobody"" user through a crafted ""HTTP"" request (OS Command Injection vulnerability in the HTTP interface). Depending upon configuration authentication may not be necessary.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-78'],"['cpe:2.3:h:xerox:colorqube_8700:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:colorqube_8700_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:colorqube_8900:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:colorqube_8900_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:colorqube_9301:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:colorqube_9301_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:colorqube_9302:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:colorqube_9302_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:colorqube_9303:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:colorqube_9303_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2019-13167,XEROX,0.00096,6.1,0.0,1.0,0.0,1.0,0,2020-03-13,0.0,,0.0,,,"Multiple Stored XSS vulnerabilities were found in the Xerox Web Application, used by the Phaser 3320 V53.006.16.000 and other printers. Successful exploitation of this vulnerability can lead to session hijacking of the administrator in the web application or the execution of unwanted actions.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:xerox:phaser_3320_firmware:v53.006.16.000:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:phaser_3320:-:*:*:*:*:*:*:*']",0,0
CVE-2019-18628,XEROX,0.00061,4.9,0.0,1.0,0.0,1.0,0,2021-03-04,0.0,,0.0,,,"Xerox AltaLink B8045/B8055/B8065/B8075/B8090 and C8030/C8035/C8045/C8055/C8070 multifunction printers with software releases before 101.00x.099.28200 allow a user with administrative privileges to turn off data encryption on the device, thus leaving it open to potential cryptographic information disclosure.",CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.2,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:xerox:altalink_b8045_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_b8045:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_b8055_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_b8055:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_b8065_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_b8065:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_b8075_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_b8075:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_b8090_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_b8090:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_c8030_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_c8030:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_c8035_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_c8035:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_c8045_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_c8045:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_c8055_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_c8055:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_c8070_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_c8070:-:*:*:*:*:*:*:*']",0,0
CVE-2019-18629,XEROX,0.00244,8.1,0.0,1.0,0.0,1.0,0,2021-03-04,1.0,2021-03-20,,,0.0,Xerox AltaLink B8045/B8055/B8065/B8075/B8090 and C8030/C8035/C8045/C8055/C8070 multifunction printers with software releases before 101.00x.099.28200 allow an attacker to execute an unwanted binary during a exploited clone install. This requires creating a clone file and signing that file with a compromised private key.,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,HIGH,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.2,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:xerox:altalink_b8045_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_b8045:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_b8055_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_b8055:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_b8065_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_b8065:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_b8075_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_b8075:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_b8090_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_b8090:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_c8030_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_c8030:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_c8035_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_c8035:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_c8045_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_c8045:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_c8055_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_c8055:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_c8070_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_c8070:-:*:*:*:*:*:*:*']",0,0
CVE-2019-18630,XEROX,0.00168,7.5,0.0,1.0,0.0,1.0,0,2021-03-04,1.0,2021-03-03,,,1.0,"On Xerox AltaLink B8045/B8055/B8065/B8075/B8090 and C8030/C8035/C8045/C8055/C8070 multifunction printers with software releases before 101.00x.099.28200, portions of the drive containing executable code were not encrypted thus leaving it open to potential cryptographic information disclosure.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-312'],"['cpe:2.3:o:xerox:altalink_b8045_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_b8045:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_b8055_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_b8055:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_b8065_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_b8065:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_b8075_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_b8075:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_b8090_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_b8090:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_c8030_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_c8030:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_c8035_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_c8035:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_c8045_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_c8045:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_c8055_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_c8055:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_c8070_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_c8070:-:*:*:*:*:*:*:*']",0,0
CVE-2020-26162,XEROX,0.00084,6.1,0.0,1.0,0.0,1.0,0,2020-10-09,0.0,,0.0,,,Xerox WorkCentre EC7836 before 073.050.059.25300 and EC7856 before 073.020.059.25300 devices allow XSS via Description pages.,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:xerox:workcentre_ec7836_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_ec7836:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_ec7856_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_ec7856:-:*:*:*:*:*:*:*']",0,0
CVE-2020-36201,XEROX,0.00168,7.5,0.0,1.0,0.0,1.0,0,2021-01-26,0.0,,0.0,,,"An issue was discovered in certain Xerox WorkCentre products. They do not properly encrypt passwords. This affects 3655, 3655i, 58XX, 58XXi 59XX, 59XXi, 6655, 6655i, 72XX, 72XXi 78XX, 78XXi, 7970, 7970i, EC7836, and EC7856 devices.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-327'],"['cpe:2.3:o:xerox:workcentre_3655_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_3655:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_3655i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_3655i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5865_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5865:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5875:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5875_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5890:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5890_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5865i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5865i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5875i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5875i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5945:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5945_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5955:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5955_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5945i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5945i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5955i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5955i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_6655_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_6655:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_6655i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_6655i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7220_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7220:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7225_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7225:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7220i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7220i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7225i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7225i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7830i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7830i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7835i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7835i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7845i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7845i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7855i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7855i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7830_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7830:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7835_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7835:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7845_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7845:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7855_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7855:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7970_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7970:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7970i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7970i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_ec7836_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_ec7836:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_ec7856_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_ec7856:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5890i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5890i:-:*:*:*:*:*:*:*']",0,0
CVE-2020-9330,XEROX,0.00109,8.8,0.0,1.0,0.0,1.0,0,2020-02-21,0.0,,0.0,,,"Certain Xerox WorkCentre printers before 073.xxx.000.02300 do not require the user to reenter or validate LDAP bind credentials when changing the LDAP connector IP address. A malicious actor who gains access to affected devices (e.g., by using default credentials) can change the LDAP connection IP address to a system owned by the actor without knowledge of the LDAP bind credentials. After changing the LDAP connection IP address, subsequent authentication attempts will result in the printer sending plaintext LDAP (Active Directory) credentials to the actor. Although the credentials may belong to a non-privileged user, organizations frequently use privileged service accounts to bind to Active Directory. The attacker gains a foothold on the Active Directory domain at a minimum, and may use the credentials to take over control of the Active Directory domain. This affects 3655*, 3655i*, 58XX*, 58XXi*, 59XX*, 59XXi*, 6655**, 6655i**, 72XX*, 72XXi*, 78XX**, 78XXi**, 7970**, 7970i**, EC7836**, and EC7856** devices.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-306'],"['cpe:2.3:h:xerox:workcentre_3655:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_3655_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_3655i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_3655i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5845:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5845_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5855:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5855_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5945:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5945_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_5955:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_5955_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_6655:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_6655_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_6655i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_6655i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7220_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7220:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7225_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7225:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7830_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7830:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7835_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7835:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7845_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7845:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7855_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7855:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7970_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7970:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_7970i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_7970i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_ec7836_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_ec7836:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_ec7856_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_ec7856:-:*:*:*:*:*:*:*']",0,0
CVE-2021-28668,XEROX,0.00138,9.8,0.0,1.0,0.0,1.0,0,2021-03-29,1.0,2021-03-18,,,1.0,"Xerox AltaLink B80xx before 103.008.020.23120, C8030/C8035 before 103.001.020.23120, C8045/C8055 before 103.002.020.23120 and C8070 before 103.003.020.23120 has several SQL injection vulnerabilities.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-89'],"['cpe:2.3:o:xerox:altalink_b8045_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_b8045:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_b8055_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_b8055:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_b8065_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_b8065:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_b8075_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_b8075:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_b8090_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_b8090:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_c8030_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_c8030:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_c8035_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_c8035:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_c8045_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_c8045:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_c8055_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_c8055:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_c8070_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_c8070:-:*:*:*:*:*:*:*']",0,0
CVE-2021-28669,XEROX,0.0007,7.5,0.0,1.0,0.0,1.0,0,2021-03-29,1.0,2021-03-18,,,1.0,"Xerox AltaLink B80xx before 103.008.020.23120, C8030/C8035 before 103.001.020.23120, C8045/C8055 before 103.002.020.23120 and C8070 before 103.003.020.23120 provide the ability to set configuration attributes without administrative rights.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,HIGH,NONE,HIGH,3.9,3.6,['CWE-862'],"['cpe:2.3:o:xerox:altalink_b8045_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_b8045:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_b8055_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_b8055:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_b8065_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_b8065:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_b8075_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_b8075:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_b8090_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_b8090:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_c8030_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_c8030:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_c8035_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_c8035:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_c8045_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_c8045:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_c8055_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_c8055:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_c8070_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_c8070:-:*:*:*:*:*:*:*']",0,0
CVE-2021-28670,XEROX,0.00103,9.1,0.0,1.0,0.0,1.0,0,2021-03-29,1.0,2021-03-18,,,1.0,"Xerox AltaLink B8045/B8090 before 103.008.030.32000, C8030/C8035 before 103.001.030.32000, C8045/C8055 before 103.002.030.32000 and C8070 before 103.003.030.32000 allow unauthorized users, by leveraging the Scan To Mailbox feature, to delete arbitrary files from the disk.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,HIGH,HIGH,CRITICAL,3.9,5.2,['NVD-CWE-noinfo'],"['cpe:2.3:o:xerox:altalink_b8045_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_b8045:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_b8055_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_b8055:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_b8065_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_b8065:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_b8075_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_b8075:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_b8090_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_b8090:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_c8030_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_c8030:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_c8035:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_c8035_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_c8045:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_c8045_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_c8055:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_c8055_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:altalink_c8070:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:altalink_c8070_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2021-28671,XEROX,0.00411,9.8,0.0,1.0,0.0,0.0,0,2021-03-29,1.0,2021-03-18,,,1.0,"Xerox Phaser 6510 before 64.65.51 and 64.59.11 (Bridge), WorkCentre 6515 before 65.65.51 and 65.59.11 (Bridge), VersaLink B400 before 37.65.51 and 37.59.01 (Bridge), B405 before 38.65.51 and 38.59.01 (Bridge), B600/B610 before 32.65.51 and 32.59.01 (Bridge), B605/B615 before 33.65.51 and 33.59.01 (Bridge), B7025/30/35 before 58.65.51 and 58.59.11 (Bridge), C400 before 67.65.51 and 67.59.01 (Bridge), C405 before 68.65.51 and 68.59.01 (Bridge), C500/C600 before 61.65.51 and 61.59.01 (Bridge), C505/C605 before 62.65.51 and 62.59.01 (Bridge), C7000 before 56.65.51 and 56.59.01 (Bridge), C7020/25/30 before 57.65.51 and 57.59.01 (Bridge), C8000/C9000 before 70.65.51 and 70.59.01 (Bridge), C8000W before 72.65.51 have a remote Command Execution vulnerability in the Web User Interface that allows remote attackers with ""a weaponized clone file"" to execute arbitrary commands.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:h:xerox:phaser_6510:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:phaser_6510_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_6515:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_6515_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b400:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b400_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b405:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b405_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b600:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b600_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b610:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b610_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b605:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b605_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b615:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b615_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b7025_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b7025:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b7030_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b7030:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b7035_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b7035:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c400_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c400:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c405_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c405:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c500_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c600_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c600:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c505_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c505:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c605_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c605:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c7000_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c7000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c7020:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c7020_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c7025_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c7025:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c7030_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c7030:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c8000_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c8000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c9000_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c9000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:phaser_6510_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:phaser_6510:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_6515_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_6515:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b400_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b400:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b405_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b405:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b610_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b610:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b605_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b605:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b615_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b615:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b7025_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b7025:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c400_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c400:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c405_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c405:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c500_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c600_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c600:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c505_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c505:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c605_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c605:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c7000_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c7000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c7020_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c7020:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c7025_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c7025:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c7030_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c7030:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c8000_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c8000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c9000_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c9000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c8000w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c8000w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b600_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b600:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b7030_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b7030:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b7035_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b7035:-:*:*:*:*:*:*:*']",0,0
CVE-2021-28672,XEROX,0.00659,9.8,0.0,1.0,0.0,0.0,0,2021-03-29,1.0,2021-03-18,,,1.0,"Xerox Phaser 6510 before 64.65.51 and 64.59.11 (Bridge), WorkCentre 6515 before 65.65.51 and 65.59.11 (Bridge), VersaLink B400 before 37.65.51 and 37.59.01 (Bridge), B405 before 38.65.51 and 38.59.01 (Bridge), B600/B610 before 32.65.51 and 32.59.01 (Bridge), B605/B615 before 33.65.51 and 33.59.01 (Bridge), B7025/30/35 before 58.65.51 and 58.59.11 (Bridge), C400 before 67.65.51 and 67.59.01 (Bridge), C405 before 68.65.51 and 68.59.01 (Bridge), C500/C600 before 61.65.51 and 61.59.01 (Bridge), C505/C605 before 62.65.51 and 62.59.01 (Bridge), C7000 before 56.65.51 and 56.59.01 (Bridge), C7020/25/30 before 57.65.51 and 57.59.01 (Bridge), C8000/C9000 before 70.65.51 and 70.59.01 (Bridge), C8000W before 72.65.51 allows remote attackers to execute arbitrary code through a buffer overflow in Web page parameter handling.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-120'],"['cpe:2.3:o:xerox:phaser_6510_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:phaser_6510:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_6515_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_6515:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b400_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b400:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b405_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b405:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b600_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b600:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b610_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b610:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b605_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b605:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b615_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b615:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b7025_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b7025:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b7030_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b7030:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b7035_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b7035:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c400_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c400:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c405_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c405:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c500_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c600_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c600:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c505_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c505:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c605_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c605:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c7000_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c7000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c7020_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c7020:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c7025_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c7025:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c7030_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c7030:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c8000_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c8000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c9000_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c9000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:phaser_6510_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:phaser_6510:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_6515_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_6515:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b400_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b400:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b405_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b405:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b610_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b610:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b605_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b605:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b615_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b615:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b7025_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b7025:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c400_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c400:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c405_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c405:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c500_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c600_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c600:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c505_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c505:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c605_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c605:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c7000_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c7000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c7020_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c7020:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c7025_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c7025:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c7030_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c7030:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c8000_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c8000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c9000_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c9000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c8000w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c8000w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b600_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b600:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b7030_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b7030:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b7035_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b7035:-:*:*:*:*:*:*:*']",0,0
CVE-2021-28673,XEROX,0.00346,9.8,0.0,1.0,0.0,0.0,0,2021-03-29,1.0,2021-03-18,,,1.0,"Xerox Phaser 6510 before 64.61.23 and 64.59.11 (Bridge), WorkCentre 6515 before 65.61.23 and 65.59.11 (Bridge), VersaLink B400 before 37.61.23 and 37.59.01 (Bridge), B405 before 38.61.23 and 38.59.01 (Bridge), B600/B610 before 32.61.23 and 32.59.01 (Bridge), B605/B615 before 33.61.23 and 33.59.01 (Bridge), B7025/30/35 before 58.61.23 and 58.59.11 (Bridge), C400 before 67.61.23 and 67.59.01 (Bridge), C405 before 68.61.23 and 68.59.01 (Bridge), C500/C600 before 61.61.23 and 61.59.01 (Bridge), C505/C605 before 62.61.23 and 62.59.11 (Bridge), C7000 before 56.61.23 and 56.59.01 (Bridge), C7020/25/30 before 57.61.23 and 57.59.01 (Bridge), C8000/C9000 before 70.61.23 and 70.59.01 (Bridge), allows remote attackers with ""a weaponized clone file"" to execute arbitrary commands in the Web User Interface.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:xerox:phaser_6510_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:phaser_6510:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_6515_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_6515:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b400_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b400:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b405_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b405:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b600_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b600:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b610_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b610:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b605_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b605:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b615_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b615:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b7025_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b7025:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b7030_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b7030:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b7035_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b7035:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c400_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c400:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c405_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c405:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c500_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c600_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c600:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c505_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c505:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c605_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c605:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c7000_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c7000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c7020_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c7020:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c7025_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c7025:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c7030_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c7030:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c8000_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c8000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c9000_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c9000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:phaser_6510_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:phaser_6510:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:workcentre_6515_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:workcentre_6515:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b400_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b400:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b405_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b405:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b610_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b610:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b605_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b605:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b615_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b615:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b7025_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b7025:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c400_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c400:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c405_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c405:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c500_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c600_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c600:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c505_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c505:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c605_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c605:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c7000_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c7000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c7020_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c7020:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c7025_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c7025:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c7030_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c7030:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c8000_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c8000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_c9000_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c9000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b600_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b600:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b7030_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b7030:-:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_b7035_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b7035:-:*:*:*:*:*:*:*']",0,0
CVE-2021-37354,XEROX,0.00285,9.8,0.0,1.0,0.0,1.0,0,2022-02-15,0.0,,0.0,,,Xerox Phaser 4622 v35.013.01.000 was discovered to contain a buffer overflow in the function sub_3226AC via the TIMEZONE variable. This vulnerability allows attackers to cause a Denial of Service (DoS) via crafted overflow data.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:o:xerox:phaser_4622_firmware:35.013.01.000:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:phaser_4622:-:*:*:*:*:*:*:*']",0,0
CVE-2022-23320,XEROX,0.00153,7.5,0.0,0.0,1.0,0.0,0,2022-02-07,0.0,,0.0,,,"XMPie uStore 12.3.7244.0 allows for administrators to generate reports based on raw SQL queries. Since the application ships with default administrative credentials, an attacker may authenticate into the application and exfiltrate sensitive information from the database.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-287'],['cpe:2.3:a:xerox:xmpie_ustore:12.3.7244.0:*:*:*:*:*:*:*'],0,0
CVE-2022-23321,XEROX,0.00067,4.8,0.0,0.0,1.0,0.0,0,2022-02-10,0.0,,0.0,,,A persistent cross-site scripting (XSS) vulnerability exists on two input fields within the administrative panel when editing users in the XMPie UStore application on version 12.3.7244.0.,CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,HIGH,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,1.7,2.7,['CWE-79'],['cpe:2.3:a:xerox:xmpie_ustore:12.3.7244.0:*:*:*:*:*:*:*'],0,0
CVE-2022-23968,XEROX,0.00185,7.5,0.0,1.0,0.0,0.0,0,2022-01-26,0.0,,0.0,,,"Xerox VersaLink devices on specific versions of firmware before 2022-01-26 allow remote attackers to brick the device via a crafted TIFF file in an unauthenticated HTTP POST request. There is a permanent denial of service because image parsing causes a reboot, but image parsing is restarted as soon as the boot process finishes. However, this boot loop can be resolved by a field technician. The TIFF file must have an incomplete Image Directory. Affected firmware versions include xx.42.01 and xx.50.61. NOTE: the 2022-01-24 NeoSmart article included ""believed to affect all previous and later versions as of the date of this posting"" but a 2022-01-26 vendor statement reports ""the latest versions of firmware are not vulnerable to this issue.""",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-835'],"['cpe:2.3:o:xerox:versalink_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:xerox:versalink_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b400:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b405:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b600:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b610:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b7025:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b7030:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_b7035:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c400:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c405:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c500:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c505:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c600:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c605:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c7000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c7020:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c7025:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c7030:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c8000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c8000w:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:versalink_c9000:-:*:*:*:*:*:*:*']",0,0
CVE-2022-26572,XEROX,0.0015,7.5,0.0,1.0,0.0,1.0,0,2022-04-04,0.0,,0.0,,,"Xerox ColorQube 8580 was discovered to contain an access control issue which allows attackers to print, view the status, and obtain sensitive information.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['NVD-CWE-Other'],"['cpe:2.3:o:xerox:colorqube_8580_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:xerox:colorqube_8580:-:*:*:*:*:*:*:*']",0,0
CVE-2018-15555,Actiontec,0.00606,9.8,0.0,1.0,0.0,1.0,1,2019-06-28,0.0,,0.0,,,"On Telus Actiontec WEB6000Q v1.1.02.22 devices, an attacker can login with root level access with the user ""root"" and password ""admin"" by using the enabled onboard UART headers.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-662'],"['cpe:2.3:o:actiontec:web6000q_firmware:1.1.02.22:*:*:*:*:*:*:*', 'cpe:2.3:h:actiontec:web6000q:-:*:*:*:*:*:*:*']",0,0
CVE-2018-15556,Actiontec,0.13666,9.8,0.0,1.0,0.0,1.0,1,2019-06-27,0.0,,0.0,,,"The Quantenna WiFi Controller on Telus Actiontec WEB6000Q v1.1.02.22 allows login with root level access with the user ""root"" and an empty password by using the enabled onboard UART headers.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-287'],"['cpe:2.3:o:actiontec:web6000q_firmware:1.1.02.22:*:*:*:*:*:*:*', 'cpe:2.3:h:actiontec:web6000q:-:*:*:*:*:*:*:*']",0,0
CVE-2018-15557,Actiontec,0.00504,8.8,0.0,1.0,0.0,1.0,1,2019-06-27,0.0,,0.0,,,"An issue was discovered in the Quantenna WiFi Controller on Telus Actiontec WEB6000Q v1.1.02.22 devices. An attacker can statically set his/her IP to anything on the 169.254.1.0/24 subnet, and obtain root access by connecting to 169.254.1.2 port 23 with telnet/netcat.",CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-269'],"['cpe:2.3:o:actiontec:web6000q_firmware:1.1.02.22:*:*:*:*:*:*:*', 'cpe:2.3:h:actiontec:web6000q:-:*:*:*:*:*:*:*']",0,0
CVE-2018-19922,Actiontec,0.00131,6.1,0.0,1.0,0.0,1.0,1,2018-12-06,0.0,,0.0,,,Persistent Cross-Site Scripting (XSS) in the advancedsetup_websiteblocking.html Website Blocking page of the Actiontec C1000A router with firmware through CAC004-31.30L.95 allows a remote attacker to inject arbitrary HTML into the Website Blocking page by inserting arbitrary HTML into the 'TodUrlAdd' URL parameter in a /urlfilter.cmd POST request.,CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:actiontec:c1000a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:actiontec:c1000a:-:*:*:*:*:*:*:*']",0,0
CVE-2019-12789,Actiontec,0.001,6.8,0.0,1.0,0.0,1.0,1,2019-06-17,0.0,,0.0,,,"An issue was discovered on Actiontec T2200H T2200H-31.128L.08 devices, as distributed by Telus. By attaching a UART adapter to the UART pins on the system board, an attacker can use a special key sequence (Ctrl-\) to obtain a shell with root privileges. After gaining root access, the attacker can mount the filesystem read-write and make permanent modifications to the device including bricking of the device, disabling vendor management of the device, preventing automatic upgrades, and permanently installing malicious code on the device.",CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,PHYSICAL,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.9,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:actiontec:t2200h_firmware:t2200h-31.1238l.08:*:*:*:*:*:*:*', 'cpe:2.3:h:actiontec:t2200h:-:*:*:*:*:*:*:*']",0,0
CVE-2018-10252,Actiontec,0.00186,8.1,0.0,1.0,0.0,1.0,0,2018-05-14,0.0,,0.0,,,"An issue was discovered on Actiontec WCB6200Q before 1.1.10.20a devices. The admin login session cookie is insecurely generated making admin session hijacking possible. When an admin logs in, a session cookie is generated using the time of day rounded to 10ms. Since the web server returns its current time of day in responses, it is possible to step backward through possible session values until a working one is found. Once a working session ID is found, an attacker then has admin control of the device and can add a secondary SSID to create a backdoor to the network.",CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,HIGH,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.2,5.9,['CWE-384'],"['cpe:2.3:h:actiontec:wcb6200q:-:*:*:*:*:*:*:*', 'cpe:2.3:o:actiontec:wcb6200q_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2018-15884,Ricoh,0.00106,8.8,1.0,0.0,0.0,1.0,1,2018-08-28,0.0,,0.0,,,RICOH MP C4504ex devices allow HTML Injection via the /web/entry/en/address/adrsSetUserWizard.cgi entryNameIn parameter.,CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-352'],"['cpe:2.3:o:ricoh:mp_c4504ex_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:mp_c4504ex:-:*:*:*:*:*:*:*']",1,0
CVE-2018-16184,Ricoh,0.0032,9.8,0.0,1.0,0.0,1.0,1,2019-01-09,1.0,2018-12-07,,,1.0,"RICOH Interactive Whiteboard D2200 V1.6 to V2.2, D5500 V1.6 to V2.2, D5510 V1.6 to V2.2, and the display versions with RICOH Interactive Whiteboard Controller Type1 V1.6 to V2.2 attached (D5520, D6500, D6510, D7500, D8400) allows remote attackers to execute arbitrary commands via unspecified vectors.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-78'],"['cpe:2.3:h:ricoh:d2200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:d2200_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:d5500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:d5500_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:d5510:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:d5510_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:d5520:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:d5520_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:d6500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:d6500_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:d6510:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:d6510_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:d7500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:d7500_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:d8400:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:d8400_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2018-16185,Ricoh,0.0013,7.8,0.0,1.0,0.0,1.0,1,2019-01-09,1.0,2018-12-07,,,1.0,"RICOH Interactive Whiteboard D2200 V1.1 to V2.2, D5500 V1.1 to V2.2, D5510 V1.1 to V2.2, the display versions with RICOH Interactive Whiteboard Controller Type1 V1.1 to V2.2 attached (D5520, D6500, D6510, D7500, D8400), and the display versions with RICOH Interactive Whiteboard Controller Type2 V3.0 to V3.1.10137.0 attached (D5520, D6510, D7500, D8400) allows remote attackers to execute a malicious program.",CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-20'],"['cpe:2.3:h:ricoh:d2200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:d2200_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:d5500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:d5500_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:d5510:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:d5510_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:d5520:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:d5520_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:d5520_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:d6500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:d6500_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:d6510_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:d6510_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:d6510:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:d7500_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:d7500_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:d7500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:d8400_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:d8400_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:d8400:-:*:*:*:*:*:*:*']",0,0
CVE-2018-16187,Ricoh,0.00087,5.9,0.0,1.0,0.0,1.0,1,2019-01-09,1.0,2018-12-07,,,1.0,"The RICOH Interactive Whiteboard D2200 V1.3 to V2.2, D5500 V1.3 to V2.2, D5510 V1.3 to V2.2, the display versions with RICOH Interactive Whiteboard Controller Type1 V1.3 to V2.2 attached (D5520, D6500, D6510, D7500, D8400), and the display versions with RICOH Interactive Whiteboard Controller Type2 V3.0 to V3.1.10137.0 attached (D5520, D6510, D7500, D8400) does not verify its server certificates, which allows man-in-the-middle attackers to eversdrop on encrypted communication.",CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,HIGH,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,2.2,3.6,['CWE-295'],"['cpe:2.3:o:ricoh:d2200_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:d2200:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:d5500_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:d5500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:d5510_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:d5510:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:d5520_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:d5520_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:d5520:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:d6500_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:d6500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:d6510_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:d6510_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:d6510:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:d7500_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:d7500_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:d7500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:d8400_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:d8400_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:d8400:-:*:*:*:*:*:*:*']",0,0
CVE-2018-17001,Ricoh,0.00085,6.1,0.0,1.0,0.0,1.0,1,2018-09-21,0.0,,0.0,,,"On the RICOH SP 4510SF printer, HTML Injection and Stored XSS vulnerabilities have been discovered in the area of adding addresses via the entryNameIn parameter to /web/entry/en/address/adrsSetUserWizard.cgi.",CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:ricoh:sp_4510sf_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_4510sf:-:*:*:*:*:*:*:*']",0,0
CVE-2018-17002,Ricoh,0.00085,6.1,0.0,1.0,0.0,1.0,1,2018-09-21,0.0,,0.0,,,"On the RICOH MP 2001 printer, HTML Injection and Stored XSS vulnerabilities have been discovered in the area of adding addresses via the entryNameIn parameter to /web/entry/en/address/adrsSetUserWizard.cgi.",CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:ricoh:mp_2001sp_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:mp_2001sp:-:*:*:*:*:*:*:*']",0,0
CVE-2018-17309,Ricoh,0.00085,6.1,0.0,1.0,0.0,1.0,1,2018-09-26,0.0,,0.0,,,"On the RICOH MP C406Z printer, HTML Injection and Stored XSS vulnerabilities have been discovered in the area of adding addresses via the entryNameIn parameter to /web/entry/en/address/adrsSetUserWizard.cgi.",CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:ricoh:mp_c406zspf_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:mp_c406z:-:*:*:*:*:*:*:*']",0,0
CVE-2018-17310,Ricoh,0.00137,6.1,1.0,1.0,0.0,1.0,1,2018-09-26,0.0,,0.0,,,"On the RICOH MP C1803 JPN printer, HTML Injection and Stored XSS vulnerabilities have been discovered in the area of adding addresses via the entryNameIn parameter to /web/entry/en/address/adrsSetUserWizard.cgi.",CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:ricoh:mp_c1803_jpn_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:mp_c1803_jpn:-:*:*:*:*:*:*:*']",1,0
CVE-2018-17311,Ricoh,0.00085,6.1,0.0,1.0,0.0,1.0,1,2018-09-26,0.0,,0.0,,,"On the RICOH MP C6503 Plus printer, HTML Injection and Stored XSS vulnerabilities have been discovered in the area of adding addresses via the entryNameIn parameter to /web/entry/en/address/adrsSetUserWizard.cgi.",CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:ricoh:mp_c6503_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:mp_c6503:-:*:*:*:*:*:*:*']",0,0
CVE-2018-17312,Ricoh,0.00085,6.1,0.0,1.0,0.0,1.0,1,2018-09-26,0.0,,0.0,,,"On the RICOH Aficio MP 301 printer, HTML Injection and Stored XSS vulnerabilities have been discovered in the area of adding addresses via the entryNameIn parameter to /web/entry/en/address/adrsSetUserWizard.cgi.",CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:ricoh:aficio_mp_301spf_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:aficio_mp_301spf:-:*:*:*:*:*:*:*']",0,0
CVE-2018-17314,Ricoh,0.00085,6.1,0.0,1.0,0.0,0.0,1,2018-09-26,0.0,,0.0,,,"On the RICOH Aficio MP 305+ printer, HTML Injection and Stored XSS vulnerabilities have been discovered in the area of adding addresses via the entryNameIn parameter to /web/entry/en/address/adrsSetUserWizard.cgi.",CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:ricoh:mp_305\\+_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:mp_305\\+:-:*:*:*:*:*:*:*']",0,0
CVE-2018-17315,Ricoh,0.00085,6.1,0.0,1.0,0.0,1.0,1,2018-09-26,0.0,,0.0,,,"On the RICOH MP C2003 printer, HTML Injection and Stored XSS vulnerabilities have been discovered in the area of adding addresses via the entryNameIn parameter to /web/entry/en/address/adrsSetUserWizard.cgi.",CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:ricoh:mp_c2003sp_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:mp_c2003:-:*:*:*:*:*:*:*']",0,0
CVE-2018-17316,Ricoh,0.00085,6.1,0.0,1.0,0.0,1.0,1,2018-09-26,0.0,,0.0,,,"On the RICOH MP C6003 printer, HTML Injection and Stored XSS vulnerabilities have been discovered in the area of adding addresses via the entryNameIn parameter to /web/entry/en/address/adrsSetUserWizard.cgi.",CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:ricoh:mp_c6003_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:mp_c6003:-:*:*:*:*:*:*:*']",0,0
CVE-2019-11844,Ricoh,0.0007,6.1,0.0,1.0,0.0,1.0,1,2019-05-14,0.0,,0.0,,,An HTML Injection vulnerability has been discovered on the RICOH SP 4520DN via the /web/entry/en/address/adrsSetUserWizard.cgi entryNameIn or entryDisplayNameIn parameter.,CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:ricoh:sp_4520dn_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_4520dn:-:*:*:*:*:*:*:*']",0,0
CVE-2019-11845,Ricoh,0.0009,6.1,0.0,1.0,0.0,1.0,1,2019-05-14,0.0,,0.0,,,An HTML Injection vulnerability has been discovered on the RICOH SP 4510DN via the /web/entry/en/address/adrsSetUserWizard.cgi entryNameIn parameter.,CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:h:ricoh:sp_4510dn:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_4510dn_firmware:-:*:*:*:*:*:*:*']",0,0
CVE-2019-14299,Ricoh,0.00244,9.8,0.0,1.0,0.0,1.0,1,2020-03-13,0.0,,0.0,,,"Ricoh SP C250DN 1.05 devices have an Authentication Method Vulnerable to Brute Force Attacks. Some Ricoh printers did not implement account lockout. Therefore, it was possible to obtain the local account credentials by brute force.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-307'],"['cpe:2.3:o:ricoh:sp_c250sf_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c250sf:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_c252sf_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c252sf:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_c250dn_firmware:1.05:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c250dn:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_c252dn_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c252dn:-:*:*:*:*:*:*:*']",0,0
CVE-2019-14300,Ricoh,0.00653,9.8,0.0,1.0,0.0,1.0,1,2019-08-26,1.0,2020-02-25,,,0.0,"Several Ricoh printers have multiple buffer overflows parsing HTTP cookie headers, which allow an attacker to cause a denial of service or code execution via crafted requests to the web server. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-119'],"['cpe:2.3:h:ricoh:sp_c250sf:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_c250sf_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c252sf:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_c252sf_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c250dn:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_c250dn_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c252dn:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_c252dn_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2019-14301,Ricoh,0.00147,7.5,0.0,1.0,0.0,1.0,1,2020-01-10,1.0,2020-02-25,,,0.0,Ricoh SP C250DN 1.06 devices have Incorrect Access Control (issue 1 of 2).,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-200'],"['cpe:2.3:h:ricoh:sp_c250sf:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_c250sf_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c252sf:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_c252sf_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c250dn:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_c250dn_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c252dn:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_c252dn_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:m_c250fw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:m_c250fw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:m_c250fwb:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:m_c250fwb_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:p_c300w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:p_c300w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:p_c301w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:p_c301w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_330sn_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_330sn:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_330sfn_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_330sfn:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_330dn_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_330dn:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_3710sf_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_3710sf:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_3710dn_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_3710dn:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_c260dnw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c260dnw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_c260sfnw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c260sfnw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_c261dnw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c261dnw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_c261sfnw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c261sfnw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_c262sfnw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c262sfnw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_c262dnw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c262dnw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:mp_2014_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:mp_2014:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:mp_2014d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:mp_2014d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:mp_2014ad_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:mp_2014ad:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:m_2700_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:m_2700:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:m_2701_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:m_2701:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_221s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_221s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_220snw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_220snw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_221snw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_221snw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_221sf_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_221sf:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_220sfnw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_220sfnw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_221sfnw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_221sfnw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_277snwx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_277snwx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_277sfnwx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_277sfnwx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_221_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_221:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_220nw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_220nw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_221nw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_221nw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp277nwx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp277nwx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_212snw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_212snw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_212sfnw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_212sfnw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_212sfw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_212sfw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_212sfnw_\\(china\\)_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_212sfnw_\\(china\\):-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_212suw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_212suw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_213snw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_213snw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_213snw_\\(taiwan\\)_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_213snw_\\(taiwan\\):-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_213suw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_213suw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_213sfnw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_213sfnw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_213sfw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_213sfw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_213sfnw_\\(taiwan\\)_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_213sfnw_\\(taiwan\\):-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_212nw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_212nw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_213nw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_213nw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_213nw_\\(taiwan\\)_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_213nw_\\(taiwan\\):-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_212w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_212w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_213w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_213w:-:*:*:*:*:*:*:*']",0,0
CVE-2019-14303,Ricoh,0.00116,7.5,0.0,1.0,0.0,1.0,1,2020-03-13,0.0,,0.0,,,Ricoh SP C250DN 1.05 devices allow denial of service (issue 1 of 3). Some Ricoh printers were affected by a wrong LPD service implementation that lead to a denial of service vulnerability.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:ricoh:sp_c250sf_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c250sf:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_c252sf_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c252sf:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_c250dn_firmware:1.05:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c250dn:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_c252dn_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c252dn:-:*:*:*:*:*:*:*']",0,0
CVE-2019-14304,Ricoh,0.00074,8.8,0.0,1.0,0.0,1.0,1,2020-01-10,1.0,2020-02-25,,,0.0,Ricoh SP C250DN 1.06 devices allow CSRF.,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-352'],"['cpe:2.3:h:ricoh:sp_c250sf:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_c250sf_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c252sf:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_c252sf_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c250dn:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_c250dn_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c252dn:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_c252dn_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:m_c250fw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:m_c250fw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:m_c250fwb:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:m_c250fwb_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:p_c300w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:p_c300w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:p_c301w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:p_c301w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_330sn_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_330sn:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_330sfn_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_330sfn:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_330dn_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_330dn:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_3710sf_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_3710sf:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_3710dn_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_3710dn:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_c260dnw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c260dnw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_c260sfnw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c260sfnw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_c261dnw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c261dnw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_c261sfnw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c261sfnw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_c262sfnw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c262sfnw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_c262dnw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c262dnw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:mp_2014_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:mp_2014:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:mp_2014d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:mp_2014d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:mp_2014ad_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:mp_2014ad:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:m_2700_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:m_2700:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:m_2701_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:m_2701:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_221s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_221s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_220snw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_220snw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_221snw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_221snw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_221sf_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_221sf:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_220sfnw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_220sfnw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_221sfnw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_221sfnw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_277snwx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_277snwx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_277sfnwx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_277sfnwx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_221_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_221:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_220nw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_220nw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_221nw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_221nw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp277nwx_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp277nwx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_212snw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_212snw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_212sfnw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_212sfnw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_212sfw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_212sfw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_212sfnw_\\(china\\)_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_212sfnw_\\(china\\):-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_212suw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_212suw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_213snw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_213snw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_213snw_\\(taiwan\\)_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_213snw_\\(taiwan\\):-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_213suw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_213suw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_213sfnw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_213sfnw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_213sfw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_213sfw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_213sfnw_\\(taiwan\\)_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_213sfnw_\\(taiwan\\):-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_212nw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_212nw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_213nw_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_213nw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_213nw_\\(taiwan\\)_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_213nw_\\(taiwan\\):-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_212w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_212w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_213w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_213w:-:*:*:*:*:*:*:*']",0,0
CVE-2019-14308,Ricoh,0.00653,9.8,0.0,1.0,0.0,1.0,1,2019-08-26,1.0,2020-02-25,,,0.0,"Several Ricoh printers have multiple buffer overflows parsing LPD packets, which allow an attacker to cause a denial of service or code execution via crafted requests to the LPD service. Affected firmware versions depend on the printer models. One affected configuration is cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:* up to (including) 1.06 running on cpe:2.3:o:ricoh:sp_c250dn:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252dn:-:*:*:*:*:*:*:*. Another affected configuration is cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:* up to (including) 1.12 running on cpe:2.3:o:ricoh:sp_c250sf:-:*:*:*:*:*:*:*, cpe:2.3:o:ricoh:sp_c252sf:-:*:*:*:*:*:*:*.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-119'],"['cpe:2.3:o:ricoh:sp_c250sf_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c250sf:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_c252sf_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c252sf:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_c250dn_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c250dn:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_c252dn_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c252dn:-:*:*:*:*:*:*:*']",0,0
CVE-2019-14309,Ricoh,0.00178,7.5,0.0,1.0,0.0,1.0,1,2020-03-13,0.0,,0.0,,,Ricoh SP C250DN 1.05 devices have a fixed password. FTP service credential were found to be hardcoded within the printer firmware. This would allow to an attacker to access and read information stored on the shared FTP folders.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-798'],"['cpe:2.3:o:ricoh:sp_c250sf_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c250sf:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_c252sf_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c252sf:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_c250dn_firmware:1.05:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c250dn:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_c252dn_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c252dn:-:*:*:*:*:*:*:*']",0,0
CVE-2019-18203,Ricoh,0.00087,6.1,0.0,1.0,0.0,1.0,1,2019-10-21,0.0,,0.0,,,"On the RICOH MP 501 printer, HTML Injection and Stored XSS vulnerabilities have been discovered in the area of adding addresses via the entryNameIn and KeyDisplay parameter to /web/entry/en/address/adrsSetUserWizard.cgi.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:ricoh:mp_501_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:mp_501:-:*:*:*:*:*:*:*']",0,0
CVE-2019-19363,Ricoh,0.0007,7.8,1.0,0.0,1.0,0.0,1,2020-01-24,1.0,2020-02-25,,,0.0,An issue was discovered in Ricoh (including Savin and Lanier) Windows printer drivers prior to 2020 that allows attackers local privilege escalation. Affected drivers and versions are: PCL6 Driver for Universal Print - Version 4.0 or later PS Driver for Universal Print - Version 4.0 or later PC FAX Generic Driver - All versions Generic PCL5 Driver - All versions RPCS Driver - All versions PostScript3 Driver - All versions PCL6 (PCL XL) Driver - All versions RPCS Raster Driver - All version,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-732'],"['cpe:2.3:a:ricoh:generic_pcl5_driver:-:*:*:*:*:*:*:*', 'cpe:2.3:a:ricoh:pc_fax_generic_driver:-:*:*:*:*:*:*:*', 'cpe:2.3:a:ricoh:pcl6_\\(pcl_xl\\)_driver:-:*:*:*:*:*:*:*', 'cpe:2.3:a:ricoh:pcl6_driver_for_universal_print:*:*:*:*:*:*:*:*', 'cpe:2.3:a:ricoh:postscript3_driver:-:*:*:*:*:*:*:*', 'cpe:2.3:a:ricoh:ps_driver_for_universal_print:*:*:*:*:*:*:*:*', 'cpe:2.3:a:ricoh:rpcs_driver:-:*:*:*:*:*:*:*', 'cpe:2.3:a:ricoh:rpcs_raster_driver:-:*:*:*:*:*:*:*']",2,1
CVE-2021-33945,Ricoh,0.00255,9.8,0.0,1.0,0.0,1.0,1,2022-02-15,1.0,2022-07-11,,,0.0,"RICOH Printer series SP products 320DN, SP 325DNw, SP 320SN, SP 320SFN, SP 325SNw, SP 325SFNw, SP 330SN, Aficio SP 3500SF, SP 221S, SP 220SNw, SP 221SNw, SP 221SF, SP 220SFNw, SP 221SFNw v1.06 were discovered to contain a stack buffer overflow in the file /etc/wpa_supplicant.conf. This vulnerability allows attackers to cause a Denial of Service (DoS) via crafted overflow data.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:o:ricoh:sp_320dn_firmware:1.06:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_320dn:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_325dnw_firmware:1.06:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_325dnw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_320sn_firmware:1.06:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_320sn:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_320sfn_firmware:1.06:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_320sfn:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_325snw_firmware:1.06:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_325snw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_325sfnw_firmware:1.06:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_325sfnw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_330sn_firmware:1.06:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_330sn:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:aficio_sp_3500sf_firmware:1.06:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:aficio_sp_3500sf:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_221s_firmware:1.06:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_221s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_220snw_firmware:1.06:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_220snw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_221snw_firmware:1.06:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_221snw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_221sf_firmware:1.06:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_221sf:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_220sfnw_firmware:1.06:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_220sfnw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_221sfnw_firmware:1.06:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_221sfnw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:m_c2000_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:m_c2000:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:m_c250fwb_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:m_c250fwb:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:m_c250fw_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:m_c250fw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_c260sfnw_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c260sfnw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_c262sfnw_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c262sfnw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_c261sfnw_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c261sfnw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_c250sf_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c250sf:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_c252sf_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c252sf:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:p_c300w_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:p_c300w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:p_c301w_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:p_c301w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_c260dnw_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c260dnw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_c262dnw_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c262dnw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_c261dnw_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c261dnw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_c250dn_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c250dn:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_c252dn_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_c252dn:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:m_320_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:m_320:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:m_320fb_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:m_320fb:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:m_320f_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:m_320f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:m_2700_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:m_2700:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:m_2701_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:m_2701:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_330sn_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_330sn:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_330sfn_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_330sfn:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_3710sf_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_3710sf:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_220snw_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_220snw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_221snw_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_221snw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_220sfnw_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_220sfnw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_221sfnw_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_221sfnw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_277snwx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_277snwx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_277sfnwx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_277sfnwx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_325snw_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_325snw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_325sfnw_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_325sfnw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_377snwx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_377snwx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_377sfnwx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_377sfnwx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_212sfnw_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_212sfnw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_212sfw_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_212sfw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_212snw_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_212snw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_212suw_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_212suw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_213sfnw_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_213sfnw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_213sfw_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_213sfw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_213snw_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_213snw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_213suw_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_213suw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_311sfnw_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_311sfnw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_310sfnw_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_310sfnw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_312sfnw_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_312sfnw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:p_310_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:p_310:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:p_311_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:p_311:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_330dn_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_330dn:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_3710dn_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_3710dn:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_220nw_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_220nw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_221nw_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_221nw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_277nwx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_277nwx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_325dnw_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_325dnw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_377dnwx_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_377dnwx:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_212nw_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_212nw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_212w_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_212w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_213nw_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_213nw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_213w_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_213w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_311dnw_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_311dnw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_310dnw_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_310dnw:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ricoh:sp_312dnw_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:ricoh:sp_312dnw:-:*:*:*:*:*:*:*']",0,0
CVE-2018-18006,Ricoh,0.00658,9.8,0.0,0.0,1.0,0.0,0,2018-12-14,0.0,,0.0,,,"Hardcoded credentials in the Ricoh myPrint application 2.9.2.4 for Windows and 2.2.7 for Android give access to any externally disclosed myPrint WSDL API, as demonstrated by discovering API secrets of related Google cloud printers, encrypted passwords of mail servers, and names of printed files.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-798'],"['cpe:2.3:a:ricoh:myprint:2.2.7:*:*:*:*:android:*:*', 'cpe:2.3:a:ricoh:myprint:2.9.2.4:*:*:*:*:windows:*:*']",0,0
CVE-2019-20001,Ricoh,0.00044,7.8,0.0,0.0,1.0,0.0,0,2020-08-04,1.0,2020-07-31,,,1.0,An issue was discovered in RICOH Streamline NX Client Tool and RICOH Streamline NX PC Client that allows attackers to escalate local privileges.,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:a:ricoh:streamline_nx_client_tool:1.4.8:*:*:*:*:*:*:*', 'cpe:2.3:a:ricoh:streamline_nx_pc_client:*:*:*:*:*:*:*:*', 'cpe:2.3:a:ricoh:streamline_nx_pc_client:*:*:*:*:*:*:*:*']",0,0
CVE-2019-6021,Ricoh,0.00133,6.1,0.0,0.0,1.0,0.0,0,2019-12-26,0.0,,1.0,2019-11-13,,Open redirect vulnerability in Library Information Management System LIMEDIO all versions allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a specially crafted URL.,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-601'],['cpe:2.3:a:ricoh:limedio:*:*:*:*:*:*:*:*'],0,0
CVE-2019-7751,Ricoh,0.12756,7.5,1.0,0.0,1.0,0.0,0,2019-12-31,0.0,,0.0,,,"A directory traversal and local file inclusion vulnerability in FPProducerInternetServer.exe in Ricoh MarcomCentral, formerly PTI Marketing, FusionPro VDP before 10.0 allows a remote attacker to list or enumerate sensitive contents of files. Furthermore, this could allow for privilege escalation by dumping the local machine's SAM and SYSTEM database files, and possibly remote code execution.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-22'],['cpe:2.3:a:ricoh:fusionpro_vdp:*:*:*:*:*:*:*:*'],1,0
CVE-2018-16217,Yealink,0.00167,8.8,0.0,0.0,0.0,1.0,1,2019-05-29,0.0,,1.0,,,The network diagnostic function (ping) in the Yeahlink Ultra-elegant IP Phone SIP-T41P (firmware 66.83.0.35) allows a remote authenticated attacker to trigger OS commands or open a reverse shell via command injection.,CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-78'],"['cpe:2.3:h:yealink:ultra-elegant_ip_phone_sip-t41p:-:*:*:*:*:*:*:*', 'cpe:2.3:o:yealink:ultra-elegant_ip_phone_sip-t41p_firmware:66.83.0.35:*:*:*:*:*:*:*']",0,0
CVE-2018-16218,Yealink,0.00975,8.8,0.0,0.0,0.0,1.0,1,2019-05-29,0.0,,1.0,,,A CSRF (Cross Site Request Forgery) in the web interface of the Yeahlink Ultra-elegant IP Phone SIP-T41P firmware version 66.83.0.35 allows a remote attacker to trigger code execution or settings modification on the device by providing a crafted link to the victim.,CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-352'],"['cpe:2.3:o:yealink:ultra-elegant_ip_phone_sip-t41p_firmware:66.83.0.35:*:*:*:*:*:*:*', 'cpe:2.3:h:yealink:ultra-elegant_ip_phone_sip-t41p:-:*:*:*:*:*:*:*']",0,0
CVE-2018-16221,Yealink,0.00092,8.0,0.0,0.0,0.0,1.0,1,2019-05-29,0.0,,1.0,,,"The diagnostics web interface in the Yeahlink Ultra-elegant IP Phone SIP-T41P (firmware 66.83.0.35) does not validate (escape) the path information (path traversal), which allows an authenticated remote attacker to get access to privileged information (e.g., /etc/passwd) via path traversal (relative path information in the file parameter of the corresponding POST request).",CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.1,5.9,['CWE-22'],"['cpe:2.3:o:yealink:ultra-elegant_ip_phone_sip-t41p_firmware:66.83.0.35:*:*:*:*:*:*:*', 'cpe:2.3:h:yealink:ultra-elegant_ip_phone_sip-t41p:-:*:*:*:*:*:*:*']",0,0
CVE-2019-14656,Yealink,0.00165,8.8,0.0,1.0,0.0,0.0,0,2019-10-08,0.0,,0.0,,,"Yealink phones through 2019-08-04 do not properly check user roles in POST requests. Consequently, the default User account (with a password of user) can make admin requests via HTTP.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-434'],"['cpe:2.3:h:yeahlink:vp59:-:*:*:*:*:*:*:*', 'cpe:2.3:o:yeahlink:vp59_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:yeahlink:t49g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:yeahlink:t49g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:yeahlink:t58v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:yeahlink:t58v_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2019-14657,Yealink,0.00225,8.8,0.0,1.0,0.0,0.0,0,2019-10-08,0.0,,0.0,,,"Yealink phones through 2019-08-04 have an issue with OpenVPN file upload. They execute tar as root to extract files, but do not validate the extraction directory. Creating a tar file with ../../../../ allows replacement of almost any file on a phone. This leads to password replacement and arbitrary code execution as root.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-22'],"['cpe:2.3:h:yeahlink:vp59:-:*:*:*:*:*:*:*', 'cpe:2.3:o:yeahlink:vp59_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:yeahlink:t49g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:yeahlink:t49g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:yeahlink:t58v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:yeahlink:t58v_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2021-27561,Yealink,0.97474,9.8,0.0,0.0,1.0,0.0,0,2021-10-15,0.0,,1.0,2021-02-23,,"Yealink Device Management (DM) 3.6.0.20 allows command injection as root via the /sm/api/v1/firewall/zone/services URI, without authentication.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-78'],['cpe:2.3:a:yealink:device_management:*:*:*:*:*:*:*:*'],0,0
CVE-2018-17587,AirTies,0.00195,6.1,1.0,0.0,0.0,1.0,1,2018-10-02,0.0,,0.0,,,AirTies Air 5750 devices with software 1.0.0.18 have XSS via the top.html productboardtype parameter.,CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:airties:air_5750_firmware:1.0.0.18:*:*:*:*:*:*:*', 'cpe:2.3:h:airties:air_5750:-:*:*:*:*:*:*:*']",1,0
CVE-2018-17588,AirTies,0.00195,6.1,1.0,0.0,0.0,1.0,1,2018-10-02,0.0,,0.0,,,AirTies Air 5021 devices with software 1.0.0.18 have XSS via the top.html productboardtype parameter.,CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:airties:air_5021_firmware:1.0.0.18:*:*:*:*:*:*:*', 'cpe:2.3:h:airties:air_5021:-:*:*:*:*:*:*:*']",1,0
CVE-2018-17589,AirTies,0.00085,6.1,0.0,1.0,0.0,1.0,1,2018-10-02,0.0,,0.0,,,AirTies Air 5650 devices with software 1.0.0.18 have XSS via the top.html productboardtype parameter.,CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:airties:air_5650_firmware:1.0.0.18:*:*:*:*:*:*:*', 'cpe:2.3:h:airties:air_5650:-:*:*:*:*:*:*:*']",0,0
CVE-2018-17590,AirTies,0.00062,6.1,1.0,0.0,0.0,1.0,1,2018-10-02,0.0,,0.0,,,AirTies Air 5442 devices with software 1.0.0.18 have XSS via the top.html productboardtype parameter.,CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:airties:air_5442_firmware:1.0.0.18:*:*:*:*:*:*:*', 'cpe:2.3:h:airties:air_5442:-:*:*:*:*:*:*:*']",1,0
CVE-2018-17591,AirTies,0.00062,6.1,1.0,1.0,0.0,1.0,1,2018-10-02,0.0,,0.0,,,AirTies Air 5343v2 devices with software 1.0.0.18 have XSS via the top.html productboardtype parameter.,CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:airties:air_5343v2_firmware:1.0.0.18:*:*:*:*:*:*:*', 'cpe:2.3:h:airties:air_5343v2:-:*:*:*:*:*:*:*']",1,0
CVE-2018-17593,AirTies,0.00062,6.1,1.0,0.0,0.0,1.0,1,2018-10-02,0.0,,0.0,,,AirTies Air 5453 devices with software 1.0.0.18 have XSS via the top.html productboardtype parameter.,CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:airties:air_5453_firmware:1.0.0.18:*:*:*:*:*:*:*', 'cpe:2.3:h:airties:air_5453:-:*:*:*:*:*:*:*']",1,0
CVE-2018-17594,AirTies,0.00061,6.1,0.0,1.0,0.0,1.0,1,2018-10-02,0.0,,0.0,,,AirTies Air 5443v2 devices with software 1.0.0.18 have XSS via the top.html productboardtype parameter.,CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:airties:air_5443v2_firmware:1.0.0.18:*:*:*:*:*:*:*', 'cpe:2.3:h:airties:air_5443v2:-:*:*:*:*:*:*:*']",0,0
CVE-2018-8738,AirTies,0.00116,6.1,1.0,1.0,0.0,1.0,1,2018-07-05,0.0,,0.0,,,Airties 5444 1.0.0.18 and 5444TT 1.0.0.18 devices allow XSS.,CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:airties:5444_firmware:1.0.0.18:*:*:*:*:*:*:*', 'cpe:2.3:h:airties:5444:-:*:*:*:*:*:*:*', 'cpe:2.3:o:airties:5444tt_firmware:1.0.0.18:*:*:*:*:*:*:*', 'cpe:2.3:h:airties:5444tt:-:*:*:*:*:*:*:*']",1,0
CVE-2019-6967,AirTies,0.00458,8.8,1.0,0.0,0.0,1.0,1,2019-03-21,0.0,,0.0,,,AirTies Air5341 1.0.0.12 devices allow cgi-bin/login CSRF.,CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-352'],"['cpe:2.3:o:airties:air_5341_firmware:1.0.0.12:*:*:*:*:*:*:*', 'cpe:2.3:h:airties:air_5341:-:*:*:*:*:*:*:*']",1,0
CVE-2022-38789,AirTies,0.00161,9.1,0.0,1.0,0.0,1.0,0,2022-09-15,0.0,,0.0,,,"An issue was discovered in Airties Smart Wi-Fi before 2020-08-04. It allows attackers to change the main/guest SSID and the PSK to arbitrary values, and map the LAN, because of Insecure Direct Object Reference.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,NONE,CRITICAL,3.9,5.2,['CWE-639'],"['cpe:2.3:o:airties:air_4920_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:airties:air_4920:-:*:*:*:*:*:*:*', 'cpe:2.3:o:airties:air_4921_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:airties:air_4921:-:*:*:*:*:*:*:*', 'cpe:2.3:o:airties:air_4971_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:airties:air_4971:-:*:*:*:*:*:*:*']",0,0
CVE-2018-19242,Trendnet,0.00085,8.8,0.0,1.0,0.0,1.0,1,2018-12-20,0.0,,1.0,2018-12-05,,Buffer overflow in apply.cgi on TRENDnet TEW-632BRP 1.010B32 and TEW-673GRU devices allows attackers to hijack the control flow to any attacker-specified location by crafting a POST request payload (with authentication).,CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-119'],"['cpe:2.3:o:trendnet:tew-632brp_firmware:1.010b32:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:tew-632brp:-:*:*:*:*:*:*:*', 'cpe:2.3:o:trendnet:tew-673gru_firmware:1.00b40:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:tew-673gru:-:*:*:*:*:*:*:*']",0,0
CVE-2018-7034,Trendnet,0.00588,7.5,0.0,1.0,0.0,1.0,1,2018-02-14,0.0,,0.0,,,"TRENDnet TEW-751DR v1.03B03, TEW-752DRU v1.03B01, and TEW733GR v1.03B01 devices allow authentication bypass via an AUTHORIZED_GROUP=1 value, as demonstrated by a request for getcfg.php.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-287'],"['cpe:2.3:o:trendnet:tew-751dr_firmware:1.03b03:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:tew-751dr:-:*:*:*:*:*:*:*', 'cpe:2.3:o:trendnet:tew-752dru_firmware:1.03b01:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:tew-752dru:-:*:*:*:*:*:*:*', 'cpe:2.3:o:trendnet:tew733gr_firmware:1.03b01:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:tew733gr:-:*:*:*:*:*:*:*']",0,0
CVE-2019-11400,Trendnet,0.00244,9.8,0.0,1.0,0.0,1.0,1,2019-12-18,0.0,,1.0,2019-12-16,,"An issue was discovered on TRENDnet TEW-651BR 2.04B1, TEW-652BRP 3.04b01, and TEW-652BRU 1.00b12 devices. A buffer overflow occurs through the get_set.ccp ccp_act parameter.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-119'],"['cpe:2.3:o:trendnet:tew-651br_firmware:2.04b1:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:tew-651br:-:*:*:*:*:*:*:*', 'cpe:2.3:o:trendnet:tew-652brp_firmware:3.04b01:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:tew-652brp:-:*:*:*:*:*:*:*', 'cpe:2.3:o:trendnet:tew-652bru_firmware:1.00b12:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:tew-652bru:-:*:*:*:*:*:*:*']",0,0
CVE-2019-11417,Trendnet,0.0025,9.8,0.0,1.0,0.0,1.0,1,2019-04-22,0.0,,1.0,2019-04-02,,"system.cgi on TRENDnet TV-IP110WN cameras has a buffer overflow caused by an inadequate source-length check before a strcpy operation in the respondAsp function. Attackers can exploit the vulnerability by using the languse parameter with a long string. This affects 1.2.2 build 28, 64, 65, and 68.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-20'],"['cpe:2.3:o:trendnet:tv-ip110wn_firmware:1.2.2.28:*:*:*:*:*:*:*', 'cpe:2.3:o:trendnet:tv-ip110wn_firmware:1.2.2.64:*:*:*:*:*:*:*', 'cpe:2.3:o:trendnet:tv-ip110wn_firmware:1.2.2.65:*:*:*:*:*:*:*', 'cpe:2.3:o:trendnet:tv-ip110wn_firmware:1.2.2.68:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:tv-ip110wn:-:*:*:*:*:*:*:*']",0,0
CVE-2019-11418,Trendnet,0.0025,9.8,0.0,1.0,0.0,1.0,1,2019-04-22,0.0,,1.0,2019-04-02,,apply.cgi on the TRENDnet TEW-632BRP 1.010B32 router has a buffer overflow via long strings to the SOAPACTION:HNAP1 interface.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-119'],"['cpe:2.3:o:trendnet:tew-632brp_firmware:1.010b32:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:tew-632brp:-:*:*:*:*:*:*:*']",0,0
CVE-2019-13153,Trendnet,0.00114,8.8,0.0,1.0,0.0,1.0,1,2019-07-02,1.0,2019-07-01,,,1.0,An issue was discovered in TRENDnet TEW-827DRU firmware before 2.05B11. There is a command injection in apply.cgi (exploitable with authentication) via the Private Port in Add Virtual Server.,CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-78'],"['cpe:2.3:o:trendnet:tew-827dru_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:tew-827dru:-:*:*:*:*:*:*:*']",0,0
CVE-2019-13155,Trendnet,0.00114,8.8,0.0,1.0,0.0,1.0,1,2019-07-02,1.0,2019-07-01,,,1.0,An issue was discovered in TRENDnet TEW-827DRU firmware before 2.05B11. There is a command injection in apply.cgi (exploitable with authentication) via the IP Address in Add Virtual Server.,CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-78'],"['cpe:2.3:o:trendnet:tew-827dru_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:tew-827dru:-:*:*:*:*:*:*:*']",0,0
CVE-2019-13277,Trendnet,0.00149,7.5,0.0,1.0,0.0,1.0,1,2019-07-09,0.0,,0.0,,,"TRENDnet TEW-827DRU with firmware up to and including 2.04B03 allows an unauthenticated attacker to execute setup wizard functionality, giving this attacker the ability to change configuration values, potentially leading to a denial of service. The request can be made on the local intranet or remotely if remote administration is enabled.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:trendnet:tew-827dru_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:tew-827dru:2.0:*:*:*:*:*:*:*']",0,0
CVE-2020-10213,Trendnet,0.00307,8.8,0.0,1.0,0.0,1.0,1,2020-03-07,0.0,,1.0,2020-02-24,,An issue was discovered on D-Link DIR-825 Rev.B 2.10 devices. They allow remote attackers to execute arbitrary commands via the wps_sta_enrollee_pin parameter in a set_sta_enrollee_pin.cgi POST request. TRENDnet TEW-632BRP 1.010B32 is also affected.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-78'],"['cpe:2.3:o:dlink:dir-825_firmware:2.10:*:*:*:*:*:*:*', 'cpe:2.3:h:dlink:dir-825:-:*:*:*:*:*:*:*', 'cpe:2.3:o:trendnet:tew-632brp_firmware:1.010b32:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:tew-632brp:-:*:*:*:*:*:*:*']",0,0
CVE-2020-10216,Trendnet,0.00307,8.8,0.0,1.0,0.0,1.0,1,2020-03-07,0.0,,1.0,2020-02-24,,An issue was discovered on D-Link DIR-825 Rev.B 2.10 devices. They allow remote attackers to execute arbitrary commands via the date parameter in a system_time.cgi POST request. TRENDnet TEW-632BRP 1.010B32 is also affected.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-78'],"['cpe:2.3:o:dlink:dir-825_firmware:2.10:*:*:*:*:*:*:*', 'cpe:2.3:h:dlink:dir-825:-:*:*:*:*:*:*:*', 'cpe:2.3:o:trendnet:tew-632brp_firmware:1.010b32:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:tew-632brp:-:*:*:*:*:*:*:*']",0,0
CVE-2020-14074,Trendnet,0.00136,8.8,0.0,1.0,0.0,1.0,1,2020-06-15,0.0,,0.0,,,TRENDnet TEW-827DRU devices through 2.06B04 contain a stack-based buffer overflow in the ssi binary. The overflow allows an authenticated user to execute arbitrary code by POSTing to apply.cgi via the action kick_ban_wifi_mac_allow with a sufficiently long qcawifi.wifi0_vap0.maclist key.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-787'],"['cpe:2.3:o:trendnet:tew-827dru_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:tew-827dru:-:*:*:*:*:*:*:*']",0,0
CVE-2020-14080,Trendnet,0.00539,9.8,0.0,1.0,0.0,1.0,1,2020-06-15,1.0,2020-04-23,,,1.0,TRENDnet TEW-827DRU devices through 2.06B04 contain a stack-based buffer overflow in the ssi binary. The overflow allows an unauthenticated user to execute arbitrary code by POSTing to apply_sec.cgi via the action ping_test with a sufficiently long ping_ipaddr key.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:o:trendnet:tew-827dru_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:tew-827dru:-:*:*:*:*:*:*:*']",0,0
CVE-2021-20151,Trendnet,0.00222,10.0,0.0,1.0,0.0,1.0,1,2021-12-30,0.0,,0.0,,,"Trendnet AC2600 TEW-827DRU version 2.08B01 contains a flaw in the session management for the device. The router's management software manages web sessions based on IP address rather than verifying client cookies/session tokens/etc. This allows an attacker (whether from a different computer, different web browser on the same machine, etc.) to take over an existing session. This does require the attacker to be able to spoof or take over original IP address of the original user's session.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,CHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,6.0,['CWE-384'],"['cpe:2.3:o:trendnet:tew-827dru_firmware:2.08b01:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:tew-827dru:2.0:*:*:*:*:*:*:*']",0,0
CVE-2021-20155,Trendnet,0.00415,9.8,0.0,1.0,0.0,1.0,1,2021-12-30,0.0,,0.0,,,"Trendnet AC2600 TEW-827DRU version 2.08B01 makes use of hardcoded credentials. It is possible to backup and restore device configurations via the management web interface. These devices are encrypted using a hardcoded password of ""12345678"".",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-798'],"['cpe:2.3:o:trendnet:tew-827dru_firmware:2.08b01:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:tew-827dru:2.0:*:*:*:*:*:*:*']",0,0
CVE-2021-20159,Trendnet,0.00563,8.8,0.0,1.0,0.0,1.0,1,2021-12-30,0.0,,0.0,,,Trendnet AC2600 TEW-827DRU version 2.08B01 is vulnerable to command injection. The system log functionality of the firmware allows for command injection as root by supplying a malformed parameter.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-78'],"['cpe:2.3:h:trendnet:tew-827dru:2.0:*:*:*:*:*:*:*', 'cpe:2.3:o:trendnet:tew-827dru_firmware:2.08b01:*:*:*:*:*:*:*']",0,0
CVE-2021-20163,Trendnet,0.00065,4.9,0.0,1.0,0.0,1.0,1,2021-12-30,0.0,,0.0,,,Trendnet AC2600 TEW-827DRU version 2.08B01 leaks information via the ftp web page. Usernames and passwords for all ftp users are revealed in plaintext on the ftpserver.asp page.,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.2,3.6,['CWE-522'],"['cpe:2.3:o:trendnet:tew-827dru_firmware:2.08b01:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:tew-827dru:2.0:*:*:*:*:*:*:*']",0,0
CVE-2021-28844,Trendnet,0.00102,7.5,0.0,1.0,0.0,1.0,1,2021-08-10,0.0,,1.0,2021-03-02,,"Null Pointer Dereference vulnerability exists in TRENDnet TEW-755AP 1.11B03, TEW-755AP2KAC 1.11B03, TEW-821DAP2KAC 1.11B03, and TEW-825DAP 1.11B03 by sending the POST request to apply_cgi via a do_graph_auth action without a session_id key.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-476'],"['cpe:2.3:o:trendnet:tew-755ap_firmware:1.11b03:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:tew-755ap:-:*:*:*:*:*:*:*', 'cpe:2.3:o:trendnet:tew-755ap2kac_firmware:1.11b03:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:tew-755ap2kac:-:*:*:*:*:*:*:*', 'cpe:2.3:o:trendnet:tew-821dap2kac_firmware:1.11b03:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:tew-821dap2kac:-:*:*:*:*:*:*:*', 'cpe:2.3:o:trendnet:tew-825dap_firmware:1.11b03:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:tew-825dap:-:*:*:*:*:*:*:*']",0,0
CVE-2021-28846,Trendnet,0.00065,6.5,0.0,1.0,0.0,1.0,1,2021-08-10,1.0,2021-03-02,,,1.0,"A Format String vulnerablity exists in TRENDnet TEW-755AP 1.11B03, TEW-755AP2KAC 1.11B03, TEW-821DAP2KAC 1.11B03, and TEW-825DAP 1.11B03, which could let a remote malicious user cause a denial of service due to a logic bug at address 0x40dcd0 when calling fprintf with ""%s: key len = %d, too long\n"" format. The two variables seem to be put in the wrong order. The vulnerability could be triggered by sending the POST request to apply_cgi with a long and unknown key in the request body.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.8,3.6,['CWE-134'],"['cpe:2.3:o:trendnet:tew-755ap_firmware:1.11b03:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:tew-755ap:-:*:*:*:*:*:*:*', 'cpe:2.3:o:trendnet:tew-755ap2kac_firmware:1.11b03:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:tew-755ap2kac:-:*:*:*:*:*:*:*', 'cpe:2.3:o:trendnet:tew-821dap2kac_firmware:1.11b03:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:tew-821dap2kac:-:*:*:*:*:*:*:*', 'cpe:2.3:o:trendnet:tew-825dap_firmware:1.11b03:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:tew-825dap:-:*:*:*:*:*:*:*']",0,0
CVE-2021-32426,Trendnet,0.00105,6.1,0.0,1.0,0.0,1.0,1,2021-06-17,0.0,,0.0,,,"In TrendNet TW100-S4W1CA 2.3.32, it is possible to inject arbitrary JavaScript into the router's web interface via the ""echo"" command.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:trendnet:tw100-s4w1ca_firmware:2.3.32:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:tw100-s4w1ca:-:*:*:*:*:*:*:*']",0,0
CVE-2021-33315,Trendnet,0.00226,9.8,0.0,1.0,0.0,1.0,1,2022-05-11,1.0,2021-05-24,,,1.0,"The TRENDnet TI-PG1284i switch(hw v2.0R) prior to version 2.0.2.S0 suffers from an integer underflow vulnerability. This vulnerability exists in its lldp related component. Due to lack of proper validation on length field of PortID TLV, by sending a crafted lldp packet to the device, integer underflow would occur and the negative number will be passed to memcpy() later, which may cause buffer overflow or invalid memory access.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-20'],"['cpe:2.3:o:trendnet:ti-pg1284i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:ti-pg1284i:2.0r:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:ti-g102i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:trendnet:ti-g102i_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:ti-g160i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:trendnet:ti-g160i_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:ti-g642i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:trendnet:ti-g642i_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:ti-pg102i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:trendnet:ti-pg102i_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:ti-pg541i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:trendnet:ti-pg541i_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:ti-rp262i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:trendnet:ti-rp262i_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:teg-30102ws:-:*:*:*:*:*:*:*', 'cpe:2.3:o:trendnet:teg-30102ws_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:tpe-30102ws:-:*:*:*:*:*:*:*', 'cpe:2.3:o:trendnet:tpe-30102ws_firmware:-:*:*:*:*:*:*:*']",0,0
CVE-2021-33316,Trendnet,0.00226,9.8,0.0,1.0,0.0,1.0,1,2022-05-11,1.0,2021-05-24,,,1.0,"The TRENDnet TI-PG1284i switch(hw v2.0R) prior to version 2.0.2.S0 suffers from an integer underflow vulnerability. This vulnerability exists in its lldp related component. Due to lack of proper validation on length field of ChassisID TLV, by sending a crafted lldp packet to the device, integer underflow would occur and the negative number will be passed to memcpy() later, which may cause buffer overflow or invalid memory access.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-20'],"['cpe:2.3:o:trendnet:ti-pg1284i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:ti-pg1284i:2.0r:*:*:*:*:*:*:*', 'cpe:2.3:o:trendnet:ti-g102i_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:ti-g102i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:trendnet:ti-g160i_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:ti-g160i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:trendnet:ti-g642i_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:ti-g642i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:trendnet:ti-pg102i_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:ti-pg102i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:trendnet:ti-pg541i_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:ti-pg541i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:trendnet:ti-rp262i_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:ti-rp262i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:trendnet:teg-30102ws_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:teg-30102ws:-:*:*:*:*:*:*:*', 'cpe:2.3:o:trendnet:tpe-30102ws_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:tpe-30102ws:-:*:*:*:*:*:*:*']",0,0
CVE-2021-33317,Trendnet,0.00088,7.5,0.0,1.0,0.0,1.0,1,2022-05-11,1.0,2021-05-24,,,1.0,"The TRENDnet TI-PG1284i switch(hw v2.0R) prior to version 2.0.2.S0 suffers from a null pointer dereference vulnerability. This vulnerability exists in its lldp related component. Due to fail to check if ChassisID TLV is contained in the packet, by sending a crafted lldp packet to the device, an attacker can crash the process due to null pointer dereference.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-476'],"['cpe:2.3:o:trendnet:ti-pg1284i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:ti-pg1284i:2.0r:*:*:*:*:*:*:*', 'cpe:2.3:o:trendnet:ti-g102i_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:ti-g102i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:trendnet:ti-g160i_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:ti-g160i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:trendnet:ti-g642i_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:ti-g642i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:trendnet:ti-pg102i_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:ti-pg102i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:trendnet:ti-pg541i_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:ti-pg541i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:trendnet:ti-rp262i_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:ti-rp262i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:trendnet:teg-30102ws_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:teg-30102ws:-:*:*:*:*:*:*:*', 'cpe:2.3:o:trendnet:tpe-30102ws_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:tpe-30102ws:-:*:*:*:*:*:*:*']",0,0
CVE-2022-30325,Trendnet,0.00068,8.8,0.0,0.0,0.0,1.0,1,2022-06-16,1.0,2022-06-02,,,1.0,An issue was found on TRENDnet TEW-831DR 1.0 601.130.1.1356 devices. The default pre-shared key for the Wi-Fi networks is the same for every router except for the last four digits. The device default pre-shared key for both 2.4 GHz and 5 GHz networks can be guessed or brute-forced by an attacker within range of the Wi-Fi network.,CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-521'],"['cpe:2.3:o:trendnet:tew-831dr_firmware:1.0_601.130.1.1356:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:tew-831dr:-:*:*:*:*:*:*:*']",0,0
CVE-2022-33007,Trendnet,0.00081,8.8,0.0,1.0,0.0,1.0,1,2022-06-27,0.0,,0.0,,,TRENDnet Wi-Fi routers TEW751DR v1.03 and TEW-752DRU v1.03 were discovered to contain a stack overflow via the function genacgi_main.,CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-787'],"['cpe:2.3:o:trendnet:tew-752dru_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:tew-752dru:-:*:*:*:*:*:*:*', 'cpe:2.3:o:trendnet:tew-751dr_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:tew-751dr:-:*:*:*:*:*:*:*']",0,0
CVE-2022-37053,Trendnet,0.00214,9.8,0.0,1.0,0.0,1.0,1,2022-08-28,0.0,,0.0,,,TRENDnet TEW733GR v1.03B01 is vulnerable to Command injection via /htdocs/upnpinc/gena.php.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-94'],"['cpe:2.3:h:trendnet:tew733gr:-:*:*:*:*:*:*:*', 'cpe:2.3:o:trendnet:tew733gr_firmware:1.03b01:*:*:*:*:*:*:*']",0,0
CVE-2022-30326,Trendnet,0.0005,5.4,0.0,0.0,0.0,1.0,0,2022-06-16,1.0,2022-06-02,,,1.0,An issue was found on TRENDnet TEW-831DR 1.0 601.130.1.1356 devices. The network pre-shared key field on the web interface is vulnerable to XSS. An attacker can use a simple XSS payload to crash the basic.config page of the web interface.,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,LOW,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.3,2.7,['CWE-79'],"['cpe:2.3:o:trendnet:tew-831dr_firmware:1.0_601.130.1.1356:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:tew-831dr:-:*:*:*:*:*:*:*']",0,0
CVE-2022-30327,Trendnet,0.00069,6.5,0.0,0.0,0.0,1.0,0,2022-06-16,1.0,2022-06-02,,,1.0,An issue was found on TRENDnet TEW-831DR 1.0 601.130.1.1356 devices. The web interface is vulnerable to CSRF. An attacker can change the pre-shared key of the Wi-Fi router if the interface's IP address is known.,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,NONE,HIGH,NONE,MEDIUM,2.8,3.6,['CWE-352'],"['cpe:2.3:o:trendnet:tew-831dr_firmware:1.0_601.130.1.1356:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:tew-831dr:-:*:*:*:*:*:*:*']",0,0
CVE-2022-30328,Trendnet,0.00053,6.5,0.0,0.0,0.0,1.0,0,2022-06-16,1.0,2022-06-02,,,1.0,An issue was found on TRENDnet TEW-831DR 1.0 601.130.1.1356 devices. The username and password setup for the web interface does not require entering the existing password. A malicious user can change the username and password of the interface.,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,NONE,HIGH,NONE,MEDIUM,2.8,3.6,['CWE-352'],"['cpe:2.3:o:trendnet:tew-831dr_firmware:1.0_601.130.1.1356:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:tew-831dr:-:*:*:*:*:*:*:*']",0,0
CVE-2022-30329,Trendnet,0.00174,9.8,0.0,0.0,0.0,1.0,0,2022-06-16,1.0,2022-06-02,,,1.0,"An issue was found on TRENDnet TEW-831DR 1.0 601.130.1.1356 devices. An OS injection vulnerability exists within the web interface, allowing an attacker with valid credentials to execute arbitrary shell commands.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-78'],"['cpe:2.3:o:trendnet:tew-831dr_firmware:1.0_601.130.1.1356:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:tew-831dr:-:*:*:*:*:*:*:*']",0,0
CVE-2022-35203,Trendnet,0.00177,7.2,0.0,0.0,0.0,1.0,0,2022-08-23,0.0,,0.0,,,An access control issue in TrendNet TV-IP572PI v1.0 allows unauthenticated attackers to access sensitive system information.,CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.2,5.9,['CWE-287'],"['cpe:2.3:o:trendnet:tv-ip572pi_firmware:1.0:*:*:*:*:*:*:*', 'cpe:2.3:h:trendnet:tv-ip572pi:-:*:*:*:*:*:*:*']",0,0
CVE-2018-5390,HP,0.78302,7.5,0.0,0.0,1.0,0.0,1,2018-08-06,0.0,,0.0,,,Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-400'],"['cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_eus:6.4:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*', 'cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*', 'cpe:2.3:o:linux:linux_kernel:4.18:rc1:*:*:*:*:*:*', 'cpe:2.3:o:linux:linux_kernel:4.18:rc2:*:*:*:*:*:*', 'cpe:2.3:o:linux:linux_kernel:4.18:rc3:*:*:*:*:*:*', 'cpe:2.3:o:linux:linux_kernel:4.18:rc4:*:*:*:*:*:*', 'cpe:2.3:o:linux:linux_kernel:4.18:rc5:*:*:*:*:*:*', 'cpe:2.3:o:linux:linux_kernel:4.18:rc6:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*', 'cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*', 'cpe:2.3:a:hp:aruba_airwave_amp:*:*:*:*:*:*:*:*', 'cpe:2.3:a:hp:aruba_clearpass_policy_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:hp:aruba_clearpass_policy_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_access_policy_manager:14.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_advanced_firewall_manager:14.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_analytics:14.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_application_acceleration_manager:14.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_application_security_manager:14.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_domain_name_system:14.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_edge_gateway:14.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_fraud_protection_service:14.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_global_traffic_manager:14.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_link_controller:14.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_local_traffic_manager:14.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_policy_enforcement_manager:14.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:big-ip_webaccelerator:14.0.0:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:traffix_systems_signaling_delivery_controller:*:*:*:*:*:*:*:*', 'cpe:2.3:a:f5:traffix_systems_signaling_delivery_controller:4.4.0:*:*:*:*:*:*:*', 'cpe:2.3:o:a10networks:advanced_core_operating_system:3.2.2:*:*:*:*:*:*:*', 'cpe:2.3:o:a10networks:advanced_core_operating_system:3.2.2:p5:*:*:*:*:*:*', 'cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.0:*:*:*:*:*:*:*', 'cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.0:p11:*:*:*:*:*:*', 'cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.1:p8:*:*:*:*:*:*', 'cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.2:*:*:*:*:*:*:*', 'cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.2:p4:*:*:*:*:*:*', 'cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:*:*:*:*:*:*:*', 'cpe:2.3:o:a10networks:advanced_core_operating_system:4.1.4:p1:*:*:*:*:*:*', 'cpe:2.3:a:cisco:collaboration_meeting_rooms:1.0:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:digital_network_architecture_center:1.2:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:expressway:x8.10:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:expressway:x8.10.1:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:expressway:x8.10.2:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:expressway:x8.10.3:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:expressway:x8.10.4:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:expressway:x8.11:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:expressway_series:-:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:meeting_management:1.0:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:meeting_management:1.0.1:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:network_assurance_engine:2.1\\(1a\\):*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:threat_grid-cloud:-:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:webex_hybrid_data_security:-:*:*:*:*:*:*:*', 'cpe:2.3:a:cisco:webex_video_mesh:-:*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10:*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10.1:*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10.2:*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10.3:*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.10.4:*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:telepresence_video_communication_server_firmware:x8.11:*:*:*:*:*:*:*', 'cpe:2.3:h:cisco:telepresence_video_communication_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3:*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3.1:*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3.2:*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3.3:*:*:*:*:*:*:*', 'cpe:2.3:o:cisco:telepresence_conductor_firmware:xc4.3.4:*:*:*:*:*:*:*', 'cpe:2.3:h:cisco:telepresence_conductor:-:*:*:*:*:*:*:*']",0,0
CVE-2018-7094,HP,0.00044,5.5,0.0,0.0,0.0,1.0,1,2018-08-14,1.0,2018-09-19,,,0.0,A security vulnerability was identified in 3PAR Service Processor (SP) prior to SP-5.0.0.0-22913(GA). The vulnerability may be exploited locally to allow disclosure of privileged information.,CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.8,3.6,['NVD-CWE-noinfo'],['cpe:2.3:o:hpe:3par_service_provider:*:*:*:*:*:*:*:*'],0,0
CVE-2018-7107,HP,0.00083,8.8,0.0,0.0,1.0,0.0,1,2018-09-27,1.0,2018-09-17,,,1.0,"A potential security vulnerability has been identified in HPE Device Entitlement Gateway (DEG) v3.2.4, v3.3 and v3.3.1. The vulnerability could be remotely exploited to allow local SQL injection and elevation of privilege.",CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-89'],"['cpe:2.3:a:hpe:device_entitlement_gateway:3.2.4:*:*:*:*:*:*:*', 'cpe:2.3:a:hpe:device_entitlement_gateway:3.3:*:*:*:*:*:*:*', 'cpe:2.3:a:hpe:device_entitlement_gateway:3.3.1:*:*:*:*:*:*:*']",0,0
CVE-2018-7170,HP,0.00144,5.3,0.0,0.0,1.0,0.0,1,2018-03-06,1.0,2019-10-31,,,0.0,ntpd in ntp 4.2.x before 4.2.8p7 and 4.3.x before 4.3.92 allows authenticated users that know the private symmetric key to create arbitrarily-many ephemeral associations in order to win the clock selection of ntpd and modify a victim's clock via a Sybil attack. This issue exists because of an incomplete fix for CVE-2016-1549.,CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N,NETWORK,HIGH,LOW,NONE,UNCHANGED,NONE,HIGH,NONE,MEDIUM,1.6,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p4:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p5:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p6:*:*:*:*:*:*', 'cpe:2.3:a:synology:diskstation_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:router_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:skynas:*:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:virtual_diskstation_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:o:synology:vs960hd_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:hci:-:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*', 'cpe:2.3:a:hpe:hpux-ntp:*:*:*:*:*:*:*:*']",0,0
CVE-2018-7185,HP,0.03268,7.5,0.0,0.0,1.0,0.0,1,2018-03-06,1.0,2019-10-31,,,0.0,"The protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the ""other side"" of an interleaved association causing the victim ntpd to reset its association.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p10:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p4:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p5:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p6:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p7:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p8:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p9:*:*:*:*:*:*', 'cpe:2.3:a:synology:diskstation_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:router_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:skynas:*:*:*:*:*:*:*:*', 'cpe:2.3:a:synology:virtual_diskstation_manager:*:*:*:*:*:*:*:*', 'cpe:2.3:o:synology:vs960hd_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*', 'cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*', 'cpe:2.3:a:netapp:hci:-:*:*:*:*:*:*:*', 'cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*', 'cpe:2.3:a:hpe:hpux-ntp:*:*:*:*:*:*:*:*', 'cpe:2.3:o:oracle:fujitsu_m10-1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:oracle:fujitsu_m10-1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:oracle:fujitsu_m10-4_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:oracle:fujitsu_m10-4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:oracle:fujitsu_m10-4s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:oracle:fujitsu_m10-4s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:oracle:fujitsu_m12-1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:oracle:fujitsu_m12-1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:oracle:fujitsu_m12-2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:oracle:fujitsu_m12-2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:oracle:fujitsu_m12-2s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:oracle:fujitsu_m12-2s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:oracle:fujitsu_m10-1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:oracle:fujitsu_m10-1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:oracle:fujitsu_m10-4_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:oracle:fujitsu_m10-4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:oracle:fujitsu_m10-4s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:oracle:fujitsu_m10-4s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:oracle:fujitsu_m12-1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:oracle:fujitsu_m12-1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:oracle:fujitsu_m12-2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:oracle:fujitsu_m12-2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:oracle:fujitsu_m12-2s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:oracle:fujitsu_m12-2s:-:*:*:*:*:*:*:*']",0,0
CVE-2020-24627,HP,0.00054,5.4,0.0,1.0,0.0,0.0,1,2020-10-02,1.0,2020-10-01,,,1.0,A remote stored xss vulnerability was discovered in HPE KVM IP Console Switches version(s): G2 4x1Ex32 Prior to 2.8.3.,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,LOW,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.3,2.7,['CWE-79'],"['cpe:2.3:o:hpe:kvm_ip_console_switch_g2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:kvm_ip_console_switch_g2:4x1ex32:*:*:*:*:*:*:*']",0,0
CVE-2020-24628,HP,0.00183,8.8,0.0,1.0,0.0,0.0,1,2020-10-02,1.0,2020-10-01,,,1.0,A remote code injection vulnerability was discovered in HPE KVM IP Console Switches version(s): G2 4x1Ex32 Prior to 2.8.3.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-94'],"['cpe:2.3:o:hpe:kvm_ip_console_switch_g2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:kvm_ip_console_switch_g2:4x1ex32:*:*:*:*:*:*:*']",0,0
CVE-2021-25141,HP,0.00042,4.4,0.0,1.0,0.0,0.0,1,2021-02-09,1.0,2021-02-02,,,1.0,A security vulnerability has been identified in in certain HPE and Aruba L2/L3 switch firmware. A data processing error due to improper handling of an unexpected data type in user supplied information to the switch's management interface has been identified. The data processing error could be exploited to cause a crash or reboot in the switch management interface and/or possibly the switch itself leading to local denial of service (DoS). The user must have administrator privileges to exploit this vulnerability.,CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H,LOCAL,LOW,HIGH,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,0.8,3.6,['NVD-CWE-Other'],"['cpe:2.3:o:arubanetworks:aruba_5406r_zl2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:arubanetworks:aruba_5406r_zl2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:arubanetworks:aruba_5412r_zl2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:arubanetworks:aruba_5412r_zl2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:arubanetworks:aruba_3810m_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:arubanetworks:aruba_3810m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:arubanetworks:aruba_2930m_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:arubanetworks:aruba_2930m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:arubanetworks:aruba_2930f_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:arubanetworks:aruba_2930f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:arubanetworks:aruba_2920_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:arubanetworks:aruba_2920:-:*:*:*:*:*:*:*', 'cpe:2.3:o:arubanetworks:aruba_2540_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:arubanetworks:aruba_2540:-:*:*:*:*:*:*:*', 'cpe:2.3:h:arubanetworks:aruba_2530ya:-:*:*:*:*:*:*:*', 'cpe:2.3:o:arubanetworks:aruba_2530ya_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:arubanetworks:aruba_3800_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:arubanetworks:aruba_3800:-:*:*:*:*:*:*:*', 'cpe:2.3:o:arubanetworks:aruba_2620_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:arubanetworks:aruba_2620:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:8200_zl_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:8200_zl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:6200_yl_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:6200_yl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:3500_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:3500:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:3500_yl_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:3500_yl:-:*:*:*:*:*:*:*', 'cpe:2.3:o:arubanetworks:aruba_2530yb_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:arubanetworks:aruba_2530yb:-:*:*:*:*:*:*:*']",0,0
CVE-2022-23702,HP,0.00044,6.7,0.0,1.0,0.0,1.0,1,2022-04-12,1.0,2022-04-04,,,1.0,"A potential security vulnerability has been identified in HPE Superdome Flex and Superdome Flex 280 Servers. The vulnerability could be locally exploited to allow an user with Administrator access to escalate their privilege. The vulnerability is resolved in the latest firmware update. HPE Superdome Flex Server Version 3.50.58 or later, HPE Superdome Flex 280 Server Version 1.20.204 or later.",CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.8,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:hpe:superdome_flex_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:superdome_flex_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:superdome_flex_280_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:superdome_flex_280_server:-:*:*:*:*:*:*:*']",0,0
CVE-2016-4370,HP,0.00126,8.8,0.0,0.0,1.0,0.0,0,2016-06-09,0.0,,0.0,,,HPE Project and Portfolio Management Center (PPM) 9.2x and 9.3x before 9.32.0002 allows remote authenticated users to execute arbitrary commands or obtain sensitive information via unspecified vectors.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:a:hpe:project_and_portfolio_management_center:9.20:*:*:*:*:*:*:*', 'cpe:2.3:a:hpe:project_and_portfolio_management_center:9.21:*:*:*:*:*:*:*', 'cpe:2.3:a:hpe:project_and_portfolio_management_center:9.22:*:*:*:*:*:*:*', 'cpe:2.3:a:hpe:project_and_portfolio_management_center:9.30:*:*:*:*:*:*:*', 'cpe:2.3:a:hpe:project_and_portfolio_management_center:9.31:*:*:*:*:*:*:*', 'cpe:2.3:a:hpe:project_and_portfolio_management_center:9.32:*:*:*:*:*:*:*']",0,0
CVE-2016-7434,HP,0.96455,7.5,1.0,0.0,1.0,0.0,0,2017-01-13,1.0,2017-03-09,,,0.0,The read_mru_list function in NTP before 4.2.8p9 allows remote attackers to cause a denial of service (crash) via a crafted mrulist query.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-20'],"['cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p100:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p101:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p102:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p103:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p104:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p105:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p106:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p107:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p108:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p109:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p110:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p111:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p112:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p113:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p114:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p115:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p116:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p117:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p118:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p119:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p120:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p121:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p122:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p123:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p124:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p125:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p126:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p127:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p128:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p129:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p130:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p131:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p132:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p133:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p134:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p135:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p136:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p137:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p138:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p139:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p140:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p141:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p142:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p143:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p144:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p145:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p146:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p147:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p148:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p149:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p150:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p151:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p152:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p153:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p154:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p155:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p156:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p157:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p158:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p159:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p160:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p161:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p162:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p163:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p164:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p165:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p166:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p170:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p171:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p172:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p173:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p174:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p175:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p176:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p177:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p178:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p179:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p180:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p181:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p182:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p183:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p184:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p185:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p186:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p187:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p188:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p189:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p190:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p191:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p192:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p193:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p194:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p195:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p196:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p197:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p198:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p199:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p200:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p201:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p202:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p203:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p204:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p205:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p206:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p207:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p208:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p209:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p210:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p211:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p212:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p213:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p214:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p215:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p216:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p217:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p218:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p219:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p22:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p220:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p221:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p222:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p223:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p224:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p225:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p226:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p227:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p228:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p229:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p23:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p230:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p231:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p232:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p233:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p234:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p235:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p236:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p237:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p238:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p239:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p24:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p240:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p241:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p242:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p243:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p244:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p245:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p246:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p247:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p248:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p249:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p25:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p250:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p251:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p252:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p253:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p254:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p255:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p256:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p257:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p258:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p259:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p26:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p260:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p261:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p262:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p263:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p264:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p265:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p266:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p267:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p268:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p269:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p27:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p270:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p271:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p272:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p273:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p274:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p275:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p276:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p277:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p278:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p279:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p28:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p280:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p281:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p282:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p283:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p284:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p285:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p286:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p287:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p288:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p289:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p29:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p290:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p291:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p292:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p293:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p294:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p295:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p296:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p297:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p298:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p299:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p30:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p300:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p301:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p302:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p303:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p304:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p305:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p306:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p307:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p308:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p309:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p31:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p310:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p311:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p312:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p313:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p314:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p315:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p316:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p317:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p318:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p319:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p32:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p320:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p321:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p322:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p323:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p324:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p325:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p326:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p327:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p328:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p329:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p33:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p330:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p331:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p332:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p333:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p334:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p335:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p336:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p337:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p338:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p339:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p34:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p340:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p341:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p342:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p343:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p344:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p345:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p346:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p347:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p348:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p349:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p35:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p350:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p351:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p352:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p353:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p354:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p355:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p356:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p357:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p358:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p359:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p36:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p360:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p361:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p362:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p363:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p364:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p365:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p366:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p367:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p368:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p369:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p37:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p370:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p371:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p372:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p373:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p374:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p375:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p376:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p377:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p378:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p379:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p38:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p380:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p381:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p382:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p383:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p384:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p385:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p386:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p387:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p388:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p389:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p39:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p390:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p391:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p392:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p393:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p394:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p395:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p396:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p397:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p398:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p399:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p4:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p40:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p400:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p401:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p402:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p403:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p404:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p405:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p406:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p407:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p408:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p409:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p41:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p410:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p411:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p412:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p413:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p414:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p415:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p416:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p417:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p418:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p419:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p42:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p420:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p421:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p422:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p423:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p424:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p425:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p426:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p427:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p428:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p429:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p43:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p430:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p431:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p432:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p433:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p434:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p435:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p436:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p437:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p438:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p439:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p44:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p440:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p441:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p442:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p443:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p444:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p445:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p446:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p447:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p448:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p449:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p45:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p450:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p451:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p452:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p453:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p454:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p455:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p456:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p457:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p458:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p459:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p46:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p460:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p461:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p462:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p463:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p464:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p465:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p466:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p467:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p468:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p469:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p47:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p470:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p471:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p472:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p473:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p474:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p475:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p476:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p477:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p478:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p479:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p48:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p480:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p481:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p482:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p483:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p484_rc1:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p485_rc1:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p486_rc1:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p49:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p5:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p50:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p51:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p52:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p53:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p54:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p55:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p56:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p57:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p58:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p59:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p6:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p60:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p61:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p62:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p63:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p64:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p65:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p66:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p67:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p68:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p69:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p7:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p70:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p71:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p72:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p73:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p74:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p75:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p76:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p77:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p78:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p79:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p8:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p80:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p81:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p82:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p83:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p84:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p85:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p86:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p87:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p88:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p89:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p9:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p90:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p91:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p92:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p93:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p94:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p95:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p96:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p97:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p98:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.7:p99:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p4:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p5:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p6:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p7:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p8:*:*:*:*:*:*', 'cpe:2.3:a:hpe:hpux-ntp:*:*:*:*:*:*:*:*']",1,1
CVE-2016-9042,HP,0.01865,5.9,0.0,0.0,1.0,0.0,0,2018-06-04,1.0,2019-10-31,,,0.0,An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate replies from targeted peers will fail the origin timestamp check (TEST2) causing the reply to be dropped and creating a denial of service condition.,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,HIGH,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.2,3.6,['CWE-20'],"['cpe:2.3:a:ntp:ntp:4.2.8:p9:*:*:*:*:*:*', 'cpe:2.3:o:freebsd:freebsd:10.0:*:*:*:*:*:*:*', 'cpe:2.3:o:freebsd:freebsd:11.0:*:*:*:*:*:*:*', 'cpe:2.3:a:hpe:hpux-ntp:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_net_cp_443-1_opc_ua_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_net_cp_443-1_opc_ua:-:*:*:*:*:*:*:*']",0,0
CVE-2017-6458,HP,0.00494,8.8,0.0,0.0,1.0,0.0,0,2017-03-27,1.0,2019-10-31,,,0.0,Multiple buffer overflows in the ctl_put* functions in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allow remote authenticated users to have unspecified impact via a long variable.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-119'],"['cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p4:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p5:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p6:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p7:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p8:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p9:*:*:*:*:*:*', 'cpe:2.3:a:hpe:hpux-ntp:*:*:*:*:*:*:*:*', 'cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*', 'cpe:2.3:o:siemens:simatic_net_cp_443-1_opc_ua_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:siemens:simatic_net_cp_443-1_opc_ua:-:*:*:*:*:*:*:*']",0,0
CVE-2018-7108,HP,0.0012,5.9,0.0,0.0,1.0,0.0,0,2018-09-27,1.0,2018-09-20,,,1.0,HPE StorageWorks XP7 Automation Director (AutoDir) version 8.5.2-02 to earlier than 8.6.1-00 has a local and remote authentication bypass vulnerability that exposed the user authentication information of the storage system. This problem sometimes occurred under specific conditions when running a service template.,CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,HIGH,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,2.2,3.6,['CWE-287'],['cpe:2.3:a:hpe:storageworks_xp7_automation_director:*:*:*:*:*:*:*:*'],0,0
CVE-2018-7110,HP,0.00168,5.9,0.0,0.0,1.0,0.0,0,2018-10-17,1.0,2018-09-26,,,1.0,"A remote unauthorized disclosure of information vulnerability was identified in HPE Service Governance Framework (SGF) version 4.2, 4.3. A race condition under high load in SGF exists where SGF transferred different parameter to the enabler.",CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,HIGH,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,2.2,3.6,['CWE-362'],"['cpe:2.3:a:hpe:service_governance_framework:4.2:*:*:*:*:*:*:*', 'cpe:2.3:a:hpe:service_governance_framework:4.3:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*', 'cpe:2.3:o:redhat:linux:7.0:*:*:*:*:*:*:*']",0,0
CVE-2019-11136,HP,0.00044,6.7,0.0,1.0,0.0,1.0,0,2019-11-14,1.0,2019-11-20,,,0.0,"Insufficient access control in system firmware for Intel(R) Xeon(R) Scalable Processors, 2nd Generation Intel(R) Xeon(R) Scalable Processors and Intel(R) Xeon(R) Processors D Family may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access.",CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.8,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:intel:xeon_platinum_8253_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8256_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8260_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8276_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8276m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8276m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8276l_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8280l_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8260l_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8280m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8280m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8260m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8260m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8280_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8260y_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8268_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8270_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8274_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8274:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8284_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8284:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_9242_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_9282_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8153_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8153:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8156_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8156:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8158_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8158:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8176_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8176:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8160_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8160:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8164_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8164:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8168_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8168:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8170_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8170:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8180_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8180:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8160t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8160t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8160f_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8160f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8176f_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8176f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6210u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6244_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6212u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6240_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5218_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6230_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5222_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6238t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6248_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6252_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6242_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6240y_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5217_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6238m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6238m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5218n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6226_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6254_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5220_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6238l_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5218b_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6240l_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6238_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6240m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6240m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5220s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5215_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6222v_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6252n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5215m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5215m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6246_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5215l_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5218t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5220t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6209u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6262v_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5122_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5122:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6138_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6138:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6148_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6148:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5120t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5120t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6136_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6136:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6150_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6150:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6152_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6152:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6130_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6130:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6128_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6128:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5118_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5118:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6134_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6134:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6126_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6126:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5120_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5120:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5115_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5115:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6154_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6154:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6140_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6140:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6140m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6140m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6132_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6132:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6138t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6138t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6142f_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6142f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6130t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6130t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6138f_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6138f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6130f_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6130f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6126t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6126t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6126f_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6126f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6148f_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6148f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6146_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6146:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6144_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6144:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_silver_4209t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_silver_4210_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_silver_4214_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_silver_4214y_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_silver_4215_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_silver_4208_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_silver_4216_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_silver_4116_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4116:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_silver_4109t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4109t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_silver_4114_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4114:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_silver_4112_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4112:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_silver_4108_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4108:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_silver_4110_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4110:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_bronze_3204_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_bronze_3106_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_bronze_3104_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1602_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1602:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1653n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1653n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1622_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1622:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1623n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1623n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1627_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1627:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1637_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1637:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1633n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1633n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1649n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1649n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2141i_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2177nt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2161i_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2143it_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2146nt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2145nt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2123it_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2173it_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2191_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2191:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2187nt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2142it_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2163it_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2183it_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2166nt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1533n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1533n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1513n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1513n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1543n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1543n:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1523n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1523n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1553n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1553n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1539:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1539_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1529:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1529_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1559:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1559_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1557:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1557_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1567:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1567_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1577:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1577_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1571_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1571:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1528_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1528:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1541_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1541:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1518_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1518:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1521_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1521:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1531_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1531:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1548_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1548:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1527_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1527:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1537_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1537:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1520_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1520:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1540_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1540:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2699a_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2699a_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4627_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4627_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4610_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4610_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4620_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4620_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4628l_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4628l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4660_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4660_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4640_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4640_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4669_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4669_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4667_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4667_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4655_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4655_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4650_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4650_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-1660_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1660_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-1630_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1630_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-1620_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1620_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-1680_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1680_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-1650_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1650_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2687w_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2687w_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2695_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2695_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2690_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2690_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2699_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2699_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2650l_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2650l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2658_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2658_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2698_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2698_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2660_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2660_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2680_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2680_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2697_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2697_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2683_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2683_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2628l_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2628l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2650_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2650_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2697a_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2697a_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2648l_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2648l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2620_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2620_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2630l_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2630l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2608l_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2608l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2667_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2667_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2643_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2643_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2623_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2623_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2609_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2609_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2630_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2630_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2618l_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2618l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2637_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2637_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2603_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2603_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2640_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2640_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8894_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8894_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8893_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8893_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8891_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8891_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8890_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8890_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8880_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8880_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8870_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8870_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8867_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8867_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8860_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8860_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-4850_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-4850_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-4830_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-4830_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-4820_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-4820_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-4809_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-4809_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3308_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3308:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3336_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3336:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3338_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3338:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3508_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3508:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3538_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3538:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3558_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3558:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3708_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3708:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3750_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3750:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3758_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3758:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3808_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3808:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3850_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3850:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3858_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3858:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3830_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3830:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3950_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3950:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3955_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3955:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3958_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3958:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2758_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2758:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2738_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2738:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2718_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2718:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2558_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2558:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2538_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2538:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2518_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2518:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2508_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2508:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2358_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2358:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2338_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2338:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2308_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2308:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2750_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2750:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2730_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2730:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2550_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2550:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2530_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2530:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2516_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2516:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2350_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2350:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2316_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2316:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:apollo_4200_gen10_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:apollo_4200_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_bl460c_gen10_server_blade_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl580_gen10_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl560_gen10_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl380_gen10_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl360_gen10_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl180_gen10_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl160_gen10_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl120_gen10_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl120_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_ml350_gen10_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_ml110_gen10_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_xl450_gen10_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_xl270d_gen10_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_xl230k_gen10_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_xl190r_gen10_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_xl170r_gen10_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_e910_server_blade_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:synergy_660_gen10_compute_module_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:synergy_660_gen10_compute_module:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:synergy_480_gen10_compute_module_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:synergy_480_gen10_compute_module:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_bl660c_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_bl660c_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_bl460c_gen9_server_blade_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_bl460c_gen9_server_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl580_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl580_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl560_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl560_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl380_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl380_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl360_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl360_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl180_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl180_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl160_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl160_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl120_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl120_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl80_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl80_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl60_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl60_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_xl730f_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl730f_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_xl450_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl450_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_xl250a_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl250a_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_xl230a_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl230a_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_xl190r_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl190r_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_xl170r_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl170r_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:synergy_680_gen9_compute_module_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:synergy_680_gen9_compute_module:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:synergy_620_gen9_compute_module_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:synergy_620_gen9_compute_module:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:synergy_480_gen9_compute_module_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:synergy_480_gen9_compute_module:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_ml150_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ml150_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_ml110_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ml110_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:apollo_4200_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:apollo_4200_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_ml350_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ml350_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_ws460c_gen9_graphics_server_blade_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ws460c_gen9_graphics_server_blade:-:*:*:*:*:*:*:*']",0,0
CVE-2019-11137,HP,0.00044,8.2,0.0,1.0,0.0,1.0,0,2019-11-14,1.0,2019-11-20,,,0.0,"Insufficient input validation in system firmware for Intel(R) Xeon(R) Scalable Processors, Intel(R) Xeon(R) Processors D Family, Intel(R) Xeon(R) Processors E5 v4 Family, Intel(R) Xeon(R) Processors E7 v4 Family and Intel(R) Atom(R) processor C Series may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access.",CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H,LOCAL,LOW,HIGH,NONE,CHANGED,HIGH,HIGH,HIGH,HIGH,1.5,6.0,['CWE-20'],"['cpe:2.3:o:intel:xeon_platinum_8253_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8256_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8260_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8276_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8276m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8276m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8276l_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8280l_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8260l_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8280m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8280m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8260m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8260m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8280_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8260y_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8268_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8270_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8274_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8274:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8284_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8284:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_9242_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_9282_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8153_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8153:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8156_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8156:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8158_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8158:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8176_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8176:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8160_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8160:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8164_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8164:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8168_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8168:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8170_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8170:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8180_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8180:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8160t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8160t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8160f_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8160f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_platinum_8176f_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_platinum_8176f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6210u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6244_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6212u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6240_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5218_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6230_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5222_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6238t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6248_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6252_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6242_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6240y_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5217_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6238m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6238m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5218n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6226_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6254_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5220_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6238l_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5218b_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6240l_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6238_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6240m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6240m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5220s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5215_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6222v_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6252n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5215m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5215m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6246_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5215l_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5218t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5220t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6209u_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6262v_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5122_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5122:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6138_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6138:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6148_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6148:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5120t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5120t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6136_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6136:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6150_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6150:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6152_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6152:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6130_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6130:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6128_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6128:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5118_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5118:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6134_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6134:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6126_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6126:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5120_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5120:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_5115_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_5115:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6154_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6154:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6140_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6140:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6140m_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6140m:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6132_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6132:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6138t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6138t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6142f_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6142f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6130t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6130t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6138f_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6138f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6130f_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6130f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6126t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6126t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6126f_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6126f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6148f_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6148f:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6146_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6146:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_gold_6144_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_gold_6144:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_silver_4209t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_silver_4210_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_silver_4214_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_silver_4214y_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_silver_4215_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_silver_4208_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_silver_4216_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_silver_4116_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4116:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_silver_4109t_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4109t:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_silver_4114_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4114:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_silver_4112_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4112:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_silver_4108_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4108:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_silver_4110_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_silver_4110:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_bronze_3204_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_bronze_3106_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_bronze_3104_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1602_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1602:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1653n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1653n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1622_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1622:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1623n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1623n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1627_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1627:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1637_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1637:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1633n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1633n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1649n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1649n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2141i_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2177nt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2161i_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2143it_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2146nt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2145nt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2123it_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2173it_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2191_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2191:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2187nt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2142it_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2163it_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2183it_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-2166nt_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1533n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1533n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1513n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1513n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1543n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1543n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1523n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1523n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1553n_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1553n:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1539_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1539:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1529_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1529:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1559_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1559:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1557_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1557:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1567_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1567:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1577_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1577:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1571_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1571:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1528_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1528:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1541_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1541:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1518_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1518:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1521_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1521:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1531_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1531:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1548_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1548:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1527_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1527:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1537_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1537:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1520_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1520:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_d-1540_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_d-1540:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2699a_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2699a_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4627_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4627_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4610_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4610_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4620_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4620_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4628l_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4628l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4660_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4660_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4640_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4640_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4669_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4669_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4667_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4667_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4655_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4655_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-4650_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-4650_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-1660_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1660_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-1630_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1630_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-1620_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1620_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-1680_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1680_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-1650_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-1650_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2687w_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2687w_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2695_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2695_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2690_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2690_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2699_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2699_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2650l_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2650l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2658_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2658_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2698_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2698_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2660_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2660_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2680_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2680_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2697_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2697_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2683_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2683_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2628l_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2628l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2650_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2650_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2697a_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2697a_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2648l_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2648l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2620_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2620_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2630l_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2630l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2608l_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2608l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2667_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2667_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2643_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2643_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2623_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2623_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2609_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2609_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2630_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2630_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2618l_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2618l_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2637_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2637_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2603_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2603_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e5-2640_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e5-2640_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8894_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8894_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8893_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8893_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8891_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8891_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8890_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8890_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8880_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8880_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8870_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8870_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8867_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8867_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-8860_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-8860_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-4850_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-4850_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-4830_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-4830_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-4820_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-4820_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:xeon_e7-4809_v4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:xeon_e7-4809_v4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3308_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3308:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3336_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3336:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3338_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3338:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3508_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3508:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3538_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3538:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3558_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3558:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3708_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3708:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3750_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3750:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3758_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3758:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3808_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3808:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3850_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3850:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3858_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3858:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3830_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3830:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3950_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3950:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3955_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3955:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c3958_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c3958:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2758_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2758:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2738_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2738:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2718_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2718:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2558_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2558:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2538_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2538:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2518_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2518:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2508_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2508:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2358_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2358:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2338_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2338:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2308_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2308:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2750_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2750:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2730_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2730:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2550_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2550:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2530_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2530:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2516_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2516:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2350_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2350:-:*:*:*:*:*:*:*', 'cpe:2.3:o:intel:atom_c2316_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:intel:atom_c2316:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:apollo_4200_gen10_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:apollo_4200_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_bl460c_gen10_server_blade_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl580_gen10_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl560_gen10_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl380_gen10_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl360_gen10_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl180_gen10_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl160_gen10_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl120_gen10_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl120_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_ml350_gen10_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_ml110_gen10_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_xl450_gen10_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_xl270d_gen10_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_xl230k_gen10_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_xl190r_gen10_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_xl170r_gen10_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_e910_server_blade_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:synergy_660_gen10_compute_module_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:synergy_660_gen10_compute_module:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:synergy_480_gen10_compute_module_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:synergy_480_gen10_compute_module:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_bl660c_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_bl660c_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_bl460c_gen9_server_blade_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_bl460c_gen9_server_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl580_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl580_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl560_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl560_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl380_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl380_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl360_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl360_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl180_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl180_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl160_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl160_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl120_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl120_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl80_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl80_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_dl60_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl60_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_xl730f_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl730f_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_xl450_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl450_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_xl250a_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl250a_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_xl230a_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl230a_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_xl190r_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl190r_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_xl170r_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl170r_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:synergy_680_gen9_compute_module_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:synergy_680_gen9_compute_module:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:synergy_620_gen9_compute_module_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:synergy_620_gen9_compute_module:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:synergy_480_gen9_compute_module_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:synergy_480_gen9_compute_module:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_ml150_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ml150_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_ml110_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ml110_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:apollo_4200_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:apollo_4200_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_ml350_gen9_server_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ml350_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:proliant_ws460c_gen9_graphics_server_blade_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ws460c_gen9_graphics_server_blade:-:*:*:*:*:*:*:*']",0,0
CVE-2019-11987,HP,0.00044,7.8,0.0,0.0,1.0,0.0,0,2019-06-05,1.0,2019-05-31,,,1.0,A security vulnerability in HPE Smart Update Manager (SUM) prior to v8.4 could allow local unauthorized elevation of privilege.,CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['NVD-CWE-noinfo'],['cpe:2.3:a:hpe:smart_update_manager:*:*:*:*:*:*:*:*'],0,0
CVE-2019-11996,HP,0.00222,9.8,0.0,1.0,0.0,1.0,0,2019-11-07,1.0,2019-11-05,,,1.0,"Potential security vulnerabilities have been identified with HPE Nimble Storage systems in multi array group configurations. The vulnerabilities could be exploited by an attacker to gain elevated privileges on the array. The following NimbleOS versions, and all subsequent releases, contain a software fix for this vulnerability: 3.9.2.0, 4.5.5.0, 5.0.8.0 and 5.1.3.0.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:h:hpe:nimble_storage_af20_all_flash_array:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:nimble_storage_af20q_all_flash_dual_controller:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:nimble_storage_af40_all_flash_dual_controller:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:nimble_storage_af60_all_flash_dual_controller:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:nimble_storage_af80_all_flash_dual_controller:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:nimble_storage_cs3000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:nimble_storage_cs5000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:nimble_storage_cs7000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:nimble_storage_secondary_flash_arrays:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:nimbleos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:nimbleos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:nimbleos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:nimbleos:*:*:*:*:*:*:*:*']",0,0
CVE-2019-11998,HP,0.00044,5.5,0.0,1.0,0.0,0.0,0,2020-01-16,1.0,2020-01-29,,,0.0,"HPE Superdome Flex Server is vulnerable to multiple remote vulnerabilities via improper input validation of administrator commands. This vulnerability could allow an Administrator to bypass security restrictions and access multiple remote vulnerabilities including information disclosure, or denial of service. HPE has provided firmware updates that address the above vulnerabilities for the HPE Superdome Flex Server starting with firmware version v3.20.186 (not available online) and v3.20.206 (available online). Apply v3.20.206 (4 December 2019) or a newer version to resolve this issue. Please visit HPE Support Center https://support.hpe.com/hpesc/public/home to obtain the updated firmware for your product.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.8,3.6,['CWE-20'],"['cpe:2.3:h:hpe:superdome_flex_server:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:superdome_flex_server_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2019-8936,HP,0.00522,7.5,0.0,0.0,1.0,0.0,0,2019-05-15,1.0,2019-10-31,,,0.0,NTP through 4.2.8p12 has a NULL Pointer Dereference.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-476'],"['cpe:2.3:o:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*', 'cpe:2.3:o:netapp:data_ontap:-:*:*:*:*:7-mode:*:*', 'cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*', 'cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*', 'cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*', 'cpe:2.3:a:hpe:hpux-ntp:*:*:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p10:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p11:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p12:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p4:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p5:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p6:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p7:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p8:*:*:*:*:*:*', 'cpe:2.3:a:ntp:ntp:4.2.8:p9:*:*:*:*:*:*']",0,0
CVE-2020-24623,HP,0.00236,6.5,0.0,0.0,1.0,0.0,0,2020-09-18,1.0,2020-09-14,,,1.0,A potential security vulnerability has been identified in Hewlett Packard Enterprise Universal API Framework. The vulnerability could be remotely exploited to allow SQL injection in HPE Universal API Framework for VMware Esxi v2.5.2 and HPE Universal API Framework for Microsoft Hyper-V (VHD).,CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,2.8,3.6,['CWE-89'],"['cpe:2.3:a:hpe:universal_api_framework:*:*:*:*:*:microsoft_hyper-v:*:*', 'cpe:2.3:a:hpe:universal_api_framework:*:*:*:*:*:vmware_esxi:*:*']",0,0
CVE-2020-24624,HP,0.01437,7.5,0.0,0.0,1.0,0.0,0,2020-09-23,0.0,,1.0,2020-09-17,,Unathenticated directory traversal in the DownloadServlet class execute() method can lead to arbitrary file reads in HPE Pay Per Use (PPU) Utility Computing Service (UCS) Meter version 1.9.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-22'],['cpe:2.3:a:hpe:utility_computing_service_meter:1.9:*:*:*:pay_per_use:*:*:*'],0,0
CVE-2020-24626,HP,0.01441,9.8,0.0,0.0,1.0,0.0,0,2020-09-23,0.0,,1.0,2020-09-17,,Unathenticated directory traversal in the ReceiverServlet class doPost() method can lead to arbitrary remote code execution in HPE Pay Per Use (PPU) Utility Computing Service (UCS) Meter version 1.9.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-22'],['cpe:2.3:a:hpe:utility_computing_service_meter:1.9:*:*:*:pay_per_use:*:*:*'],0,0
CVE-2020-7136,HP,0.26248,9.8,0.0,0.0,1.0,0.0,0,2020-04-30,1.0,2020-04-29,,,1.0,A security vulnerability in HPE Smart Update Manager (SUM) prior to version 8.5.6 could allow remote unauthorized access. Hewlett Packard Enterprise has provided a software update to resolve this vulnerability in HPE Smart Update Manager (SUM) prior to 8.5.6. Please visit the HPE Support Center at https://support.hpe.com/hpesc/public/home to download the latest version of HPE Smart Update Manager (SUM). Download the latest version of HPE Smart Update Manager (SUM) or download the latest Service Pack For ProLiant (SPP).,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['NVD-CWE-noinfo'],['cpe:2.3:a:hpe:smart_update_manager:*:*:*:*:*:*:*:*'],0,0
CVE-2020-7138,HP,0.00563,8.8,0.0,1.0,0.0,1.0,0,2020-05-19,1.0,2020-05-19,,,1.0,"Potential remote code execution security vulnerabilities have been identified with HPE Nimble Storage systems that could be exploited by an attacker to gain elevated privileges on the array. The following NimbleOS versions, and all subsequent releases, contain a software fix for this vulnerability: 3.9.3.0 4.5.6.0 5.0.9.0 5.1.4.100",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:hpe:nimbleos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:nimbleos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:nimbleos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:nimbleos:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:nimble_storage_af20_all_flash_array:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:nimble_storage_af20q_all_flash_dual_controller:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:nimble_storage_af40_all_flash_dual_controller:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:nimble_storage_af60_all_flash_dual_controller:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:nimble_storage_af80_all_flash_dual_controller:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:nimble_storage_cs3000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:nimble_storage_cs5000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:nimble_storage_cs7000:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:nimble_storage_secondary_flash_arrays:-:*:*:*:*:*:*:*']",0,0
CVE-2020-7205,HP,0.00044,6.7,0.0,1.0,1.0,0.0,0,2020-07-30,1.0,2020-07-31,,,0.0,"A potential security vulnerability has been identified in HPE Intelligent Provisioning, Service Pack for ProLiant, and HPE Scripting ToolKit. The vulnerability could be locally exploited to allow arbitrary code execution during the boot process. **Note:** This vulnerability is related to using insmod in GRUB2 in the specific impacted HPE product and HPE is addressing this issue. HPE has made the following software updates and mitigation information to resolve the vulnerability in Intelligent Provisioning, Service Pack for ProLiant, and HPE Scripting ToolKit. HPE provided latest Intelligent Provisioning, Service Pack for ProLiant, and HPE Scripting Toolkit which includes the GRUB2 patch to resolve this vulnerability. These new boot images will update GRUB2 and the Forbidden Signature Database (DBX). After the DBX is updated, users will not be able to boot to the older IP, SPP or Scripting ToolKit with Secure Boot enabled. HPE have provided a standalone DBX update tool to work with Microsoft Windows, and supported Linux Operating Systems. These tools can be used to update the Forbidden Signature Database (DBX) from within the OS. **Note:** This DBX update mitigates the GRUB2 issue with insmod enabled, and the ""Boot Hole"" issue for HPE signed GRUB2 applications.",CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.8,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:a:hpe:intelligent_provisioning:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_bl460c_gen8_blade_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_bl660c_gen8_blade_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl160_gen8_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl360e_gen8_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl360p_gen8_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl380e_gen8_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl380p_gen8_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl385p_gen8_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl560_gen8_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl580_gen8_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ml310e_gen8_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ml350e_gen8_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ml350p_gen8_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_sl230s_gen8_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_sl250s_gen8_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_sl270s_gen8_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_sl4540_gen8_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ws460c_gen8_graphics_server_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:a:hpe:intelligent_provisioning:*:*:*:*:*:*:*:*', 'cpe:2.3:a:hpe:service_pack_for_proliant:*:*:*:*:*:*:*:*', 'cpe:2.3:a:hpe:smartstart_scripting_toolkit:*:*:*:*:*:linux:*:*', 'cpe:2.3:h:hpe:apollo_4200_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:apollo_4520_chassis:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:cloudline_cl3100_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:cloudline_cl5200_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:cloudline_cl5800_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_bl460c_gen9_server_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_bl660c_gen9_server_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl120_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl160_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl180_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl20_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl360_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl380_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl388_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl560_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl580_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl60_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl80_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_m510_server_cartridge:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_m710x-l_server_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_m710x_server_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_m750_server_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ml10_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ml110_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ml150_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ml30_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ml350_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_se2160w_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ws460c_gen9_graphics_server_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl170r_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl190r_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl230a_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl250a_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl260a_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl270d_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl450_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl730f_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl740f_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl750f_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:storeeasy_1000_storage_gen9:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:synergy_480_gen9_compute_module:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:synergy_620_gen9_compute_module:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:synergy_660_gen9_compute_module:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:synergy_680_gen9_compute_module:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:synergy_d3940_storage_module:-:*:*:*:*:*:*:*', 'cpe:2.3:a:hpe:intelligent_provisioning:*:*:*:*:*:*:*:*', 'cpe:2.3:a:hpe:intelligent_provisioning:3.31:*:*:*:*:*:*:*', 'cpe:2.3:a:hpe:intelligent_provisioning:3.40:*:*:*:*:*:*:*', 'cpe:2.3:a:hpe:service_pack_for_proliant:*:*:*:*:*:*:*:*', 'cpe:2.3:a:hpe:smartstart_scripting_toolkit:*:*:*:*:*:linux:*:*', 'cpe:2.3:h:hpe:apollo_2000_gen10_plus_system:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:apollo_4200_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:apollo_4510_gen10_system:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:apollo_6500_gen10_system:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:cloudline_cl2100_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:cloudline_cl2200_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:cloudline_cl2600_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:cloudline_cl2800_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:cloudline_cl3100_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:cloudline_cl3150_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:cloudline_cl4100_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl120_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl325_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dx170r_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dx190r_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dx360_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dx380_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dx385_gen10_plus_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dx4200_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dx560_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_microserver_gen10:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_microserver_gen10_plus:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl220n_gen10_plus_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl270d_gen9_special_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl290n_gen10_plus_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl2x260w_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl925g_gen10_plus_1u_4-node_configure-to-order_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:simplivity_2600_gen10:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:simplivity_325_gen10:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:simplivity_380_gen10:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:storeeasy_1000_storage_gen10:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:synergy_480_gen10_compute_module:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:synergy_480_gen10_plus_compute_module:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:synergy_660_gen10_compute_module:-:*:*:*:*:*:*:*']",0,0
CVE-2021-25142,HP,0.00042,7.8,0.0,1.0,0.0,0.0,0,2021-02-08,1.0,2021-02-03,,,1.0,The Baseboard Management Controller (BMC) firmware in HPE Apollo 70 System prior to version 3.0.14.0 has a local buffer overflow in libifc.so webstartflash function.,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-120'],"['cpe:2.3:h:hpe:apollo_70_system:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:baseboard_management_controller:*:*:*:*:*:*:*:*']",0,0
CVE-2021-25169,HP,0.00042,7.8,0.0,1.0,0.0,0.0,0,2021-02-08,1.0,2021-02-03,,,1.0,The Baseboard Management Controller (BMC) firmware in HPE Apollo 70 System prior to version 3.0.14.0 has a local buffer overflow in libifc.so websetservicecfg function.,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-120'],"['cpe:2.3:o:hpe:baseboard_management_controller:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:apollo_70_system:-:*:*:*:*:*:*:*']",0,0
CVE-2021-25172,HP,0.00044,7.8,0.0,1.0,0.0,0.0,0,2021-02-08,1.0,2021-02-03,,,1.0,The Baseboard Management Controller (BMC) firmware in HPE Apollo 70 System prior to version 3.0.14.0 has a command injection vulnerability in libifc.so websetdefaultlangcfg function.,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-77'],"['cpe:2.3:o:hpe:baseboard_management_controller:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:apollo_70_system:-:*:*:*:*:*:*:*']",0,0
CVE-2021-26570,HP,0.00042,7.8,0.0,1.0,0.0,0.0,0,2021-02-08,1.0,2021-02-03,,,1.0,The Baseboard Management Controller (BMC) firmware in HPE Apollo 70 System prior to version 3.0.14.0 has a local buffer overflow in libifc.so webifc_setadconfig function.,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-120'],"['cpe:2.3:h:hpe:apollo_70_system:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:baseboard_management_controller:*:*:*:*:*:*:*:*']",0,0
CVE-2021-26579,HP,0.00042,5.5,0.0,0.0,1.0,0.0,0,2021-03-30,1.0,2021-03-19,,,1.0,A security vulnerability in HPE Unified Data Management (UDM) could allow the local disclosure of privileged information (CWE-321: Use of Hard-coded Cryptographic Key in a product). HPE has provided updates to versions 1.2009.0 and 1.2101.0 of HPE Unified Data Management (UDM). Version 1.2103.0 of HPE Unified Data Management (UDM) removes all hard-coded cryptographic keys.,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.8,3.6,['CWE-798'],"['cpe:2.3:a:hpe:unified_data_management:1.2009.0:*:*:*:*:*:*:*', 'cpe:2.3:a:hpe:unified_data_management:1.2101.0:*:*:*:*:*:*:*']",0,0
CVE-2021-26585,HP,0.00042,5.5,0.0,0.0,1.0,0.0,0,2021-06-24,1.0,2021-06-08,,,1.0,A potential vulnerability has been identified in HPE OneView Global Dashboard release 2.31 which could lead to a local disclosure of privileged information. HPE has provided an update to OneView Global Dashboard. The issue is resolved in 2.32.,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,1.8,3.6,['NVD-CWE-noinfo'],['cpe:2.3:a:hpe:oneview_global_dashboard:2.31:*:*:*:*:*:*:*'],0,0
CVE-2021-29216,HP,0.00073,6.1,0.0,0.0,1.0,0.0,0,2022-02-24,1.0,2022-02-22,,,1.0,A remote cross-site scripting vulnerability was discovered in HPE OneView Global Dashboard version(s): Prior to 2.5. HPE has provided a software update to resolve this vulnerability in HPE OneView Global Dashboard.,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],['cpe:2.3:a:hpe:oneview_global_dashboard:*:*:*:*:*:*:*:*'],0,0
CVE-2021-29217,HP,0.00113,6.1,0.0,0.0,1.0,0.0,0,2022-02-24,1.0,2022-02-22,,,1.0,A remote URL redirection vulnerability was discovered in HPE OneView Global Dashboard version(s): Prior to 2.5. HPE has provided a software update to resolve this vulnerability in HPE OneView Global Dashboard.,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-601'],['cpe:2.3:a:hpe:oneview_global_dashboard:*:*:*:*:*:*:*:*'],0,0
CVE-2021-3191,HP,0.00357,8.8,0.0,0.0,1.0,0.0,0,2021-02-09,1.0,2021-02-08,,,1.0,"Idelji Web ViewPoint Suite, as used in conjunction with HPE NonStop, allows Remote Unauthorized Access for T0320L01^ABY and T0320L01^ACD, T0952L01^AAR through T0952L01^AAX, and T0986L01^AAD through T0986L01^AAJ (L) and T0320H01^ABW through T0320H01^ACC, T0952H01^AAQ through T0952H01^AAW, and T0986H01^AAC through T0986H01^AAI (J and H).",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:a:hpe:nonstop:-:*:*:*:*:*:*:*', 'cpe:2.3:a:hpe:web_viewpoint:*:*:*:*:*:*:*:*', 'cpe:2.3:a:hpe:web_viewpoint:*:*:*:*:*:*:*:*', 'cpe:2.3:a:hpe:web_viewpoint:*:*:*:*:*:*:*:*', 'cpe:2.3:a:hpe:web_viewpoint:*:*:*:*:*:*:*:*', 'cpe:2.3:a:hpe:web_viewpoint:*:*:*:*:*:*:*:*', 'cpe:2.3:a:hpe:web_viewpoint:*:*:*:*:*:*:*:*', 'cpe:2.3:a:hpe:web_viewpoint:*:*:*:*:*:*:*:*', 'cpe:2.3:a:hpe:web_viewpoint:15.02.00:*:*:*:*:*:*:*', 'cpe:2.3:a:hpe:web_viewpoint:15.02.01:*:*:*:*:*:*:*', 'cpe:2.3:a:hpe:web_viewpoint:t0320l01\\^aby:*:*:*:*:*:*:*', 'cpe:2.3:a:hpe:web_viewpoint:t0320l01\\^acd:*:*:*:*:*:*:*']",0,0
CVE-2021-41001,HP,0.00344,8.8,0.0,1.0,0.0,1.0,0,2022-03-02,1.0,2022-02-22,,,1.0,"An authenticated remote code execution vulnerability was discovered in the AOS-CX Network Analytics Engine (NAE) in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below. Aruba has released upgrades for Aruba AOS-CX devices that address this security vulnerability.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-77'],"['cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:aruba_8320:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:aruba_8325-32-c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:aruba_8325-48y8c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:aruba_8360-12c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:aruba_8360-16y2c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:aruba_8360-24xf2c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:aruba_8360-32y4c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:aruba_8360-48xt4c:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:aruba_8400x:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:aruba_cx_6200f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:aruba_cx_6300f:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:aruba_cx_6300m:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:aruba_cx_6405:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:aruba_cx_6410:-:*:*:*:*:*:*:*']",0,0
CVE-2021-41004,HP,0.00089,7.5,0.0,1.0,0.0,1.0,0,2022-04-12,1.0,2022-04-06,,,1.0,A remote vulnerability was discovered in Aruba Instant On 1930 Switch Series version(s): Firmware below v1.0.7.0.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:h:hpe:aruba_instant_on_1930_8g_2sfp:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:aruba_instant_on_1930_8g_2sfp_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:aruba_instant_on_1930_8g_class4_poe_2sfp_124w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:aruba_instant_on_1930_8g_class4_poe_2sfp_124w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:aruba_instant_on_1930_48g_class4_poe_4sfp\\/sfp\\+_370w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:aruba_instant_on_1930_48g_class4_poe_4sfp\\/sfp\\+_370w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:aruba_instant_on_1930_48g_4sfp\\/sfp\\+:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:aruba_instant_on_1930_48g_4sfp\\/sfp\\+_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:aruba_instant_on_1930_24g_class4_poe_4sfp\\/sfp\\+_370w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:aruba_instant_on_1930_24g_class4_poe_4sfp\\/sfp\\+_370w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:aruba_instant_on_1930_24g_class4_poe_4sfp\\/sfp\\+_195w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:aruba_instant_on_1930_24g_class4_poe_4sfp\\/sfp\\+_195w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:aruba_instant_on_1930_24g_4sfp\\/sfp\\+:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:aruba_instant_on_1930_24g_4sfp\\/sfp\\+_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2022-23704,HP,0.00627,7.5,0.0,1.0,0.0,0.0,0,2022-05-09,1.0,2022-04-11,,,1.0,A potential security vulnerability has been identified in Integrated Lights-Out 4 (iLO 4). The vulnerability could allow remote Denial of Service. The vulnerability is resolved in Integrated Lights-Out 4 (iLO 4) 2.80 and later.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:hp:integrated_lights-out_4:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:apollo_4200_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_bl420c_gen8_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_bl460c_gen8_server_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_bl460c_gen9_server_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_bl465c_gen8_server_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_bl660c_gen8_server_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_bl660c_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl120_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl160_gen8_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl160_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl180_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl20_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl320e_gen8_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl320e_gen8_v2_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl360_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl360e_gen8_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl360p_gen8_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl380_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl380e_gen8_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl380p_gen8_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl385p_gen8:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl560_gen8_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl560_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl580_gen8_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl580_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl60_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl80_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ec200a_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_microserver_gen8:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ml110_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ml150_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ml30_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ml310e_gen8_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ml310e_gen8_v2_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ml350_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ml350e_gen8_v2_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ml350p_gen8_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_sl210t_gen8_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_sl230s_gen8_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_sl250s_gen8_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_sl270s_gen8_se_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_sl270s_gen8_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_sl4540_gen8_1_node_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ws460c_gen8_graphics_server_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ws460c_gen9_graphics_server_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl170r_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl190r_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl220a_gen8_v2_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl230a_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl250a_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl450_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl730f_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl740f_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl750f_gen9_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:synergy_480_gen9_compute_module:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:synergy_620_gen9_compute_module:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:synergy_660_gen9_compute_module:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:synergy_680_gen9_compute_module:-:*:*:*:*:*:*:*']",0,0
CVE-2022-25256,HP,0.00092,6.1,0.0,0.0,1.0,0.0,0,2022-02-19,1.0,2020-03-31,,,1.0,"SAS Web Report Studio 4.4 allows XSS. /SASWebReportStudio/logonAndRender.do has two parameters: saspfs_request_backlabel_list and saspfs_request_backurl_list. The first one affects the content of the button placed in the top left. The second affects the page to which the user is directed after pressing the button, e.g., a malicious web page. In addition, the second parameter executes JavaScript, which means XSS is possible by adding a javascript: URL.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:a:sas:web_report_studio:4.4:*:*:*:*:*:*:*', 'cpe:2.3:a:hpe:hp-ux_ipfilter:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ibm:aix:-:*:*:*:*:*:x64:*', 'cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:x64:*', 'cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:x64:*', 'cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:x64:*']",0,0
CVE-2022-28618,HP,0.00108,9.8,0.0,1.0,0.0,1.0,0,2022-05-20,1.0,2022-05-11,,,1.0,"A command injection security vulnerability has been identified in HPE Nimble Storage Hybrid Flash Arrays, HPE Nimble Storage All Flash Arrays and HPE Nimble Storage Secondary Flash Arrays that could allow an attacker to execute arbitrary commands on a Nimble appliance. HPE has made the following software updates to resolve the vulnerability in HPE Nimble Storage: 5.0.10.100 or later, 5.2.1.0 or later, 6.0.0.100 or later.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-77'],"['cpe:2.3:o:hpe:nimbleos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:nimbleos:*:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:nimbleos:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:nimble_storage_all_flash_arrays:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:nimble_storage_hybrid_flash_arrays:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:nimble_storage_secondary_flash_arrays:-:*:*:*:*:*:*:*']",0,0
CVE-2022-28620,HP,0.00434,9.8,0.0,1.0,0.0,1.0,0,2022-06-24,1.0,2022-06-16,,,1.0,"A remote authentication bypass vulnerability was discovered in HPE Cray Legacy Shasta System Solutions; HPE Slingshot; and HPE Cray EX supercomputers versions: Prior to node controller firmware associated with HPE Cray EX liquid cooled blades, and all versions of chassis controller firmware associated with HPE Cray EX liquid cooled cabinets prior to 1.6.27/1.5.33/1.4.27; All Slingshot versions prior to 1.7.2; All versions of node controller firmware associated with HPE Cray EX liquid cooled blades, and all versions of chassis controller firmware associated with HPE Cray EX liquid cooled cabinets prior to 1.6.27/1.5.33/1.4.27. HPE has provided a software update to resolve this vulnerability in HPE Cray Legacy Shasta System Solutions, HPE Slingshot, and HPE Cray EX Supercomputers.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:hpe:slingshot_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:slingshot:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:cray_ex_supercomputers_firmware:1.4.27:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:cray_ex_supercomputers_firmware:1.5.33:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:cray_ex_supercomputers_firmware:1.6.27:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:cray_ex_supercomputers:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:cray_sh_supercomputer_air_cooled_base_system_code_firmware:1.4.27:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:cray_sh_supercomputer_air_cooled_base_system_code_firmware:1.5.33:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:cray_sh_supercomputer_air_cooled_base_system_code_firmware:1.6.27:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:cray_sh_supercomputer_air_cooled_base_system_code:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:cray_sh_supercomputer_liquid_cooled_base_system_code_firmware:1.4.27:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:cray_sh_supercomputer_liquid_cooled_base_system_code_firmware:1.5.33:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:cray_sh_supercomputer_liquid_cooled_base_system_code_firmware:1.6.27:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:cray_sh_supercomputer_liquid_cooled_base_system_code:-:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:cray_sh_supercomputer_liquid_cooled_tds_base_system_code_firmware:1.4.27:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:cray_sh_supercomputer_liquid_cooled_tds_base_system_code_firmware:1.5.33:*:*:*:*:*:*:*', 'cpe:2.3:o:hpe:cray_sh_supercomputer_liquid_cooled_tds_base_system_code_firmware:1.6.27:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:cray_sh_supercomputer_liquid_cooled_tds_base_system_code:-:*:*:*:*:*:*:*']",0,0
CVE-2022-28639,HP,0.00065,8.8,0.0,1.0,0.0,0.0,0,2022-09-20,1.0,2022-09-15,,,1.0,"A remote potential adjacent denial of service (DoS) and potential adjacent arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability were discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses these security vulnerabilities.",CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:hpe:integrated_lights-out_5_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:apollo_4200_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:apollo_4500:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:apollo_r2000_chassis:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:apollo_2000_gen10_plus_system:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:apollo_4200_gen10_plus_system:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:apollo_4510_gen10_system:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:apollo_6500_gen10_plus:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:apollo_n2600_gen10_plus:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:apollo_n2800_gen10_plus:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:apollo_r2600_gen10:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:apollo_r2800_gen10:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:edgeline_e920_server_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:edgeline_e920d_server_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:edgeline_e920t_server_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:integrated_lights-out_5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl110_gen10_plus_telco_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl20_gen10_plus_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl325_gen10_plus_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl325_gen10_plus_v2_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl325_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl345_gen10_plus_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl360_gen10_plus_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl365_gen10_plus_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl380_gen10_plus_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl385_gen10_plus_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl385_gen10_plus_v2_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dx170r_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dx190r_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dx220n_gen10_plus_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dx325_gen10_plus_v2_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dx360_gen10_plus_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dx360_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dx380_gen10_plus_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dx380_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dx385_gen10_plus_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dx385_gen10_plus_v2_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dx4200_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dx560_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_e910t_server_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_m750_server_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_microserver_gen10_plus:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ml30_gen10_plus_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl220n_gen10_plus_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl225n_gen10_plus_1u_node:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl290n_gen10_plus_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl420_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl645d_gen10_plus_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl675d_gen10_plus_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl925g_gen10_plus_1u_4-node_configure-to-order_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:storage_file_controller:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:storage_performance_file_controller:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:storeeasy_1460_storage:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:storeeasy_1560_storage:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:storeeasy_1660_expanded_storage:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:storeeasy_1660_performance_storage:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:storeeasy_1660_storage:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:storeeasy_1860_performance_storage:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:storeeasy_1860_storage:-:*:*:*:*:*:*:*']",0,0
CVE-2022-28640,HP,0.00065,8.8,0.0,1.0,0.0,0.0,0,2022-09-20,1.0,2022-09-15,,,1.0,"A potential local adjacent arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability was discovered in HPE Integrated Lights-Out 5 (iLO 5) in Version: 2.71. Hewlett Packard Enterprise has provided updated firmware for HPE Integrated Lights-Out 5 (iLO 5) that addresses this security vulnerability.",CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:hpe:integrated_lights-out_5_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:apollo_4200_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:apollo_4500:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hp:apollo_r2000_chassis:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:apollo_2000_gen10_plus_system:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:apollo_4200_gen10_plus_system:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:apollo_4510_gen10_system:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:apollo_6500_gen10_plus:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:apollo_n2600_gen10_plus:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:apollo_n2800_gen10_plus:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:apollo_r2600_gen10:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:apollo_r2800_gen10:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:edgeline_e920_server_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:edgeline_e920d_server_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:edgeline_e920t_server_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:integrated_lights-out_5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl110_gen10_plus_telco_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl20_gen10_plus_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl325_gen10_plus_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl325_gen10_plus_v2_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl325_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl345_gen10_plus_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl360_gen10_plus_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl365_gen10_plus_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl380_gen10_plus_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl385_gen10_plus_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl385_gen10_plus_v2_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dx170r_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dx190r_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dx220n_gen10_plus_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dx325_gen10_plus_v2_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dx360_gen10_plus_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dx360_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dx380_gen10_plus_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dx380_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dx385_gen10_plus_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dx385_gen10_plus_v2_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dx4200_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_dx560_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_e910t_server_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_m750_server_blade:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_microserver_gen10_plus:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ml30_gen10_plus_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl220n_gen10_plus_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl225n_gen10_plus_1u_node:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl290n_gen10_plus_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl420_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl645d_gen10_plus_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl675d_gen10_plus_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:proliant_xl925g_gen10_plus_1u_4-node_configure-to-order_server:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:storage_file_controller:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:storage_performance_file_controller:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:storeeasy_1460_storage:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:storeeasy_1560_storage:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:storeeasy_1660_expanded_storage:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:storeeasy_1660_performance_storage:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:storeeasy_1660_storage:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:storeeasy_1860_performance_storage:-:*:*:*:*:*:*:*', 'cpe:2.3:h:hpe:storeeasy_1860_storage:-:*:*:*:*:*:*:*']",0,0
CVE-2018-6311,FoxConn,0.0007,6.8,0.0,1.0,0.0,1.0,1,2018-03-10,1.0,2018-03-09,,,1.0,"One can gain root access on the Foxconn femtocell FEMTO AP-FC4064-T version AP_GT_B38_5.8.3lb15-W47 LTE Build 15 via UART pins without any restrictions, which leads to full system compromise and disclosure of user communications.",CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,PHYSICAL,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.9,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:foxconn:ap-fc4064-t_firmware:ap_gt_b38_5.8.3lb15-w47_lte:*:*:*:*:*:*:*', 'cpe:2.3:h:foxconn:ap-fc4064-t:-:*:*:*:*:*:*:*']",0,0
CVE-2018-6312,FoxConn,0.00078,7.2,0.0,1.0,0.0,1.0,1,2018-03-10,1.0,2018-03-09,,,1.0,"A privileged account with a weak default password on the Foxconn femtocell FEMTO AP-FC4064-T version AP_GT_B38_5.8.3lb15-W47 LTE Build 15 can be used to turn on the TELNET service via the web interface, which allows root login without any password. This vulnerability will lead to full system compromise and disclosure of user communications. The foxconn account with an 8-character lowercase alphabetic password can be used.",CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.2,5.9,['CWE-521'],"['cpe:2.3:o:foxconn:ap-fc4064-t_firmware:ap_gt_b38_5.8.3lb15-w47_lte:*:*:*:*:*:*:*', 'cpe:2.3:h:foxconn:ap-fc4064-t:-:*:*:*:*:*:*:*']",0,0
CVE-2018-9111,FoxConn,0.00057,5.4,0.0,1.0,0.0,1.0,1,2018-05-10,0.0,,0.0,,,Cross Site Scripting (XSS) exists on the Foxconn FEMTO AP-FC4064-T AP_GT_B38_5.8.3lb15-W47 LTE Build 15 via the configuration of a user account. An attacker can execute arbitrary script on an unsuspecting user's browser.,CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,LOW,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.3,2.7,['CWE-79'],"['cpe:2.3:o:foxconn:ap-fc4064-t_firmware:ap_gt_b38_5.8.3lb15-w47_lte:*:*:*:*:*:*:*', 'cpe:2.3:h:foxconn:ap-fc4064-t:-:*:*:*:*:*:*:*']",0,0
CVE-2018-9112,FoxConn,0.00659,9.8,0.0,1.0,0.0,1.0,1,2018-05-10,0.0,,0.0,,,"A low privileged admin account with a weak default password of admin exists on the Foxconn FEMTO AP-FC4064-T AP_GT_B38_5.8.3lb15-W47 LTE Build 15. In addition, its web management page relies on the existence or values of cookies when performing security-critical operations. One can gain privileges by modifying cookies.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-798'],"['cpe:2.3:o:foxconn:ap-fc4064-t_firmware:ap_gt_b38_5.8.3lb15-w47_lte:*:*:*:*:*:*:*', 'cpe:2.3:h:foxconn:ap-fc4064-t:-:*:*:*:*:*:*:*']",0,0
CVE-2018-6402,Ecobee,0.00083,7.5,0.0,1.0,0.0,1.0,1,2020-04-14,1.0,2018-04-28,,,1.0,"Ecobee Ecobee4 4.2.0.171 devices can be forced to deauthenticate and connect to an unencrypted Wi-Fi network with the same SSID, even if the device settings specify use of encryption such as WPA2, as long as the competing network has a stronger signal. An attacker must be able to set up a nearby SSID, similar to an ""Evil Twin"" attack.",CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,HIGH,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.6,5.9,['CWE-327'],"['cpe:2.3:h:ecobee:ecobee4:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ecobee:ecobee4_firmware:4.2.0.171:*:*:*:*:*:*:*']",0,0
CVE-2021-27952,Ecobee,0.00576,9.8,0.0,1.0,0.0,1.0,1,2021-08-03,0.0,,0.0,,,Hardcoded default root credentials exist on the ecobee3 lite 4.5.81.200 device. This allows a threat actor to gain access to the password-protected bootloader environment through the serial console.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-798'],"['cpe:2.3:h:ecobee:ecobee3_lite:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ecobee:ecobee3_lite_firmware:4.5.81.200:*:*:*:*:*:*:*']",0,0
CVE-2021-27953,Ecobee,0.00212,7.5,0.0,1.0,0.0,1.0,1,2021-08-03,0.0,,0.0,,,"A NULL pointer dereference vulnerability exists on the ecobee3 lite 4.5.81.200 device in the HomeKit Wireless Access Control setup process. A threat actor can exploit this vulnerability to cause a denial of service, forcing the device to reboot via a crafted HTTP request.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-476'],"['cpe:2.3:h:ecobee:ecobee3_lite:-:*:*:*:*:*:*:*', 'cpe:2.3:o:ecobee:ecobee3_lite_firmware:4.5.81.200:*:*:*:*:*:*:*']",0,0
CVE-2021-27954,Ecobee,0.0013,8.2,0.0,1.0,0.0,1.0,1,2021-08-03,0.0,,0.0,,,A heap-based buffer overflow vulnerability exists on the ecobee3 lite 4.5.81.200 device in the HKProcessConfig function of the HomeKit Wireless Access Control setup process. A threat actor can exploit this vulnerability to force the device to connect to a SSID or cause a denial of service.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,LOW,HIGH,HIGH,3.9,4.2,['CWE-787'],"['cpe:2.3:o:ecobee:ecobee3_lite_firmware:4.5.81.200:*:*:*:*:*:*:*', 'cpe:2.3:h:ecobee:ecobee3_lite:-:*:*:*:*:*:*:*']",0,0
CVE-2018-7296,eq-3,0.0018,5.3,0.0,0.0,0.0,1.0,1,2018-02-22,0.0,,0.0,,,Directory Traversal / Arbitrary File Read in User.getLanguage method in eQ-3 AG Homematic CCU2 2.29.2 and earlier allows remote attackers to read the first line of an arbitrary file on the CCU2's filesystem. This vulnerability can be exploited by unauthenticated attackers with access to the web interface.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,LOW,NONE,NONE,MEDIUM,3.9,1.4,['CWE-22'],"['cpe:2.3:o:eq-3:homematic_central_control_unit_ccu2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_central_control_unit_ccu2:-:*:*:*:*:*:*:*']",0,0
CVE-2018-7297,eq-3,0.37692,9.8,1.0,0.0,0.0,1.0,1,2018-02-22,0.0,,0.0,,,Remote Code Execution in the TCL script interpreter in eQ-3 AG Homematic CCU2 2.29.2 and earlier allows remote attackers to obtain read/write access and execute system commands on the device. This vulnerability can be exploited by unauthenticated attackers with access to the web interface.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:eq-3:homematic_central_control_unit_ccu2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_central_control_unit_ccu2:-:*:*:*:*:*:*:*']",1,0
CVE-2018-7298,eq-3,0.00222,8.1,0.0,0.0,0.0,1.0,1,2018-02-22,0.0,,0.0,,,"In /usr/local/etc/config/addons/mh/loopupd.sh on eQ-3 AG HomeMatic CCU2 2.29.22 devices, software update packages are downloaded via the HTTP protocol, which does not provide any cryptographic protection of the downloaded contents. An attacker with a privileged network position (which could be obtained via DNS spoofing of www.meine-homematic.de or other approaches) can exploit this issue in order to provide arbitrary malicious firmware updates to the CCU2. This can result in a full system compromise.",CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,HIGH,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.2,5.9,['CWE-319'],"['cpe:2.3:o:eq-3:homematic_central_control_unit_ccu2_firmware:2.29.22:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_central_control_unit_ccu2:-:*:*:*:*:*:*:*']",0,0
CVE-2018-7299,eq-3,0.00272,8.0,0.0,0.0,0.0,1.0,1,2018-02-22,0.0,,0.0,,,Remote Code Execution in the addon installation process in eQ-3 AG Homematic CCU2 2.29.2 and earlier allows authenticated attackers to create or overwrite arbitrary files or install malicious software on the device.,CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.1,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:eq-3:homematic_central_control_unit_ccu2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_central_control_unit_ccu2:-:*:*:*:*:*:*:*']",0,0
CVE-2018-7300,eq-3,0.03485,9.8,1.0,1.0,0.0,1.0,1,2018-02-22,0.0,,0.0,,,Directory Traversal / Arbitrary File Write / Remote Code Execution in the User.setLanguage method in eQ-3 AG Homematic CCU2 2.29.2 and earlier allows remote attackers to write arbitrary files to the device's filesystem. This vulnerability can be exploited by unauthenticated attackers with access to the web interface.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-22'],"['cpe:2.3:o:eq-3:homematic_ccu2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*']",1,0
CVE-2018-7301,eq-3,0.00222,9.8,0.0,0.0,0.0,1.0,1,2018-02-22,0.0,,0.0,,,eQ-3 AG HomeMatic CCU2 2.29.22 devices have an open XML-RPC port without authentication. This can be exploited by sending arbitrary XML-RPC requests to control the attached BidCos devices.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-306'],"['cpe:2.3:o:eq-3:homematic_central_control_unit_ccu2_firmware:2.29.22:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_central_control_unit_ccu2:-:*:*:*:*:*:*:*']",0,0
CVE-2019-14473,eq-3,0.00109,8.8,0.0,1.0,0.0,1.0,1,2019-08-06,0.0,,0.0,,,"eQ-3 Homematic CCU2 and CCU3 use session IDs for authentication but lack authorization checks. Consequently, a valid guest level or user level account can create a new admin level account, read the service messages, clear the system protocol or modify/delete internal programs, etc. pp.",CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-862'],"['cpe:2.3:o:eq-3:ccu2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:ccu2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:ccu3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:ccu3:-:*:*:*:*:*:*:*']",0,0
CVE-2019-14474,eq-3,0.00095,7.5,0.0,1.0,0.0,1.0,1,2019-08-07,0.0,,0.0,,,"eQ-3 Homematic CCU3 3.47.15 and prior has Improper Input Validation in function 'Call()' of ReGa core logic process, resulting in the ability to start a Denial of Service. Due to Improper Authorization an attacker can obtain a session ID from CVE-2019-9583 or a valid guest/user/admin account can start this attack too.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-20'],"['cpe:2.3:h:eq-3:ccu3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:ccu3_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2019-14475,eq-3,0.0057,7.5,0.0,1.0,0.0,1.0,1,2019-08-05,0.0,,0.0,,,"eQ-3 Homematic CCU2 2.47.15 and prior and CCU3 3.47.15 and prior use session IDs for authentication but lack authorization checks. An attacker can obtain a session ID from CVE-2019-9583, resulting in the ability to read the service messages, clear the system protocol, create a new user in the system, or modify/delete internal programs.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-862'],"['cpe:2.3:o:eq-3:ccu2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:ccu2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:ccu3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:ccu3:-:*:*:*:*:*:*:*']",0,0
CVE-2019-14984,eq-3,0.00483,8.1,0.0,1.0,0.0,1.0,1,2019-08-13,0.0,,0.0,,,"eQ-3 Homematic CCU2 and CCU3 with the XML-API through 1.2.0 AddOn installed allow Remote Code Execution by unauthenticated attackers with access to the web interface, because the undocumented addons/xmlapi/exec.cgi script uses CMD_EXEC to execute TCL code from a POST request.",CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,HIGH,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.2,5.9,['CWE-306'],"['cpe:2.3:o:eq-3:homematic_ccu2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*']",0,0
CVE-2019-14985,eq-3,0.00914,9.8,0.0,1.0,0.0,1.0,1,2019-08-13,0.0,,0.0,,,"eQ-3 Homematic CCU2 and CCU3 with the CUxD AddOn installed allow Remote Code Execution by unauthenticated attackers with access to the web interface, because this interface can access the CMD_EXEC virtual device type 28.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-287'],"['cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.35.16:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.41.5:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.41.8:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.41.9:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.45.6:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.45.7:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.47.10:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.47.12:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.47.15:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.41.11:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.43.16:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.45.5:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.45.7:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.10:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.15:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*']",0,0
CVE-2019-14986,eq-3,0.00434,8.1,0.0,1.0,0.0,1.0,1,2019-08-13,0.0,,0.0,,,"eQ-3 Homematic CCU2 and CCU3 with the CUxD AddOn before 2.3.0 installed allow administrative operations by unauthenticated attackers with access to the web interface, because features such as File-Browser and Shell Command (as well as ""Set root password"") are exposed.",CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,HIGH,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.2,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:eq-3:homematic_ccu2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*']",0,0
CVE-2019-15849,eq-3,0.00079,7.3,0.0,1.0,0.0,1.0,1,2019-10-17,1.0,2019-09-10,0.0,,1.0,"eQ-3 HomeMatic CCU3 firmware 3.41.11 allows session fixation. An attacker can create session IDs and send them to the victim. After the victim logs in to the session, the attacker can use that session. The attacker could create SSH logins after a valid session and easily compromise the system.",CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N,NETWORK,LOW,LOW,REQUIRED,UNCHANGED,HIGH,HIGH,NONE,HIGH,2.1,5.2,['CWE-384'],"['cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.14.11:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*']",0,0
CVE-2019-15850,eq-3,0.0061,8.8,0.0,1.0,0.0,1.0,1,2019-10-17,0.0,,1.0,2019-09-10,,eQ-3 HomeMatic CCU3 firmware version 3.41.11 allows Remote Code Execution in the ReGa.runScript method. An authenticated attacker can easily execute code and compromise the system.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-862'],"['cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.41.11:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*']",0,0
CVE-2019-16199,eq-3,0.01292,9.8,0.0,1.0,0.0,1.0,1,2019-09-17,1.0,2019-09-12,0.0,,1.0,eQ-3 Homematic CCU2 before 2.47.18 and CCU3 before 3.47.18 allow Remote Code Execution by unauthenticated attackers with access to the web interface via an HTTP POST request to certain URLs related to the ReGa core process.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-306'],"['cpe:2.3:o:eq-3:homematic_ccu2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*']",0,0
CVE-2019-18937,eq-3,0.01292,9.8,0.0,1.0,0.0,1.0,1,2019-11-14,0.0,,0.0,,,"eQ-3 Homematic CCU2 2.47.20 and CCU3 3.47.18 with the Script Parser AddOn through 1.8 installed allow Remote Code Execution by unauthenticated attackers with access to the web interface via the exec.cgi script, which executes TCL script content from an HTTP POST request.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-306'],"['cpe:2.3:a:scriptparser_project:scriptparser:1.8:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.47.20:*:*:*:*:*:*:*', 'cpe:2.3:a:scriptparser_project:scriptparser:1.8:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*', 'cpe:2.3:a:scriptparser_project:scriptparser:1.7:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*', 'cpe:2.3:a:scriptparser_project:scriptparser:1.7:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.47.20:*:*:*:*:*:*:*', 'cpe:2.3:a:scriptparser_project:scriptparser:1.6:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.47.20:*:*:*:*:*:*:*', 'cpe:2.3:a:scriptparser_project:scriptparser:1.5:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.47.20:*:*:*:*:*:*:*', 'cpe:2.3:a:scriptparser_project:scriptparser:1.4:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.47.20:*:*:*:*:*:*:*', 'cpe:2.3:a:scriptparser_project:scriptparser:1.3:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.47.20:*:*:*:*:*:*:*', 'cpe:2.3:a:scriptparser_project:scriptparser:1.3:beta1:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.47.20:*:*:*:*:*:*:*', 'cpe:2.3:a:scriptparser_project:scriptparser:1.2:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.47.20:*:*:*:*:*:*:*', 'cpe:2.3:a:scriptparser_project:scriptparser:1.0:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.47.20:*:*:*:*:*:*:*', 'cpe:2.3:a:scriptparser_project:scriptparser:1.6:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*', 'cpe:2.3:a:scriptparser_project:scriptparser:1.5:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*', 'cpe:2.3:a:scriptparser_project:scriptparser:1.4:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*', 'cpe:2.3:a:scriptparser_project:scriptparser:1.3:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*', 'cpe:2.3:a:scriptparser_project:scriptparser:1.3:beta1:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*', 'cpe:2.3:a:scriptparser_project:scriptparser:1.2:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*', 'cpe:2.3:a:scriptparser_project:scriptparser:1.0:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*']",0,0
CVE-2019-18938,eq-3,0.01292,9.8,0.0,1.0,0.0,1.0,1,2019-11-14,0.0,,0.0,,,eQ-3 Homematic CCU2 2.47.20 and CCU3 3.47.18 with the E-Mail AddOn through 1.6.8.c installed allow Remote Code Execution by unauthenticated attackers with access to the web interface via the save.cgi script for payload upload and the testtcl.cgi script for its execution.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-306'],"['cpe:2.3:a:hm_email_project:hm_email:1.6.8c:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.24.20:*:*:*:*:*:*:*', 'cpe:2.3:a:hm_email_project:hm_email:1.6.8c:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*', 'cpe:2.3:a:hm_email_project:hm_email:1.6.8b:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.24.20:*:*:*:*:*:*:*', 'cpe:2.3:a:hm_email_project:hm_email:1.6.8a:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.24.20:*:*:*:*:*:*:*', 'cpe:2.3:a:hm_email_project:hm_email:1.6.7c:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.24.20:*:*:*:*:*:*:*', 'cpe:2.3:a:hm_email_project:hm_email:1.6.7b:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.24.20:*:*:*:*:*:*:*', 'cpe:2.3:a:hm_email_project:hm_email:1.6.7a:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.24.20:*:*:*:*:*:*:*', 'cpe:2.3:a:hm_email_project:hm_email:1.6.7:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.24.20:*:*:*:*:*:*:*', 'cpe:2.3:a:hm_email_project:hm_email:1.6.6:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.24.20:*:*:*:*:*:*:*', 'cpe:2.3:a:hm_email_project:hm_email:1.6.5:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.24.20:*:*:*:*:*:*:*', 'cpe:2.3:a:hm_email_project:hm_email:1.6.4:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.24.20:*:*:*:*:*:*:*', 'cpe:2.3:a:hm_email_project:hm_email:1.6.3:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.24.20:*:*:*:*:*:*:*', 'cpe:2.3:a:hm_email_project:hm_email:1.6.2:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.24.20:*:*:*:*:*:*:*', 'cpe:2.3:a:hm_email_project:hm_email:1.6.0:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.24.20:*:*:*:*:*:*:*', 'cpe:2.3:a:hm_email_project:hm_email:1.6.8:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.24.20:*:*:*:*:*:*:*', 'cpe:2.3:a:hm_email_project:hm_email:1.6.8b:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*', 'cpe:2.3:a:hm_email_project:hm_email:1.6.8a:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*', 'cpe:2.3:a:hm_email_project:hm_email:1.6.8:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*', 'cpe:2.3:a:hm_email_project:hm_email:1.6.7c:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*', 'cpe:2.3:a:hm_email_project:hm_email:1.6.7b:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*', 'cpe:2.3:a:hm_email_project:hm_email:1.6.7a:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*', 'cpe:2.3:a:hm_email_project:hm_email:1.6.7:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*', 'cpe:2.3:a:hm_email_project:hm_email:1.6.6:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*', 'cpe:2.3:a:hm_email_project:hm_email:1.6.5:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*', 'cpe:2.3:a:hm_email_project:hm_email:1.6.4:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*', 'cpe:2.3:a:hm_email_project:hm_email:1.6.3:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*', 'cpe:2.3:a:hm_email_project:hm_email:1.6.2:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*', 'cpe:2.3:a:hm_email_project:hm_email:1.6.0:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*']",0,0
CVE-2019-18939,eq-3,0.01292,9.8,0.0,1.0,0.0,1.0,1,2019-11-14,0.0,,0.0,,,"eQ-3 Homematic CCU2 2.47.20 and CCU3 3.47.18 with the HM-Print AddOn through 1.2a installed allow Remote Code Execution by unauthenticated attackers with access to the web interface via the exec.cgi and exec1.cgi scripts, which execute TCL script content from an HTTP POST request.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-306'],"['cpe:2.3:a:hm-print_project:hm-print:1.2a:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.47.20:*:*:*:*:*:*:*', 'cpe:2.3:a:hm-print_project:hm-print:1.2:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*', 'cpe:2.3:a:hm-print_project:hm-print:1.2a:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.18:*:*:*:*:*:*:*', 'cpe:2.3:a:hm-print_project:hm-print:1.2:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.47.20:*:*:*:*:*:*:*']",0,0
CVE-2019-9582,eq-3,0.00098,7.5,0.0,1.0,0.0,1.0,1,2019-08-14,1.0,2019-09-12,0.0,,0.0,"eQ-3 Homematic CCU2 outdated base software packages allows Denial of Service. CCU2 affected versions: 2.35.16, 2.41.5, 2.41.8, 2.41.9, 2.45.6, 2.45.7, 2.47.10, 2.47.12, 2.47.15.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.35.16:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.41.5:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.41.8:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.41.9:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.45.6:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.45.7:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.47.10:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.47.12:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.47.15:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*']",0,0
CVE-2019-9583,eq-3,0.00098,8.2,0.0,1.0,0.0,1.0,1,2019-08-14,1.0,2019-09-12,0.0,,0.0,"eQ-3 Homematic CCU2 and CCU3 obtain session IDs without login. This allows a Denial of Service and is a starting point for other attacks. Affected versions for CCU2: 2.35.16, 2.41.5, 2.41.8, 2.41.9, 2.45.6, 2.45.7, 2.47.10, 2.47.12, 2.47.15. Affected versions for CCU3: 3.41.11, 3.43.16, 3.45.5, 3.45.7, 3.47.10, 3.47.15.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,LOW,HIGH,HIGH,3.9,4.2,['CWE-400'],"['cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.41.11:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.43.16:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.45.5:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.45.7:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.10:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu3_firmware:3.47.15:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.35.16:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.41.5:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.41.8:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.41.9:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.45.6:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.45.7:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.47.10:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.47.12:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:2.47.15:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*']",0,0
CVE-2019-9584,eq-3,0.00578,9.8,0.0,1.0,0.0,1.0,1,2019-08-14,1.0,2020-08-18,0.0,,0.0,"eQ-3 Homematic AddOn 'CloudMatic' on CCU2 and CCU3 allows uncontrolled admin access, resulting in the ability to obtain VPN profile details, shutting down the VPN service and to delete the VPN service configuration. This is related to improper access control for all /addons/mh/ pages.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-425'],"['cpe:2.3:o:eq-3:homematic_ccu2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*']",0,0
CVE-2019-9585,eq-3,0.00819,9.8,0.0,1.0,0.0,1.0,1,2019-08-14,1.0,2019-07-26,0.0,,1.0,"eQ-3 Homematic CCU2 prior to 2.47.10 and CCU3 prior to 3.47.10 JSON API has Improper Access Control for Interface.***Metadata related operations, resulting in the ability to read, set and deletion of Metadata.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-306'],"['cpe:2.3:o:eq-3:homematic_ccu2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*']",0,0
CVE-2019-9726,eq-3,0.03616,7.5,0.0,1.0,0.0,1.0,1,2019-05-13,0.0,,0.0,,,Directory Traversal / Arbitrary File Read in eQ-3 AG Homematic CCU3 3.43.15 and earlier allows remote attackers to read arbitrary files of the device's filesystem. This vulnerability can be exploited by unauthenticated attackers with access to the web interface.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-22'],"['cpe:2.3:o:eq-3:ccu3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:ccu3:-:*:*:*:*:*:*:*']",0,0
CVE-2019-9727,eq-3,0.01011,7.5,0.0,1.0,0.0,1.0,1,2019-05-13,0.0,,0.0,,,Unauthenticated password hash disclosure in the User.getUserPWD method in eQ-3 AG Homematic CCU3 3.43.15 and earlier allows remote attackers to retrieve the GUI password hashes of GUI users. This vulnerability can be exploited by unauthenticated attackers with access to the web interface.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-306'],"['cpe:2.3:o:eq-3:ccu3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:ccu3:-:*:*:*:*:*:*:*']",0,0
CVE-2020-12834,eq-3,0.01292,9.8,0.0,1.0,0.0,1.0,1,2020-05-15,1.0,2020-08-25,0.0,,0.0,"eQ-3 Homematic Central Control Unit (CCU)2 through 2.51.6 and CCU3 through 3.51.6 allow Remote Code Execution in the JSON API Method ReGa.runScript, by unauthenticated attackers with access to the web interface, due to the default auto-login feature being enabled during first-time setup (or factory reset).",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-276'],"['cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:ccu3_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2021-33032,eq-3,0.03429,10.0,0.0,1.0,0.0,1.0,1,2021-07-22,1.0,2021-07-06,0.0,,1.0,A Remote Code Execution (RCE) vulnerability in the WebUI component of the eQ-3 HomeMatic CCU2 firmware up to and including version 2.57.5 and CCU3 firmware up to and including version 3.57.5 allows remote unauthenticated attackers to execute system commands as root via a simple HTTP request.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,CHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,6.0,['CWE-78'],"['cpe:2.3:o:eq-3:homematic_ccu2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:homematic_ccu3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:homematic_ccu3:-:*:*:*:*:*:*:*']",0,0
CVE-2019-10119,eq-3,0.00244,9.8,0.0,1.0,0.0,1.0,0,2019-07-10,0.0,,0.0,,,"eQ-3 HomeMatic CCU2 devices before 2.41.8 and CCU3 devices before 3.43.16 use session IDs for authentication but lack authorization checks. An attacker can obtain a session ID via an invalid login attempt to the RemoteApi account, aka HMCCU-154. This leads to automatic login as admin.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-306'],"['cpe:2.3:o:eq-3:ccu3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:ccu3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:ccu2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:ccu2:-:*:*:*:*:*:*:*']",0,0
CVE-2019-10120,eq-3,0.00104,8.8,0.0,1.0,0.0,1.0,0,2019-07-10,0.0,,0.0,,,"On eQ-3 HomeMatic CCU2 devices before 2.41.8 and CCU3 devices before 3.43.16, automatic login configuration (aka setAutoLogin) can be achieved by continuing to use a session ID after a logout, aka HMCCU-154.",CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-384'],"['cpe:2.3:o:eq-3:ccu3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:ccu3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:ccu2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:ccu2:-:*:*:*:*:*:*:*']",0,0
CVE-2019-10121,eq-3,0.006,9.8,0.0,1.0,0.0,1.0,0,2019-07-10,0.0,,0.0,,,"eQ-3 HomeMatic CCU2 devices before 2.41.8 and CCU3 devices before 3.43.15 use session IDs for authentication but lack authorization checks. An attacker can obtain a session ID via the user authentication dialogue, aka HMCCU-153. This leads to automatic login as admin.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-306'],"['cpe:2.3:o:eq-3:ccu3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:ccu3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:ccu2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:ccu2:-:*:*:*:*:*:*:*']",0,0
CVE-2019-10122,eq-3,0.01919,9.8,0.0,1.0,0.0,1.0,0,2019-07-10,0.0,,0.0,,,"eQ-3 HomeMatic CCU2 devices before 2.41.9 and CCU3 devices before 3.43.16 have buffer overflows in the ReGa ise GmbH HTTP-Server 2.0 component, aka HMCCU-179. This may lead to remote code execution.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:o:eq-3:ccu3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:ccu3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:ccu2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:ccu2:-:*:*:*:*:*:*:*']",0,0
CVE-2019-14423,eq-3,0.01864,8.8,0.0,0.0,1.0,1.0,0,2019-10-17,1.0,2019-06-21,0.0,,1.0,A Remote Code Execution (RCE) issue in the addon CUx-Daemon 1.11a of the eQ-3 Homematic CCU-Firmware 2.35.16 until 2.45.6 allows remote authenticated attackers to execute system commands as root remotely via a simple HTTP request.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-78'],"['cpe:2.3:a:eq-3:cux-daemon:*:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:ccu2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:ccu2:-:*:*:*:*:*:*:*']",0,0
CVE-2019-14424,eq-3,0.00503,6.5,0.0,0.0,1.0,1.0,0,2019-10-17,1.0,2019-06-21,0.0,,1.0,A Local File Inclusion (LFI) issue in the addon CUx-Daemon 1.11a of the eQ-3 Homematic CCU-Firmware 2.35.16 until 2.45.6 allows remote authenticated attackers to read sensitive files via a simple HTTP Request.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,2.8,3.6,['CWE-22'],"['cpe:2.3:a:eq-3:cux-daemon:*:*:*:*:*:*:*:*', 'cpe:2.3:o:eq-3:ccu2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:eq-3:ccu2:-:*:*:*:*:*:*:*']",0,0
CVE-2019-11001,Reolink,0.00425,7.2,0.0,1.0,0.0,1.0,1,2019-04-08,0.0,,0.0,,,"On Reolink RLC-410W, C1 Pro, C2 Pro, RLC-422W, and RLC-511W devices through 1.0.227, an authenticated admin can use the ""TestEmail"" functionality to inject and run OS commands as root, as demonstrated by shell metacharacters in the addr1 field.",CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.2,5.9,['CWE-78'],"['cpe:2.3:o:reolink:rlc-410w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:reolink:rlc-410w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:reolink:c1_pro_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:reolink:c1_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:o:reolink:c2_pro_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:reolink:c2_pro:-:*:*:*:*:*:*:*', 'cpe:2.3:o:reolink:rlc-422w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:reolink:rlc-422w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:reolink:rlc-511w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:reolink:rlc-511w:-:*:*:*:*:*:*:*']",0,0
CVE-2020-25169,Reolink,0.00162,7.5,0.0,1.0,0.0,1.0,1,2021-01-26,1.0,2021-01-19,,,1.0,"The affected Reolink P2P products do not sufficiently protect data transferred between the local device and Reolink servers. This can allow an attacker to access sensitive information, such as camera feeds.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-319'],"['cpe:2.3:o:reolink:rln8-410_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:reolink:rln8-410:-:*:*:*:*:*:*:*', 'cpe:2.3:o:reolink:rlc-422_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:reolink:rlc-422:-:*:*:*:*:*:*:*', 'cpe:2.3:o:reolink:rlc-510a_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:reolink:rlc-510a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:reolink:rlc-410_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:reolink:rlc-410:-:*:*:*:*:*:*:*', 'cpe:2.3:o:reolink:rlc-423s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:reolink:rlc-423s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:reolink:rlc-423_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:reolink:rlc-423:-:*:*:*:*:*:*:*', 'cpe:2.3:h:reolink:rlc-520a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:reolink:rlc-520a_firmware:-:*:*:*:*:*:*:*']",0,0
CVE-2020-25173,Reolink,0.00042,7.8,0.0,1.0,0.0,1.0,1,2021-01-26,1.0,2021-01-19,,,1.0,An attacker with local network access can obtain a fixed cryptography key which may allow for further compromise of Reolink P2P cameras outside of local network access,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,"['CWE-798', 'CWE-321']","['cpe:2.3:o:reolink:rln8-410_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:reolink:rln8-410:-:*:*:*:*:*:*:*', 'cpe:2.3:o:reolink:rlc-422_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:reolink:rlc-422:-:*:*:*:*:*:*:*', 'cpe:2.3:o:reolink:rlc-510a_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:reolink:rlc-510a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:reolink:rlc-423s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:reolink:rlc-423s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:reolink:rlc-423_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:reolink:rlc-423:-:*:*:*:*:*:*:*', 'cpe:2.3:o:reolink:rlc-410_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:reolink:rlc-410:-:*:*:*:*:*:*:*', 'cpe:2.3:o:reolink:rlc-520a_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:reolink:rlc-520a:-:*:*:*:*:*:*:*']",0,0
CVE-2021-40415,Reolink,0.00074,6.5,0.0,1.0,0.0,0.0,1,2022-01-28,1.0,2022-01-19,,,1.0,"An incorrect default permission vulnerability exists in the cgiserver.cgi cgi_check_ability functionality of reolink RLC-410W v3.0.0.136_20121102. In cgi_check_ability the Format API does not have a specific case, the user permission will default to 7. This will give non-administrative users the possibility to format the SD card and reboot the device.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.8,3.6,"['CWE-276', 'CWE-284']","['cpe:2.3:o:reolink:rlc-410w_firmware:3.0.0.136_20121102:*:*:*:*:*:*:*', 'cpe:2.3:h:reolink:rlc-410w:-:*:*:*:*:*:*:*']",0,0
CVE-2021-44354,Reolink,0.00089,7.5,0.0,1.0,0.0,0.0,1,2022-04-14,1.0,2022-01-19,,,1.0,Multiple denial of service vulnerabilities exist in the cgiserver.cgi JSON command parser functionality of Reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. An attacker can send an HTTP request to trigger this vulnerability.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-20'],"['cpe:2.3:h:reolink:rlc-410w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:reolink:rlc-410w_firmware:3.0.0.136_20121102:*:*:*:*:*:*:*']",0,0
CVE-2021-44363,Reolink,0.00084,7.7,0.0,1.0,0.0,0.0,1,2022-01-28,1.0,2022-01-19,,,1.0,A denial of service vulnerability exists in the cgiserver.cgi JSON command parser functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. SetPush param is not object. An attacker can send an HTTP request to trigger this vulnerability.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H,NETWORK,LOW,LOW,NONE,CHANGED,NONE,NONE,HIGH,HIGH,3.1,4.0,['CWE-20'],"['cpe:2.3:o:reolink:rlc-410w_firmware:3.0.0.136_20121102:*:*:*:*:*:*:*', 'cpe:2.3:h:reolink:rlc-410w:-:*:*:*:*:*:*:*']",0,0
CVE-2021-44368,Reolink,0.00084,7.7,0.0,1.0,0.0,0.0,1,2022-01-28,1.0,2022-01-19,,,1.0,A denial of service vulnerability exists in the cgiserver.cgi JSON command parser functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. SetNetPort param is not object. An attacker can send an HTTP request to trigger this vulnerability.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H,NETWORK,LOW,LOW,NONE,CHANGED,NONE,NONE,HIGH,HIGH,3.1,4.0,['CWE-20'],"['cpe:2.3:o:reolink:rlc-410w_firmware:3.0.0.136_20121102:*:*:*:*:*:*:*', 'cpe:2.3:h:reolink:rlc-410w:-:*:*:*:*:*:*:*']",0,0
CVE-2021-44372,Reolink,0.00084,7.7,0.0,1.0,0.0,0.0,1,2022-01-28,1.0,2022-01-19,,,1.0,A denial of service vulnerability exists in the cgiserver.cgi JSON command parser functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. SetLocalLink param is not object. An attacker can send an HTTP request to trigger this vulnerability.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H,NETWORK,LOW,LOW,NONE,CHANGED,NONE,NONE,HIGH,HIGH,3.1,4.0,['CWE-20'],"['cpe:2.3:o:reolink:rlc-410w_firmware:3.0.0.136_20121102:*:*:*:*:*:*:*', 'cpe:2.3:h:reolink:rlc-410w:-:*:*:*:*:*:*:*']",0,0
CVE-2021-44375,Reolink,0.00089,7.5,0.0,1.0,0.0,0.0,1,2022-04-14,1.0,2022-01-19,,,1.0,Multiple denial of service vulnerabilities exist in the cgiserver.cgi JSON command parser functionality of Reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. An attacker can send an HTTP request to trigger this vulnerability.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-20'],"['cpe:2.3:o:reolink:rlc-410w_firmware:3.0.0.136_20121102:*:*:*:*:*:*:*', 'cpe:2.3:h:reolink:rlc-410w:-:*:*:*:*:*:*:*']",0,0
CVE-2021-44377,Reolink,0.00084,7.7,0.0,1.0,0.0,0.0,1,2022-01-28,1.0,2022-01-19,,,1.0,A denial of service vulnerability exists in the cgiserver.cgi JSON command parser functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. SetImage param is not object. An attacker can send an HTTP request to trigger this vulnerability.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H,NETWORK,LOW,LOW,NONE,CHANGED,NONE,NONE,HIGH,HIGH,3.1,4.0,['CWE-20'],"['cpe:2.3:o:reolink:rlc-410w_firmware:3.0.0.136_20121102:*:*:*:*:*:*:*', 'cpe:2.3:h:reolink:rlc-410w:-:*:*:*:*:*:*:*']",0,0
CVE-2021-44379,Reolink,0.00084,7.7,0.0,1.0,0.0,0.0,1,2022-01-28,1.0,2022-01-19,,,1.0,A denial of service vulnerability exists in the cgiserver.cgi JSON command parser functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. SetAutoMaint param is not object. An attacker can send an HTTP request to trigger this vulnerability.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H,NETWORK,LOW,LOW,NONE,CHANGED,NONE,NONE,HIGH,HIGH,3.1,4.0,['CWE-20'],"['cpe:2.3:o:reolink:rlc-410w_firmware:3.0.0.136_20121102:*:*:*:*:*:*:*', 'cpe:2.3:h:reolink:rlc-410w:-:*:*:*:*:*:*:*']",0,0
CVE-2021-44384,Reolink,0.00084,7.7,0.0,1.0,0.0,0.0,1,2022-01-28,1.0,2022-01-19,,,1.0,A denial of service vulnerability exists in the cgiserver.cgi JSON command parser functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. SetPtzTattern param is not object. An attacker can send an HTTP request to trigger this vulnerability.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H,NETWORK,LOW,LOW,NONE,CHANGED,NONE,NONE,HIGH,HIGH,3.1,4.0,['CWE-20'],"['cpe:2.3:o:reolink:rlc-410w_firmware:3.0.0.136_20121102:*:*:*:*:*:*:*', 'cpe:2.3:h:reolink:rlc-410w:-:*:*:*:*:*:*:*']",0,0
CVE-2021-44389,Reolink,0.00084,7.7,0.0,1.0,0.0,0.0,1,2022-01-28,1.0,2022-01-19,,,1.0,A denial of service vulnerability exists in the cgiserver.cgi JSON command parser functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. GetAbility param is not object. An attacker can send an HTTP request to trigger this vulnerability.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H,NETWORK,LOW,LOW,NONE,CHANGED,NONE,NONE,HIGH,HIGH,3.1,4.0,['CWE-20'],"['cpe:2.3:o:reolink:rlc-410w_firmware:3.0.0.136_20121102:*:*:*:*:*:*:*', 'cpe:2.3:h:reolink:rlc-410w:-:*:*:*:*:*:*:*']",0,0
CVE-2021-44393,Reolink,0.00084,7.7,0.0,1.0,0.0,0.0,1,2022-01-28,1.0,2022-01-19,,,1.0,A denial of service vulnerability exists in the cgiserver.cgi JSON command parser functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. GetIsp param is not object. An attacker can send an HTTP request to trigger this vulnerability.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H,NETWORK,LOW,LOW,NONE,CHANGED,NONE,NONE,HIGH,HIGH,3.1,4.0,['CWE-20'],"['cpe:2.3:o:reolink:rlc-410w_firmware:3.0.0.136_20121102:*:*:*:*:*:*:*', 'cpe:2.3:h:reolink:rlc-410w:-:*:*:*:*:*:*:*']",0,0
CVE-2021-44396,Reolink,0.00084,7.7,0.0,1.0,0.0,0.0,1,2022-01-28,1.0,2022-01-19,,,1.0,A denial of service vulnerability exists in the cgiserver.cgi JSON command parser functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. Preview param is not object. An attacker can send an HTTP request to trigger this vulnerability.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H,NETWORK,LOW,LOW,NONE,CHANGED,NONE,NONE,HIGH,HIGH,3.1,4.0,['CWE-20'],"['cpe:2.3:o:reolink:rlc-410w_firmware:3.0.0.136_20121102:*:*:*:*:*:*:*', 'cpe:2.3:h:reolink:rlc-410w:-:*:*:*:*:*:*:*']",0,0
CVE-2021-44400,Reolink,0.00084,7.7,0.0,1.0,0.0,0.0,1,2022-01-28,1.0,2022-01-19,,,1.0,A denial of service vulnerability exists in the cgiserver.cgi JSON command parser functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. GetPtzPatrol param is not object. An attacker can send an HTTP request to trigger this vulnerability.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H,NETWORK,LOW,LOW,NONE,CHANGED,NONE,NONE,HIGH,HIGH,3.1,4.0,['CWE-20'],"['cpe:2.3:o:reolink:rlc-410w_firmware:3.0.0.136_20121102:*:*:*:*:*:*:*', 'cpe:2.3:h:reolink:rlc-410w:-:*:*:*:*:*:*:*']",0,0
CVE-2021-44401,Reolink,0.00084,7.7,0.0,1.0,0.0,0.0,1,2022-01-28,1.0,2022-01-19,,,1.0,A denial of service vulnerability exists in the cgiserver.cgi JSON command parser functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. PtzCtrl param is not object. An attacker can send an HTTP request to trigger this vulnerability.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H,NETWORK,LOW,LOW,NONE,CHANGED,NONE,NONE,HIGH,HIGH,3.1,4.0,['CWE-20'],"['cpe:2.3:o:reolink:rlc-410w_firmware:3.0.0.136_20121102:*:*:*:*:*:*:*', 'cpe:2.3:h:reolink:rlc-410w:-:*:*:*:*:*:*:*']",0,0
CVE-2021-44409,Reolink,0.00084,7.7,0.0,1.0,0.0,0.0,1,2022-01-28,1.0,2022-01-19,,,1.0,A denial of service vulnerability exists in the cgiserver.cgi JSON command parser functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. TestWifi param is not object. An attacker can send an HTTP request to trigger this vulnerability.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H,NETWORK,LOW,LOW,NONE,CHANGED,NONE,NONE,HIGH,HIGH,3.1,4.0,['CWE-20'],"['cpe:2.3:o:reolink:rlc-410w_firmware:3.0.0.136_20121102:*:*:*:*:*:*:*', 'cpe:2.3:h:reolink:rlc-410w:-:*:*:*:*:*:*:*']",0,0
CVE-2021-44413,Reolink,0.00084,7.7,0.0,1.0,0.0,0.0,1,2022-01-28,1.0,2022-01-19,,,1.0,A denial of service vulnerability exists in the cgiserver.cgi JSON command parser functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. AddUser param is not object. An attacker can send an HTTP request to trigger this vulnerability.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H,NETWORK,LOW,LOW,NONE,CHANGED,NONE,NONE,HIGH,HIGH,3.1,4.0,['CWE-20'],"['cpe:2.3:o:reolink:rlc-410w_firmware:3.0.0.136_20121102:*:*:*:*:*:*:*', 'cpe:2.3:h:reolink:rlc-410w:-:*:*:*:*:*:*:*']",0,0
CVE-2022-21134,Reolink,0.00257,7.5,0.0,1.0,0.0,0.0,1,2022-01-28,0.0,,0.0,,,A firmware update vulnerability exists in the "update" firmware checks functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to firmware update. An attacker can send a sequence of requests to trigger this vulnerability.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,HIGH,NONE,HIGH,3.9,3.6,['CWE-347'],"['cpe:2.3:o:reolink:rlc-410w_firmware:3.0.0.136_20121102:*:*:*:*:*:*:*', 'cpe:2.3:h:reolink:rlc-410w:-:*:*:*:*:*:*:*']",0,0
CVE-2022-21199,Reolink,0.00162,5.9,0.0,1.0,0.0,0.0,1,2022-01-28,0.0,,0.0,,,An information disclosure vulnerability exists due to the hardcoded TLS key of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted man-in-the-middle attack can lead to a disclosure of sensitive information. An attacker can perform a man-in-the-middle attack to trigger this vulnerability.,CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,HIGH,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,2.2,3.6,"['CWE-798', 'CWE-321']","['cpe:2.3:o:reolink:rlc-410w_firmware:3.0.0.136_20121102:*:*:*:*:*:*:*', 'cpe:2.3:h:reolink:rlc-410w:-:*:*:*:*:*:*:*']",0,0
CVE-2022-21217,Reolink,0.00265,9.8,0.0,1.0,0.0,0.0,1,2022-01-28,0.0,,0.0,,,An out-of-bounds write vulnerability exists in the device TestEmail functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted network request can lead to an out-of-bounds write. An attacker can send an HTTP request to trigger this vulnerability.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,"['CWE-787', 'CWE-457']","['cpe:2.3:o:reolink:rlc-410w_firmware:3.0.0.136_20121102:*:*:*:*:*:*:*', 'cpe:2.3:h:reolink:rlc-410w:-:*:*:*:*:*:*:*']",0,0
CVE-2022-21236,Reolink,0.00653,7.5,0.0,1.0,0.0,0.0,1,2022-01-28,1.0,2022-01-19,,,1.0,An information disclosure vulnerability exists due to a web server misconfiguration in the Reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a disclosure of sensitive information. An attacker can send an HTTP request to trigger this vulnerability.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,"['CWE-552', 'CWE-219']","['cpe:2.3:o:reolink:rlc-410w_firmware:3.0.0.136_20121102:*:*:*:*:*:*:*', 'cpe:2.3:h:reolink:rlc-410w:-:*:*:*:*:*:*:*']",0,0
CVE-2022-21796,Reolink,0.00078,8.2,0.0,1.0,0.0,0.0,1,2022-01-28,0.0,,0.0,,,A memory corruption vulnerability exists in the netserver parse_command_list functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to an out-of-bounds write. An attacker can send an HTTP request to trigger this vulnerability.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,LOW,HIGH,HIGH,3.9,4.2,"['CWE-787', 'CWE-20']","['cpe:2.3:o:reolink:rlc-410w_firmware:3.0.0.136_20121102:*:*:*:*:*:*:*', 'cpe:2.3:h:reolink:rlc-410w:-:*:*:*:*:*:*:*']",0,0
CVE-2022-21801,Reolink,0.00129,7.5,0.0,1.0,0.0,0.0,1,2022-01-28,0.0,,0.0,,,A denial of service vulnerability exists in the netserver recv_command functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted network request can lead to a reboot. An attacker can send a malicious packet to trigger this vulnerability.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-190'],"['cpe:2.3:o:reolink:rlc-410w_firmware:3.0.0.136_20121102:*:*:*:*:*:*:*', 'cpe:2.3:h:reolink:rlc-410w:-:*:*:*:*:*:*:*']",0,0
CVE-2019-11064,GeoVision,0.00457,9.8,0.0,1.0,0.0,1.0,1,2019-08-29,0.0,,0.0,,,A vulnerability of remote credential disclosure was discovered in Advan VD-1 firmware versions up to 230. An attacker can export system configuration which is not encrypted to get the administrator’s account and password in plain text via cgibin/ExportSettings.cgi?Export=1 without any authentication.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,"['CWE-287', 'CWE-200']","['cpe:2.3:o:androvideo:vd_1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:androvideo:vd_1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:geovision:gv-vr360_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:geovision:gv-vr360:-:*:*:*:*:*:*:*', 'cpe:2.3:o:geovision:gv-vd8700_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:geovision:gv-vd8700:-:*:*:*:*:*:*:*']",0,0
CVE-2019-13407,GeoVision,0.00085,6.1,0.0,1.0,0.0,1.0,1,2019-08-29,0.0,,0.0,,,A XSS found in Advan VD-1 firmware versions up to 230. VD-1 responses a path error message when a requested resource was not found in page cgibin/ssi.cgi. It leads to a reflected XSS because the error message does not escape properly.,CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],"['cpe:2.3:o:androvideo:vd_1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:androvideo:vd_1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:geovision:gv-vr360_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:geovision:gv-vr360:-:*:*:*:*:*:*:*', 'cpe:2.3:o:geovision:gv-vd8700_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:geovision:gv-vd8700:-:*:*:*:*:*:*:*']",0,0
CVE-2019-13408,GeoVision,0.00365,7.5,0.0,1.0,0.0,1.0,1,2019-08-29,0.0,,0.0,,,"A relative path traversal vulnerability found in Advan VD-1 firmware versions up to 230. It allows attackers to download arbitrary files via url cgibin/ExportSettings.cgi?Download=filepath, without any authentication.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,"['CWE-22', 'CWE-23']","['cpe:2.3:o:androvideo:vd_1_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:androvideo:vd_1:-:*:*:*:*:*:*:*', 'cpe:2.3:o:geovision:gv-vr360_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:geovision:gv-vr360:-:*:*:*:*:*:*:*', 'cpe:2.3:o:geovision:gv-vd8700_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:geovision:gv-vd8700:-:*:*:*:*:*:*:*']",0,0
CVE-2020-3930,GeoVision,0.00044,3.3,0.0,1.0,0.0,1.0,1,2020-06-12,1.0,2020-06-12,,,1.0,"GeoVision Door Access Control device family improperly stores and controls access to system logs, any users can read these logs.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N,LOCAL,LOW,LOW,NONE,UNCHANGED,LOW,NONE,NONE,LOW,1.8,1.4,['CWE-532'],"['cpe:2.3:o:geovision:gv-gf192x_firmware:1.10:*:*:*:*:*:*:*', 'cpe:2.3:h:geovision:gv-gf192x:-:*:*:*:*:*:*:*']",0,0
CVE-2020-3931,GeoVision,0.00448,9.8,0.0,1.0,0.0,1.0,0,2020-07-08,1.0,2020-07-08,,,1.0,"Buffer overflow exists in Geovision Door Access Control device family, an unauthenticated remote attacker can execute arbitrary command.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-120'],"['cpe:2.3:o:geovision:gv-as210_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:geovision:gv-as210:-:*:*:*:*:*:*:*', 'cpe:2.3:o:geovision:gv-as410_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:geovision:gv-as410:-:*:*:*:*:*:*:*', 'cpe:2.3:o:geovision:gv-as810_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:geovision:gv-as810:-:*:*:*:*:*:*:*', 'cpe:2.3:o:geovision:gv-gf1921_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:geovision:gv-gf1921:-:*:*:*:*:*:*:*', 'cpe:2.3:o:geovision:gv-as1010_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:geovision:gv-as1010:-:*:*:*:*:*:*:*', 'cpe:2.3:o:geovision:gv-gf1922_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:geovision:gv-gf1922:-:*:*:*:*:*:*:*']",0,0
CVE-2019-13379,AV Tech Corp,0.01289,8.8,0.0,1.0,0.0,0.0,1,2019-07-07,1.0,2019-05-23,,,1.0,"On AVTECH Room Alert 3E devices before 2.2.5, an attacker with access to the device's web interface may escalate privileges from an unauthenticated user to administrator by performing a cmd.cgi?action=ResetDefaults&src=RA reset and using the default credentials to get in.",CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-668'],"['cpe:2.3:o:avtech:room_alert_3e_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:avtech:room_alert_3e:-:*:*:*:*:*:*:*']",0,0
CVE-2019-16241,TCL,0.001,6.8,0.0,1.0,0.0,1.0,1,2019-11-26,0.0,,0.0,,,"On TCL Alcatel Cingular Flip 2 B9HUAH1 devices, PIN authentication can be bypassed by creating a special file within the /data/local/tmp/ directory. The System application that implements the lock screen checks for the existence of a specific file and disables PIN authentication if it exists. This file would typically be created via Android Debug Bridge (adb) over USB.",CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,PHYSICAL,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.9,5.9,['CWE-668'],"['cpe:2.3:o:alcatelmobile:cingular_flip_2_firmware:b9huah1:*:*:*:*:*:*:*', 'cpe:2.3:h:alcatelmobile:cingularl_flip_2:-:*:*:*:*:*:*:*']",0,0
CVE-2019-16242,TCL,0.00284,6.8,0.0,1.0,0.0,1.0,1,2019-11-26,0.0,,0.0,,,"On TCL Alcatel Cingular Flip 2 B9HUAH1 devices, there is an engineering application named omamock that is vulnerable to OS command injection. An attacker with physical access to the device can abuse this vulnerability to execute arbitrary OS commands as the root user via the application's UI.",CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,PHYSICAL,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.9,5.9,['CWE-78'],"['cpe:2.3:o:alcatelmobile:cingular_flip_2_firmware:b9huah1:*:*:*:*:*:*:*', 'cpe:2.3:h:alcatelmobile:cingular_flip_2:-:*:*:*:*:*:*:*']",0,0
CVE-2019-16243,TCL,0.00076,6.1,0.0,1.0,0.0,1.0,1,2019-11-26,0.0,,0.0,,,"On TCL Alcatel Cingular Flip 2 B9HUAH1 devices, there is an undocumented web API that allows unprivileged JavaScript, including JavaScript running within the KaiOS browser, to view and edit the device's firmware over-the-air update settings. (This web API is normally used by the system application to trigger firmware updates via OmaService.js.)",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-306'],"['cpe:2.3:o:alcatelmobile:cingular_flip_2_firmware:b9huah1:*:*:*:*:*:*:*', 'cpe:2.3:h:alcatelmobile:cingular_flip_2:-:*:*:*:*:*:*:*']",0,0
CVE-2019-7163,TCL,0.00434,9.8,0.0,1.0,0.0,1.0,1,2019-08-02,0.0,,0.0,,,The web interface of Alcatel LINKZONE MW40-V-V1.0 MW40_LU_02.00_02 devices is vulnerable to an authentication bypass that allows an unauthenticated user to have access to the web interface without knowing the administrator's password.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-287'],"['cpe:2.3:o:tcl:alcatel_linkzone_firmware:mw40-v-v1.0_mw40_lu_02.00_02:*:*:*:*:*:*:*', 'cpe:2.3:h:tcl:alcatel_linkzone:-:*:*:*:*:*:*:*']",0,0
CVE-2016-9796,TCL,0.07222,9.8,1.0,0.0,1.0,0.0,0,2016-12-03,0.0,,1.0,2016-10-29,,"Alcatel-Lucent OmniVista 8770 2.0 through 3.0 exposes different ORBs interfaces, which can be queried using the GIOP protocol on TCP port 30024. An attacker can bypass authentication, and OmniVista invokes methods (AddJobSet, AddJob, and ExecuteNow) that can be used to run arbitrary commands on the server, with the privilege of NT AUTHORITY\SYSTEM on the server. NOTE: The discoverer states ""The vendor position is to refer to the technical guidelines of the product security deployment to mitigate this issue, which means applying proper firewall rules to prevent unauthorised clients to connect to the OmniVista server.""",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-264'],"['cpe:2.3:a:alcatel-lucent:omnivista_8770_network_management_system:2.0:*:*:*:*:*:*:*', 'cpe:2.3:a:alcatel-lucent:omnivista_8770_network_management_system:2.6:*:*:*:*:*:*:*', 'cpe:2.3:a:alcatel-lucent:omnivista_8770_network_management_system:3.0:*:*:*:*:*:*:*']",1,1
CVE-2020-27403,TCL,0.00175,6.5,0.0,1.0,0.0,1.0,0,2020-11-10,1.0,2020-10-30,,,1.0,"A vulnerability in the TCL Android Smart TV series V8-R851T02-LF1 V295 and below and V8-T658T01-LF1 V373 and below by TCL Technology Group Corporation allows an attacker on the adjacent network to arbitrarily browse and download sensitive files over an insecure web server running on port 7989 that lists all files & directories. An unprivileged remote attacker on the adjacent network, can download most system files, leading to serious critical information disclosure. Also, some TV models and/or FW versions may expose the webserver with the entire filesystem accessible on another port. For example, nmap scan for all ports run directly from the TV model U43P6046 (Android 8.0) showed port 7983 not mentioned in the original CVE description, but containing the same directory listing of the entire filesystem. This webserver is bound (at least) to localhost interface and accessible freely to all unprivileged installed apps on the Android such as a regular web browser. Any app can therefore read any files of any other apps including Android system settings including sensitive data such as saved passwords, private keys etc.",CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,2.8,3.6,['CWE-200'],"['cpe:2.3:o:tcl:32s330_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:tcl:32s330:-:*:*:*:*:*:*:*', 'cpe:2.3:o:tcl:40s330_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:tcl:40s330:-:*:*:*:*:*:*:*', 'cpe:2.3:o:tcl:43s434_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:tcl:43s434:-:*:*:*:*:*:*:*', 'cpe:2.3:o:tcl:50s434_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:tcl:50s434:-:*:*:*:*:*:*:*', 'cpe:2.3:o:tcl:55s434_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:tcl:55s434:-:*:*:*:*:*:*:*', 'cpe:2.3:o:tcl:65s434_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:tcl:65s434:-:*:*:*:*:*:*:*', 'cpe:2.3:o:tcl:75s434_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:tcl:75s434:-:*:*:*:*:*:*:*']",0,0
CVE-2020-28055,TCL,0.00125,7.8,0.0,1.0,0.0,1.0,0,2020-11-10,1.0,2020-10-30,,,1.0,"A vulnerability in the TCL Android Smart TV series V8-R851T02-LF1 V295 and below and V8-T658T01-LF1 V373 and below by TCL Technology Group Corporation allows a local unprivileged attacker, such as a malicious App, to read & write to the /data/vendor/tcl, /data/vendor/upgrade, and /var/TerminalManager directories within the TV file system. An attacker, such as a malicious APK or local unprivileged user could perform fake system upgrades by writing to the /data/vendor/upgrage folder.",CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-732'],"['cpe:2.3:h:tcl:32s330:-:*:*:*:*:*:*:*', 'cpe:2.3:o:tcl:32s330_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:tcl:40s330:-:*:*:*:*:*:*:*', 'cpe:2.3:o:tcl:40s330_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:tcl:43s434:-:*:*:*:*:*:*:*', 'cpe:2.3:o:tcl:43s434_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:tcl:50s434:-:*:*:*:*:*:*:*', 'cpe:2.3:o:tcl:50s434_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:tcl:55s434:-:*:*:*:*:*:*:*', 'cpe:2.3:o:tcl:55s434_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:tcl:65s434:-:*:*:*:*:*:*:*', 'cpe:2.3:o:tcl:65s434_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:tcl:75s434:-:*:*:*:*:*:*:*', 'cpe:2.3:o:tcl:75s434_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2021-35331,TCL,0.00413,7.8,0.0,0.0,1.0,0.0,0,2021-07-05,1.0,2021-06-22,,,1.0,"In Tcl 8.6.11, a format string vulnerability in nmakehlp.c might allow code execution via a crafted file. NOTE: multiple third parties dispute the significance of this finding",CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,LOCAL,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,['CWE-134'],['cpe:2.3:a:tcl:tcl:8.6.11:*:*:*:*:*:*:*'],0,0
CVE-2019-6113,ONKYO,0.00801,7.5,0.0,0.0,0.0,1.0,1,2019-08-30,0.0,,0.0,,,Directory traversal vulnerability on ONKYO TX-NR686 1030-5000-1040-0010 A/V Receiver devices allows remote attackers to read arbitrary files via a .. (dot dot) and %2f to the default URI.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-22'],"['cpe:2.3:h:onkyo:tx-nr686:-:*:*:*:*:*:*:*', 'cpe:2.3:o:onkyo:tx-nr686_firmware:1030-5000-1040-0010:*:*:*:*:*:*:*']",0,0
CVE-2020-12447,ONKYO,0.02897,7.5,0.0,0.0,0.0,1.0,0,2020-04-29,0.0,,0.0,,,"A Local File Inclusion (LFI) issue on Onkyo TX-NR585 1000-0000-000-0008-0000 devices allows remote unauthenticated users on the network to read sensitive files via %2e%2e%2f directory traversal, as demonstrated by reading /etc/shadow.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-22'],"['cpe:2.3:o:onkyo:tx-nr585_firmware:1000-0000-000-0008-0000:*:*:*:*:*:*:*', 'cpe:2.3:h:onkyo:tx-nr585:-:*:*:*:*:*:*:*']",0,0
CVE-2019-7676,Enphase,0.00241,7.2,0.0,0.0,1.0,0.0,1,2019-02-09,0.0,,0.0,,,A weak password vulnerability was discovered in Enphase Envoy R3.*.*. One can login via TCP port 8888 with the admin password for the admin account.,CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.2,5.9,['CWE-521'],['cpe:2.3:a:enphase:envoy:*:*:*:*:*:*:*:*'],0,0
CVE-2020-25752,Enphase,0.00179,5.3,0.0,1.0,0.0,1.0,1,2021-06-16,0.0,,0.0,,,An issue was discovered on Enphase Envoy R3.x and D4.x devices. There are hardcoded web-panel login passwords for the installer and Enphase accounts. The passwords for these accounts are hardcoded values derived from the MD5 hash of the username and serial number mixed with some static strings. The serial number can be retrieved by an unauthenticated user at /info.xml. These passwords can be easily calculated by an attacker; users are unable to change these passwords.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,LOW,NONE,NONE,MEDIUM,3.9,1.4,['CWE-798'],"['cpe:2.3:h:enphase:envoy:-:*:*:*:*:*:*:*', 'cpe:2.3:o:enphase:envoy_firmware:d4.0:*:*:*:*:*:*:*', 'cpe:2.3:o:enphase:envoy_firmware:r3.0:*:*:*:*:*:*:*']",0,0
CVE-2020-25753,Enphase,0.01301,9.8,0.0,1.0,0.0,1.0,1,2021-06-16,0.0,,0.0,,,An issue was discovered on Enphase Envoy R3.x and D4.x devices with v3 software. The default admin password is set to the last 6 digits of the serial number. The serial number can be retrieved by an unauthenticated user at /info.xml.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:o:enphase:envoy_firmware:d4.0:*:*:*:*:*:*:*', 'cpe:2.3:o:enphase:envoy_firmware:r3.0:*:*:*:*:*:*:*', 'cpe:2.3:h:enphase:envoy:-:*:*:*:*:*:*:*']",0,0
CVE-2019-7677,Enphase,0.00144,6.1,0.0,0.0,1.0,0.0,0,2019-02-09,0.0,,0.0,,,XSS exists in Enphase Envoy R3.*.* via the profileName parameter to the /home URI on TCP port 8888.,CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],['cpe:2.3:a:enphase:envoy:*:*:*:*:*:*:*:*'],0,0
CVE-2019-7678,Enphase,0.00242,9.8,0.0,0.0,1.0,0.0,0,2019-02-09,0.0,,0.0,,,"A directory traversal vulnerability was discovered in Enphase Envoy R3.*.* via images/, include/, include/js, or include/css on TCP port 8888.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-22'],['cpe:2.3:a:enphase:envoy:*:*:*:*:*:*:*:*'],0,0
CVE-2020-25754,Enphase,0.00296,7.5,0.0,1.0,0.0,1.0,0,2021-06-16,0.0,,0.0,,,An issue was discovered on Enphase Envoy R3.x and D4.x devices. There is a custom PAM module for user authentication that circumvents traditional user authentication. This module uses a password derived from the MD5 hash of the username and serial number. The serial number can be retrieved by an unauthenticated user at /info.xml. Attempts to change the user password via passwd or other tools have no effect.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,HIGH,3.9,3.6,['CWE-916'],"['cpe:2.3:o:enphase:envoy_firmware:d4.0:*:*:*:*:*:*:*', 'cpe:2.3:o:enphase:envoy_firmware:r3.0:*:*:*:*:*:*:*', 'cpe:2.3:h:enphase:envoy:-:*:*:*:*:*:*:*']",0,0
CVE-2020-25755,Enphase,0.02042,8.8,0.0,1.0,0.0,1.0,0,2021-06-16,0.0,,0.0,,,An issue was discovered on Enphase Envoy R3.x and D4.x (and other current) devices. The upgrade_start function in /installer/upgrade_start allows remote authenticated users to execute arbitrary commands via the force parameter.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-78'],"['cpe:2.3:o:enphase:envoy_firmware:d4.0:*:*:*:*:*:*:*', 'cpe:2.3:o:enphase:envoy_firmware:r3.0:*:*:*:*:*:*:*', 'cpe:2.3:h:enphase:envoy:-:*:*:*:*:*:*:*']",0,0
CVE-2019-9564,WyzeCam,0.00115,9.8,0.0,1.0,0.0,1.0,1,2022-03-30,1.0,2022-03-29,,,1.0,"A vulnerability in the authentication logic of Wyze Cam Pan v2, Cam v2, Cam v3 allows an attacker to bypass login and control the devices. This issue affects: Wyze Cam Pan v2 versions prior to 4.49.1.47. Wyze Cam v2 versions prior to 4.9.8.1002. Wyze Cam v3 versions prior to 4.36.8.32.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-287'],"['cpe:2.3:o:wyze:cam_pan_v2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:wyze:cam_pan_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:wyze:cam_v2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:wyze:cam_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:wyze:cam_v3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:wyze:cam_v3:-:*:*:*:*:*:*:*']",0,0
CVE-2019-12266,WyzeCam,0.00284,9.8,0.0,1.0,0.0,1.0,0,2022-03-30,1.0,2022-03-29,,,1.0,"Stack-based Buffer Overflow vulnerability in Wyze Cam Pan v2, Cam v2, Cam v3 allows an attacker to run arbitrary code on the affected device. This issue affects: Wyze Cam Pan v2 versions prior to 4.49.1.47. Wyze Cam v2 versions prior to 4.9.8.1002. Wyze Cam v3 versions prior to 4.36.8.32.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,"['CWE-787', 'CWE-121']","['cpe:2.3:h:wyze:cam_pan_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:wyze:cam_pan_v2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:wyze:cam_v2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:wyze:cam_v2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:wyze:cam_v3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:wyze:cam_v3_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2020-8824,Hitron,0.00058,5.4,0.0,1.0,0.0,1.0,1,2020-02-19,0.0,,0.0,,,Hitron CODA-4582U 7.1.1.30 devices allow XSS via a Managed Device name on the Wireless > Access Control > Add Managed Device screen.,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,LOW,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.3,2.7,['CWE-79'],"['cpe:2.3:o:hitrontech:coda-4582u_firmware:7.1.1.30:*:*:*:*:*:*:*', 'cpe:2.3:h:hitrontech:coda-4582u:-:*:*:*:*:*:*:*']",0,0
CVE-2022-25017,Hitron,0.00277,8.8,0.0,1.0,0.0,1.0,0,2022-04-01,0.0,,0.0,,,Hitron CHITA 7.2.2.0.3b6-CD devices contain a command injection vulnerability via the Device/DDNS ddnsUsername field.,CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-78'],"['cpe:2.3:o:hitrontech:chita_firmware:7.2.2.0.3b6-cd:*:*:*:*:*:*:*', 'cpe:2.3:h:hitrontech:chita:-:*:*:*:*:*:*:*']",0,0
CVE-2021-20643,ELECOM,0.0018,7.5,0.0,1.0,0.0,1.0,1,2021-02-12,0.0,,1.0,2021-01-26,,Improper access control vulnerability in ELECOM LD-PS/U1 allows remote attackers to change the administrative password of the affected device by processing a specially crafted request.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,HIGH,NONE,HIGH,3.9,3.6,['NVD-CWE-Other'],"['cpe:2.3:o:elecom:ld-ps\\/u1_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:ld-ps\\/u1:-:*:*:*:*:*:*:*']",0,0
CVE-2021-20644,ELECOM,0.00084,6.1,0.0,1.0,0.0,1.0,1,2021-02-12,0.0,,1.0,2021-01-26,,ELECOM WRC-1467GHBK-A allows arbitrary scripts to be executed on the user's web browser by displaying a specially crafted SSID on the web setup page.,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-74'],"['cpe:2.3:o:elecom:wrc-1467ghbk-a_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1467ghbk-a:-:*:*:*:*:*:*:*']",0,0
CVE-2021-20645,ELECOM,0.00066,5.4,0.0,1.0,0.0,1.0,1,2021-02-12,0.0,,1.0,2021-01-26,,Cross-site scripting vulnerability in ELECOM WRC-300FEBK-A allows remote authenticated attackers to inject arbitrary script via unspecified vectors.,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,LOW,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.3,2.7,['CWE-79'],"['cpe:2.3:o:elecom:wrc-300febk-a_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-300febk-a:-:*:*:*:*:*:*:*']",0,0
CVE-2021-20646,ELECOM,0.00077,6.5,0.0,1.0,0.0,1.0,1,2021-02-12,0.0,,1.0,2021-01-26,,"Cross-site request forgery (CSRF) vulnerability in ELECOM WRC-300FEBK-A allows remote attackers to hijack the authentication of administrators and execute an arbitrary request via unspecified vector. As a result, the device settings may be altered and/or telnet daemon may be started.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,NONE,HIGH,NONE,MEDIUM,2.8,3.6,['CWE-352'],"['cpe:2.3:o:elecom:wrc-300febk-a_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-300febk-a:-:*:*:*:*:*:*:*']",0,0
CVE-2021-20647,ELECOM,0.00077,6.5,0.0,1.0,0.0,1.0,1,2021-02-12,0.0,,1.0,2021-01-26,,"Cross-site request forgery (CSRF) vulnerability in ELECOM WRC-300FEBK-S allows remote attackers to hijack the authentication of administrators and execute an arbitrary request via unspecified vector. As a result, the device settings may be altered and/or telnet daemon may be started.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,NONE,HIGH,NONE,MEDIUM,2.8,3.6,['CWE-352'],"['cpe:2.3:o:elecom:wrc-300febk-s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-300febk-s:-:*:*:*:*:*:*:*']",0,0
CVE-2021-20648,ELECOM,0.00044,6.8,0.0,1.0,0.0,1.0,1,2021-02-12,0.0,,1.0,2021-01-26,,ELECOM WRC-300FEBK-S allows an attacker with administrator rights to execute arbitrary OS commands via unspecified vectors.,CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.9,5.9,['CWE-78'],"['cpe:2.3:o:elecom:wrc-300febk-s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-300febk-s:-:*:*:*:*:*:*:*']",0,0
CVE-2021-20649,ELECOM,0.00065,4.8,0.0,1.0,0.0,1.0,1,2021-02-12,0.0,,1.0,2021-01-26,,"ELECOM WRC-300FEBK-S contains an improper certificate validation vulnerability. Via a man-in-the-middle attack, an attacker may alter the communication response. As a result, an arbitrary OS command may be executed on the affected device.",CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N,NETWORK,HIGH,NONE,NONE,UNCHANGED,LOW,LOW,NONE,MEDIUM,2.2,2.5,['CWE-295'],"['cpe:2.3:o:elecom:wrc-300febk-s_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-300febk-s:-:*:*:*:*:*:*:*']",0,0
CVE-2021-20650,ELECOM,0.00077,6.5,0.0,1.0,0.0,1.0,1,2021-02-12,0.0,,1.0,2021-01-26,,"Cross-site request forgery (CSRF) vulnerability in ELECOM NCC-EWF100RMWH2 allows remote attackers to hijack the authentication of administrators and execute an arbitrary request via unspecified vector. As a result, the device settings may be altered and/or telnet daemon may be started.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,NONE,HIGH,NONE,MEDIUM,2.8,3.6,['CWE-352'],"['cpe:2.3:o:elecom:ncc-ewf100rmwh2_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:ncc-ewf100rmwh2:-:*:*:*:*:*:*:*']",0,0
CVE-2021-20852,ELECOM,0.00044,6.8,0.0,1.0,0.0,0.0,1,2021-12-01,1.0,2021-11-30,,,1.0,Buffer overflow vulnerability in ELECOM LAN routers (WRH-733GBK firmware v1.02.9 and prior and WRH-733GWH firmware v1.02.9 and prior) allows a network-adjacent attacker with an administrator privilege to execute an arbitrary OS command via unspecified vectors.,CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.9,5.9,['CWE-120'],"['cpe:2.3:h:elecom:wrh-733gbk:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrh-733gbk_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrh-733gwh:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrh-733gwh_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2021-20853,ELECOM,0.00044,6.8,0.0,1.0,0.0,0.0,1,2021-12-01,1.0,2021-11-30,,,1.0,ELECOM LAN routers (WRH-733GBK firmware v1.02.9 and prior and WRH-733GWH firmware v1.02.9 and prior) allows a network-adjacent attacker with an administrator privilege to execute arbitrary OS commands via unspecified vectors.,CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.9,5.9,['CWE-78'],"['cpe:2.3:o:elecom:wrh-733gbk_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrh-733gbk:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrh-733gwh_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrh-733gwh:-:*:*:*:*:*:*:*']",0,0
CVE-2021-20854,ELECOM,0.00044,6.8,0.0,1.0,0.0,0.0,1,2021-12-01,1.0,2021-11-30,,,1.0,ELECOM LAN routers (WRH-733GBK firmware v1.02.9 and prior and WRH-733GWH firmware v1.02.9 and prior) allows a network-adjacent attacker with an administrator privilege to execute arbitrary OS commands via unspecified vectors.,CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.9,5.9,['CWE-78'],"['cpe:2.3:o:elecom:wrh-733gbk_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrh-733gbk:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrh-733gwh_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrh-733gwh:-:*:*:*:*:*:*:*']",0,0
CVE-2021-20855,ELECOM,0.00066,5.4,0.0,1.0,0.0,0.0,1,2021-12-01,1.0,2021-11-30,,,1.0,Cross-site scripting vulnerability in ELECOM LAN routers (WRH-733GBK firmware v1.02.9 and prior and WRH-733GWH firmware v1.02.9 and prior) allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors.,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,LOW,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.3,2.7,['CWE-79'],"['cpe:2.3:o:elecom:wrh-733gbk_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrh-733gbk:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrh-733gwh_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrh-733gwh:-:*:*:*:*:*:*:*']",0,0
CVE-2021-20856,ELECOM,0.00066,5.4,0.0,1.0,0.0,0.0,1,2021-12-01,1.0,2021-11-30,,,1.0,Cross-site scripting vulnerability in ELECOM LAN routers (WRH-733GBK firmware v1.02.9 and prior and WRH-733GWH firmware v1.02.9 and prior) allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors.,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,LOW,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.3,2.7,['CWE-79'],"['cpe:2.3:o:elecom:wrh-733gbk_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrh-733gbk:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrh-733gwh_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrh-733gwh:-:*:*:*:*:*:*:*']",0,0
CVE-2021-20857,ELECOM,0.00066,5.4,0.0,1.0,0.0,0.0,1,2021-12-01,1.0,2021-11-30,,,1.0,Cross-site scripting vulnerability in ELECOM LAN router WRC-2533GHBK-I firmware v1.20 and prior allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors.,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,LOW,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.3,2.7,['CWE-79'],"['cpe:2.3:h:elecom:wrc-2533ghbk-i:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533ghbk-i_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2021-20858,ELECOM,0.00066,5.4,0.0,1.0,0.0,0.0,1,2021-12-01,1.0,2021-11-30,,,1.0,Cross-site scripting vulnerability in ELECOM LAN router WRC-2533GHBK-I firmware v1.20 and prior allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors.,CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,LOW,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.3,2.7,['CWE-79'],"['cpe:2.3:o:elecom:wrc-2533ghbk-i_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533ghbk-i:-:*:*:*:*:*:*:*']",0,0
CVE-2021-20860,ELECOM,0.00086,8.8,0.0,1.0,0.0,1.0,1,2021-12-01,1.0,2021-11-30,,,1.0,"Cross-site request forgery (CSRF) vulnerability in ELECOM LAN routers (WRC-1167GST2 firmware v1.25 and prior, WRC-1167GST2A firmware v1.25 and prior, WRC-1167GST2H firmware v1.25 and prior, WRC-2533GS2-B firmware v1.52 and prior, WRC-2533GS2-W firmware v1.52 and prior, WRC-1750GS firmware v1.03 and prior, WRC-1750GSV firmware v2.11 and prior, WRC-1900GST firmware v1.03 and prior, WRC-2533GST firmware v1.03 and prior, WRC-2533GSTA firmware v1.03 and prior, WRC-2533GST2 firmware v1.25 and prior, WRC-2533GST2SP firmware v1.25 and prior, WRC-2533GST2-G firmware v1.25 and prior, and EDWRC-2533GST2 firmware v1.25 and prior) allows a remote authenticated attacker to hijack the authentication of an administrator via a specially crafted page.",CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-352'],"['cpe:2.3:o:elecom:wrc-1167gst2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1167gst2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-1167gst2a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1167gst2a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-1167gst2h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1167gst2h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gs2-b_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gs2-b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gs2-w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gs2-w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-1750gs_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1750gs:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-1750gsv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1750gsv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-1900gst_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1900gst:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gst_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gst:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gst2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gst2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gsta_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gsta:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gst2sp_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gst2sp:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gst2-g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gst2-g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:edwrc-2533gst2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:edwrc-2533gst2:-:*:*:*:*:*:*:*']",0,0
CVE-2021-20861,ELECOM,0.00077,8.8,0.0,1.0,0.0,1.0,1,2021-12-01,0.0,,1.0,2021-01-26,,"Improper access control vulnerability in ELECOM LAN routers (WRC-1167GST2 firmware v1.25 and prior, WRC-1167GST2A firmware v1.25 and prior, WRC-1167GST2H firmware v1.25 and prior, WRC-2533GS2-B firmware v1.52 and prior, WRC-2533GS2-W firmware v1.52 and prior, WRC-1750GS firmware v1.03 and prior, WRC-1750GSV firmware v2.11 and prior, WRC-1900GST firmware v1.03 and prior, WRC-2533GST firmware v1.03 and prior, WRC-2533GSTA firmware v1.03 and prior, WRC-2533GST2 firmware v1.25 and prior, WRC-2533GST2SP firmware v1.25 and prior, WRC-2533GST2-G firmware v1.25 and prior, and EDWRC-2533GST2 firmware v1.25 and prior) allows a network-adjacent authenticated attacker to bypass access restriction and to access the management screen of the product via unspecified vectors.",CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['NVD-CWE-Other'],"['cpe:2.3:o:elecom:wrc-1167gst2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1167gst2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-1167gst2a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1167gst2a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-1167gst2h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1167gst2h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gs2-b_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gs2-b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gs2-w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gs2-w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-1750gs_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1750gs:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-1750gsv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1750gsv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-1900gst_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1900gst:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gst_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gst:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gst2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gst2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gsta_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gsta:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gst2sp_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gst2sp:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gst2-g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gst2-g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:edwrc-2533gst2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:edwrc-2533gst2:-:*:*:*:*:*:*:*']",0,0
CVE-2021-20863,ELECOM,0.00044,8.0,0.0,1.0,0.0,1.0,1,2021-12-01,1.0,2021-11-30,,,1.0,"OS command injection vulnerability in ELECOM routers (WRC-1167GST2 firmware v1.25 and prior, WRC-1167GST2A firmware v1.25 and prior, WRC-1167GST2H firmware v1.25 and prior, WRC-2533GS2-B firmware v1.52 and prior, WRC-2533GS2-W firmware v1.52 and prior, WRC-1750GS firmware v1.03 and prior, WRC-1750GSV firmware v2.11 and prior, WRC-1900GST firmware v1.03 and prior, WRC-2533GST firmware v1.03 and prior, WRC-2533GSTA firmware v1.03 and prior, WRC-2533GST2 firmware v1.25 and prior, WRC-2533GST2SP firmware v1.25 and prior, WRC-2533GST2-G firmware v1.25 and prior, and EDWRC-2533GST2 firmware v1.25 and prior) allows a network-adjacent authenticated attackers to execute an arbitrary OS command with the root privilege via unspecified vectors.",CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.1,5.9,['CWE-78'],"['cpe:2.3:o:elecom:wrc-1167gst2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1167gst2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-1167gst2a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1167gst2a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-1167gst2h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1167gst2h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gs2-b_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gs2-b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gs2-w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gs2-w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-1750gs_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1750gs:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-1750gsv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1750gsv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-1900gst_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1900gst:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gst_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gst:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gst2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gst2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gsta_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gsta:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gst2sp_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gst2sp:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gst2-g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gst2-g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:edwrc-2533gst2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:edwrc-2533gst2:-:*:*:*:*:*:*:*']",0,0
CVE-2020-5634,ELECOM,0.00077,8.8,0.0,1.0,0.0,1.0,0,2020-10-06,1.0,2020-10-05,,,1.0,"ELECOM LAN routers (WRC-2533GST2 firmware versions prior to v1.14, WRC-1900GST2 firmware versions prior to v1.14, WRC-1750GST2 firmware versions prior to v1.14, and WRC-1167GST2 firmware versions prior to v1.10) allow an attacker on the same network segment to execute arbitrary OS commands with a root privilege via unspecified vectors.",CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:h:elecom:wrc-2533gst2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gst2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1900gst2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-1900gst2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1750gst2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-1750gst2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1167gst2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-1167gst2_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2021-20651,ELECOM,0.00271,9.1,0.0,0.0,1.0,0.0,0,2021-02-12,0.0,,1.0,2021-01-26,,Directory traversal vulnerability in ELECOM File Manager all versions allows remote attackers to create an arbitrary file or overwrite an existing file in a directory which can be accessed with the application privileges via unspecified vectors.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,HIGH,HIGH,CRITICAL,3.9,5.2,['CWE-22'],['cpe:2.3:a:elecom:file_manager:*:*:*:*:*:*:*:*'],0,0
CVE-2021-20738,ELECOM,0.00074,6.5,0.0,1.0,0.0,0.0,0,2021-07-07,0.0,,1.0,2021-07-06,,"WRC-1167FS-W, WRC-1167FS-B, and WRC-1167FSA all versions allow an unauthenticated network-adjacent attacker to obtain sensitive information via unspecified vectors.",CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,2.8,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:elecom:wrc-1167fs-w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1167fs-w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-1167fs-b_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1167fs-b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-1167fsa_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1167fsa:-:*:*:*:*:*:*:*']",0,0
CVE-2021-20739,ELECOM,0.00078,8.8,0.0,1.0,0.0,0.0,0,2021-07-07,0.0,,1.0,2021-07-06,,"WRC-300FEBK, WRC-F300NF, WRC-733FEBK, WRH-300RD, WRH-300BK, WRH-300SV, WRH-300WH, WRH-H300WH, WRH-H300BK, WRH-300BK-S, and WRH-300WH-S all versions allows an unauthenticated network-adjacent attacker to execute an arbitrary OS command via unspecified vectors.",CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-78'],"['cpe:2.3:h:elecom:wrc-300febk:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-300febk_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-f300nf:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-f300nf_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-733febk:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-733febk_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrh-300rd:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrh-300rd_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrh-300bk:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrh-300bk_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrh-300sv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrh-300sv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrh-300wh:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrh-300wh_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrh-h300wh:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrh-h300wh_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrh-h300bk_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrh-h300bk:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrh-300bk-s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrh-300bk-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrh-300wh-s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrh-300wh-s:-:*:*:*:*:*:*:*']",0,0
CVE-2021-20859,ELECOM,0.00044,8.0,0.0,1.0,0.0,1.0,0,2021-12-01,1.0,2021-11-30,,,1.0,"ELECOM LAN routers (WRC-1167GST2 firmware v1.25 and prior, WRC-1167GST2A firmware v1.25 and prior, WRC-1167GST2H firmware v1.25 and prior, WRC-2533GS2-B firmware v1.52 and prior, WRC-2533GS2-W firmware v1.52 and prior, WRC-1750GS firmware v1.03 and prior, WRC-1750GSV firmware v2.11 and prior, WRC-1900GST firmware v1.03 and prior, WRC-2533GST firmware v1.03 and prior, WRC-2533GSTA firmware v1.03 and prior, WRC-2533GST2 firmware v1.25 and prior, WRC-2533GST2SP firmware v1.25 and prior, WRC-2533GST2-G firmware v1.25 and prior, and EDWRC-2533GST2 firmware v1.25 and prior) allows a network-adjacent authenticated attacker to execute an arbitrary OS command via unspecified vectors.",CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.1,5.9,['CWE-78'],"['cpe:2.3:o:elecom:wrc-1167gst2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1167gst2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-1167gst2a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1167gst2a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-1167gst2h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1167gst2h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gs2-b_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gs2-b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gs2-w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gs2-w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-1750gs_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1750gs:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-1750gsv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1750gsv:-:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1900gst:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-1900gst_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gst:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gst_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gst2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gst2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gsta:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gsta_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gst2sp_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gst2sp:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gst2-g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gst2-g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:edwrc-2533gst2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:edwrc-2533gst2:-:*:*:*:*:*:*:*']",0,0
CVE-2021-20862,ELECOM,0.00063,4.3,0.0,1.0,0.0,1.0,0,2021-12-01,1.0,2021-11-30,,,1.0,"Improper access control vulnerability in ELECOM routers (WRC-1167GST2 firmware v1.25 and prior, WRC-1167GST2A firmware v1.25 and prior, WRC-1167GST2H firmware v1.25 and prior, WRC-2533GS2-B firmware v1.52 and prior, WRC-2533GS2-W firmware v1.52 and prior, WRC-1750GS firmware v1.03 and prior, WRC-1750GSV firmware v2.11 and prior, WRC-1900GST firmware v1.03 and prior, WRC-2533GST firmware v1.03 and prior, WRC-2533GSTA firmware v1.03 and prior, WRC-2533GST2 firmware v1.25 and prior, WRC-2533GST2SP firmware v1.25 and prior, WRC-2533GST2-G firmware v1.25 and prior, and EDWRC-2533GST2 firmware v1.25 and prior) allows a network-adjacent unauthenticated attacker to bypass access restriction, and to obtain anti-CSRF tokens and change the product's settings via unspecified vectors.",CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,LOW,NONE,MEDIUM,2.8,1.4,['NVD-CWE-Other'],"['cpe:2.3:o:elecom:wrc-1167gst2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1167gst2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-1167gst2a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1167gst2a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-1167gst2h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1167gst2h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gs2-b_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gs2-b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gs2-w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gs2-w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-1750gs_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1750gs:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-1750gsv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1750gsv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-1900gst_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1900gst:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gst_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gst:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gst2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gst2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gsta_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gsta:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gst2sp_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gst2sp:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gst2-g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gst2-g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:edwrc-2533gst2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:edwrc-2533gst2:-:*:*:*:*:*:*:*']",0,0
CVE-2021-20864,ELECOM,0.00077,8.8,0.0,1.0,0.0,1.0,0,2021-12-01,1.0,2021-11-30,,,1.0,"Improper access control vulnerability in ELECOM routers (WRC-1167GST2 firmware v1.25 and prior, WRC-1167GST2A firmware v1.25 and prior, WRC-1167GST2H firmware v1.25 and prior, WRC-2533GS2-B firmware v1.52 and prior, WRC-2533GS2-W firmware v1.52 and prior, WRC-1750GS firmware v1.03 and prior, WRC-1750GSV firmware v2.11 and prior, WRC-1900GST firmware v1.03 and prior, WRC-2533GST firmware v1.03 and prior, WRC-2533GSTA firmware v1.03 and prior, WRC-2533GST2 firmware v1.25 and prior, WRC-2533GST2SP firmware v1.25 and prior, WRC-2533GST2-G firmware v1.25 and prior, and EDWRC-2533GST2 firmware v1.25 and prior) allows a network-adjacent unauthenticated attacker to bypass access restriction, and to start the telnet service and execute an arbitrary OS command via unspecified vectors.",CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['NVD-CWE-Other'],"['cpe:2.3:o:elecom:wrc-1167gst2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1167gst2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-1167gst2a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1167gst2a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-1167gst2h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1167gst2h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gs2-b_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gs2-b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gs2-w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gs2-w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-1750gs_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1750gs:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-1750gsv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1750gsv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-1900gst_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1900gst:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gst_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gst:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gst2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gst2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gsta_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gsta:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gst2sp_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gst2sp:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gst2-g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gst2-g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:edwrc-2533gst2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:edwrc-2533gst2:-:*:*:*:*:*:*:*']",0,0
CVE-2022-21173,ELECOM,0.00068,8.8,0.0,1.0,0.0,0.0,0,2022-02-08,1.0,2022-02-08,,,1.0,"Hidden functionality vulnerability in ELECOM LAN routers (WRH-300BK3 firmware v1.05 and earlier, WRH-300WH3 firmware v1.05 and earlier, WRH-300BK3-S firmware v1.05 and earlier, WRH-300DR3-S firmware v1.05 and earlier, WRH-300LB3-S firmware v1.05 and earlier, WRH-300PN3-S firmware v1.05 and earlier, WRH-300WH3-S firmware v1.05 and earlier, and WRH-300YG3-S firmware v1.05 and earlier) allows an attacker on the adjacent network to execute an arbitrary OS command via unspecified vectors.",CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['NVD-CWE-Other'],"['cpe:2.3:h:elecom:wrh-300bk3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrh-300bk3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrh-300wh3:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrh-300wh3_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrh-300bk3-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrh-300bk3-s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrh-300wh3-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrh-300wh3-s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrh-300lb3-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrh-300lb3-s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrh-300pn3-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrh-300pn3-s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrh-300yg3-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrh-300yg3-s_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrh-300dr3-s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrh-300dr3-s_firmware:*:*:*:*:*:*:*:*']",0,0
CVE-2022-21799,ELECOM,0.00055,5.2,0.0,1.0,0.0,0.0,0,2022-02-08,1.0,2022-02-08,,,1.0,Cross-site scripting vulnerability in ELECOM LAN router WRC-300FEBK-R firmware v1.13 and earlier allows an attacker on the adjacent network to inject an arbitrary script via unspecified vectors.,CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,ADJACENT_NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.1,2.7,['CWE-79'],"['cpe:2.3:o:elecom:wrc-300febk-r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-300febk-r:-:*:*:*:*:*:*:*']",0,0
CVE-2022-25915,ELECOM,0.00068,8.8,0.0,1.0,0.0,1.0,0,2022-03-31,1.0,2021-11-30,,,1.0,"Improper access control vulnerability in ELECOM LAN routers (WRC-1167GST2 firmware v1.25 and prior, WRC-1167GST2A firmware v1.25 and prior, WRC-1167GST2H firmware v1.25 and prior, WRC-2533GS2-B firmware v1.52 and prior, WRC-2533GS2-W firmware v1.52 and prior, WRC-1750GS firmware v1.03 and prior, WRC-1750GSV firmware v2.11 and prior, WRC-1900GST firmware v1.03 and prior, WRC-2533GST firmware v1.03 and prior, WRC-2533GSTA firmware v1.03 and prior, WRC-2533GST2 firmware v1.25 and prior, WRC-2533GST2SP firmware v1.25 and prior, WRC-2533GST2-G firmware v1.25 and prior, and EDWRC-2533GST2 firmware v1.25 and prior) allows a network-adjacent authenticated attacker to bypass access restriction and to access the management screen of the product via unspecified vectors.",CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['NVD-CWE-Other'],"['cpe:2.3:h:elecom:wrc-1167gst2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-1167gst2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1167gst2a:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-1167gst2a_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1167gst2h:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-1167gst2h_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gs2-b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gs2-b_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gs2-w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gs2-w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1750gs:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-1750gs_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1750gsv:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-1750gsv_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1900gst:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-1900gst_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gst_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gst:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gst2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gst2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gsta_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gsta:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gst2sp_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gst2sp:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-2533gst2-g_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-2533gst2-g:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:edwrc-2533gst2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:edwrc-2533gst2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-1167gs2-b_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1167gs2-b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-1167gs2h-b_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1167gs2h-b:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wmc-dlgst2-w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wmc-dlgst2-w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wmc-m1267gst2-w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wmc-m1267gst2-w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wmc-2hc-w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wmc-2hc-w:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wmc-c2533gst-w_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wmc-c2533gst-w:-:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1900gst2:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-1900gst2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-1900gst2sp_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1900gst2sp:-:*:*:*:*:*:*:*', 'cpe:2.3:o:elecom:wrc-1750gst2_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:elecom:wrc-1750gst2:-:*:*:*:*:*:*:*']",0,0
CVE-2021-32234,Smarter,0.01297,9.8,0.0,0.0,1.0,0.0,1,2021-11-17,1.0,2021-10-14,,,1.0,SmarterTools SmarterMail 16.x through 100.x before 100.0.7803 allows remote code execution.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['NVD-CWE-noinfo'],['cpe:2.3:a:smartertools:smartermail:*:*:*:*:*:*:*:*'],0,0
CVE-2017-14620,Smarter,0.00261,6.1,1.0,0.0,1.0,0.0,0,2017-09-30,1.0,2017-09-28,,,1.0,SmarterStats Version 11.3.6347 will Render the Referer Field of HTTP Logfiles from URL /Data/Reports/ReferringURLsWithQueries resulting in Stored Cross Site Scripting.,CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],['cpe:2.3:a:smartertools:smarterstats:11.3.6347:*:*:*:*:*:*:*'],1,0
CVE-2019-7211,Smarter,0.00084,6.1,0.0,0.0,1.0,0.0,0,2019-04-24,1.0,2019-02-26,,,1.0,SmarterTools SmarterMail 16.x before build 6995 has stored XSS. JavaScript code could be executed on the application by opening a malicious email or when viewing a malicious file attachment.,CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],['cpe:2.3:a:smartertools:smartermail:*:*:*:*:*:*:*:*'],0,0
CVE-2019-7212,Smarter,0.00255,8.2,0.0,0.0,1.0,0.0,0,2019-04-24,1.0,2019-02-25,,,1.0,SmarterTools SmarterMail 16.x before build 6985 has hardcoded secret keys. An unauthenticated attacker could access other users’ emails and file attachments. It was also possible to interact with mailing lists.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,LOW,NONE,HIGH,3.9,4.2,['CWE-798'],['cpe:2.3:a:smartertools:smartermail:*:*:*:*:*:*:*:*'],0,0
CVE-2019-7213,Smarter,0.00062,6.5,0.0,0.0,1.0,0.0,0,2019-04-24,1.0,2019-02-25,,,1.0,SmarterTools SmarterMail 16.x before build 6985 allows directory traversal. An authenticated user could delete arbitrary files or could create files in new folders in arbitrary locations on the mail server. This could lead to command execution on the server for instance by putting files inside the web directories.,CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N,NETWORK,LOW,LOW,NONE,UNCHANGED,NONE,HIGH,NONE,MEDIUM,2.8,3.6,['CWE-22'],['cpe:2.3:a:smartertools:smartermail:*:*:*:*:*:*:*:*'],0,0
CVE-2019-7214,Smarter,0.81423,9.8,1.0,0.0,1.0,0.0,0,2019-04-24,1.0,2019-02-25,,,1.0,SmarterTools SmarterMail 16.x before build 6985 allows deserialization of untrusted data. An unauthenticated attacker could run commands on the server when port 17001 was remotely accessible. This port is not accessible remotely by default after applying the Build 6985 patch.,CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-502'],['cpe:2.3:a:smartertools:smartermail:*:*:*:*:*:*:*:*'],1,0
CVE-2020-15501,Smarter,0.00082,6.5,0.0,1.0,0.0,0.0,0,2020-10-07,0.0,,1.0,,,Smarter Coffee Maker before 2nd generation allows firmware replacement without authentication or authorization. User interaction is required to press a button. NOTE: This vulnerability only affects products that are no longer supported by the maintainer,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,NONE,HIGH,NONE,MEDIUM,2.8,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:smarter:smarter_coffee_maker_1st_generation:-:*:*:*:*:*:*:*', 'cpe:2.3:h:smarter:smarter_coffee_maker_1st_generation:-:*:*:*:*:*:*:*']",0,0
CVE-2020-29548,Smarter,0.00308,8.1,0.0,0.0,1.0,0.0,0,2021-08-17,1.0,2020-08-27,,,1.0,"An issue was discovered in SmarterTools SmarterMail through 100.0.7537. Meddler-in-the-middle attackers can pipeline commands after a POP3 STLS command, injecting plaintext commands into an encrypted user session.",CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,HIGH,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.2,5.9,['CWE-77'],['cpe:2.3:a:smartertools:smartermail:*:*:*:*:*:*:*:*'],0,0
CVE-2021-32233,Smarter,0.00078,6.1,0.0,0.0,1.0,0.0,0,2021-07-06,1.0,2021-10-14,,,0.0,SmarterTools SmarterMail before Build 7776 allows XSS.,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],['cpe:2.3:a:smartertools:smartermail:*:*:*:*:*:*:*:*'],0,0
CVE-2021-40377,Smarter,0.00054,5.4,0.0,0.0,1.0,0.0,0,2021-09-08,1.0,2021-07-28,,,1.0,"SmarterTools SmarterMail 16.x before build 7866 has stored XSS. The application fails to sanitize email content, thus allowing one to inject HTML and/or JavaScript into a page that will then be processed and stored by the application.",CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,LOW,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.3,2.7,['CWE-79'],['cpe:2.3:a:smartertools:smartermail:*:*:*:*:*:*:*:*'],0,0
CVE-2021-43977,Smarter,0.00084,6.1,0.0,0.0,1.0,0.0,0,2021-11-17,1.0,2021-10-14,,,1.0,SmarterTools SmarterMail 16.x through 100.x before 100.0.7803 allows XSS.,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N,NETWORK,LOW,NONE,REQUIRED,CHANGED,LOW,LOW,NONE,MEDIUM,2.8,2.7,['CWE-79'],['cpe:2.3:a:smartertools:smartermail:*:*:*:*:*:*:*:*'],0,0
CVE-2021-3788,Binatone,0.00069,6.8,0.0,1.0,0.0,1.0,1,2021-11-12,1.0,2021-09-14,,,1.0,An exposed debug interface was reported in some Motorola-branded Binatone Hubble Cameras that could allow an attacker with physical access unauthorized access to the device.,CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,PHYSICAL,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.9,5.9,"['CWE-287', 'CWE-1299']","['cpe:2.3:o:binatoneglobal:halo\\+_camera_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:halo\\+_camera:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:comfort_85_connect_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:comfort_85_connect:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:mbp3855_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:mbp3855:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:focus_68_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:focus_68:v100:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:focus_68_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:focus_68:v200:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:focus_72r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:focus_72r:v100:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:focus_72r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:focus_72r:v200:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:cn28_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:cn28:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:cn50_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:cn50:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:comfort_40_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:comfort_40:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:comfort_50_connect_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:comfort_50_connect:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:mbp4855_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:mbp4855:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:mbp3667_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:mbp3667:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:mbp669_connect_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:mbp669_connect:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:lux_64_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:lux_64:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:lux_65_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:lux_65:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:connect_view_65_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:connect_view_65:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:lux_85_connect_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:lux_85_connect:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:ease44_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:ease44:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:connect_20_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:connect_20:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:mbp6855_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:mbp6855:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:cn40_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:cn40:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:cn75_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:cn75:-:*:*:*:*:*:*:*']",0,0
CVE-2021-3789,Binatone,0.00061,4.6,0.0,1.0,0.0,1.0,1,2021-11-12,1.0,2021-09-14,,,1.0,An information disclosure vulnerability was reported in some Motorola-branded Binatone Hubble Cameras that could allow an attacker with physical access to obtain the encryption key used to decrypt firmware update packages.,CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,PHYSICAL,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,0.9,3.6,"['CWE-326', 'CWE-522']","['cpe:2.3:o:binatoneglobal:halo\\+_camera_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:halo\\+_camera:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:comfort_85_connect_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:comfort_85_connect:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:mbp3855_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:mbp3855:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:focus_68_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:focus_68:v100:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:focus_68_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:focus_68:v200:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:focus_72r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:focus_72r:v100:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:focus_72r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:focus_72r:v200:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:cn28_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:cn28:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:cn50_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:cn50:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:comfort_40_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:comfort_40:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:comfort_50_connect_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:comfort_50_connect:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:mbp4855_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:mbp4855:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:mbp3667_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:mbp3667:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:mbp669_connect_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:mbp669_connect:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:lux_64_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:lux_64:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:lux_65_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:lux_65:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:connect_view_65_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:connect_view_65:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:lux_85_connect_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:lux_85_connect:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:ease44_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:ease44:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:connect_20_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:connect_20:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:mbp6855_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:mbp6855:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:cn40_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:cn40:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:cn75_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:cn75:-:*:*:*:*:*:*:*']",0,0
CVE-2021-3790,Binatone,0.00084,6.5,0.0,1.0,0.0,1.0,1,2021-11-12,1.0,2021-09-14,,,1.0,A buffer overflow was reported in the local web server of some Motorola-branded Binatone Hubble Cameras that could allow an unauthenticated attacker on the same network to perform a denial-of-service attack against the device.,CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.8,3.6,"['CWE-120', 'CWE-121']","['cpe:2.3:o:binatoneglobal:halo\\+_camera_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:halo\\+_camera:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:comfort_85_connect_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:comfort_85_connect:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:mbp3855_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:mbp3855:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:focus_68_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:focus_68:v100:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:focus_68_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:focus_68:v200:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:focus_72r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:focus_72r:v100:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:focus_72r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:focus_72r:v200:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:cn28_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:cn28:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:cn50_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:cn50:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:comfort_40_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:comfort_40:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:comfort_50_connect_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:comfort_50_connect:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:mbp4855_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:mbp4855:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:mbp3667_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:mbp3667:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:mbp669_connect_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:mbp669_connect:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:lux_64_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:lux_64:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:lux_65_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:lux_65:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:connect_view_65_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:connect_view_65:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:lux_85_connect_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:lux_85_connect:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:ease44_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:ease44:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:connect_20_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:connect_20:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:mbp6855_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:mbp6855:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:cn40_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:cn40:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:cn75_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:cn75:-:*:*:*:*:*:*:*']",0,0
CVE-2021-3791,Binatone,0.0007,6.5,0.0,1.0,0.0,1.0,1,2021-11-12,1.0,2021-09-14,,,1.0,An information disclosure vulnerability was reported in some Motorola-branded Binatone Hubble Cameras that could allow an unauthenticated attacker on the same subnet to download an encrypted log file containing sensitive information such as WiFi SSID and password.,CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,2.8,3.6,['CWE-532'],"['cpe:2.3:o:binatoneglobal:halo\\+_camera_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:halo\\+_camera:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:comfort_85_connect_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:comfort_85_connect:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:mbp3855_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:mbp3855:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:focus_68_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:focus_68:v100:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:focus_68_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:focus_68:v200:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:focus_72r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:focus_72r:v100:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:focus_72r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:focus_72r:v200:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:cn28_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:cn28:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:cn50_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:cn50:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:comfort_40_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:comfort_40:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:comfort_50_connect_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:comfort_50_connect:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:mbp4855_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:mbp4855:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:mbp3667_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:mbp3667:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:mbp669_connect_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:mbp669_connect:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:lux_64_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:lux_64:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:lux_65_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:lux_65:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:connect_view_65_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:connect_view_65:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:lux_85_connect_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:lux_85_connect:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:ease44_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:ease44:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:connect_20_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:connect_20:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:mbp6855_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:mbp6855:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:cn40_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:cn40:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:cn75_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:cn75:-:*:*:*:*:*:*:*']",0,0
CVE-2021-3792,Binatone,0.00084,5.3,0.0,1.0,0.0,1.0,1,2021-11-12,1.0,2021-09-14,,,1.0,Some device communications in some Motorola-branded Binatone Hubble Cameras with backend Hubble services are not encrypted which could lead to the communication channel being accessible by an attacker.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,LOW,NONE,NONE,MEDIUM,3.9,1.4,['CWE-319'],"['cpe:2.3:o:binatoneglobal:halo\\+_camera_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:halo\\+_camera:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:comfort_85_connect_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:comfort_85_connect:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:mbp3855_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:mbp3855:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:focus_68_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:focus_68:v100:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:focus_68_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:focus_68:v200:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:focus_72r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:focus_72r:v100:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:focus_72r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:focus_72r:v200:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:cn28_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:cn28:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:cn50_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:cn50:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:comfort_40_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:comfort_40:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:comfort_50_connect_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:comfort_50_connect:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:mbp4855_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:mbp4855:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:mbp3667_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:mbp3667:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:mbp669_connect_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:mbp669_connect:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:lux_64_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:lux_64:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:lux_65_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:lux_65:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:connect_view_65_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:connect_view_65:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:lux_85_connect_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:lux_85_connect:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:ease44_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:ease44:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:connect_20_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:connect_20:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:mbp6855_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:mbp6855:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:cn40_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:cn40:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:cn75_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:cn75:-:*:*:*:*:*:*:*']",0,0
CVE-2021-3793,Binatone,0.00089,5.3,0.0,1.0,0.0,1.0,1,2021-11-12,1.0,2021-09-14,,,1.0,An improper access control vulnerability was reported in some Motorola-branded Binatone Hubble Cameras which could allow an unauthenticated attacker on the same network as the device to access administrative pages that could result in information disclosure or device firmware update with verified firmware.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,LOW,NONE,NONE,MEDIUM,3.9,1.4,"['NVD-CWE-Other', 'CWE-424']","['cpe:2.3:o:binatoneglobal:halo\\+_camera_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:halo\\+_camera:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:comfort_85_connect_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:comfort_85_connect:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:mbp3855_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:mbp3855:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:focus_68_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:focus_68:v100:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:focus_68_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:focus_68:v200:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:focus_72r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:focus_72r:v100:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:focus_72r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:focus_72r:v200:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:cn28_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:cn28:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:cn50_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:cn50:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:comfort_40_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:comfort_40:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:comfort_50_connect_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:comfort_50_connect:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:mbp4855_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:mbp4855:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:mbp3667_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:mbp3667:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:mbp669_connect_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:mbp669_connect:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:lux_64_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:lux_64:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:lux_65_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:lux_65:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:connect_view_65_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:connect_view_65:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:lux_85_connect_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:lux_85_connect:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:ease44_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:ease44:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:connect_20_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:connect_20:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:mbp6855_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:mbp6855:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:cn40_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:cn40:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:cn75_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:cn75:-:*:*:*:*:*:*:*']",0,0
CVE-2021-3577,Binatone,0.95956,8.8,0.0,1.0,0.0,1.0,0,2021-11-12,1.0,2021-09-14,,,1.0,An unauthenticated remote code execution vulnerability was reported in some Motorola-branded Binatone Hubble Cameras that could allow an attacker on the same network unauthorized access to the device.,CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,"['CWE-863', 'CWE-78']","['cpe:2.3:o:binatoneglobal:halo\\+_camera_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:halo\\+_camera:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:comfort_85_connect_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:comfort_85_connect:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:mbp3855_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:mbp3855:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:focus_68_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:focus_68:v100:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:focus_68_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:focus_68:v200:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:focus_72r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:focus_72r:v100:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:focus_72r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:focus_72r:v200:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:cn28_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:cn28:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:cn50_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:cn50:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:comfort_40_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:comfort_40:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:comfort_50_connect_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:comfort_50_connect:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:mbp4855_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:mbp4855:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:mbp3667_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:mbp3667:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:mbp669_connect_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:mbp669_connect:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:lux_64_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:lux_64:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:lux_65_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:lux_65:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:connect_view_65_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:connect_view_65:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:lux_85_connect_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:lux_85_connect:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:ease44_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:ease44:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:connect_20_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:connect_20:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:mbp6855_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:mbp6855:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:cn40_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:cn40:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:cn75_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:cn75:-:*:*:*:*:*:*:*']",0,0
CVE-2021-3787,Binatone,0.00042,7.8,0.0,1.0,0.0,1.0,0,2021-11-12,1.0,2021-09-14,,,1.0,A vulnerability was reported in some Motorola-branded Binatone Hubble Cameras that could allow an attacker with local access to obtain the MQTT credentials that could result in unauthorized access to backend Hubble services.,CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H,LOCAL,LOW,LOW,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.8,5.9,"['NVD-CWE-noinfo', 'CWE-256']","['cpe:2.3:o:binatoneglobal:halo\\+_camera_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:halo\\+_camera:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:comfort_85_connect_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:comfort_85_connect:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:mbp3855_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:mbp3855:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:focus_68_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:focus_68:v100:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:focus_68_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:focus_68:v200:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:focus_72r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:focus_72r:v100:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:focus_72r_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:focus_72r:v200:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:cn28_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:cn28:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:cn50_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:cn50:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:comfort_40_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:comfort_40:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:comfort_50_connect_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:comfort_50_connect:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:mbp4855_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:mbp4855:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:mbp3667_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:mbp3667:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:mbp669_connect_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:mbp669_connect:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:lux_64_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:lux_64:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:lux_65_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:lux_65:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:connect_view_65_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:connect_view_65:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:lux_85_connect_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:lux_85_connect:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:ease44_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:ease44:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:connect_20_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:connect_20:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:mbp6855_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:mbp6855:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:cn40_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:cn40:-:*:*:*:*:*:*:*', 'cpe:2.3:o:binatoneglobal:cn75_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:binatoneglobal:cn75:-:*:*:*:*:*:*:*']",0,0
CVE-2017-5249,Wink,0.00222,9.8,0.0,0.0,1.0,0.0,0,2018-02-22,1.0,2019-05-10,,,0.0,"In version 6.1.0.19 and prior of Wink Labs's Wink - Smart Home Android app, the OAuth token used by the app to authorize user access is not stored in an encrypted and secure manner.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,"['CWE-312', 'CWE-922']",['cpe:2.3:a:wink:wink:*:*:*:*:*:android:*:*'],0,0
CVE-2018-16618,VTech,0.00749,9.8,0.0,1.0,0.0,0.0,0,2019-06-19,1.0,2018-05-31,,,1.0,"VTech Storio Max before 56.D3JM6 allows remote command execution via shell metacharacters in an Android activity name. It exposes the storeintenttranslate.x service on port 1668 listening for requests on localhost. Requests submitted to this service are checked for a string of random characters followed by the name of an Android activity to start. Activities are started by inserting their name into a string that is executed in a shell command. By inserting metacharacters this can be exploited to run arbitrary commands as root. The requests also match those of the HTTP protocol and can be triggered on any web page rendered on the device by requesting resources stored at an http://127.0.0.1:1668/ URI, as demonstrated by the http://127.0.0.1:1668/dacdb70556479813fab2d92896596eef?';{ping,example.org}' URL.",CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-78'],"['cpe:2.3:o:vtech:storio_max_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:vtech:80-183803:-:*:*:*:*:*:*:*', 'cpe:2.3:h:vtech:80-183804:-:*:*:*:*:*:*:*', 'cpe:2.3:h:vtech:80-183805:-:*:*:*:*:*:*:*', 'cpe:2.3:h:vtech:80-183807:-:*:*:*:*:*:*:*', 'cpe:2.3:h:vtech:80-183822:-:*:*:*:*:*:*:*', 'cpe:2.3:h:vtech:80-183823:-:*:*:*:*:*:*:*', 'cpe:2.3:h:vtech:80-183824:-:*:*:*:*:*:*:*', 'cpe:2.3:h:vtech:80-1838xx:-:*:*:*:*:*:*:*']",0,0
CVE-2018-18558,Espressif,0.00079,6.4,0.0,0.0,1.0,0.0,0,2019-05-13,1.0,2018-11-01,,,1.0,"An issue was discovered in Espressif ESP-IDF 2.x and 3.x before 3.0.6 and 3.1.x before 3.1.1. Insufficient validation of input data in the 2nd stage bootloader allows a physically proximate attacker to bypass secure boot checks and execute arbitrary code, by crafting an application binary that overwrites a bootloader code segment in process_segment in components/bootloader_support/src/esp_image_format.c. The attack is effective when the flash encryption feature is not enabled, or if the attacker finds a different vulnerability that allows them to write this binary to flash memory.",CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,PHYSICAL,HIGH,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.5,5.9,['CWE-20'],"['cpe:2.3:a:espressif:esp-idf:*:*:*:*:*:*:*:*', 'cpe:2.3:a:espressif:esp-idf:*:*:*:*:*:*:*:*']",0,0
CVE-2019-12586,Espressif,0.00176,6.5,0.0,0.0,1.0,0.0,0,2019-09-04,1.0,2019-09-05,,,0.0,"The EAP peer implementation in Espressif ESP-IDF 2.0.0 through 4.0.0 and ESP8266_NONOS_SDK 2.2.0 through 3.1.0 processes EAP Success messages before any EAP method completion or failure, which allows attackers in radio range to cause a denial of service (crash) via a crafted message.",CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.8,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:a:espressif:arduino-esp32:*:*:*:*:*:*:*:*', 'cpe:2.3:a:espressif:arduino-esp32:1.0.3:-:*:*:*:*:*:*', 'cpe:2.3:a:espressif:arduino-esp32:1.0.3:rc1:*:*:*:*:*:*', 'cpe:2.3:a:espressif:arduino-esp32:1.0.3:rc2:*:*:*:*:*:*', 'cpe:2.3:a:espressif:esp-idf:*:*:*:*:*:*:*:*', 'cpe:2.3:a:espressif:esp8266_nonos_sdk:*:*:*:*:*:*:*:*']",0,0
CVE-2019-12587,Espressif,0.00172,8.1,0.0,0.0,1.0,0.0,0,2019-09-04,1.0,2019-09-05,,,0.0,"The EAP peer implementation in Espressif ESP-IDF 2.0.0 through 4.0.0 and ESP8266_NONOS_SDK 2.2.0 through 3.1.0 allows the installation of a zero Pairwise Master Key (PMK) after the completion of any EAP authentication method, which allows attackers in radio range to replay, decrypt, or spoof frames via a rogue access point.",CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,NONE,HIGH,2.8,5.2,['CWE-327'],"['cpe:2.3:a:espressif:esp-idf:*:*:*:*:*:*:*:*', 'cpe:2.3:a:espressif:esp8266_nonos_sdk:*:*:*:*:*:*:*:*']",0,0
CVE-2019-12588,Espressif,0.00163,6.5,0.0,0.0,1.0,0.0,0,2019-09-04,1.0,2019-09-05,,,0.0,"The client 802.11 mac implementation in Espressif ESP8266_NONOS_SDK 2.2.0 through 3.1.0 does not validate correctly the RSN AuthKey suite list count in beacon frames, probe responses, and association responses, which allows attackers in radio range to cause a denial of service (crash) via a crafted message.",CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.8,3.6,['CWE-20'],"['cpe:2.3:a:espressif:arduino_esp8266:*:*:*:*:*:*:*:*', 'cpe:2.3:a:espressif:esp8266_nonos_sdk:*:*:*:*:*:*:*:*']",0,0
CVE-2019-15894,Espressif,0.00079,6.8,0.0,0.0,1.0,0.0,0,2019-10-07,0.0,,1.0,2019-09-03,,"An issue was discovered in Espressif ESP-IDF 2.x, 3.0.x through 3.0.9, 3.1.x through 3.1.6, 3.2.x through 3.2.3, and 3.3.x through 3.3.1. An attacker who uses fault injection to physically disrupt the ESP32 CPU can bypass the Secure Boot digest verification at startup, and boot unverified code from flash. The fault injection attack does not disable the Flash Encryption feature, so if the ESP32 is configured with the recommended combination of Secure Boot and Flash Encryption, then the impact is minimized. If the ESP32 is configured without Flash Encryption then successful fault injection allows arbitrary code execution. To protect devices with Flash Encryption and Secure Boot enabled against this attack, a firmware change must be made to permanently enable Flash Encryption in the field if it is not already permanently enabled.",CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,PHYSICAL,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,MEDIUM,0.9,5.9,['CWE-755'],"['cpe:2.3:a:espressif:esp-idf:*:*:*:*:*:*:*:*', 'cpe:2.3:a:espressif:esp-idf:*:*:*:*:*:*:*:*', 'cpe:2.3:a:espressif:esp-idf:*:*:*:*:*:*:*:*', 'cpe:2.3:a:espressif:esp-idf:*:*:*:*:*:*:*:*']",0,0
CVE-2019-17391,Espressif,0.00061,4.6,0.0,1.0,0.0,1.0,0,2019-11-14,0.0,,1.0,2019-11-01,,"An issue was discovered in the Espressif ESP32 mask ROM code 2016-06-08 0 through 2. Lack of anti-glitch mitigations in the first stage bootloader of the ESP32 chip allows an attacker (with physical access to the device) to read the contents of read-protected eFuses, such as flash encryption and secure boot keys, by injecting a glitch into the power supply of the chip shortly after reset.",CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,PHYSICAL,LOW,NONE,NONE,UNCHANGED,HIGH,NONE,NONE,MEDIUM,0.9,3.6,['CWE-755'],"['cpe:2.3:o:espressif:esp32-d0wd_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:espressif:esp32-d0wd:-:*:*:*:*:*:*:*', 'cpe:2.3:o:espressif:esp32-d2wd_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:espressif:esp32-d2wd:-:*:*:*:*:*:*:*', 'cpe:2.3:o:espressif:esp32-s0wd_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:espressif:esp32-s0wd:-:*:*:*:*:*:*:*', 'cpe:2.3:o:espressif:esp32-pico-d4_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:espressif:esp32-pico-d4:-:*:*:*:*:*:*:*']",0,0
CVE-2020-12638,Espressif,0.00083,6.8,0.0,0.0,1.0,0.0,0,2020-07-23,1.0,2021-02-26,,,0.0,"An encryption-bypass issue was discovered on Espressif ESP-IDF devices through 4.2, ESP8266_NONOS_SDK devices through 3.0.3, and ESP8266_RTOS_SDK devices through 3.3. Broadcasting forged beacon frames forces a device to change its authentication mode to OPEN, effectively disabling its 802.11 encryption.",CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N,ADJACENT_NETWORK,HIGH,NONE,NONE,UNCHANGED,HIGH,HIGH,NONE,MEDIUM,1.6,5.2,['CWE-287'],"['cpe:2.3:a:espressif:esp-idf:*:*:*:*:*:*:*:*', 'cpe:2.3:a:espressif:esp8266_nonos_sdk:*:*:*:*:*:*:*:*', 'cpe:2.3:a:espressif:esp8266_rtos_sdk:*:*:*:*:*:*:*:*']",0,0
CVE-2020-13594,Espressif,0.00093,6.5,0.0,1.0,1.0,0.0,0,2020-08-31,1.0,2020-07-14,,,1.0,"The Bluetooth Low Energy (BLE) controller implementation in Espressif ESP-IDF 4.2 and earlier (for ESP32 devices) does not properly restrict the channel map field of the connection request packet on reception, allowing attackers in radio range to cause a denial of service (crash) via a crafted packet.",CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.8,3.6,['CWE-20'],"['cpe:2.3:a:espressif:esp-idf:*:*:*:*:*:*:*:*', 'cpe:2.3:h:espressif:esp32:-:*:*:*:*:*:*:*']",0,0
CVE-2020-13595,Espressif,0.00093,6.5,0.0,1.0,1.0,0.0,0,2020-08-31,1.0,2020-07-14,,,1.0,The Bluetooth Low Energy (BLE) controller implementation in Espressif ESP-IDF 4.0 through 4.2 (for ESP32 devices) returns the wrong number of completed BLE packets and triggers a reachable assertion on the host stack when receiving a packet with an MIC failure. An attacker within radio range can silently trigger the assertion (which disables the target's BLE stack) by sending a crafted sequence of BLE packets.,CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.8,3.6,['CWE-617'],"['cpe:2.3:h:espressif:esp32:-:*:*:*:*:*:*:*', 'cpe:2.3:a:espressif:esp-idf:*:*:*:*:*:*:*:*']",0,0
CVE-2020-16146,Espressif,0.00163,7.5,0.0,0.0,1.0,0.0,0,2021-01-12,0.0,,0.0,,,"Espressif ESP-IDF 2.x, 3.0.x through 3.0.9, 3.1.x through 3.1.7, 3.2.x through 3.2.3, 3.3.x through 3.3.2, and 4.0.x through 4.0.1 has a Buffer Overflow in BluFi provisioning in btc_blufi_recv_handler function in blufi_prf.c. An attacker can send a crafted BluFi protocol Write Attribute command to characteristic 0xFF01. With manipulated packet fields, there is a buffer overflow.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['CWE-120'],"['cpe:2.3:a:espressif:esp-idf:*:*:*:*:*:*:*:*', 'cpe:2.3:a:espressif:esp-idf:*:*:*:*:*:*:*:*', 'cpe:2.3:a:espressif:esp-idf:*:*:*:*:*:*:*:*', 'cpe:2.3:a:espressif:esp-idf:*:*:*:*:*:*:*:*', 'cpe:2.3:a:espressif:esp-idf:*:*:*:*:*:*:*:*', 'cpe:2.3:a:espressif:esp-idf:*:*:*:*:*:*:*:*']",0,0
CVE-2021-28135,Espressif,0.00144,6.5,0.0,0.0,1.0,0.0,0,2021-09-07,0.0,,0.0,,,"The Bluetooth Classic implementation in Espressif ESP-IDF 4.4 and earlier does not properly handle the reception of continuous unsolicited LMP responses, allowing attackers in radio range to trigger a denial of service (crash) in ESP32 by flooding the target device with LMP Feature Response data.",CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.8,3.6,['NVD-CWE-Other'],['cpe:2.3:a:espressif:esp-idf:*:*:*:*:*:*:*:*'],0,0
CVE-2021-28136,Espressif,0.00115,6.5,0.0,1.0,1.0,0.0,0,2021-09-07,0.0,,0.0,,,"The Bluetooth Classic implementation in Espressif ESP-IDF 4.4 and earlier does not properly handle the reception of multiple LMP IO Capability Request packets during the pairing process, allowing attackers in radio range to trigger memory corruption (and consequently a crash) in ESP32 via a replayed (duplicated) LMP packet.",CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,MEDIUM,2.8,3.6,['CWE-787'],"['cpe:2.3:h:espressif:esp32:-:*:*:*:*:*:*:*', 'cpe:2.3:a:espressif:esp-idf:*:*:*:*:*:*:*:*']",0,0
CVE-2021-28139,Espressif,0.00154,8.8,0.0,1.0,1.0,0.0,0,2021-09-07,0.0,,0.0,,,"The Bluetooth Classic implementation in Espressif ESP-IDF 4.4 and earlier does not properly restrict the Feature Page upon reception of an LMP Feature Response Extended packet, allowing attackers in radio range to trigger arbitrary code execution in ESP32 via a crafted Extended Features bitfield payload.",CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['NVD-CWE-noinfo'],"['cpe:2.3:a:espressif:esp-idf:*:*:*:*:*:*:*:*', 'cpe:2.3:h:espressif:esp32:-:*:*:*:*:*:*:*']",0,0
CVE-2021-34173,Espressif,0.00117,7.5,0.0,1.0,0.0,1.0,0,2021-07-14,0.0,,0.0,,,An attacker can cause a Denial of Service and kernel panic in v4.2 and earlier versions of Espressif esp32 via a malformed beacon csa frame. The device requires a reboot to recover.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,NONE,HIGH,HIGH,3.9,3.6,['NVD-CWE-noinfo'],"['cpe:2.3:o:espressif:esp32_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:espressif:esp32:-:*:*:*:*:*:*:*']",0,0
CVE-2021-41104,Espressif,0.00086,7.5,0.0,1.0,0.0,0.0,0,2021-09-28,1.0,2021-09-02,,,1.0,"ESPHome is a system to control the ESP8266/ESP32. Anyone with web_server enabled and HTTP basic auth configured on version 2021.9.1 or older is vulnerable to an issue in which `web_server` allows over-the-air (OTA) updates without checking user defined basic auth username & password. This issue is patched in version 2021.9.2. As a workaround, one may disable or remove `web_server`.",CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N,NETWORK,LOW,NONE,NONE,UNCHANGED,NONE,HIGH,NONE,HIGH,3.9,3.6,['CWE-306'],"['cpe:2.3:o:esphome:esphome_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:espressif:esp32:-:*:*:*:*:*:*:*', 'cpe:2.3:h:espressif:esp8266:-:*:*:*:*:*:*:*']",0,0
CVE-2022-24893,Espressif,0.00088,8.8,0.0,0.0,1.0,0.0,0,2022-06-25,0.0,,1.0,2022-06-23,,"ESP-IDF is the official development framework for Espressif SoCs. In Espressif’s Bluetooth Mesh SDK (`ESP-BLE-MESH`), a memory corruption vulnerability can be triggered during provisioning, because there is no check for the `SegN` field of the Transaction Start PDU. This can result in memory corruption related attacks and potentially attacker gaining control of the entire system. Patch commits are available on the 4.1, 4.2, 4.3 and 4.4 branches and users are recommended to upgrade. The upgrade is applicable for all applications and users of `ESP-BLE-MESH` component from `ESP-IDF`. As it is implemented in the Bluetooth Mesh stack, there is no workaround for the user to fix the application layer without upgrading the underlying firmware.",CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,['CWE-787'],"['cpe:2.3:a:espressif:esp-idf:4.1.3:*:*:*:*:*:*:*', 'cpe:2.3:a:espressif:esp-idf:4.2.3:*:*:*:*:*:*:*', 'cpe:2.3:a:espressif:esp-idf:4.3.2:*:*:*:*:*:*:*', 'cpe:2.3:a:espressif:esp-idf:4.4.1:*:*:*:*:*:*:*']",0,0
CVE-2020-13109,Nintendo,0.01471,9.8,0.0,1.0,0.0,0.0,0,2020-05-16,0.0,,0.0,,,Morita Shogi 64 through 2020-05-02 for Nintendo 64 devices allows remote attackers to execute arbitrary code via crafted packet data to the built-in modem because 0x800b3e94 (aka the IF subcommand to top-level command 7) has a stack-based buffer overflow.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-787'],"['cpe:2.3:a:seta:morita_shogi_64:*:*:*:*:*:*:*:*', 'cpe:2.3:h:nintendo:nintendo_64:-:*:*:*:*:*:*:*']",0,0
CVE-2022-3216,Nintendo,0.00211,8.8,0.0,1.0,0.0,1.0,0,2022-09-14,0.0,,0.0,,,A vulnerability has been found in Nintendo Game Boy Color and classified as problematic. This vulnerability affects unknown code of the component Mobile Adapter GB. The manipulation leads to memory corruption. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-208606 is the identifier assigned to this vulnerability.,CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,REQUIRED,UNCHANGED,HIGH,HIGH,HIGH,HIGH,2.8,5.9,"['CWE-674', 'CWE-119']","['cpe:2.3:o:nintendo:game_boy_color_firmware:-:*:*:*:*:*:*:*', 'cpe:2.3:h:nintendo:game_boy_color:-:*:*:*:*:*:*:*']",0,0
CVE-2020-21224,Inspur,0.06073,9.8,0.0,0.0,1.0,0.0,0,2021-02-22,1.0,2021-02-23,,,0.0,A Remote Code Execution vulnerability has been found in Inspur ClusterEngine V4.0. A remote attacker can send a malicious login packet to the control server,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-88'],['cpe:2.3:a:inspur:clusterengine:4.0:*:*:*:*:*:*:*'],0,0
CVE-2020-26122,Inspur,0.00959,7.2,0.0,1.0,0.0,1.0,0,2020-12-07,1.0,2021-03-02,,,0.0,"Inspur NF5266M5 through 3.21.2 and other server M5 devices allow remote code execution via administrator privileges. The Baseboard Management Controller (BMC) program of INSPUR server is weak in checking the firmware and lacks the signature verification mechanism, the attacker who obtains the administrator's rights can control the BMC by inserting malicious code into the firmware program and bypassing the current verification mechanism to upgrade the BMC.",CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.2,5.9,['CWE-347'],"['cpe:2.3:o:inspur:nf8480m5_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:inspur:nf8480m5:-:*:*:*:*:*:*:*', 'cpe:2.3:h:inspur:nf8260m5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:inspur:nf8260m5_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:inspur:ns5162m5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:inspur:ns5162m5_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:inspur:ns5488m5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:inspur:ns5488m5_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:inspur:ns5484m5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:inspur:ns5484m5_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:inspur:ns5482m5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:inspur:ns5482m5_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:inspur:nf5280m5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:inspur:nf5280m5_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:inspur:nf5468m5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:inspur:nf5468m5_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:inspur:nf5488m5-d:-:*:*:*:*:*:*:*', 'cpe:2.3:o:inspur:nf5488m5-d_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:o:inspur:nf5180m5_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:inspur:nf5180m5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:inspur:nf5270m5_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:inspur:nf5270m5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:inspur:nf5260m5_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:inspur:nf5260m5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:inspur:nf5266m5_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:inspur:nf5266m5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:inspur:nf5466m5_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:inspur:nf5466m5:-:*:*:*:*:*:*:*', 'cpe:2.3:o:inspur:nf5486m5_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:inspur:nf5486m5:-:*:*:*:*:*:*:*']",0,0
CVE-2020-27483,Garmin,0.00421,9.9,0.0,1.0,0.0,0.0,0,2020-11-16,1.0,2020-10-05,,,1.0,"Garmin Forerunner 235 before 8.20 is affected by: Array index error. The component is: ConnectIQ TVM. The attack vector is: To exploit the vulnerability, the attacker must upload a malicious ConnectIQ application to the ConnectIQ store. The ConnectIQ program interpreter trusts the offset provided for the stack value duplication instruction, DUP. The offset is unchecked and memory prior to the start of the execution stack can be read and treated as a TVM object. A successful exploit could use the vulnerability to leak runtime information such as the heap handle or pointer for a number of TVM context variables. Some reachable values may be controlled enough to forge a TVM object on the stack, leading to possible remote code execution.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,CHANGED,HIGH,HIGH,HIGH,CRITICAL,3.1,6.0,['CWE-129'],"['cpe:2.3:o:garmin:forerunner_235_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:garmin:forerunner_235:-:*:*:*:*:*:*:*']",0,0
CVE-2020-27484,Garmin,0.00153,9.9,0.0,1.0,0.0,0.0,0,2020-11-16,1.0,2020-10-05,,,1.0,"Garmin Forerunner 235 before 8.20 is affected by: Integer Overflow. The component is: ConnectIQ TVM. The attack vector is: To exploit the vulnerability, the attacker must upload a malicious ConnectIQ application to the ConnectIQ store. The ConnectIQ program interpreter fails to check for overflow when allocating the array for the NEWA instruction. This a constrained read/write primitive across the entire MAX32630 address space. A successful exploit would allow a ConnectIQ app store application to escape and perform activities outside the restricted application execution environment.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,CHANGED,HIGH,HIGH,HIGH,CRITICAL,3.1,6.0,['CWE-190'],"['cpe:2.3:o:garmin:forerunner_235_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:garmin:forerunner_235:-:*:*:*:*:*:*:*']",0,0
CVE-2020-27485,Garmin,0.00131,9.9,0.0,1.0,0.0,0.0,0,2020-11-16,1.0,2020-10-05,,,1.0,"Garmin Forerunner 235 before 8.20 is affected by: Array index error. The component is: ConnectIQ TVM. The attack vector is: To exploit the vulnerability, the attacker must upload a malicious ConnectIQ application to the ConnectIQ store. The ConnectIQ program interpreter fails to check the index provided when accessing the local variable in the LGETV and LPUTV instructions. This provides the ability to both read and write memory outside the bounds of the TVM context allocation. It can be leveraged to construct a use-after-free scenario, leading to a constrained read/write primitive across the entire MAX32630 address space. A successful exploit would allow a ConnectIQ app store application to escape and perform activities outside the restricted application execution environment.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,CHANGED,HIGH,HIGH,HIGH,CRITICAL,3.1,6.0,['CWE-129'],"['cpe:2.3:o:garmin:forerunner_235_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:garmin:forerunner_235:-:*:*:*:*:*:*:*']",0,0
CVE-2020-27486,Garmin,0.00121,9.9,0.0,1.0,0.0,0.0,0,2020-11-16,1.0,2020-10-05,,,1.0,"Garmin Forerunner 235 before 8.20 is affected by: Buffer Overflow. The component is: ConnectIQ TVM. The attack vector is: To exploit the vulnerability, the attacker must upload a malicious ConnectIQ application to the ConnectIQ store. The ConnectIQ program interpreter trusts the string length provided in the data section of the PRG file. It allocates memory for the string immediately, and then copies the string into the TVM object by using a function similar to strcpy. This copy can exceed the length of the allocated string data and overwrite heap data. A successful exploit would allow a ConnectIQ app store application to escape and perform activities outside the restricted application execution environment.",CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H,NETWORK,LOW,LOW,NONE,CHANGED,HIGH,HIGH,HIGH,CRITICAL,3.1,6.0,['CWE-120'],"['cpe:2.3:o:garmin:forerunner_235_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:garmin:forerunner_235:-:*:*:*:*:*:*:*']",0,0
CVE-2021-27132,Sercomm,0.04033,9.8,0.0,1.0,0.0,1.0,0,2021-02-27,0.0,,1.0,2021-02-08,,SerComm AG Combo VD625 AGSOT_2.1.0 devices allow CRLF injection (for HTTP header injection) in the download function via the Content-Disposition header.,CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,CRITICAL,3.9,5.9,['CWE-74'],"['cpe:2.3:h:sercomm:agcombo_vd625:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sercomm:agcombo_vd625_firmware:agsot_2.1.0:*:*:*:*:*:*:*']",0,0
CVE-2021-44080,Sercomm,0.0024,7.2,0.0,1.0,0.0,1.0,0,2022-06-02,1.0,2021-10-18,,,1.0,"A Command Injection vulnerability in httpd web server (setup.cgi) in SerComm h500s, FW: lowi-h500s-v3.4.22 allows logged in administrators to arbitrary OS commands as root in the device via the connection_type parameter of the statussupport_diagnostic_tracing.json endpoint.",CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H,NETWORK,LOW,HIGH,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.2,5.9,['CWE-78'],"['cpe:2.3:h:sercomm:h500s:-:*:*:*:*:*:*:*', 'cpe:2.3:o:sercomm:h500s_firmware:lowi-h500s-v3.4.22:*:*:*:*:*:*:*']",0,0
CVE-2021-29255,MicroSeven,0.00147,7.5,0.0,1.0,0.0,1.0,0,2021-03-26,0.0,,0.0,,,MicroSeven MYM71080i-B 2.0.5 through 2.0.20 devices send admin credentials in cleartext to pnp.microseven.com TCP port 7007. An attacker on the same network as the device can capture these credentials.,CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H,ADJACENT_NETWORK,HIGH,NONE,NONE,UNCHANGED,HIGH,HIGH,HIGH,HIGH,1.6,5.9,['CWE-522'],"['cpe:2.3:o:microseven:mym71080i-b_firmware:*:*:*:*:*:*:*:*', 'cpe:2.3:h:microseven:mym71080i-b:-:*:*:*:*:*:*:*']",0,0