Vulnerabilites related to oracle - communications_lsms
cve-2020-12723
Vulnerability from cvelistv5
Published
2020-06-05 14:20
Modified
2024-08-04 12:04
Severity ?
Summary
regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T12:04:22.480Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "GLSA-202006-03",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "https://security.gentoo.org/glsa/202006-03",
               },
               {
                  name: "FEDORA-2020-fd73c08076",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/",
               },
               {
                  name: "openSUSE-SU-2020:0850",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20200611-0001/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/Perl/perl5/issues/16947",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://github.com/Perl/perl5/issues/17743",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://github.com/perl/perl5/commit/66bbb51b93253a3f87d11c2695cfb7bdb782184a",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpujan2021.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpuApr2021.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com//security-alerts/cpujul2021.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpujan2022.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpuapr2022.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-04-19T23:21:14",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "GLSA-202006-03",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "https://security.gentoo.org/glsa/202006-03",
            },
            {
               name: "FEDORA-2020-fd73c08076",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/",
            },
            {
               name: "openSUSE-SU-2020:0850",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20200611-0001/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/Perl/perl5/issues/16947",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://github.com/Perl/perl5/issues/17743",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/perl/perl5/commit/66bbb51b93253a3f87d11c2695cfb7bdb782184a",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpujan2021.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpuApr2021.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com//security-alerts/cpujul2021.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpujan2022.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpuapr2022.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2020-12723",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "GLSA-202006-03",
                     refsource: "GENTOO",
                     url: "https://security.gentoo.org/glsa/202006-03",
                  },
                  {
                     name: "FEDORA-2020-fd73c08076",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/",
                  },
                  {
                     name: "openSUSE-SU-2020:0850",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpuoct2020.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
                  },
                  {
                     name: "https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3",
                     refsource: "CONFIRM",
                     url: "https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3",
                  },
                  {
                     name: "https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod",
                     refsource: "CONFIRM",
                     url: "https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20200611-0001/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20200611-0001/",
                  },
                  {
                     name: "https://github.com/Perl/perl5/issues/16947",
                     refsource: "MISC",
                     url: "https://github.com/Perl/perl5/issues/16947",
                  },
                  {
                     name: "https://github.com/Perl/perl5/issues/17743",
                     refsource: "MISC",
                     url: "https://github.com/Perl/perl5/issues/17743",
                  },
                  {
                     name: "https://github.com/perl/perl5/commit/66bbb51b93253a3f87d11c2695cfb7bdb782184a",
                     refsource: "CONFIRM",
                     url: "https://github.com/perl/perl5/commit/66bbb51b93253a3f87d11c2695cfb7bdb782184a",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpujan2021.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpujan2021.html",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpuApr2021.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpuApr2021.html",
                  },
                  {
                     name: "https://www.oracle.com//security-alerts/cpujul2021.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com//security-alerts/cpujul2021.html",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpuoct2021.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpujan2022.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpujan2022.html",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpuapr2022.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpuapr2022.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2020-12723",
      datePublished: "2020-06-05T14:20:50",
      dateReserved: "2020-05-08T00:00:00",
      dateUpdated: "2024-08-04T12:04:22.480Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2015-0235
Vulnerability from cvelistv5
Published
2015-01-28 19:00
Modified
2024-08-06 04:03
Severity ?
Summary
Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."
References
http://www.securityfocus.com/bid/72325vdb-entry, x_refsource_BID
http://marc.info/?l=bugtraq&m=142296726407499&w=2vendor-advisory, x_refsource_HP
http://www-01.ibm.com/support/docview.wss?uid=swg21696131x_refsource_CONFIRM
http://secunia.com/advisories/62883third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/62691third-party-advisory, x_refsource_SECUNIA
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.htmlx_refsource_CONFIRM
http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.htmlvendor-advisory, x_refsource_APPLE
http://packetstormsecurity.com/files/130974/Exim-GHOST-glibc-gethostbyname-Buffer-Overflow.htmlx_refsource_MISC
https://support.apple.com/HT205375x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=142722450701342&w=2vendor-advisory, x_refsource_HP
http://seclists.org/oss-sec/2015/q1/269mailing-list, x_refsource_BUGTRAQ
http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0x_refsource_CONFIRM
http://secunia.com/advisories/62698third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/62640third-party-advisory, x_refsource_SECUNIA
http://www.securitytracker.com/id/1032909vdb-entry, x_refsource_SECTRACK
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.htmlx_refsource_CONFIRM
https://bto.bluecoat.com/security-advisory/sa90x_refsource_CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21696618x_refsource_CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21696600x_refsource_CONFIRM
http://www.idirect.net/Partners/~/media/Files/CVE/iDirect-Posted-Common-Vulnerabilities-and-Exposures.pdfx_refsource_CONFIRM
http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.htmlvendor-advisory, x_refsource_APPLE
http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.htmlx_refsource_CONFIRM
https://www.sophos.com/en-us/support/knowledgebase/121879.aspxx_refsource_CONFIRM
http://secunia.com/advisories/62688third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/62865third-party-advisory, x_refsource_SECUNIA
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.htmlx_refsource_CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21696243x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=142721102728110&w=2vendor-advisory, x_refsource_HP
http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.htmlvendor-advisory, x_refsource_APPLE
https://kc.mcafee.com/corporate/index?page=content&id=SB10100x_refsource_CONFIRM
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.htmlx_refsource_CONFIRM
http://secunia.com/advisories/62812third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/62879third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=142781412222323&w=2vendor-advisory, x_refsource_HP
http://linux.oracle.com/errata/ELSA-2015-0090.htmlx_refsource_CONFIRM
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.htmlx_refsource_CONFIRM
http://secunia.com/advisories/62871third-party-advisory, x_refsource_SECUNIA
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.htmlx_refsource_CONFIRM
http://secunia.com/advisories/62690third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/62692third-party-advisory, x_refsource_SECUNIA
https://support.apple.com/HT205267x_refsource_CONFIRM
https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixesx_refsource_CONFIRM
http://secunia.com/advisories/62681third-party-advisory, x_refsource_SECUNIA
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10671x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=142781412222323&w=2vendor-advisory, x_refsource_HP
http://www-01.ibm.com/support/docview.wss?uid=swg21696526x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=142721102728110&w=2vendor-advisory, x_refsource_HP
http://secunia.com/advisories/62667third-party-advisory, x_refsource_SECUNIA
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04874668x_refsource_CONFIRM
http://www.mandriva.com/security/advisories?name=MDVSA-2015:039vendor-advisory, x_refsource_MANDRIVA
https://www.f-secure.com/en/web/labs_global/fsc-2015-1x_refsource_CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21696602x_refsource_CONFIRM
http://secunia.com/advisories/62517third-party-advisory, x_refsource_SECUNIA
http://support.apple.com/kb/HT204942x_refsource_CONFIRM
http://blogs.sophos.com/2015/01/29/sophos-products-and-the-ghost-vulnerability-affecting-linux/x_refsource_CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21695695x_refsource_CONFIRM
http://secunia.com/advisories/62680third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/62813third-party-advisory, x_refsource_SECUNIA
http://packetstormsecurity.com/files/130768/EMC-Secure-Remote-Services-GHOST-SQL-Injection-Command-Injection.htmlx_refsource_MISC
https://security.gentoo.org/glsa/201503-04vendor-advisory, x_refsource_GENTOO
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.htmlx_refsource_CONFIRM
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150128-ghostvendor-advisory, x_refsource_CISCO
http://www.securityfocus.com/bid/91787vdb-entry, x_refsource_BID
http://packetstormsecurity.com/files/130171/Exim-ESMTP-GHOST-Denial-Of-Service.htmlx_refsource_MISC
http://rhn.redhat.com/errata/RHSA-2015-0126.htmlvendor-advisory, x_refsource_REDHAT
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.htmlx_refsource_CONFIRM
http://www.securityfocus.com/archive/1/534845/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/62715third-party-advisory, x_refsource_SECUNIA
https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txtx_refsource_MISC
http://www-01.ibm.com/support/docview.wss?uid=swg21695835x_refsource_CONFIRM
http://seclists.org/oss-sec/2015/q1/274mailing-list, x_refsource_BUGTRAQ
http://marc.info/?l=bugtraq&m=143145428124857&w=2vendor-advisory, x_refsource_HP
http://seclists.org/fulldisclosure/2015/Jan/111mailing-list, x_refsource_FULLDISC
http://www-01.ibm.com/support/docview.wss?uid=swg21695774x_refsource_CONFIRM
http://secunia.com/advisories/62870third-party-advisory, x_refsource_SECUNIA
https://security.netapp.com/advisory/ntap-20150127-0001/x_refsource_CONFIRM
http://linux.oracle.com/errata/ELSA-2015-0092.htmlx_refsource_CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21695860x_refsource_CONFIRM
http://www.debian.org/security/2015/dsa-3142vendor-advisory, x_refsource_DEBIAN
https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/27/the-ghost-vulnerabilityx_refsource_MISC
http://secunia.com/advisories/62816third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/62758third-party-advisory, x_refsource_SECUNIA
http://seclists.org/fulldisclosure/2019/Jun/18mailing-list, x_refsource_FULLDISC
https://seclists.org/bugtraq/2019/Jun/14mailing-list, x_refsource_BUGTRAQ
http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.htmlx_refsource_MISC
https://cert-portal.siemens.com/productcert/pdf/ssa-994726.pdfx_refsource_CONFIRM
http://www.openwall.com/lists/oss-security/2021/05/04/7mailing-list, x_refsource_MLIST
http://seclists.org/fulldisclosure/2021/Sep/0mailing-list, x_refsource_FULLDISC
http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.htmlx_refsource_MISC
https://www.arista.com/en/support/advisories-notices/security-advisories/1053-security-advisory-9x_refsource_MISC
http://seclists.org/fulldisclosure/2022/Jun/36mailing-list, x_refsource_FULLDISC
http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.htmlx_refsource_MISC
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T04:03:10.392Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "72325",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/72325",
               },
               {
                  name: "HPSBGN03247",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_HP",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=142296726407499&w=2",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www-01.ibm.com/support/docview.wss?uid=swg21696131",
               },
               {
                  name: "62883",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/62883",
               },
               {
                  name: "62691",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/62691",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
               },
               {
                  name: "APPLE-SA-2015-10-21-4",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_APPLE",
                     "x_transferred",
                  ],
                  url: "http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://packetstormsecurity.com/files/130974/Exim-GHOST-glibc-gethostbyname-Buffer-Overflow.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://support.apple.com/HT205375",
               },
               {
                  name: "HPSBGN03285",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_HP",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=142722450701342&w=2",
               },
               {
                  name: "20150127 GHOST gethostbyname() heap overflow in glibc (CVE-2015-0235)",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://seclists.org/oss-sec/2015/q1/269",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0",
               },
               {
                  name: "62698",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/62698",
               },
               {
                  name: "62640",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/62640",
               },
               {
                  name: "1032909",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1032909",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://bto.bluecoat.com/security-advisory/sa90",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www-01.ibm.com/support/docview.wss?uid=swg21696618",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www-01.ibm.com/support/docview.wss?uid=swg21696600",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.idirect.net/Partners/~/media/Files/CVE/iDirect-Posted-Common-Vulnerabilities-and-Exposures.pdf",
               },
               {
                  name: "APPLE-SA-2015-09-30-3",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_APPLE",
                     "x_transferred",
                  ],
                  url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.sophos.com/en-us/support/knowledgebase/121879.aspx",
               },
               {
                  name: "62688",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/62688",
               },
               {
                  name: "62865",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/62865",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www-01.ibm.com/support/docview.wss?uid=swg21696243",
               },
               {
                  name: "HPSBHF03289",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_HP",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=142721102728110&w=2",
               },
               {
                  name: "APPLE-SA-2015-06-30-2",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_APPLE",
                     "x_transferred",
                  ],
                  url: "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10100",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
               },
               {
                  name: "62812",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/62812",
               },
               {
                  name: "62879",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/62879",
               },
               {
                  name: "HPSBGN03270",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_HP",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=142781412222323&w=2",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://linux.oracle.com/errata/ELSA-2015-0090.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
               },
               {
                  name: "62871",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/62871",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
               },
               {
                  name: "62690",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/62690",
               },
               {
                  name: "62692",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/62692",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://support.apple.com/HT205267",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes",
               },
               {
                  name: "62681",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/62681",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10671",
               },
               {
                  name: "SSRT101937",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_HP",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=142781412222323&w=2",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www-01.ibm.com/support/docview.wss?uid=swg21696526",
               },
               {
                  name: "SSRT101953",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_HP",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=142721102728110&w=2",
               },
               {
                  name: "62667",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/62667",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04874668",
               },
               {
                  name: "MDVSA-2015:039",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:039",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.f-secure.com/en/web/labs_global/fsc-2015-1",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www-01.ibm.com/support/docview.wss?uid=swg21696602",
               },
               {
                  name: "62517",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/62517",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://support.apple.com/kb/HT204942",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://blogs.sophos.com/2015/01/29/sophos-products-and-the-ghost-vulnerability-affecting-linux/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www-01.ibm.com/support/docview.wss?uid=swg21695695",
               },
               {
                  name: "62680",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/62680",
               },
               {
                  name: "62813",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/62813",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://packetstormsecurity.com/files/130768/EMC-Secure-Remote-Services-GHOST-SQL-Injection-Command-Injection.html",
               },
               {
                  name: "GLSA-201503-04",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "https://security.gentoo.org/glsa/201503-04",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
               },
               {
                  name: "20150128 GNU glibc gethostbyname Function Buffer Overflow Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CISCO",
                     "x_transferred",
                  ],
                  url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150128-ghost",
               },
               {
                  name: "91787",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/91787",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://packetstormsecurity.com/files/130171/Exim-ESMTP-GHOST-Denial-Of-Service.html",
               },
               {
                  name: "RHSA-2015:0126",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2015-0126.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
               },
               {
                  name: "20150311 OpenSSL v1.0.2 for Linux affected by CVE-2015-0235",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/534845/100/0/threaded",
               },
               {
                  name: "62715",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/62715",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www-01.ibm.com/support/docview.wss?uid=swg21695835",
               },
               {
                  name: "20150127 Qualys Security Advisory CVE-2015-0235 - GHOST: glibc gethostbyname buffer overflow",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://seclists.org/oss-sec/2015/q1/274",
               },
               {
                  name: "HPSBMU03330",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_HP",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=143145428124857&w=2",
               },
               {
                  name: "20150128 Qualys Security Advisory CVE-2015-0235 - GHOST: glibc gethostbyname buffer overflow",
                  tags: [
                     "mailing-list",
                     "x_refsource_FULLDISC",
                     "x_transferred",
                  ],
                  url: "http://seclists.org/fulldisclosure/2015/Jan/111",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www-01.ibm.com/support/docview.wss?uid=swg21695774",
               },
               {
                  name: "62870",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/62870",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20150127-0001/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://linux.oracle.com/errata/ELSA-2015-0092.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www-01.ibm.com/support/docview.wss?uid=swg21695860",
               },
               {
                  name: "DSA-3142",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2015/dsa-3142",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/27/the-ghost-vulnerability",
               },
               {
                  name: "62816",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/62816",
               },
               {
                  name: "62758",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/62758",
               },
               {
                  name: "20190612 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series",
                  tags: [
                     "mailing-list",
                     "x_refsource_FULLDISC",
                     "x_transferred",
                  ],
                  url: "http://seclists.org/fulldisclosure/2019/Jun/18",
               },
               {
                  name: "20190613 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "https://seclists.org/bugtraq/2019/Jun/14",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://cert-portal.siemens.com/productcert/pdf/ssa-994726.pdf",
               },
               {
                  name: "[oss-security] 20210504 21Nails: Multiple vulnerabilities in Exim",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2021/05/04/7",
               },
               {
                  name: "20210901 SEC Consult SA-20210901-0 :: Multiple vulnerabilities in MOXA devices",
                  tags: [
                     "mailing-list",
                     "x_refsource_FULLDISC",
                     "x_transferred",
                  ],
                  url: "http://seclists.org/fulldisclosure/2021/Sep/0",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.arista.com/en/support/advisories-notices/security-advisories/1053-security-advisory-9",
               },
               {
                  name: "20220617 SEC Consult SA-20220615-0 :: Hardcoded Backdoor User and Outdated Software Components in Nexans FTTO GigaSwitch series",
                  tags: [
                     "mailing-list",
                     "x_refsource_FULLDISC",
                     "x_transferred",
                  ],
                  url: "http://seclists.org/fulldisclosure/2022/Jun/36",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2015-01-27T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka \"GHOST.\"",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-06-20T18:06:40",
            orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
            shortName: "redhat",
         },
         references: [
            {
               name: "72325",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/72325",
            },
            {
               name: "HPSBGN03247",
               tags: [
                  "vendor-advisory",
                  "x_refsource_HP",
               ],
               url: "http://marc.info/?l=bugtraq&m=142296726407499&w=2",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www-01.ibm.com/support/docview.wss?uid=swg21696131",
            },
            {
               name: "62883",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/62883",
            },
            {
               name: "62691",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/62691",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
            },
            {
               name: "APPLE-SA-2015-10-21-4",
               tags: [
                  "vendor-advisory",
                  "x_refsource_APPLE",
               ],
               url: "http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://packetstormsecurity.com/files/130974/Exim-GHOST-glibc-gethostbyname-Buffer-Overflow.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://support.apple.com/HT205375",
            },
            {
               name: "HPSBGN03285",
               tags: [
                  "vendor-advisory",
                  "x_refsource_HP",
               ],
               url: "http://marc.info/?l=bugtraq&m=142722450701342&w=2",
            },
            {
               name: "20150127 GHOST gethostbyname() heap overflow in glibc (CVE-2015-0235)",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://seclists.org/oss-sec/2015/q1/269",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0",
            },
            {
               name: "62698",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/62698",
            },
            {
               name: "62640",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/62640",
            },
            {
               name: "1032909",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1032909",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://bto.bluecoat.com/security-advisory/sa90",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www-01.ibm.com/support/docview.wss?uid=swg21696618",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www-01.ibm.com/support/docview.wss?uid=swg21696600",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.idirect.net/Partners/~/media/Files/CVE/iDirect-Posted-Common-Vulnerabilities-and-Exposures.pdf",
            },
            {
               name: "APPLE-SA-2015-09-30-3",
               tags: [
                  "vendor-advisory",
                  "x_refsource_APPLE",
               ],
               url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.sophos.com/en-us/support/knowledgebase/121879.aspx",
            },
            {
               name: "62688",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/62688",
            },
            {
               name: "62865",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/62865",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www-01.ibm.com/support/docview.wss?uid=swg21696243",
            },
            {
               name: "HPSBHF03289",
               tags: [
                  "vendor-advisory",
                  "x_refsource_HP",
               ],
               url: "http://marc.info/?l=bugtraq&m=142721102728110&w=2",
            },
            {
               name: "APPLE-SA-2015-06-30-2",
               tags: [
                  "vendor-advisory",
                  "x_refsource_APPLE",
               ],
               url: "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10100",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
            },
            {
               name: "62812",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/62812",
            },
            {
               name: "62879",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/62879",
            },
            {
               name: "HPSBGN03270",
               tags: [
                  "vendor-advisory",
                  "x_refsource_HP",
               ],
               url: "http://marc.info/?l=bugtraq&m=142781412222323&w=2",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://linux.oracle.com/errata/ELSA-2015-0090.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
            },
            {
               name: "62871",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/62871",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
            },
            {
               name: "62690",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/62690",
            },
            {
               name: "62692",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/62692",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://support.apple.com/HT205267",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes",
            },
            {
               name: "62681",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/62681",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10671",
            },
            {
               name: "SSRT101937",
               tags: [
                  "vendor-advisory",
                  "x_refsource_HP",
               ],
               url: "http://marc.info/?l=bugtraq&m=142781412222323&w=2",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www-01.ibm.com/support/docview.wss?uid=swg21696526",
            },
            {
               name: "SSRT101953",
               tags: [
                  "vendor-advisory",
                  "x_refsource_HP",
               ],
               url: "http://marc.info/?l=bugtraq&m=142721102728110&w=2",
            },
            {
               name: "62667",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/62667",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04874668",
            },
            {
               name: "MDVSA-2015:039",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:039",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.f-secure.com/en/web/labs_global/fsc-2015-1",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www-01.ibm.com/support/docview.wss?uid=swg21696602",
            },
            {
               name: "62517",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/62517",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://support.apple.com/kb/HT204942",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://blogs.sophos.com/2015/01/29/sophos-products-and-the-ghost-vulnerability-affecting-linux/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www-01.ibm.com/support/docview.wss?uid=swg21695695",
            },
            {
               name: "62680",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/62680",
            },
            {
               name: "62813",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/62813",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://packetstormsecurity.com/files/130768/EMC-Secure-Remote-Services-GHOST-SQL-Injection-Command-Injection.html",
            },
            {
               name: "GLSA-201503-04",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "https://security.gentoo.org/glsa/201503-04",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
            },
            {
               name: "20150128 GNU glibc gethostbyname Function Buffer Overflow Vulnerability",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CISCO",
               ],
               url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150128-ghost",
            },
            {
               name: "91787",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/91787",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://packetstormsecurity.com/files/130171/Exim-ESMTP-GHOST-Denial-Of-Service.html",
            },
            {
               name: "RHSA-2015:0126",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2015-0126.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
            },
            {
               name: "20150311 OpenSSL v1.0.2 for Linux affected by CVE-2015-0235",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://www.securityfocus.com/archive/1/534845/100/0/threaded",
            },
            {
               name: "62715",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/62715",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www-01.ibm.com/support/docview.wss?uid=swg21695835",
            },
            {
               name: "20150127 Qualys Security Advisory CVE-2015-0235 - GHOST: glibc gethostbyname buffer overflow",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://seclists.org/oss-sec/2015/q1/274",
            },
            {
               name: "HPSBMU03330",
               tags: [
                  "vendor-advisory",
                  "x_refsource_HP",
               ],
               url: "http://marc.info/?l=bugtraq&m=143145428124857&w=2",
            },
            {
               name: "20150128 Qualys Security Advisory CVE-2015-0235 - GHOST: glibc gethostbyname buffer overflow",
               tags: [
                  "mailing-list",
                  "x_refsource_FULLDISC",
               ],
               url: "http://seclists.org/fulldisclosure/2015/Jan/111",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www-01.ibm.com/support/docview.wss?uid=swg21695774",
            },
            {
               name: "62870",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/62870",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20150127-0001/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://linux.oracle.com/errata/ELSA-2015-0092.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www-01.ibm.com/support/docview.wss?uid=swg21695860",
            },
            {
               name: "DSA-3142",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2015/dsa-3142",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/27/the-ghost-vulnerability",
            },
            {
               name: "62816",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/62816",
            },
            {
               name: "62758",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/62758",
            },
            {
               name: "20190612 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series",
               tags: [
                  "mailing-list",
                  "x_refsource_FULLDISC",
               ],
               url: "http://seclists.org/fulldisclosure/2019/Jun/18",
            },
            {
               name: "20190613 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "https://seclists.org/bugtraq/2019/Jun/14",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://cert-portal.siemens.com/productcert/pdf/ssa-994726.pdf",
            },
            {
               name: "[oss-security] 20210504 21Nails: Multiple vulnerabilities in Exim",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2021/05/04/7",
            },
            {
               name: "20210901 SEC Consult SA-20210901-0 :: Multiple vulnerabilities in MOXA devices",
               tags: [
                  "mailing-list",
                  "x_refsource_FULLDISC",
               ],
               url: "http://seclists.org/fulldisclosure/2021/Sep/0",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.arista.com/en/support/advisories-notices/security-advisories/1053-security-advisory-9",
            },
            {
               name: "20220617 SEC Consult SA-20220615-0 :: Hardcoded Backdoor User and Outdated Software Components in Nexans FTTO GigaSwitch series",
               tags: [
                  "mailing-list",
                  "x_refsource_FULLDISC",
               ],
               url: "http://seclists.org/fulldisclosure/2022/Jun/36",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secalert@redhat.com",
               ID: "CVE-2015-0235",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka \"GHOST.\"",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "72325",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/72325",
                  },
                  {
                     name: "HPSBGN03247",
                     refsource: "HP",
                     url: "http://marc.info/?l=bugtraq&m=142296726407499&w=2",
                  },
                  {
                     name: "http://www-01.ibm.com/support/docview.wss?uid=swg21696131",
                     refsource: "CONFIRM",
                     url: "http://www-01.ibm.com/support/docview.wss?uid=swg21696131",
                  },
                  {
                     name: "62883",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/62883",
                  },
                  {
                     name: "62691",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/62691",
                  },
                  {
                     name: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
                     refsource: "CONFIRM",
                     url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
                  },
                  {
                     name: "APPLE-SA-2015-10-21-4",
                     refsource: "APPLE",
                     url: "http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html",
                  },
                  {
                     name: "http://packetstormsecurity.com/files/130974/Exim-GHOST-glibc-gethostbyname-Buffer-Overflow.html",
                     refsource: "MISC",
                     url: "http://packetstormsecurity.com/files/130974/Exim-GHOST-glibc-gethostbyname-Buffer-Overflow.html",
                  },
                  {
                     name: "https://support.apple.com/HT205375",
                     refsource: "CONFIRM",
                     url: "https://support.apple.com/HT205375",
                  },
                  {
                     name: "HPSBGN03285",
                     refsource: "HP",
                     url: "http://marc.info/?l=bugtraq&m=142722450701342&w=2",
                  },
                  {
                     name: "20150127 GHOST gethostbyname() heap overflow in glibc (CVE-2015-0235)",
                     refsource: "BUGTRAQ",
                     url: "http://seclists.org/oss-sec/2015/q1/269",
                  },
                  {
                     name: "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0",
                     refsource: "CONFIRM",
                     url: "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0",
                  },
                  {
                     name: "62698",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/62698",
                  },
                  {
                     name: "62640",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/62640",
                  },
                  {
                     name: "1032909",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1032909",
                  },
                  {
                     name: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
                     refsource: "CONFIRM",
                     url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
                  },
                  {
                     name: "https://bto.bluecoat.com/security-advisory/sa90",
                     refsource: "CONFIRM",
                     url: "https://bto.bluecoat.com/security-advisory/sa90",
                  },
                  {
                     name: "http://www-01.ibm.com/support/docview.wss?uid=swg21696618",
                     refsource: "CONFIRM",
                     url: "http://www-01.ibm.com/support/docview.wss?uid=swg21696618",
                  },
                  {
                     name: "http://www-01.ibm.com/support/docview.wss?uid=swg21696600",
                     refsource: "CONFIRM",
                     url: "http://www-01.ibm.com/support/docview.wss?uid=swg21696600",
                  },
                  {
                     name: "http://www.idirect.net/Partners/~/media/Files/CVE/iDirect-Posted-Common-Vulnerabilities-and-Exposures.pdf",
                     refsource: "CONFIRM",
                     url: "http://www.idirect.net/Partners/~/media/Files/CVE/iDirect-Posted-Common-Vulnerabilities-and-Exposures.pdf",
                  },
                  {
                     name: "APPLE-SA-2015-09-30-3",
                     refsource: "APPLE",
                     url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html",
                  },
                  {
                     name: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
                     refsource: "CONFIRM",
                     url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
                  },
                  {
                     name: "https://www.sophos.com/en-us/support/knowledgebase/121879.aspx",
                     refsource: "CONFIRM",
                     url: "https://www.sophos.com/en-us/support/knowledgebase/121879.aspx",
                  },
                  {
                     name: "62688",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/62688",
                  },
                  {
                     name: "62865",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/62865",
                  },
                  {
                     name: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
                     refsource: "CONFIRM",
                     url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
                  },
                  {
                     name: "http://www-01.ibm.com/support/docview.wss?uid=swg21696243",
                     refsource: "CONFIRM",
                     url: "http://www-01.ibm.com/support/docview.wss?uid=swg21696243",
                  },
                  {
                     name: "HPSBHF03289",
                     refsource: "HP",
                     url: "http://marc.info/?l=bugtraq&m=142721102728110&w=2",
                  },
                  {
                     name: "APPLE-SA-2015-06-30-2",
                     refsource: "APPLE",
                     url: "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html",
                  },
                  {
                     name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10100",
                     refsource: "CONFIRM",
                     url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10100",
                  },
                  {
                     name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
                     refsource: "CONFIRM",
                     url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
                  },
                  {
                     name: "62812",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/62812",
                  },
                  {
                     name: "62879",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/62879",
                  },
                  {
                     name: "HPSBGN03270",
                     refsource: "HP",
                     url: "http://marc.info/?l=bugtraq&m=142781412222323&w=2",
                  },
                  {
                     name: "http://linux.oracle.com/errata/ELSA-2015-0090.html",
                     refsource: "CONFIRM",
                     url: "http://linux.oracle.com/errata/ELSA-2015-0090.html",
                  },
                  {
                     name: "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
                     refsource: "CONFIRM",
                     url: "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
                  },
                  {
                     name: "62871",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/62871",
                  },
                  {
                     name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
                     refsource: "CONFIRM",
                     url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
                  },
                  {
                     name: "62690",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/62690",
                  },
                  {
                     name: "62692",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/62692",
                  },
                  {
                     name: "https://support.apple.com/HT205267",
                     refsource: "CONFIRM",
                     url: "https://support.apple.com/HT205267",
                  },
                  {
                     name: "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes",
                     refsource: "CONFIRM",
                     url: "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes",
                  },
                  {
                     name: "62681",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/62681",
                  },
                  {
                     name: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10671",
                     refsource: "CONFIRM",
                     url: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10671",
                  },
                  {
                     name: "SSRT101937",
                     refsource: "HP",
                     url: "http://marc.info/?l=bugtraq&m=142781412222323&w=2",
                  },
                  {
                     name: "http://www-01.ibm.com/support/docview.wss?uid=swg21696526",
                     refsource: "CONFIRM",
                     url: "http://www-01.ibm.com/support/docview.wss?uid=swg21696526",
                  },
                  {
                     name: "SSRT101953",
                     refsource: "HP",
                     url: "http://marc.info/?l=bugtraq&m=142721102728110&w=2",
                  },
                  {
                     name: "62667",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/62667",
                  },
                  {
                     name: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04874668",
                     refsource: "CONFIRM",
                     url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04874668",
                  },
                  {
                     name: "MDVSA-2015:039",
                     refsource: "MANDRIVA",
                     url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:039",
                  },
                  {
                     name: "https://www.f-secure.com/en/web/labs_global/fsc-2015-1",
                     refsource: "CONFIRM",
                     url: "https://www.f-secure.com/en/web/labs_global/fsc-2015-1",
                  },
                  {
                     name: "http://www-01.ibm.com/support/docview.wss?uid=swg21696602",
                     refsource: "CONFIRM",
                     url: "http://www-01.ibm.com/support/docview.wss?uid=swg21696602",
                  },
                  {
                     name: "62517",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/62517",
                  },
                  {
                     name: "http://support.apple.com/kb/HT204942",
                     refsource: "CONFIRM",
                     url: "http://support.apple.com/kb/HT204942",
                  },
                  {
                     name: "http://blogs.sophos.com/2015/01/29/sophos-products-and-the-ghost-vulnerability-affecting-linux/",
                     refsource: "CONFIRM",
                     url: "http://blogs.sophos.com/2015/01/29/sophos-products-and-the-ghost-vulnerability-affecting-linux/",
                  },
                  {
                     name: "http://www-01.ibm.com/support/docview.wss?uid=swg21695695",
                     refsource: "CONFIRM",
                     url: "http://www-01.ibm.com/support/docview.wss?uid=swg21695695",
                  },
                  {
                     name: "62680",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/62680",
                  },
                  {
                     name: "62813",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/62813",
                  },
                  {
                     name: "http://packetstormsecurity.com/files/130768/EMC-Secure-Remote-Services-GHOST-SQL-Injection-Command-Injection.html",
                     refsource: "MISC",
                     url: "http://packetstormsecurity.com/files/130768/EMC-Secure-Remote-Services-GHOST-SQL-Injection-Command-Injection.html",
                  },
                  {
                     name: "GLSA-201503-04",
                     refsource: "GENTOO",
                     url: "https://security.gentoo.org/glsa/201503-04",
                  },
                  {
                     name: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
                     refsource: "CONFIRM",
                     url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
                  },
                  {
                     name: "20150128 GNU glibc gethostbyname Function Buffer Overflow Vulnerability",
                     refsource: "CISCO",
                     url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150128-ghost",
                  },
                  {
                     name: "91787",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/91787",
                  },
                  {
                     name: "http://packetstormsecurity.com/files/130171/Exim-ESMTP-GHOST-Denial-Of-Service.html",
                     refsource: "MISC",
                     url: "http://packetstormsecurity.com/files/130171/Exim-ESMTP-GHOST-Denial-Of-Service.html",
                  },
                  {
                     name: "RHSA-2015:0126",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2015-0126.html",
                  },
                  {
                     name: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
                     refsource: "CONFIRM",
                     url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
                  },
                  {
                     name: "20150311 OpenSSL v1.0.2 for Linux affected by CVE-2015-0235",
                     refsource: "BUGTRAQ",
                     url: "http://www.securityfocus.com/archive/1/534845/100/0/threaded",
                  },
                  {
                     name: "62715",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/62715",
                  },
                  {
                     name: "https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt",
                     refsource: "MISC",
                     url: "https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt",
                  },
                  {
                     name: "http://www-01.ibm.com/support/docview.wss?uid=swg21695835",
                     refsource: "CONFIRM",
                     url: "http://www-01.ibm.com/support/docview.wss?uid=swg21695835",
                  },
                  {
                     name: "20150127 Qualys Security Advisory CVE-2015-0235 - GHOST: glibc gethostbyname buffer overflow",
                     refsource: "BUGTRAQ",
                     url: "http://seclists.org/oss-sec/2015/q1/274",
                  },
                  {
                     name: "HPSBMU03330",
                     refsource: "HP",
                     url: "http://marc.info/?l=bugtraq&m=143145428124857&w=2",
                  },
                  {
                     name: "20150128 Qualys Security Advisory CVE-2015-0235 - GHOST: glibc gethostbyname buffer overflow",
                     refsource: "FULLDISC",
                     url: "http://seclists.org/fulldisclosure/2015/Jan/111",
                  },
                  {
                     name: "http://www-01.ibm.com/support/docview.wss?uid=swg21695774",
                     refsource: "CONFIRM",
                     url: "http://www-01.ibm.com/support/docview.wss?uid=swg21695774",
                  },
                  {
                     name: "62870",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/62870",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20150127-0001/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20150127-0001/",
                  },
                  {
                     name: "http://linux.oracle.com/errata/ELSA-2015-0092.html",
                     refsource: "CONFIRM",
                     url: "http://linux.oracle.com/errata/ELSA-2015-0092.html",
                  },
                  {
                     name: "http://www-01.ibm.com/support/docview.wss?uid=swg21695860",
                     refsource: "CONFIRM",
                     url: "http://www-01.ibm.com/support/docview.wss?uid=swg21695860",
                  },
                  {
                     name: "DSA-3142",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2015/dsa-3142",
                  },
                  {
                     name: "https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/27/the-ghost-vulnerability",
                     refsource: "MISC",
                     url: "https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/27/the-ghost-vulnerability",
                  },
                  {
                     name: "62816",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/62816",
                  },
                  {
                     name: "62758",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/62758",
                  },
                  {
                     name: "20190612 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series",
                     refsource: "FULLDISC",
                     url: "http://seclists.org/fulldisclosure/2019/Jun/18",
                  },
                  {
                     name: "20190613 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series",
                     refsource: "BUGTRAQ",
                     url: "https://seclists.org/bugtraq/2019/Jun/14",
                  },
                  {
                     name: "http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html",
                     refsource: "MISC",
                     url: "http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html",
                  },
                  {
                     name: "https://cert-portal.siemens.com/productcert/pdf/ssa-994726.pdf",
                     refsource: "CONFIRM",
                     url: "https://cert-portal.siemens.com/productcert/pdf/ssa-994726.pdf",
                  },
                  {
                     name: "[oss-security] 20210504 21Nails: Multiple vulnerabilities in Exim",
                     refsource: "MLIST",
                     url: "http://www.openwall.com/lists/oss-security/2021/05/04/7",
                  },
                  {
                     name: "20210901 SEC Consult SA-20210901-0 :: Multiple vulnerabilities in MOXA devices",
                     refsource: "FULLDISC",
                     url: "http://seclists.org/fulldisclosure/2021/Sep/0",
                  },
                  {
                     name: "http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html",
                     refsource: "MISC",
                     url: "http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html",
                  },
                  {
                     name: "https://www.arista.com/en/support/advisories-notices/security-advisories/1053-security-advisory-9",
                     refsource: "MISC",
                     url: "https://www.arista.com/en/support/advisories-notices/security-advisories/1053-security-advisory-9",
                  },
                  {
                     name: "20220617 SEC Consult SA-20220615-0 :: Hardcoded Backdoor User and Outdated Software Components in Nexans FTTO GigaSwitch series",
                     refsource: "FULLDISC",
                     url: "http://seclists.org/fulldisclosure/2022/Jun/36",
                  },
                  {
                     name: "http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html",
                     refsource: "MISC",
                     url: "http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749",
      assignerShortName: "redhat",
      cveId: "CVE-2015-0235",
      datePublished: "2015-01-28T19:00:00",
      dateReserved: "2014-11-18T00:00:00",
      dateUpdated: "2024-08-06T04:03:10.392Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2018-20034
Vulnerability from cvelistv5
Published
2019-03-21 20:54
Modified
2024-08-05 11:51
Severity ?
Summary
A Denial of Service vulnerability related to adding an item to a list in lmgrd and vendor daemon components of FlexNet Publisher version 11.16.1.0 and earlier allows a remote attacker to send a combination of messages to lmgrd or the vendor daemon, causing the heartbeat between lmgrd and the vendor daemon to stop, and the vendor daemon to shut down.
Impacted products
Vendor Product Version
Flexera Software LLC FlexNet Publisher Version: 11.16.1.0 and earlier
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T11:51:18.806Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "109155",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/109155",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://secuniaresearch.flexerasoftware.com/advisories/85979/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "FlexNet Publisher",
               vendor: "Flexera Software LLC",
               versions: [
                  {
                     status: "affected",
                     version: "11.16.1.0 and earlier",
                  },
               ],
            },
         ],
         datePublic: "2019-01-28T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A Denial of Service vulnerability related to adding an item to a list in lmgrd and vendor daemon components of FlexNet Publisher version 11.16.1.0 and earlier allows a remote attacker to send a combination of messages to lmgrd or the vendor daemon, causing the heartbeat between lmgrd and the vendor daemon to stop, and the vendor daemon to shut down.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "DoS",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-10-20T10:38:08",
            orgId: "44d08088-2bea-4760-83a6-1e9be26b15ab",
            shortName: "flexera",
         },
         references: [
            {
               name: "109155",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/109155",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://secuniaresearch.flexerasoftware.com/advisories/85979/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "PSIRT-CNA@flexerasoftware.com",
               ID: "CVE-2018-20034",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "FlexNet Publisher",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "11.16.1.0 and earlier",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Flexera Software LLC",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A Denial of Service vulnerability related to adding an item to a list in lmgrd and vendor daemon components of FlexNet Publisher version 11.16.1.0 and earlier allows a remote attacker to send a combination of messages to lmgrd or the vendor daemon, causing the heartbeat between lmgrd and the vendor daemon to stop, and the vendor daemon to shut down.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "DoS",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "109155",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/109155",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpuoct2021.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
                  },
                  {
                     name: "https://secuniaresearch.flexerasoftware.com/advisories/85979/",
                     refsource: "CONFIRM",
                     url: "https://secuniaresearch.flexerasoftware.com/advisories/85979/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "44d08088-2bea-4760-83a6-1e9be26b15ab",
      assignerShortName: "flexera",
      cveId: "CVE-2018-20034",
      datePublished: "2019-03-21T20:54:28",
      dateReserved: "2018-12-10T00:00:00",
      dateUpdated: "2024-08-05T11:51:18.806Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-10543
Vulnerability from cvelistv5
Published
2020-06-05 13:17
Modified
2024-08-04 11:06
Severity ?
Summary
Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T11:06:09.544Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "GLSA-202006-03",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "https://security.gentoo.org/glsa/202006-03",
               },
               {
                  name: "FEDORA-2020-fd73c08076",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/",
               },
               {
                  name: "openSUSE-SU-2020:0850",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://github.com/perl/perl5/commit/897d1f7fd515b828e4b198d8b8bef76c6faf03ed",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20200611-0001/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpujan2021.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpuApr2021.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com//security-alerts/cpujul2021.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpujan2022.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpuapr2022.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-04-19T23:20:49",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "GLSA-202006-03",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "https://security.gentoo.org/glsa/202006-03",
            },
            {
               name: "FEDORA-2020-fd73c08076",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/",
            },
            {
               name: "openSUSE-SU-2020:0850",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/perl/perl5/commit/897d1f7fd515b828e4b198d8b8bef76c6faf03ed",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20200611-0001/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpujan2021.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpuApr2021.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com//security-alerts/cpujul2021.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpujan2022.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpuapr2022.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2020-10543",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "GLSA-202006-03",
                     refsource: "GENTOO",
                     url: "https://security.gentoo.org/glsa/202006-03",
                  },
                  {
                     name: "FEDORA-2020-fd73c08076",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/",
                  },
                  {
                     name: "openSUSE-SU-2020:0850",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpuoct2020.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
                  },
                  {
                     name: "https://github.com/perl/perl5/commit/897d1f7fd515b828e4b198d8b8bef76c6faf03ed",
                     refsource: "CONFIRM",
                     url: "https://github.com/perl/perl5/commit/897d1f7fd515b828e4b198d8b8bef76c6faf03ed",
                  },
                  {
                     name: "https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3",
                     refsource: "CONFIRM",
                     url: "https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3",
                  },
                  {
                     name: "https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod",
                     refsource: "CONFIRM",
                     url: "https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20200611-0001/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20200611-0001/",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpujan2021.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpujan2021.html",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpuApr2021.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpuApr2021.html",
                  },
                  {
                     name: "https://www.oracle.com//security-alerts/cpujul2021.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com//security-alerts/cpujul2021.html",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpuoct2021.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpujan2022.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpujan2022.html",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpuapr2022.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpuapr2022.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2020-10543",
      datePublished: "2020-06-05T13:17:49",
      dateReserved: "2020-03-13T00:00:00",
      dateUpdated: "2024-08-04T11:06:09.544Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-21783
Vulnerability from cvelistv5
Published
2021-03-25 16:01
Modified
2024-08-03 18:23
Severity ?
Summary
A code execution vulnerability exists in the WS-Addressing plugin functionality of Genivia gSOAP 2.8.107. A specially crafted SOAP request can lead to remote code execution. An attacker can send an HTTP request to trigger this vulnerability.
Impacted products
Vendor Product Version
n/a Genivia Version: Genivia gSOAP 2.8.109, Genivia gSOAP 2.8.110
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T18:23:29.363Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1245",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpujan2022.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Genivia",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Genivia gSOAP 2.8.109, Genivia gSOAP 2.8.110",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A code execution vulnerability exists in the WS-Addressing plugin functionality of Genivia gSOAP 2.8.107. A specially crafted SOAP request can lead to remote code execution. An attacker can send an HTTP request to trigger this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 9.8,
                  baseSeverity: "CRITICAL",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-680",
                     description: "CWE-680: Integer Overflow to Buffer Overflow",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-02-07T14:41:27",
            orgId: "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b",
            shortName: "talos",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1245",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpujan2022.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "talos-cna@cisco.com",
               ID: "CVE-2021-21783",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Genivia",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Genivia gSOAP 2.8.109, Genivia gSOAP 2.8.110",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A code execution vulnerability exists in the WS-Addressing plugin functionality of Genivia gSOAP 2.8.107. A specially crafted SOAP request can lead to remote code execution. An attacker can send an HTTP request to trigger this vulnerability.",
                  },
               ],
            },
            impact: {
               cvss: {
                  baseScore: 9.8,
                  baseSeverity: "Critical",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-680: Integer Overflow to Buffer Overflow",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1245",
                     refsource: "MISC",
                     url: "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1245",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpuoct2021.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpujan2022.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpujan2022.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b",
      assignerShortName: "talos",
      cveId: "CVE-2021-21783",
      datePublished: "2021-03-25T16:01:12",
      dateReserved: "2021-01-04T00:00:00",
      dateUpdated: "2024-08-03T18:23:29.363Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2018-3693
Vulnerability from cvelistv5
Published
2018-07-10 21:00
Modified
2024-08-05 04:50
Severity ?
Summary
Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a speculative buffer overflow and side-channel analysis.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T04:50:30.557Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "RHSA-2018:2390",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2018:2390",
               },
               {
                  name: "RHSA-2018:2395",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2018:2395",
               },
               {
                  name: "RHSA-2018:2384",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2018:2384",
               },
               {
                  name: "RHSA-2019:1946",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2019:1946",
               },
               {
                  name: "RHSA-2020:0174",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2020:0174",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpujul2020.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20180823-0001/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://cdrdv2.intel.com/v1/dl/getContent/685359",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Most Modern Operating Systems",
               vendor: "Intel Corporation",
               versions: [
                  {
                     status: "affected",
                     version: "All",
                  },
               ],
            },
         ],
         datePublic: "2018-07-10T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a speculative buffer overflow and side-channel analysis.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-11-19T17:51:16",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               name: "RHSA-2018:2390",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2018:2390",
            },
            {
               name: "RHSA-2018:2395",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2018:2395",
            },
            {
               name: "RHSA-2018:2384",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2018:2384",
            },
            {
               name: "RHSA-2019:1946",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2019:1946",
            },
            {
               name: "RHSA-2020:0174",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2020:0174",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpujul2020.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20180823-0001/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://cdrdv2.intel.com/v1/dl/getContent/685359",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2018-3693",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Most Modern Operating Systems",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "All",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Intel Corporation",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a speculative buffer overflow and side-channel analysis.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "RHSA-2018:2390",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2018:2390",
                  },
                  {
                     name: "RHSA-2018:2395",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2018:2395",
                  },
                  {
                     name: "RHSA-2018:2384",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2018:2384",
                  },
                  {
                     name: "RHSA-2019:1946",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2019:1946",
                  },
                  {
                     name: "RHSA-2020:0174",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2020:0174",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpujul2020.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpujul2020.html",
                  },
                  {
                     name: "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
                  },
                  {
                     name: "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
                     refsource: "CONFIRM",
                     url: "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20180823-0001/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20180823-0001/",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpuoct2020.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
                  },
                  {
                     name: "https://cdrdv2.intel.com/v1/dl/getContent/685359",
                     refsource: "CONFIRM",
                     url: "https://cdrdv2.intel.com/v1/dl/getContent/685359",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2018-3693",
      datePublished: "2018-07-10T21:00:00",
      dateReserved: "2017-12-28T00:00:00",
      dateUpdated: "2024-08-05T04:50:30.557Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-10878
Vulnerability from cvelistv5
Published
2020-06-05 13:27
Modified
2024-08-04 11:14
Severity ?
Summary
Perl before 5.30.3 has an integer overflow related to mishandling of a "PL_regkind[OP(n)] == NOTHING" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T11:14:15.674Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "GLSA-202006-03",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "https://security.gentoo.org/glsa/202006-03",
               },
               {
                  name: "FEDORA-2020-fd73c08076",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/",
               },
               {
                  name: "openSUSE-SU-2020:0850",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20200611-0001/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://github.com/perl/perl5/commit/0a320d753fe7fca03df259a4dfd8e641e51edaa8",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://github.com/perl/perl5/commit/3295b48defa0f8570114877b063fe546dd348b3c",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpujan2021.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpuApr2021.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com//security-alerts/cpujul2021.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpujan2022.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpuapr2022.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Perl before 5.30.3 has an integer overflow related to mishandling of a \"PL_regkind[OP(n)] == NOTHING\" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-04-19T23:20:52",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "GLSA-202006-03",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "https://security.gentoo.org/glsa/202006-03",
            },
            {
               name: "FEDORA-2020-fd73c08076",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/",
            },
            {
               name: "openSUSE-SU-2020:0850",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20200611-0001/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/perl/perl5/commit/0a320d753fe7fca03df259a4dfd8e641e51edaa8",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://github.com/perl/perl5/commit/3295b48defa0f8570114877b063fe546dd348b3c",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpujan2021.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpuApr2021.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com//security-alerts/cpujul2021.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpujan2022.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpuapr2022.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2020-10878",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Perl before 5.30.3 has an integer overflow related to mishandling of a \"PL_regkind[OP(n)] == NOTHING\" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "GLSA-202006-03",
                     refsource: "GENTOO",
                     url: "https://security.gentoo.org/glsa/202006-03",
                  },
                  {
                     name: "FEDORA-2020-fd73c08076",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/",
                  },
                  {
                     name: "openSUSE-SU-2020:0850",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpuoct2020.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
                  },
                  {
                     name: "https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3",
                     refsource: "CONFIRM",
                     url: "https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3",
                  },
                  {
                     name: "https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod",
                     refsource: "CONFIRM",
                     url: "https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20200611-0001/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20200611-0001/",
                  },
                  {
                     name: "https://github.com/perl/perl5/commit/0a320d753fe7fca03df259a4dfd8e641e51edaa8",
                     refsource: "CONFIRM",
                     url: "https://github.com/perl/perl5/commit/0a320d753fe7fca03df259a4dfd8e641e51edaa8",
                  },
                  {
                     name: "https://github.com/perl/perl5/commit/3295b48defa0f8570114877b063fe546dd348b3c",
                     refsource: "CONFIRM",
                     url: "https://github.com/perl/perl5/commit/3295b48defa0f8570114877b063fe546dd348b3c",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpujan2021.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpujan2021.html",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpuApr2021.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpuApr2021.html",
                  },
                  {
                     name: "https://www.oracle.com//security-alerts/cpujul2021.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com//security-alerts/cpujul2021.html",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpuoct2021.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpujan2022.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpujan2022.html",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpuapr2022.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpuapr2022.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2020-10878",
      datePublished: "2020-06-05T13:27:22",
      dateReserved: "2020-03-23T00:00:00",
      dateUpdated: "2024-08-04T11:14:15.674Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2018-20032
Vulnerability from cvelistv5
Published
2019-03-21 20:52
Modified
2024-08-05 11:51
Severity ?
Summary
A Denial of Service vulnerability related to message decoding in lmgrd and vendor daemon components of FlexNet Publisher version 11.16.1.0 and earlier allows a remote attacker to send a combination of messages to lmgrd or the vendor daemon, causing the heartbeat between lmgrd and the vendor daemon to stop, and the vendor daemon to shut down.
Impacted products
Vendor Product Version
Flexera Software LLC FlexNet Publisher Version: 11.16.1.0 and earlier
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T11:51:18.821Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "109155",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/109155",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://secuniaresearch.flexerasoftware.com/advisories/85979/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "FlexNet Publisher",
               vendor: "Flexera Software LLC",
               versions: [
                  {
                     status: "affected",
                     version: "11.16.1.0 and earlier",
                  },
               ],
            },
         ],
         datePublic: "2019-01-28T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A Denial of Service vulnerability related to message decoding in lmgrd and vendor daemon components of FlexNet Publisher version 11.16.1.0 and earlier allows a remote attacker to send a combination of messages to lmgrd or the vendor daemon, causing the heartbeat between lmgrd and the vendor daemon to stop, and the vendor daemon to shut down.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "DoS",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-10-20T10:38:06",
            orgId: "44d08088-2bea-4760-83a6-1e9be26b15ab",
            shortName: "flexera",
         },
         references: [
            {
               name: "109155",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/109155",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://secuniaresearch.flexerasoftware.com/advisories/85979/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "PSIRT-CNA@flexerasoftware.com",
               ID: "CVE-2018-20032",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "FlexNet Publisher",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "11.16.1.0 and earlier",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Flexera Software LLC",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A Denial of Service vulnerability related to message decoding in lmgrd and vendor daemon components of FlexNet Publisher version 11.16.1.0 and earlier allows a remote attacker to send a combination of messages to lmgrd or the vendor daemon, causing the heartbeat between lmgrd and the vendor daemon to stop, and the vendor daemon to shut down.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "DoS",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "109155",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/109155",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpuoct2021.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
                  },
                  {
                     name: "https://secuniaresearch.flexerasoftware.com/advisories/85979/",
                     refsource: "CONFIRM",
                     url: "https://secuniaresearch.flexerasoftware.com/advisories/85979/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "44d08088-2bea-4760-83a6-1e9be26b15ab",
      assignerShortName: "flexera",
      cveId: "CVE-2018-20032",
      datePublished: "2019-03-21T20:52:17",
      dateReserved: "2018-12-10T00:00:00",
      dateUpdated: "2024-08-05T11:51:18.821Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2018-20033
Vulnerability from cvelistv5
Published
2019-02-25 20:00
Modified
2024-09-17 02:11
Severity ?
Summary
A Remote Code Execution vulnerability in lmgrd and vendor daemon components of FlexNet Publisher version 11.16.1.0 and earlier could allow a remote attacker to corrupt the memory by allocating / deallocating memory, loading lmgrd or the vendor daemon and causing the heartbeat between lmgrd and the vendor daemon to stop. This would force the vendor daemon to shut down. No exploit of this vulnerability has been demonstrated.
References
Impacted products
Vendor Product Version
Flexera Software LLC FlexNet Publisher Version: 11.16.1.0 and earlier
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T11:51:18.821Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "85979",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "https://secuniaresearch.flexerasoftware.com/advisories/85979/",
               },
               {
                  name: "109155",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/109155",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "FlexNet Publisher",
               vendor: "Flexera Software LLC",
               versions: [
                  {
                     status: "affected",
                     version: "11.16.1.0 and earlier",
                  },
               ],
            },
         ],
         datePublic: "2019-01-28T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A Remote Code Execution vulnerability in lmgrd and vendor daemon components of FlexNet Publisher version 11.16.1.0 and earlier could allow a remote attacker to corrupt the memory by allocating / deallocating memory, loading lmgrd or the vendor daemon and causing the heartbeat between lmgrd and the vendor daemon to stop. This would force the vendor daemon to shut down. No exploit of this vulnerability has been demonstrated.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Remote Code Execution (RCE)",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-10-20T10:38:07",
            orgId: "44d08088-2bea-4760-83a6-1e9be26b15ab",
            shortName: "flexera",
         },
         references: [
            {
               name: "85979",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "https://secuniaresearch.flexerasoftware.com/advisories/85979/",
            },
            {
               name: "109155",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/109155",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "PSIRT-CNA@flexerasoftware.com",
               DATE_PUBLIC: "2019-01-28T00:00:00",
               ID: "CVE-2018-20033",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "FlexNet Publisher",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "11.16.1.0 and earlier",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Flexera Software LLC",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A Remote Code Execution vulnerability in lmgrd and vendor daemon components of FlexNet Publisher version 11.16.1.0 and earlier could allow a remote attacker to corrupt the memory by allocating / deallocating memory, loading lmgrd or the vendor daemon and causing the heartbeat between lmgrd and the vendor daemon to stop. This would force the vendor daemon to shut down. No exploit of this vulnerability has been demonstrated.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Remote Code Execution (RCE)",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "85979",
                     refsource: "SECUNIA",
                     url: "https://secuniaresearch.flexerasoftware.com/advisories/85979/",
                  },
                  {
                     name: "109155",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/109155",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpuoct2021.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "44d08088-2bea-4760-83a6-1e9be26b15ab",
      assignerShortName: "flexera",
      cveId: "CVE-2018-20033",
      datePublished: "2019-02-25T20:00:00Z",
      dateReserved: "2018-12-10T00:00:00",
      dateUpdated: "2024-09-17T02:11:14.068Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2018-20031
Vulnerability from cvelistv5
Published
2019-03-21 20:47
Modified
2024-08-05 11:51
Severity ?
Summary
A Denial of Service vulnerability related to preemptive item deletion in lmgrd and vendor daemon components of FlexNet Publisher version 11.16.1.0 and earlier allows a remote attacker to send a combination of messages to lmgrd or the vendor daemon, causing the heartbeat between lmgrd and the vendor daemon to stop, and the vendor daemon to shut down.
Impacted products
Vendor Product Version
Flexera Software LLC FlexNet Publisher Version: 11.16.1.0 and earlier
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T11:51:18.328Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "109155",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/109155",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://secuniaresearch.flexerasoftware.com/advisories/85979/",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "FlexNet Publisher",
               vendor: "Flexera Software LLC",
               versions: [
                  {
                     status: "affected",
                     version: "11.16.1.0 and earlier",
                  },
               ],
            },
         ],
         datePublic: "2019-01-28T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A Denial of Service vulnerability related to preemptive item deletion in lmgrd and vendor daemon components of FlexNet Publisher version 11.16.1.0 and earlier allows a remote attacker to send a combination of messages to lmgrd or the vendor daemon, causing the heartbeat between lmgrd and the vendor daemon to stop, and the vendor daemon to shut down.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "DoS",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-10-20T10:38:05",
            orgId: "44d08088-2bea-4760-83a6-1e9be26b15ab",
            shortName: "flexera",
         },
         references: [
            {
               name: "109155",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/109155",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://secuniaresearch.flexerasoftware.com/advisories/85979/",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "PSIRT-CNA@flexerasoftware.com",
               ID: "CVE-2018-20031",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "FlexNet Publisher",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "11.16.1.0 and earlier",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Flexera Software LLC",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A Denial of Service vulnerability related to preemptive item deletion in lmgrd and vendor daemon components of FlexNet Publisher version 11.16.1.0 and earlier allows a remote attacker to send a combination of messages to lmgrd or the vendor daemon, causing the heartbeat between lmgrd and the vendor daemon to stop, and the vendor daemon to shut down.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "DoS",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "109155",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/109155",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpuoct2021.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
                  },
                  {
                     name: "https://secuniaresearch.flexerasoftware.com/advisories/85979/",
                     refsource: "CONFIRM",
                     url: "https://secuniaresearch.flexerasoftware.com/advisories/85979/",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "44d08088-2bea-4760-83a6-1e9be26b15ab",
      assignerShortName: "flexera",
      cveId: "CVE-2018-20031",
      datePublished: "2019-03-21T20:47:53",
      dateReserved: "2018-12-10T00:00:00",
      dateUpdated: "2024-08-05T11:51:18.328Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

Vulnerability from fkie_nvd
Published
2021-03-25 17:15
Modified
2024-11-21 05:48
Severity ?
Summary
A code execution vulnerability exists in the WS-Addressing plugin functionality of Genivia gSOAP 2.8.107. A specially crafted SOAP request can lead to remote code execution. An attacker can send an HTTP request to trigger this vulnerability.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:genivia:gsoap:2.8.107:*:*:*:*:*:*:*",
                     matchCriteriaId: "67681E3B-436C-4B75-A472-F99B22E3625F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C88D46AF-459D-4917-9403-0F63FEC83512",
                     versionEndIncluding: "8.5.0",
                     versionStartIncluding: "8.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_eagle_application_processor:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A0E3537-CB5A-40BF-B42C-CED9211B8892",
                     versionEndIncluding: "16.4.0",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:46.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FE18D-6B1C-4CF7-B409-C379E9F60D0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:46.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2BE3FB3-5619-4381-BE4E-FBADB3C747F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:46.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AB3C447-DA3F-44FF-91FD-8985C0527940",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_lsms:13.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E14AECDA-5C63-40F0-81FF-17BBFA487577",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_lsms:13.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "E93FC676-40F5-45CA-880E-8084FF911A7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_lsms:13.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A946E0B-083B-4315-B979-FAB8EF96F9F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_lsms:13.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E6EF0DC-0188-4804-ACBF-25171A710CDE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:tekelec_virtual_operating_environment:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4509814-6693-4045-8263-B8C965398741",
                     versionEndIncluding: "3.7.1",
                     versionStartIncluding: "3.4.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A code execution vulnerability exists in the WS-Addressing plugin functionality of Genivia gSOAP 2.8.107. A specially crafted SOAP request can lead to remote code execution. An attacker can send an HTTP request to trigger this vulnerability.",
      },
      {
         lang: "es",
         value: "Se presenta una vulnerabilidad de ejecución de código en la funcionalidad del plugin WS-Addressing de Genivia gSOAP versión 2.8.107. Una petición  SOAP especialmente diseñada puede conllevar a una ejecución de código remota. Un atacante puede enviar una petición  HTTP para desencadenar esta vulnerabilidad",
      },
   ],
   id: "CVE-2021-21783",
   lastModified: "2024-11-21T05:48:57.697",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "talos-cna@cisco.com",
            type: "Secondary",
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-03-25T17:15:13.210",
   references: [
      {
         source: "talos-cna@cisco.com",
         tags: [
            "Exploit",
            "Technical Description",
            "Third Party Advisory",
         ],
         url: "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1245",
      },
      {
         source: "talos-cna@cisco.com",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpujan2022.html",
      },
      {
         source: "talos-cna@cisco.com",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Technical Description",
            "Third Party Advisory",
         ],
         url: "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1245",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpujan2022.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
      },
   ],
   sourceIdentifier: "talos-cna@cisco.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-680",
            },
         ],
         source: "talos-cna@cisco.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-190",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-03-21 21:29
Modified
2024-11-21 04:00
Summary
A Denial of Service vulnerability related to message decoding in lmgrd and vendor daemon components of FlexNet Publisher version 11.16.1.0 and earlier allows a remote attacker to send a combination of messages to lmgrd or the vendor daemon, causing the heartbeat between lmgrd and the vendor daemon to stop, and the vendor daemon to shut down.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:flexera:flexnet_publisher:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C7C03AE-8A93-4E82-B1EC-CEB6C4402FDF",
                     versionEndIncluding: "11.16.1.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:oracle:communications_lsms:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "806AF4AF-12FB-4222-84E4-BC9D44EFF09F",
                     versionEndIncluding: "13.4",
                     versionStartIncluding: "13.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A Denial of Service vulnerability related to message decoding in lmgrd and vendor daemon components of FlexNet Publisher version 11.16.1.0 and earlier allows a remote attacker to send a combination of messages to lmgrd or the vendor daemon, causing the heartbeat between lmgrd and the vendor daemon to stop, and the vendor daemon to shut down.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de denegación de servicio (DoS) relacionada con el descifrado de mensajes en los componentes del demonio lmgrd y del fabricante de FlexNet Publisher, en versiones 11.16.1.0 y anteriores, permite que un atacante remoto envíe una combinación de mensajes a los demonios lmgrd o del fabricante, haciendo que el latido entre los demonios lmgrd y del fabricante se detengan y el demonio del fabricante se cierre.",
      },
   ],
   id: "CVE-2018-20032",
   lastModified: "2024-11-21T04:00:47.880",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-03-21T21:29:00.357",
   references: [
      {
         source: "PSIRT-CNA@flexerasoftware.com",
         tags: [
            "Broken Link",
         ],
         url: "http://www.securityfocus.com/bid/109155",
      },
      {
         source: "PSIRT-CNA@flexerasoftware.com",
         tags: [
            "Not Applicable",
            "Vendor Advisory",
         ],
         url: "https://secuniaresearch.flexerasoftware.com/advisories/85979/",
      },
      {
         source: "PSIRT-CNA@flexerasoftware.com",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://www.securityfocus.com/bid/109155",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Not Applicable",
            "Vendor Advisory",
         ],
         url: "https://secuniaresearch.flexerasoftware.com/advisories/85979/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
      },
   ],
   sourceIdentifier: "PSIRT-CNA@flexerasoftware.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-03-21 21:29
Modified
2024-11-21 04:00
Summary
A Denial of Service vulnerability related to adding an item to a list in lmgrd and vendor daemon components of FlexNet Publisher version 11.16.1.0 and earlier allows a remote attacker to send a combination of messages to lmgrd or the vendor daemon, causing the heartbeat between lmgrd and the vendor daemon to stop, and the vendor daemon to shut down.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:flexera:flexnet_publisher:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C7C03AE-8A93-4E82-B1EC-CEB6C4402FDF",
                     versionEndIncluding: "11.16.1.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:oracle:communications_lsms:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "806AF4AF-12FB-4222-84E4-BC9D44EFF09F",
                     versionEndIncluding: "13.4",
                     versionStartIncluding: "13.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A Denial of Service vulnerability related to adding an item to a list in lmgrd and vendor daemon components of FlexNet Publisher version 11.16.1.0 and earlier allows a remote attacker to send a combination of messages to lmgrd or the vendor daemon, causing the heartbeat between lmgrd and the vendor daemon to stop, and the vendor daemon to shut down.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de denegación de servicio (DoS) relacionada con la adición de un ítem a una lista en los componentes del demonio lmgrd y del fabricante de FlexNet Publisher, en versiones 11.16.1.0 y anteriores, permite que un atacante remoto envíe una combinación de mensajes a los demonios lmgrd o del fabricante, haciendo que el latido entre los demonios lmgrd y del fabricante se detengan y el demonio del fabricante se cierre.",
      },
   ],
   id: "CVE-2018-20034",
   lastModified: "2024-11-21T04:00:48.137",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-03-21T21:29:00.403",
   references: [
      {
         source: "PSIRT-CNA@flexerasoftware.com",
         tags: [
            "Broken Link",
         ],
         url: "http://www.securityfocus.com/bid/109155",
      },
      {
         source: "PSIRT-CNA@flexerasoftware.com",
         tags: [
            "Not Applicable",
            "Vendor Advisory",
         ],
         url: "https://secuniaresearch.flexerasoftware.com/advisories/85979/",
      },
      {
         source: "PSIRT-CNA@flexerasoftware.com",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://www.securityfocus.com/bid/109155",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Not Applicable",
            "Vendor Advisory",
         ],
         url: "https://secuniaresearch.flexerasoftware.com/advisories/85979/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
      },
   ],
   sourceIdentifier: "PSIRT-CNA@flexerasoftware.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-06-05 15:15
Modified
2024-11-21 05:00
Summary
regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.
References
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.htmlMailing List, Third Party Advisory
cve@mitre.orghttps://github.com/Perl/perl5/blob/blead/pod/perl5303delta.podThird Party Advisory
cve@mitre.orghttps://github.com/Perl/perl5/compare/v5.30.2...v5.30.3Patch, Third Party Advisory
cve@mitre.orghttps://github.com/Perl/perl5/issues/16947Third Party Advisory
cve@mitre.orghttps://github.com/Perl/perl5/issues/17743Third Party Advisory
cve@mitre.orghttps://github.com/perl/perl5/commit/66bbb51b93253a3f87d11c2695cfb7bdb782184aPatch, Third Party Advisory
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/
cve@mitre.orghttps://security.gentoo.org/glsa/202006-03Third Party Advisory
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20200611-0001/Third Party Advisory
cve@mitre.orghttps://www.oracle.com//security-alerts/cpujul2021.htmlPatch, Third Party Advisory
cve@mitre.orghttps://www.oracle.com/security-alerts/cpuApr2021.htmlPatch, Third Party Advisory
cve@mitre.orghttps://www.oracle.com/security-alerts/cpuapr2022.htmlPatch, Third Party Advisory
cve@mitre.orghttps://www.oracle.com/security-alerts/cpujan2021.htmlPatch, Third Party Advisory
cve@mitre.orghttps://www.oracle.com/security-alerts/cpujan2022.htmlPatch, Third Party Advisory
cve@mitre.orghttps://www.oracle.com/security-alerts/cpuoct2020.htmlPatch, Third Party Advisory
cve@mitre.orghttps://www.oracle.com/security-alerts/cpuoct2021.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.podThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/Perl/perl5/issues/16947Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/Perl/perl5/issues/17743Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/perl/perl5/commit/66bbb51b93253a3f87d11c2695cfb7bdb782184aPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202006-03Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20200611-0001/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com//security-alerts/cpujul2021.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpuApr2021.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpuapr2022.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpujan2021.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpujan2022.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpuoct2020.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpuoct2021.htmlPatch, Third Party Advisory



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C171B203-3DAA-43B7-A0BE-DDB0895EB744",
                     versionEndExcluding: "5.30.3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5735E553-9731-4AAC-BCFF-989377F817B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:netapp:snap_creator_framework:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9F4754FB-E3EB-454A-AB1A-AE3835C5350C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F0FA5D-8D3B-4C0E-81E2-87998286AF33",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B620311B-34A3-48A6-82DF-6F078D7A4493",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2ECD5E79-5C1B-42E9-BE0B-A034EE2D632D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E39D442D-1997-49AF-8B02-5640BE2A26CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C88D46AF-459D-4917-9403-0F63FEC83512",
                     versionEndIncluding: "8.5.0",
                     versionStartIncluding: "8.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_eagle_application_processor:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A0E3537-CB5A-40BF-B42C-CED9211B8892",
                     versionEndIncluding: "16.4.0",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:10.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "996861FC-0089-4BED-8E46-F2B76037EA65",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:10.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "37764AF5-E42E-461E-AA43-763D21B3DCE2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_lsms:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "806AF4AF-12FB-4222-84E4-BC9D44EFF09F",
                     versionEndIncluding: "13.4",
                     versionStartIncluding: "13.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "49ACFC73-A509-4D1C-8FC3-F68F495AB055",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_performance_intelligence_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "977CA754-6CE0-4FCB-9683-D81B7A15449D",
                     versionEndIncluding: "10.3.0.2.1",
                     versionStartIncluding: "10.3.0.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_performance_intelligence_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "29A3F7EF-2A69-427F-9F75-DDDBEE34BA2B",
                     versionEndIncluding: "10.4.0.3.1",
                     versionStartIncluding: "10.4.0.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:configuration_manager:12.1.2.0.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "495DECD7-B14F-4D59-B3E1-30BF9B267475",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D26F3E23-F1A9-45E7-9E5F-0C0A24EE3783",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:sd-wan_edge:8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C99571-0F3C-43E6-84B3-7D80E045EF8E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:sd-wan_edge:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "77E39D5C-5EFA-4FEB-909E-0A92004F2563",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:sd-wan_edge:9.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "06816711-7C49-47B9-A9D7-FB18CC3F42F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:tekelec_platform_distribution:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "26F05F85-7458-4C8F-B93F-93C92E506A40",
                     versionEndIncluding: "7.7.1",
                     versionStartIncluding: "7.4.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.",
      },
      {
         lang: "es",
         value: "En el archivo regcomp.c en Perl versiones anteriores a 5.30.3, permite un desbordamiento del búfer por medio de una expresión regular diseñada debido a llamadas recursivas de la función S_study_chunk",
      },
   ],
   id: "CVE-2020-12723",
   lastModified: "2024-11-21T05:00:08.870",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-06-05T15:15:10.800",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://github.com/Perl/perl5/issues/16947",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://github.com/Perl/perl5/issues/17743",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/perl/perl5/commit/66bbb51b93253a3f87d11c2695cfb7bdb782184a",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.gentoo.org/glsa/202006-03",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20200611-0001/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com//security-alerts/cpujul2021.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuApr2021.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuapr2022.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpujan2021.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpujan2022.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://github.com/Perl/perl5/issues/16947",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://github.com/Perl/perl5/issues/17743",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/perl/perl5/commit/66bbb51b93253a3f87d11c2695cfb7bdb782184a",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.gentoo.org/glsa/202006-03",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20200611-0001/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com//security-alerts/cpujul2021.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuApr2021.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuapr2022.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpujan2021.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpujan2022.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-120",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-06-05 14:15
Modified
2024-11-21 04:56
Summary
Perl before 5.30.3 has an integer overflow related to mishandling of a "PL_regkind[OP(n)] == NOTHING" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.
References
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.htmlMailing List, Third Party Advisory
cve@mitre.orghttps://github.com/Perl/perl5/blob/blead/pod/perl5303delta.podThird Party Advisory
cve@mitre.orghttps://github.com/Perl/perl5/compare/v5.30.2...v5.30.3Patch, Third Party Advisory
cve@mitre.orghttps://github.com/perl/perl5/commit/0a320d753fe7fca03df259a4dfd8e641e51edaa8Patch, Third Party Advisory
cve@mitre.orghttps://github.com/perl/perl5/commit/3295b48defa0f8570114877b063fe546dd348b3cPatch, Third Party Advisory
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/
cve@mitre.orghttps://security.gentoo.org/glsa/202006-03Third Party Advisory
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20200611-0001/Third Party Advisory
cve@mitre.orghttps://www.oracle.com//security-alerts/cpujul2021.htmlPatch, Third Party Advisory
cve@mitre.orghttps://www.oracle.com/security-alerts/cpuApr2021.htmlPatch, Third Party Advisory
cve@mitre.orghttps://www.oracle.com/security-alerts/cpuapr2022.htmlPatch, Third Party Advisory
cve@mitre.orghttps://www.oracle.com/security-alerts/cpujan2021.htmlPatch, Third Party Advisory
cve@mitre.orghttps://www.oracle.com/security-alerts/cpujan2022.htmlPatch, Third Party Advisory
cve@mitre.orghttps://www.oracle.com/security-alerts/cpuoct2020.htmlPatch, Third Party Advisory
cve@mitre.orghttps://www.oracle.com/security-alerts/cpuoct2021.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.podThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/perl/perl5/commit/0a320d753fe7fca03df259a4dfd8e641e51edaa8Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/perl/perl5/commit/3295b48defa0f8570114877b063fe546dd348b3cPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202006-03Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20200611-0001/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com//security-alerts/cpujul2021.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpuApr2021.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpuapr2022.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpujan2021.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpujan2022.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpuoct2020.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpuoct2021.htmlPatch, Third Party Advisory



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C171B203-3DAA-43B7-A0BE-DDB0895EB744",
                     versionEndExcluding: "5.30.3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F0FA5D-8D3B-4C0E-81E2-87998286AF33",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B620311B-34A3-48A6-82DF-6F078D7A4493",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5735E553-9731-4AAC-BCFF-989377F817B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:netapp:snap_creator_framework:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9F4754FB-E3EB-454A-AB1A-AE3835C5350C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2ECD5E79-5C1B-42E9-BE0B-A034EE2D632D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E39D442D-1997-49AF-8B02-5640BE2A26CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C88D46AF-459D-4917-9403-0F63FEC83512",
                     versionEndIncluding: "8.5.0",
                     versionStartIncluding: "8.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_eagle_application_processor:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A0E3537-CB5A-40BF-B42C-CED9211B8892",
                     versionEndIncluding: "16.4.0",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:10.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "996861FC-0089-4BED-8E46-F2B76037EA65",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:10.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "37764AF5-E42E-461E-AA43-763D21B3DCE2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:46.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FE18D-6B1C-4CF7-B409-C379E9F60D0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:46.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2BE3FB3-5619-4381-BE4E-FBADB3C747F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:46.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AB3C447-DA3F-44FF-91FD-8985C0527940",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_lsms:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "806AF4AF-12FB-4222-84E4-BC9D44EFF09F",
                     versionEndIncluding: "13.4",
                     versionStartIncluding: "13.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "49ACFC73-A509-4D1C-8FC3-F68F495AB055",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_performance_intelligence_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "977CA754-6CE0-4FCB-9683-D81B7A15449D",
                     versionEndIncluding: "10.3.0.2.1",
                     versionStartIncluding: "10.3.0.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_performance_intelligence_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "29A3F7EF-2A69-427F-9F75-DDDBEE34BA2B",
                     versionEndIncluding: "10.4.0.3.1",
                     versionStartIncluding: "10.4.0.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7B49D71-6A31-497A-B6A9-06E84F086E7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:configuration_manager:12.1.2.0.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "495DECD7-B14F-4D59-B3E1-30BF9B267475",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D26F3E23-F1A9-45E7-9E5F-0C0A24EE3783",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:sd-wan_aware:8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "667A06DE-E173-406F-94DA-1FE64BCFAE18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:sd-wan_aware:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B003D11-398F-486C-941D-698FB5BE5BCE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:sd-wan_aware:9.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "D13834B9-C48B-4C72-A27B-F9A8ACB50098",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:tekelec_platform_distribution:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "26F05F85-7458-4C8F-B93F-93C92E506A40",
                     versionEndIncluding: "7.7.1",
                     versionStartIncluding: "7.4.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Perl before 5.30.3 has an integer overflow related to mishandling of a \"PL_regkind[OP(n)] == NOTHING\" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.",
      },
      {
         lang: "es",
         value: "Perl versiones anteriores a 5.30.3, presenta un desbordamiento de enteros relacionado con un manejo inapropiado de una situación \"PL_regkind[OP(n)] == NOTHING\". Una expresión regular diseñada podría conllevar a un bytecode malformado con la posibilidad de inyección de instrucciones",
      },
   ],
   id: "CVE-2020-10878",
   lastModified: "2024-11-21T04:56:16.367",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.6,
               baseSeverity: "HIGH",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 4.7,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-06-05T14:15:10.527",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/perl/perl5/commit/0a320d753fe7fca03df259a4dfd8e641e51edaa8",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/perl/perl5/commit/3295b48defa0f8570114877b063fe546dd348b3c",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.gentoo.org/glsa/202006-03",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20200611-0001/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com//security-alerts/cpujul2021.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuApr2021.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuapr2022.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpujan2021.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpujan2022.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/perl/perl5/commit/0a320d753fe7fca03df259a4dfd8e641e51edaa8",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/perl/perl5/commit/3295b48defa0f8570114877b063fe546dd348b3c",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.gentoo.org/glsa/202006-03",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20200611-0001/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com//security-alerts/cpujul2021.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuApr2021.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuapr2022.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpujan2021.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpujan2022.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-190",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-02-25 20:29
Modified
2024-11-21 04:00
Severity ?
Summary
A Remote Code Execution vulnerability in lmgrd and vendor daemon components of FlexNet Publisher version 11.16.1.0 and earlier could allow a remote attacker to corrupt the memory by allocating / deallocating memory, loading lmgrd or the vendor daemon and causing the heartbeat between lmgrd and the vendor daemon to stop. This would force the vendor daemon to shut down. No exploit of this vulnerability has been demonstrated.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:flexera:flexnet_publisher:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C7C03AE-8A93-4E82-B1EC-CEB6C4402FDF",
                     versionEndIncluding: "11.16.1.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:oracle:communications_lsms:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "806AF4AF-12FB-4222-84E4-BC9D44EFF09F",
                     versionEndIncluding: "13.4",
                     versionStartIncluding: "13.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A Remote Code Execution vulnerability in lmgrd and vendor daemon components of FlexNet Publisher version 11.16.1.0 and earlier could allow a remote attacker to corrupt the memory by allocating / deallocating memory, loading lmgrd or the vendor daemon and causing the heartbeat between lmgrd and the vendor daemon to stop. This would force the vendor daemon to shut down. No exploit of this vulnerability has been demonstrated.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de ejecución remota de código en los componentes de lmgrd y del demonio del fabricante en FlexNet Publisher, en versiones 11.16.1.0 y anteriores, podría permitir que un atacante remoto corrompa la memoria asignando/desasignando memoria, cargando lmgrd o el demonio del fabricante y provocando que el latido entre lmgrd y el demonio del fabricante se detenga. Esto forzaría el cierre del demonio del fabricante. No se han demostrado explotaciones de esta vulnerabilidad.",
      },
   ],
   id: "CVE-2018-20033",
   lastModified: "2024-11-21T04:00:48.007",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-02-25T20:29:00.233",
   references: [
      {
         source: "PSIRT-CNA@flexerasoftware.com",
         tags: [
            "Broken Link",
         ],
         url: "http://www.securityfocus.com/bid/109155",
      },
      {
         source: "PSIRT-CNA@flexerasoftware.com",
         tags: [
            "Not Applicable",
            "Vendor Advisory",
         ],
         url: "https://secuniaresearch.flexerasoftware.com/advisories/85979/",
      },
      {
         source: "PSIRT-CNA@flexerasoftware.com",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://www.securityfocus.com/bid/109155",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Not Applicable",
            "Vendor Advisory",
         ],
         url: "https://secuniaresearch.flexerasoftware.com/advisories/85979/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
      },
   ],
   sourceIdentifier: "PSIRT-CNA@flexerasoftware.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-770",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-07-10 21:29
Modified
2024-11-21 04:05
Summary
Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a speculative buffer overflow and side-channel analysis.
References
secure@intel.comhttps://access.redhat.com/errata/RHSA-2018:2384Third Party Advisory
secure@intel.comhttps://access.redhat.com/errata/RHSA-2018:2390Third Party Advisory
secure@intel.comhttps://access.redhat.com/errata/RHSA-2018:2395Third Party Advisory
secure@intel.comhttps://access.redhat.com/errata/RHSA-2019:1946Third Party Advisory
secure@intel.comhttps://access.redhat.com/errata/RHSA-2020:0174Third Party Advisory
secure@intel.comhttps://cdrdv2.intel.com/v1/dl/getContent/685359Third Party Advisory
secure@intel.comhttps://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0Third Party Advisory
secure@intel.comhttps://security.netapp.com/advisory/ntap-20180823-0001/Third Party Advisory
secure@intel.comhttps://www.oracle.com/security-alerts/cpujul2020.htmlPatch, Third Party Advisory
secure@intel.comhttps://www.oracle.com/security-alerts/cpuoct2020.htmlPatch, Third Party Advisory
secure@intel.comhttps://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2018:2384Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2018:2390Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2018:2395Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2019:1946Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2020:0174Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://cdrdv2.intel.com/v1/dl/getContent/685359Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20180823-0001/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpujul2020.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpuoct2020.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.htmlPatch, Third Party Advisory
Impacted products
Vendor Product Version
intel atom_c c2308
intel atom_c c2316
intel atom_c c2338
intel atom_c c2350
intel atom_c c2358
intel atom_c c2508
intel atom_c c2516
intel atom_c c2518
intel atom_c c2530
intel atom_c c2538
intel atom_c c2550
intel atom_c c2558
intel atom_c c2718
intel atom_c c2730
intel atom_c c2738
intel atom_c c2750
intel atom_c c2758
intel atom_c c3308
intel atom_c c3338
intel atom_c c3508
intel atom_c c3538
intel atom_c c3558
intel atom_c c3708
intel atom_c c3750
intel atom_c c3758
intel atom_c c3808
intel atom_c c3830
intel atom_c c3850
intel atom_c c3858
intel atom_c c3950
intel atom_c c3955
intel atom_c c3958
intel atom_e e3805
intel atom_e e3815
intel atom_e e3825
intel atom_e e3826
intel atom_e e3827
intel atom_e e3845
intel atom_x3 c3130
intel atom_x3 c3200rk
intel atom_x3 c3205rk
intel atom_x3 c3230rk
intel atom_x3 c3235rk
intel atom_x3 c3265rk
intel atom_x3 c3295rk
intel atom_x3 c3405
intel atom_x3 c3445
intel atom_z z2420
intel atom_z z2460
intel atom_z z2480
intel atom_z z2520
intel atom_z z2560
intel atom_z z2580
intel atom_z z2760
intel atom_z z3460
intel atom_z z3480
intel atom_z z3530
intel atom_z z3560
intel atom_z z3570
intel atom_z z3580
intel atom_z z3590
intel atom_z z3735d
intel atom_z z3735e
intel atom_z z3735f
intel atom_z z3735g
intel atom_z z3736f
intel atom_z z3736g
intel atom_z z3740
intel atom_z z3740d
intel atom_z z3745
intel atom_z z3745d
intel atom_z z3770
intel atom_z z3770d
intel atom_z z3775
intel atom_z z3775d
intel atom_z z3785
intel atom_z z3795
intel celeron_j j1750
intel celeron_j j1800
intel celeron_j j1850
intel celeron_j j1900
intel celeron_j j3060
intel celeron_j j3160
intel celeron_j j3355
intel celeron_j j3455
intel celeron_j j4005
intel celeron_j j4105
intel celeron_n n2805
intel celeron_n n2806
intel celeron_n n2807
intel celeron_n n2808
intel celeron_n n2810
intel celeron_n n2815
intel celeron_n n2820
intel celeron_n n2830
intel celeron_n n2840
intel celeron_n n2910
intel celeron_n n2920
intel celeron_n n2930
intel celeron_n n2940
intel celeron_n n3000
intel celeron_n n3010
intel celeron_n n3050
intel celeron_n n3060
intel celeron_n n3150
intel celeron_n n3160
intel celeron_n n3350
intel celeron_n n3450
intel celeron_n n4000
intel celeron_n n4100
intel core_i3 330e
intel core_i3 330m
intel core_i3 330um
intel core_i3 350m
intel core_i3 370m
intel core_i3 380m
intel core_i3 380um
intel core_i3 390m
intel core_i3 530
intel core_i3 540
intel core_i3 550
intel core_i3 560
intel core_i3 2100
intel core_i3 2100t
intel core_i3 2102
intel core_i3 2105
intel core_i3 2115c
intel core_i3 2120
intel core_i3 2120t
intel core_i3 2125
intel core_i3 2130
intel core_i3 2310e
intel core_i3 2310m
intel core_i3 2312m
intel core_i3 2328m
intel core_i3 2330e
intel core_i3 2330m
intel core_i3 2340ue
intel core_i3 2348m
intel core_i3 2350m
intel core_i3 2357m
intel core_i3 2365m
intel core_i3 2367m
intel core_i3 2370m
intel core_i3 2375m
intel core_i3 2377m
intel core_i3 3110m
intel core_i3 3115c
intel core_i3 3120m
intel core_i3 3120me
intel core_i3 3130m
intel core_i3 3210
intel core_i3 3217u
intel core_i3 3217ue
intel core_i3 3220
intel core_i3 3220t
intel core_i3 3225
intel core_i3 3227u
intel core_i3 3229y
intel core_i3 3240
intel core_i3 3240t
intel core_i3 3245
intel core_i3 3250
intel core_i3 3250t
intel core_i3 4000m
intel core_i3 4005u
intel core_i3 4010u
intel core_i3 4010y
intel core_i3 4012y
intel core_i3 4020y
intel core_i3 4025u
intel core_i3 4030u
intel core_i3 4030y
intel core_i3 4100e
intel core_i3 4100m
intel core_i3 4100u
intel core_i3 4102e
intel core_i3 4110e
intel core_i3 4110m
intel core_i3 4112e
intel core_i3 4120u
intel core_i3 4130
intel core_i3 4130t
intel core_i3 4150
intel core_i3 4150t
intel core_i3 4158u
intel core_i3 4160
intel core_i3 4160t
intel core_i3 4170
intel core_i3 4170t
intel core_i3 4330
intel core_i3 4330t
intel core_i3 4330te
intel core_i3 4340
intel core_i3 4340te
intel core_i3 4350
intel core_i3 4350t
intel core_i3 4360
intel core_i3 4360t
intel core_i3 4370
intel core_i3 4370t
intel core_i3 5005u
intel core_i3 5010u
intel core_i3 5015u
intel core_i3 5020u
intel core_i3 5157u
intel core_i3 6006u
intel core_i3 6098p
intel core_i3 6100
intel core_i3 6100e
intel core_i3 6100h
intel core_i3 6100t
intel core_i3 6100te
intel core_i3 6100u
intel core_i3 6102e
intel core_i3 6157u
intel core_i3 6167u
intel core_i3 6300
intel core_i3 6300t
intel core_i3 6320
intel core_i3 8100
intel core_i3 8350k
intel core_i5 430m
intel core_i5 430um
intel core_i5 450m
intel core_i5 460m
intel core_i5 470um
intel core_i5 480m
intel core_i5 520e
intel core_i5 520m
intel core_i5 520um
intel core_i5 540m
intel core_i5 540um
intel core_i5 560m
intel core_i5 560um
intel core_i5 580m
intel core_i5 650
intel core_i5 655k
intel core_i5 660
intel core_i5 661
intel core_i5 670
intel core_i5 680
intel core_i5 750
intel core_i5 750s
intel core_i5 760
intel core_i5 2300
intel core_i5 2310
intel core_i5 2320
intel core_i5 2380p
intel core_i5 2390t
intel core_i5 2400
intel core_i5 2400s
intel core_i5 2405s
intel core_i5 2410m
intel core_i5 2430m
intel core_i5 2435m
intel core_i5 2450m
intel core_i5 2450p
intel core_i5 2467m
intel core_i5 2500
intel core_i5 2500k
intel core_i5 2500s
intel core_i5 2500t
intel core_i5 2510e
intel core_i5 2515e
intel core_i5 2520m
intel core_i5 2537m
intel core_i5 2540m
intel core_i5 2550k
intel core_i5 2557m
intel core_i5 3210m
intel core_i5 3230m
intel core_i5 3317u
intel core_i5 3320m
intel core_i5 3330
intel core_i5 3330s
intel core_i5 3337u
intel core_i5 3339y
intel core_i5 3340
intel core_i5 3340m
intel core_i5 3340s
intel core_i5 3350p
intel core_i5 3360m
intel core_i5 3380m
intel core_i5 3427u
intel core_i5 3437u
intel core_i5 3439y
intel core_i5 3450
intel core_i5 3450s
intel core_i5 3470
intel core_i5 3470s
intel core_i5 3470t
intel core_i5 3475s
intel core_i5 3550
intel core_i5 3550s
intel core_i5 3570
intel core_i5 3570k
intel core_i5 3570s
intel core_i5 3570t
intel core_i5 3610me
intel core_i5 4200h
intel core_i5 4200m
intel core_i5 4200u
intel core_i5 4200y
intel core_i5 4202y
intel core_i5 4210h
intel core_i5 4210m
intel core_i5 4210u
intel core_i5 4210y
intel core_i5 4220y
intel core_i5 4250u
intel core_i5 4258u
intel core_i5 4260u
intel core_i5 4278u
intel core_i5 4288u
intel core_i5 4300m
intel core_i5 4300u
intel core_i5 4300y
intel core_i5 4302y
intel core_i5 4308u
intel core_i5 4310m
intel core_i5 4310u
intel core_i5 4330m
intel core_i5 4340m
intel core_i5 4350u
intel core_i5 4360u
intel core_i5 4400e
intel core_i5 4402e
intel core_i5 4402ec
intel core_i5 4410e
intel core_i5 4422e
intel core_i5 4430
intel core_i5 4430s
intel core_i5 4440
intel core_i5 4440s
intel core_i5 4460
intel core_i5 4460s
intel core_i5 4460t
intel core_i5 4570
intel core_i5 4570r
intel core_i5 4570s
intel core_i5 4570t
intel core_i5 4570te
intel core_i5 4590
intel core_i5 4590s
intel core_i5 4590t
intel core_i5 4670
intel core_i5 4670k
intel core_i5 4670r
intel core_i5 4670s
intel core_i5 4670t
intel core_i5 4690
intel core_i5 4690k
intel core_i5 4690s
intel core_i5 4690t
intel core_i5 5200u
intel core_i5 5250u
intel core_i5 5257u
intel core_i5 5287u
intel core_i5 5300u
intel core_i5 5350h
intel core_i5 5350u
intel core_i5 5575r
intel core_i5 5675c
intel core_i5 5675r
intel core_i5 6200u
intel core_i5 6260u
intel core_i5 6267u
intel core_i5 6287u
intel core_i5 6300hq
intel core_i5 6300u
intel core_i5 6350hq
intel core_i5 6360u
intel core_i5 6400
intel core_i5 6400t
intel core_i5 6402p
intel core_i5 6440eq
intel core_i5 6440hq
intel core_i5 6442eq
intel core_i5 6500
intel core_i5 6500t
intel core_i5 6500te
intel core_i5 6585r
intel core_i5 6600
intel core_i5 6600k
intel core_i5 6600t
intel core_i5 6685r
intel core_i5 8250u
intel core_i5 8350u
intel core_i5 8400
intel core_i5 8600k
intel core_i7 7y75
intel core_i7 610e
intel core_i7 620le
intel core_i7 620lm
intel core_i7 620m
intel core_i7 620ue
intel core_i7 620um
intel core_i7 640lm
intel core_i7 640m
intel core_i7 640um
intel core_i7 660lm
intel core_i7 660ue
intel core_i7 660um
intel core_i7 680um
intel core_i7 720qm
intel core_i7 740qm
intel core_i7 820qm
intel core_i7 840qm
intel core_i7 860
intel core_i7 860s
intel core_i7 870
intel core_i7 870s
intel core_i7 875k
intel core_i7 880
intel core_i7 920
intel core_i7 920xm
intel core_i7 930
intel core_i7 940
intel core_i7 940xm
intel core_i7 950
intel core_i7 960
intel core_i7 965
intel core_i7 970
intel core_i7 975
intel core_i7 980
intel core_i7 980x
intel core_i7 990x
intel core_i7 2600
intel core_i7 2600k
intel core_i7 2600s
intel core_i7 2610ue
intel core_i7 2617m
intel core_i7 2620m
intel core_i7 2629m
intel core_i7 2630qm
intel core_i7 2635qm
intel core_i7 2637m
intel core_i7 2640m
intel core_i7 2649m
intel core_i7 2655le
intel core_i7 2657m
intel core_i7 2670qm
intel core_i7 2675qm
intel core_i7 2677m
intel core_i7 2700k
intel core_i7 2710qe
intel core_i7 2715qe
intel core_i7 2720qm
intel core_i7 2760qm
intel core_i7 2820qm
intel core_i7 2860qm
intel core_i7 2920xm
intel core_i7 2960xm
intel core_i7 3517u
intel core_i7 3517ue
intel core_i7 3520m
intel core_i7 3537u
intel core_i7 3540m
intel core_i7 3555le
intel core_i7 3610qe
intel core_i7 3610qm
intel core_i7 3612qe
intel core_i7 3612qm
intel core_i7 3615qe
intel core_i7 3615qm
intel core_i7 3630qm
intel core_i7 3632qm
intel core_i7 3635qm
intel core_i7 3667u
intel core_i7 3687u
intel core_i7 3689y
intel core_i7 3720qm
intel core_i7 3740qm
intel core_i7 3770
intel core_i7 3770k
intel core_i7 3770s
intel core_i7 3770t
intel core_i7 3820qm
intel core_i7 3840qm
intel core_i7 4500u
intel core_i7 4510u
intel core_i7 4550u
intel core_i7 4558u
intel core_i7 4578u
intel core_i7 4600m
intel core_i7 4600u
intel core_i7 4610m
intel core_i7 4610y
intel core_i7 4650u
intel core_i7 4700ec
intel core_i7 4700eq
intel core_i7 4700hq
intel core_i7 4700mq
intel core_i7 4702ec
intel core_i7 4702hq
intel core_i7 4702mq
intel core_i7 4710hq
intel core_i7 4710mq
intel core_i7 4712hq
intel core_i7 4712mq
intel core_i7 4720hq
intel core_i7 4722hq
intel core_i7 4750hq
intel core_i7 4760hq
intel core_i7 4765t
intel core_i7 4770
intel core_i7 4770hq
intel core_i7 4770k
intel core_i7 4770r
intel core_i7 4770s
intel core_i7 4770t
intel core_i7 4770te
intel core_i7 4771
intel core_i7 4785t
intel core_i7 4790
intel core_i7 4790k
intel core_i7 4790s
intel core_i7 4790t
intel core_i7 4800mq
intel core_i7 4810mq
intel core_i7 4850hq
intel core_i7 4860hq
intel core_i7 4870hq
intel core_i7 4900mq
intel core_i7 4910mq
intel core_i7 4950hq
intel core_i7 4960hq
intel core_i7 4980hq
intel core_i7 5500u
intel core_i7 5550u
intel core_i7 5557u
intel core_i7 5600u
intel core_i7 5650u
intel core_i7 5700eq
intel core_i7 5700hq
intel core_i7 5750hq
intel core_i7 5775c
intel core_i7 5775r
intel core_i7 5850eq
intel core_i7 5850hq
intel core_i7 5950hq
intel core_i7 7500u
intel core_i7 7560u
intel core_i7 7567u
intel core_i7 7600u
intel core_i7 7660u
intel core_i7 7700
intel core_i7 7700hq
intel core_i7 7700k
intel core_i7 7700t
intel core_i7 7820eq
intel core_i7 7820hk
intel core_i7 7820hq
intel core_i7 7920hq
intel core_i7 8550u
intel core_i7 8650u
intel core_i7 8700
intel core_i7 8700k
intel core_m 5y10
intel core_m 5y10a
intel core_m 5y10c
intel core_m 5y31
intel core_m 5y51
intel core_m 5y70
intel core_m 5y71
intel core_m3 6y30
intel core_m3 7y30
intel core_m3 7y32
intel core_m5 6y54
intel core_m5 6y57
intel core_m7 6y75
intel pentium_j j2850
intel pentium_j j2900
intel pentium_j j3710
intel pentium_j j4205
intel pentium_n n3510
intel pentium_n n3520
intel pentium_n n3530
intel pentium_n n3540
intel pentium_n n3700
intel pentium_n n3710
intel pentium_n n4200
intel xeon e5502
intel xeon e5503
intel xeon e5504
intel xeon e5506
intel xeon e5507
intel xeon e5520
intel xeon e5530
intel xeon e5540
intel xeon e5603
intel xeon e5606
intel xeon e5607
intel xeon e5620
intel xeon e5630
intel xeon e5640
intel xeon e5645
intel xeon e5649
intel xeon e6510
intel xeon e6540
intel xeon e7520
intel xeon e7530
intel xeon e7540
intel xeon ec5509
intel xeon ec5539
intel xeon ec5549
intel xeon l3406
intel xeon l3426
intel xeon l5506
intel xeon l5508
intel xeon l5518
intel xeon l5520
intel xeon l5530
intel xeon l5609
intel xeon l5618
intel xeon l5630
intel xeon l5638
intel xeon l5640
intel xeon l7545
intel xeon l7555
intel xeon lc5518
intel xeon lc5528
intel xeon w3670
intel xeon w3680
intel xeon w3690
intel xeon w5580
intel xeon w5590
intel xeon x3430
intel xeon x3440
intel xeon x3450
intel xeon x3460
intel xeon x3470
intel xeon x3480
intel xeon x5550
intel xeon x5560
intel xeon x5570
intel xeon x5647
intel xeon x5650
intel xeon x5660
intel xeon x5667
intel xeon x5670
intel xeon x5672
intel xeon x5675
intel xeon x5677
intel xeon x5680
intel xeon x5687
intel xeon x5690
intel xeon x6550
intel xeon x7542
intel xeon x7550
intel xeon x7560
intel xeon_bronze_3104 -
intel xeon_bronze_3106 -
intel xeon_e-1105c -
intel xeon_e3 1505m_v6
intel xeon_e3 1515m_v5
intel xeon_e3 1535m_v5
intel xeon_e3 1535m_v6
intel xeon_e3 1545m_v5
intel xeon_e3 1558l_v5
intel xeon_e3 1565l_v5
intel xeon_e3 1575m_v5
intel xeon_e3 1578l_v5
intel xeon_e3 1585_v5
intel xeon_e3 1585l_v5
intel xeon_e3_1105c_v2 -
intel xeon_e3_1125c -
intel xeon_e3_1125c_v2 -
intel xeon_e3_1220 -
intel xeon_e3_1220_v2 -
intel xeon_e3_1220_v3 -
intel xeon_e3_1220_v5 -
intel xeon_e3_1220_v6 -
intel xeon_e3_12201 -
intel xeon_e3_12201_v2 -
intel xeon_e3_1220l_v3 -
intel xeon_e3_1225 -
intel xeon_e3_1225_v2 -
intel xeon_e3_1225_v3 -
intel xeon_e3_1225_v5 -
intel xeon_e3_1225_v6 -
intel xeon_e3_1226_v3 -
intel xeon_e3_1230 -
intel xeon_e3_1230_v2 -
intel xeon_e3_1230_v3 -
intel xeon_e3_1230_v5 -
intel xeon_e3_1230_v6 -
intel xeon_e3_1230l_v3 -
intel xeon_e3_1231_v3 -
intel xeon_e3_1235 -
intel xeon_e3_1235l_v5 -
intel xeon_e3_1240 -
intel xeon_e3_1240_v2 -
intel xeon_e3_1240_v3 -
intel xeon_e3_1240_v5 -
intel xeon_e3_1240_v6 -
intel xeon_e3_1240l_v3 -
intel xeon_e3_1240l_v5 -
intel xeon_e3_1241_v3 -
intel xeon_e3_1245 -
intel xeon_e3_1245_v2 -
intel xeon_e3_1245_v3 -
intel xeon_e3_1245_v5 -
intel xeon_e3_1245_v6 -
intel xeon_e3_1246_v3 -
intel xeon_e3_1258l_v4 -
intel xeon_e3_1260l -
intel xeon_e3_1260l_v5 -
intel xeon_e3_1265l_v2 -
intel xeon_e3_1265l_v3 -
intel xeon_e3_1265l_v4 -
intel xeon_e3_1268l_v3 -
intel xeon_e3_1268l_v5 -
intel xeon_e3_1270 -
intel xeon_e3_1270_v2 -
intel xeon_e3_1270_v3 -
intel xeon_e3_1270_v5 -
intel xeon_e3_1270_v6 -
intel xeon_e3_1271_v3 -
intel xeon_e3_1275 -
intel xeon_e3_1275_v2 -
intel xeon_e3_1275_v3 -
intel xeon_e3_1275_v5 -
intel xeon_e3_1275_v6 -
intel xeon_e3_1275l_v3 -
intel xeon_e3_1276_v3 -
intel xeon_e3_1278l_v4 -
intel xeon_e3_1280 -
intel xeon_e3_1280_v2 -
intel xeon_e3_1280_v3 -
intel xeon_e3_1280_v5 -
intel xeon_e3_1280_v6 -
intel xeon_e3_1281_v3 -
intel xeon_e3_1285_v3 -
intel xeon_e3_1285_v4 -
intel xeon_e3_1285_v6 -
intel xeon_e3_1285l_v3 -
intel xeon_e3_1285l_v4 -
intel xeon_e3_1286_v3 -
intel xeon_e3_1286l_v3 -
intel xeon_e3_1290 -
intel xeon_e3_1290_v2 -
intel xeon_e3_1501l_v6 -
intel xeon_e3_1501m_v6 -
intel xeon_e3_1505l_v5 -
intel xeon_e3_1505l_v6 -
intel xeon_e3_1505m_v5 -
intel xeon_e5 2650l_v4
intel xeon_e5 2658
intel xeon_e5 2658_v2
intel xeon_e5 2658_v3
intel xeon_e5 2658_v4
intel xeon_e5 2658a_v3
intel xeon_e5 2660
intel xeon_e5 2660_v2
intel xeon_e5 2660_v3
intel xeon_e5 2660_v4
intel xeon_e5 2665
intel xeon_e5 2667
intel xeon_e5 2667_v2
intel xeon_e5 2667_v3
intel xeon_e5 2667_v4
intel xeon_e5 2670
intel xeon_e5 2670_v2
intel xeon_e5 2670_v3
intel xeon_e5 2680
intel xeon_e5 2680_v2
intel xeon_e5 2680_v3
intel xeon_e5 2680_v4
intel xeon_e5 2683_v3
intel xeon_e5 2683_v4
intel xeon_e5 2687w
intel xeon_e5 2687w_v2
intel xeon_e5 2687w_v3
intel xeon_e5 2687w_v4
intel xeon_e5 2690
intel xeon_e5 2690_v2
intel xeon_e5 2690_v3
intel xeon_e5 2690_v4
intel xeon_e5 2695_v2
intel xeon_e5 2695_v3
intel xeon_e5 2695_v4
intel xeon_e5 2697_v2
intel xeon_e5 2697_v3
intel xeon_e5 2697_v4
intel xeon_e5 2697a_v4
intel xeon_e5 2698_v3
intel xeon_e5 2698_v4
intel xeon_e5 2699_v3
intel xeon_e5 2699_v4
intel xeon_e5 2699a_v4
intel xeon_e5 2699r_v4
intel xeon_e5 4603
intel xeon_e5 4603_v2
intel xeon_e5 4607
intel xeon_e5 4607_v2
intel xeon_e5 4610
intel xeon_e5 4610_v2
intel xeon_e5 4610_v3
intel xeon_e5 4610_v4
intel xeon_e5 4617
intel xeon_e5 4620
intel xeon_e5 4620_v2
intel xeon_e5 4620_v3
intel xeon_e5 4620_v4
intel xeon_e5 4624l_v2
intel xeon_e5 4627_v2
intel xeon_e5 4627_v3
intel xeon_e5 4627_v4
intel xeon_e5 4628l_v4
intel xeon_e5 4640
intel xeon_e5 4640_v2
intel xeon_e5 4640_v3
intel xeon_e5 4640_v4
intel xeon_e5 4648_v3
intel xeon_e5 4650
intel xeon_e5 4650_v2
intel xeon_e5 4650_v3
intel xeon_e5 4650_v4
intel xeon_e5 4650l
intel xeon_e5 4655_v3
intel xeon_e5 4655_v4
intel xeon_e5 4657l_v2
intel xeon_e5 4660_v3
intel xeon_e5 4660_v4
intel xeon_e5 4667_v3
intel xeon_e5 4667_v4
intel xeon_e5 4669_v3
intel xeon_e5 4669_v4
intel xeon_e5_1428l -
intel xeon_e5_1428l_v2 -
intel xeon_e5_1428l_v3 -
intel xeon_e5_1620 -
intel xeon_e5_1620_v2 -
intel xeon_e5_1620_v3 -
intel xeon_e5_1620_v4 -
intel xeon_e5_1630_v3 -
intel xeon_e5_1630_v4 -
intel xeon_e5_1650 -
intel xeon_e5_1650_v2 -
intel xeon_e5_1650_v3 -
intel xeon_e5_1650_v4 -
intel xeon_e5_1660 -
intel xeon_e5_1660_v2 -
intel xeon_e5_1660_v3 -
intel xeon_e5_1660_v4 -
intel xeon_e5_1680_v3 -
intel xeon_e5_1680_v4 -
intel xeon_e5_2403 -
intel xeon_e5_2403_v2 -
intel xeon_e5_2407 -
intel xeon_e5_2407_v2 -
intel xeon_e5_2408l_v3 -
intel xeon_e5_2418l -
intel xeon_e5_2418l_v2 -
intel xeon_e5_2418l_v3 -
intel xeon_e5_2420 -
intel xeon_e5_2420_v2 -
intel xeon_e5_2428l -
intel xeon_e5_2428l_v2 -
intel xeon_e5_2428l_v3 -
intel xeon_e5_2430 -
intel xeon_e5_2430_v2 -
intel xeon_e5_2430l -
intel xeon_e5_2430l_v2 -
intel xeon_e5_2438l_v3 -
intel xeon_e5_2440 -
intel xeon_e5_2440_v2 -
intel xeon_e5_2448l -
intel xeon_e5_2448l_v2 -
intel xeon_e5_2450 -
intel xeon_e5_2450_v2 -
intel xeon_e5_2450l -
intel xeon_e5_2450l_v2 -
intel xeon_e5_2470 -
intel xeon_e5_2470_v2 -
intel xeon_e5_2603 -
intel xeon_e5_2603_v2 -
intel xeon_e5_2603_v3 -
intel xeon_e5_2603_v4 -
intel xeon_e5_2608l_v3 -
intel xeon_e5_2608l_v4 -
intel xeon_e5_2609 -
intel xeon_e5_2609_v2 -
intel xeon_e5_2609_v3 -
intel xeon_e5_2609_v4 -
intel xeon_e5_2618l_v2 -
intel xeon_e5_2618l_v3 -
intel xeon_e5_2618l_v4 -
intel xeon_e5_2620 -
intel xeon_e5_2620_v2 -
intel xeon_e5_2620_v3 -
intel xeon_e5_2620_v4 -
intel xeon_e5_2623_v3 -
intel xeon_e5_2623_v4 -
intel xeon_e5_2628l_v2 -
intel xeon_e5_2628l_v3 -
intel xeon_e5_2628l_v4 -
intel xeon_e5_2630 -
intel xeon_e5_2630_v2 -
intel xeon_e5_2630_v3 -
intel xeon_e5_2630_v4 -
intel xeon_e5_2630l -
intel xeon_e5_2630l_v2 -
intel xeon_e5_2630l_v3 -
intel xeon_e5_2630l_v4 -
intel xeon_e5_2637 -
intel xeon_e5_2637_v2 -
intel xeon_e5_2637_v3 -
intel xeon_e5_2637_v4 -
intel xeon_e5_2640 -
intel xeon_e5_2640_v2 -
intel xeon_e5_2640_v3 -
intel xeon_e5_2640_v4 -
intel xeon_e5_2643 -
intel xeon_e5_2643_v2 -
intel xeon_e5_2643_v3 -
intel xeon_e5_2643_v4 -
intel xeon_e5_2648l -
intel xeon_e5_2648l_v2 -
intel xeon_e5_2648l_v3 -
intel xeon_e5_2648l_v4 -
intel xeon_e5_2650 -
intel xeon_e5_2650_v2 -
intel xeon_e5_2650_v3 -
intel xeon_e5_2650_v4 -
intel xeon_e5_2650l -
intel xeon_e5_2650l_v2 -
intel xeon_e5_2650l_v3 -
intel xeon_e7 2803
intel xeon_e7 2820
intel xeon_e7 2830
intel xeon_e7 2850
intel xeon_e7 2850_v2
intel xeon_e7 2860
intel xeon_e7 2870
intel xeon_e7 2870_v2
intel xeon_e7 2880_v2
intel xeon_e7 2890_v2
intel xeon_e7 4807
intel xeon_e7 4809_v2
intel xeon_e7 4809_v3
intel xeon_e7 4809_v4
intel xeon_e7 4820
intel xeon_e7 4820_v2
intel xeon_e7 4820_v3
intel xeon_e7 4820_v4
intel xeon_e7 4830
intel xeon_e7 4830_v2
intel xeon_e7 4830_v3
intel xeon_e7 4830_v4
intel xeon_e7 4850
intel xeon_e7 4850_v2
intel xeon_e7 4850_v3
intel xeon_e7 4850_v4
intel xeon_e7 4860
intel xeon_e7 4860_v2
intel xeon_e7 4870
intel xeon_e7 4870_v2
intel xeon_e7 4880_v2
intel xeon_e7 4890_v2
intel xeon_e7 8830
intel xeon_e7 8837
intel xeon_e7 8850
intel xeon_e7 8850_v2
intel xeon_e7 8857_v2
intel xeon_e7 8860
intel xeon_e7 8860_v3
intel xeon_e7 8860_v4
intel xeon_e7 8867_v3
intel xeon_e7 8867_v4
intel xeon_e7 8867l
intel xeon_e7 8870
intel xeon_e7 8870_v2
intel xeon_e7 8870_v3
intel xeon_e7 8870_v4
intel xeon_e7 8880_v2
intel xeon_e7 8880_v3
intel xeon_e7 8880_v4
intel xeon_e7 8880l_v2
intel xeon_e7 8880l_v3
intel xeon_e7 8890_v2
intel xeon_e7 8890_v3
intel xeon_e7 8890_v4
intel xeon_e7 8891_v2
intel xeon_e7 8891_v3
intel xeon_e7 8891_v4
intel xeon_e7 8893_v2
intel xeon_e7 8893_v3
intel xeon_e7 8893_v4
intel xeon_e7 8894_v4
intel xeon_gold 5115
intel xeon_gold 5118
intel xeon_gold 5119t
intel xeon_gold 5120
intel xeon_gold 5120t
intel xeon_gold 5122
intel xeon_gold 6126
intel xeon_gold 6126f
intel xeon_gold 6126t
intel xeon_gold 6128
intel xeon_gold 6130
intel xeon_gold 6130f
intel xeon_gold 6130t
intel xeon_gold 6132
intel xeon_gold 6134
intel xeon_gold 6134m
intel xeon_gold 6136
intel xeon_gold 6138
intel xeon_gold 6138f
intel xeon_gold 6138t
intel xeon_gold 6140
intel xeon_gold 6140m
intel xeon_gold 6142
intel xeon_gold 6142f
intel xeon_gold 6142m
intel xeon_gold 6144
intel xeon_gold 6146
intel xeon_gold 6148
intel xeon_gold 6148f
intel xeon_gold 6150
intel xeon_gold 6152
intel xeon_gold 6154
intel xeon_phi 7210
intel xeon_phi 7210f
intel xeon_phi 7230
intel xeon_phi 7230f
intel xeon_phi 7235
intel xeon_phi 7250
intel xeon_phi 7250f
intel xeon_phi 7285
intel xeon_phi 7290
intel xeon_phi 7290f
intel xeon_phi 7295
intel xeon_platinum 8153
intel xeon_platinum 8156
intel xeon_platinum 8158
intel xeon_platinum 8160
intel xeon_platinum 8160f
intel xeon_platinum 8160m
intel xeon_platinum 8160t
intel xeon_platinum 8164
intel xeon_platinum 8168
intel xeon_platinum 8170
intel xeon_platinum 8170m
intel xeon_platinum 8176
intel xeon_platinum 8176f
intel xeon_platinum 8176m
intel xeon_platinum 8180
intel xeon_silver 4108
intel xeon_silver 4109t
intel xeon_silver 4110
intel xeon_silver 4112
intel xeon_silver 4114
intel xeon_silver 4114t
intel xeon_silver 4116
intel xeon_silver 4116t
arm cortex-a 8
arm cortex-a 9
arm cortex-a 12
arm cortex-a 15
arm cortex-a 17
arm cortex-a 57
arm cortex-a 72
arm cortex-a 73
arm cortex-a 75
arm cortex-a 76
arm cortex-r 7
arm cortex-r 8
oracle communications_eagle_application_processor 16.1.0
oracle communications_eagle_application_processor 16.2.0
oracle communications_lsms *
schneider-electric struxureware_data_center_expert 7.6.0
netapp solidfire_element_os_management_node -
redhat enterprise_linux 7.0
redhat enterprise_linux_desktop 6.0
redhat enterprise_linux_desktop 7.0
redhat enterprise_linux_eus 7.4
redhat enterprise_linux_server 6.0
redhat enterprise_linux_server 7.0
redhat enterprise_linux_server_aus 7.4
redhat enterprise_linux_server_aus 7.6
redhat enterprise_linux_server_eus 7.5
redhat enterprise_linux_server_eus 7.6
redhat enterprise_linux_server_tus 7.4
redhat enterprise_linux_server_tus 7.6
redhat enterprise_linux_workstation 6.0
redhat enterprise_linux_workstation 7.0
fujitsu m12-1_firmware *
fujitsu m12-1 -
fujitsu m12-2_firmware *
fujitsu m12-2 -
fujitsu m12-2s_firmware *
fujitsu m12-2s -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD028C10-FD07-4206-A732-CCAC1B6D043D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_c:c2316:*:*:*:*:*:*:*",
                     matchCriteriaId: "704FAA50-1B7D-4917-AC4A-4C58785340F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_c:c2338:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C6B95D3-75BD-4826-BFBE-9701CC0FF052",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_c:c2350:*:*:*:*:*:*:*",
                     matchCriteriaId: "F66E31A6-EA01-40C8-8718-CE2C1F45EEB8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_c:c2358:*:*:*:*:*:*:*",
                     matchCriteriaId: "DBBE3B05-2063-49DE-A1D3-9D0A62E0CF5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_c:c2508:*:*:*:*:*:*:*",
                     matchCriteriaId: "022F2CBE-EFB1-4962-AC91-D25AAB057DAF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_c:c2516:*:*:*:*:*:*:*",
                     matchCriteriaId: "69C05CD9-551B-46EE-85F8-D18FF878FE8D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_c:c2518:*:*:*:*:*:*:*",
                     matchCriteriaId: "2DCCB5A5-20E3-4EC5-956C-EA7C0F33A026",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_c:c2530:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C38C609-242E-4923-A81F-DAFBE7B6A927",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_c:c2538:*:*:*:*:*:*:*",
                     matchCriteriaId: "2AEB08B5-7CBA-479A-A41B-FD8A6D9E0875",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_c:c2550:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8C4FDD7-F2EC-4EDB-ACC9-3D6B9152C855",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_c:c2558:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E51DD0B-1EED-4BE9-B0A7-BE2E91CCA84C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_c:c2718:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7AC7C56-2205-4121-99E2-001A7488E0FC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_c:c2730:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1677313-FF8F-493B-9DA3-C78F87581A17",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_c:c2738:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B2A3CCE-FA57-43B5-B7DE-CFD0CC2ECD7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_c:c2750:*:*:*:*:*:*:*",
                     matchCriteriaId: "85CA4444-5103-4451-8A7C-F6BBE714BBB7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_c:c2758:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA1EB745-46D7-4088-93C6-E7156520B144",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:*",
                     matchCriteriaId: "A93010C0-33B3-438F-94F6-8DA7A9D7B451",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A988A78-6B3D-4599-A85C-42B4A294D86D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D7C5EF4-3A92-4AF7-9B11-62B4FFDC5128",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:*",
                     matchCriteriaId: "246AA1B0-B6C8-406B-817D-26113DC63858",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:*",
                     matchCriteriaId: "00EE5B42-FF05-447C-BACC-0E650E773E49",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0779CC9-BD39-4E0B-B523-A6C69F9EBB0C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1F0E3C4-7E9B-435F-907E-4BF4F12AF314",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D616C72-0863-478C-9E87-3963C83B87E8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC333B0D-3A0E-4629-8016-68C060343874",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:*",
                     matchCriteriaId: "6655535C-FF64-4F9E-8168-253AABCC4F5D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1EDEA1E-9A19-4B3F-806E-D770D1AB4C73",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:*",
                     matchCriteriaId: "BBD68F3F-7E38-40B9-A20B-B9BB45E8D042",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EACEF19-83BC-4579-9274-BE367F914432",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CC73291-AA6F-40B0-860A-1F2E6AB1E2AC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:*",
                     matchCriteriaId: "24128A7F-2B0B-4923-BA9E-9F5093D29423",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:*",
                     matchCriteriaId: "0990DD71-9E83-499D-9DAF-A466CF896CFA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:*",
                     matchCriteriaId: "9B7FEDEF-9772-4FB1-9261-020487A795AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE7B0F72-DEDF-40C4-887C-83725C52C92E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:*",
                     matchCriteriaId: "9568C222-9816-4520-B01C-C1DC2A79002D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B2F8FAD-1688-4369-BB4B-9FA9F30A80A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:*",
                     matchCriteriaId: "53A1F23D-7226-4479-B51F-36376CC80B04",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:atom_x3:c3130:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAB245C8-9918-41A0-9DFB-A11E4185C87A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_x3:c3200rk:*:*:*:*:*:*:*",
                     matchCriteriaId: "9990DD08-BD81-4BFA-B3D4-0DECBF8CCC54",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_x3:c3205rk:*:*:*:*:*:*:*",
                     matchCriteriaId: "F752A3C8-18ED-4765-B6EC-C664154EB701",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_x3:c3230rk:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4F31C3F-7C0D-4D95-B4B9-89FD38076913",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_x3:c3235rk:*:*:*:*:*:*:*",
                     matchCriteriaId: "5BEEE36E-E735-4A33-80B7-9407D072F6BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_x3:c3265rk:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CB3D3DE-21BE-40C7-A510-AC97C92390DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_x3:c3295rk:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D9A9545-38A3-460D-AB1A-8B03BEB405A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_x3:c3405:*:*:*:*:*:*:*",
                     matchCriteriaId: "1860D932-777D-41F2-94A2-D14AB1494AA3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_x3:c3445:*:*:*:*:*:*:*",
                     matchCriteriaId: "75165A10-2FD5-4370-814C-B60FDE339AFF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:*",
                     matchCriteriaId: "65AAC7A7-77CA-4C6C-BD96-92A253512F09",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:*",
                     matchCriteriaId: "FCD16C07-0050-495A-8722-7AC46F5920F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:*",
                     matchCriteriaId: "01423706-C82C-4457-9638-1A2380DE3826",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:*",
                     matchCriteriaId: "A881E2D3-A668-465F-862B-F8C145BD5E8D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E5B9B98-0EF0-4ACD-B378-F9DE5AB36CBB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:*",
                     matchCriteriaId: "4BDC6806-E4FC-4A6E-A6BB-88C18E47ABFA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:*",
                     matchCriteriaId: "6602DD69-E59A-417D-B19F-CA16B01E652C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:*",
                     matchCriteriaId: "05C493EE-EF9F-47E2-8F88-86DF6C5F1FF9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:*",
                     matchCriteriaId: "40010DAE-DD1A-4A81-B6E9-EDC1B0DDCAB0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED96AC16-12CC-43F6-ACC8-009A06CDD8F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CE9DC29-C192-4553-AF29-D39290976F47",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:*",
                     matchCriteriaId: "F625E647-B47E-404C-9C5B-72F3EB1C46F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:*",
                     matchCriteriaId: "E3AF3279-89E7-4C91-8C5F-5AD5937CD0C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5878612-9825-4737-85A5-8227BA97CBA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:*",
                     matchCriteriaId: "F453D348-28CE-402B-9D40-A29436A24ECC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:*",
                     matchCriteriaId: "36322F4B-83D7-468A-BB34-1C03729E9BF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:*",
                     matchCriteriaId: "0AD22811-C3C6-4B5E-98D5-D3F2240E6C8C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3C7D0BA-8F07-42AD-8BB9-C65472BE41C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0A2A50E-94FA-44E9-A45D-3016750CFBDA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:*",
                     matchCriteriaId: "5625CAD8-4A62-4747-B6D9-90E56F09B731",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:*",
                     matchCriteriaId: "43A234CE-D6AA-4A32-8425-1A4DDA0F6B6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:*",
                     matchCriteriaId: "78DE1A01-3AEF-41E6-97EE-CB93429C4A1D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:*",
                     matchCriteriaId: "410184AF-B932-4AC9-984F-73FD58BB4CF7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:*",
                     matchCriteriaId: "B265F073-9E0A-4CA0-8296-AB52DEB1C323",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F664223-1CBC-4D8A-921B-F03AACA6672B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_z:z3770d:*:*:*:*:*:*:*",
                     matchCriteriaId: "987A8470-08BA-45DE-8EC0-CD2B4451EECD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_z:z3775:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BBC9542-FB77-4769-BF67-D42829703920",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_z:z3775d:*:*:*:*:*:*:*",
                     matchCriteriaId: "74FDC18B-4662-422E-A86A-48FE821C056F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_z:z3785:*:*:*:*:*:*:*",
                     matchCriteriaId: "CAB4AA2C-D1D9-44D8-9471-66EBDE9DC66D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:atom_z:z3795:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBA3E7AE-CB74-48A8-A2B8-9FCADB6E40D2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:celeron_j:j1750:*:*:*:*:*:*:*",
                     matchCriteriaId: "78E4461B-72F8-4F3D-A405-4AFA99EC8A32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_j:j1800:*:*:*:*:*:*:*",
                     matchCriteriaId: "663DDC1C-E48A-4E84-A6CC-B46FC45D6A6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_j:j1850:*:*:*:*:*:*:*",
                     matchCriteriaId: "8CEEC75B-10CE-4B7E-BA5F-6D661EC07FFF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_j:j1900:*:*:*:*:*:*:*",
                     matchCriteriaId: "DAEDED56-9387-4DAC-BF52-C32ECCB7D407",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_j:j3060:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA13F31C-BBD9-48C7-8499-92D0B5CA8CF4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_j:j3160:*:*:*:*:*:*:*",
                     matchCriteriaId: "E57A9B28-734B-401D-B24C-A295F364D8E8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_j:j3355:*:*:*:*:*:*:*",
                     matchCriteriaId: "F02289DF-4A02-4602-89B7-E9148236EE1E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:*",
                     matchCriteriaId: "723E7155-493D-4B5A-99E2-AB261838190E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:*",
                     matchCriteriaId: "82E37264-E4BA-4D9D-92E7-56DE6B5F918F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:*",
                     matchCriteriaId: "8704BE6D-2857-4328-9298-E0273376F2CD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n:n2805:*:*:*:*:*:*:*",
                     matchCriteriaId: "731F1E65-1D53-443B-8E2F-8AF11191AFA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n:n2806:*:*:*:*:*:*:*",
                     matchCriteriaId: "02A83822-822D-4A4D-B29B-A5BE6367A7DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n:n2807:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8C32738-F08E-469C-8DE0-2708F30574A1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n:n2808:*:*:*:*:*:*:*",
                     matchCriteriaId: "B292187E-8EAD-49D2-B469-B14CA0656035",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n:n2810:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7D131E1-24C1-48CF-B3DD-46B09A718FB5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n:n2815:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ABF1231-73CF-4D1B-860C-E76CD26A645E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n:n2820:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7F88E38-4EC4-41DB-A59D-800997440C0E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n:n2830:*:*:*:*:*:*:*",
                     matchCriteriaId: "32FD6647-4101-4B36-9A9A-F70C29997148",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n:n2840:*:*:*:*:*:*:*",
                     matchCriteriaId: "D248D668-A895-43B3-ADEF-1B22EE7DC76E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n:n2910:*:*:*:*:*:*:*",
                     matchCriteriaId: "858411B5-E904-45FA-8B33-5CC73B915B22",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n:n2920:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BB9336C-C893-4AB0-9402-868CE9960058",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n:n2930:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4695F94-7AAE-4219-9EF6-CE6D0838192D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n:n2940:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD7A0991-73F0-410D-855C-BFC88A66E61F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n:n3000:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAF5CF9A-B3F2-4686-B933-7DB13AD2CF35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n:n3010:*:*:*:*:*:*:*",
                     matchCriteriaId: "9858EAC3-C1CE-449B-A605-FFA337DA825D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n:n3050:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7A8F905-A4C6-4EC6-B9E8-800948350B89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n:n3060:*:*:*:*:*:*:*",
                     matchCriteriaId: "565B48E3-1406-4E3C-B4A5-35865C5614E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n:n3150:*:*:*:*:*:*:*",
                     matchCriteriaId: "46B6C4D7-B0A2-4DF1-B8DE-19C806D5FABB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n:n3160:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AB82A90-C0BC-4BA8-88CA-4967BC3A4A7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n:n3350:*:*:*:*:*:*:*",
                     matchCriteriaId: "191A094B-E354-4767-AD43-87CE140BF851",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1289B9E-5725-42EF-8848-F545421A29E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n:n4000:*:*:*:*:*:*:*",
                     matchCriteriaId: "238A21CB-F8C5-468B-B523-6D014E2EA8AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:celeron_n:n4100:*:*:*:*:*:*:*",
                     matchCriteriaId: "0DC52CDD-614D-4EA0-8DA8-D71189C42E8B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4229DB2-8BBC-49F8-87A8-2E7D56EFD310",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*",
                     matchCriteriaId: "FEBA7322-4D95-4E70-B6A5-E0D8F1B5D7EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0E91F46-D950-4894-BACF-05A70C7C6F7B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E12B40B-5221-48A6-B2A6-D44CD5636BB0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BCB77C9-ABE3-44A0-B377-7D7035E8A11F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*",
                     matchCriteriaId: "D06639F5-5EE8-44F4-B48A-5694383154DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD9662C9-59D3-4B3E-A4DA-4F1EE16FC94B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*",
                     matchCriteriaId: "637C3687-FBCC-41A0-BFE6-823BAE45FB92",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*",
                     matchCriteriaId: "2350A197-193F-4B22-80E8-3275C97C78EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*",
                     matchCriteriaId: "734C7A7E-ACCA-4B34-BF38-0FAED988CC6A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D9ABAFC-B3B5-449D-A48E-2E978563EDE7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*",
                     matchCriteriaId: "99019EA0-6576-4CE7-B60A-975D418AA917",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E846AEF-751D-40AD-84B5-EFDC9CF23E2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB9DD909-B2AC-46BA-B057-D239D0773CAD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*",
                     matchCriteriaId: "54F5C355-FDFC-4E71-93AA-218389EF10E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0A1CA1E-971D-4F67-864E-2E772C1E736B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B5F8391-D974-49AC-8550-ADB3FA6C0535",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*",
                     matchCriteriaId: "8302BF58-9E54-40DA-BCFE-59CA52C460D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*",
                     matchCriteriaId: "ECCDE9EF-037B-4650-8131-4D57BE141277",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*",
                     matchCriteriaId: "47BA9DA8-F690-4E3C-AEF6-6A5C7BAA6F19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB8253DA-9A04-40D6-84C1-C682B4023D4B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*",
                     matchCriteriaId: "DAF6D175-85C3-4C72-AD9F-31B47EF43154",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A5FC594-2092-4240-9538-235BBE236DD9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*",
                     matchCriteriaId: "87D95F00-EA89-4FDE-991C-56636B8E0331",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*",
                     matchCriteriaId: "32C40D38-F7F2-4A48-ADAA-6A8BBD6A1A00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*",
                     matchCriteriaId: "4158561F-8270-42D1-91D8-E063CE7F5505",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF0DEA96-0202-41EB-BDC3-24E2FC4415B2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8BACE1C-5D66-4FBC-8F86-30215A623A94",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF707146-0D64-4F3A-AE22-956EA1CB32B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*",
                     matchCriteriaId: "8118C3F9-0853-4E87-9E65-86E1398B2780",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A298501-C4D7-48D4-90F9-15AFA59DED48",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*",
                     matchCriteriaId: "FEE1B07B-3D92-4D2D-8667-D902F002277F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F05CB19-1059-4C4D-BFD7-9F51A22A4F97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*",
                     matchCriteriaId: "5588732F-7F1A-4C24-B35F-30532107FFDE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*",
                     matchCriteriaId: "A127DD5D-426D-4F24-A8C5-DC9DAC94B91C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*",
                     matchCriteriaId: "26EE0BBD-3982-4B0F-82F6-D58E077C75DD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAEEC918-EA25-4B38-B5C3-85899D3EBE6C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*",
                     matchCriteriaId: "813965F4-3BDA-4478-8E6A-0FD52723B764",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C5EA2F4-F3EF-4305-B1A1-92F636ED688F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*",
                     matchCriteriaId: "04384319-EE8C-45B4-8BDD-414502E7C02D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*",
                     matchCriteriaId: "C52528CE-4F31-4E5F-8255-E576B20F3043",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6C3F422-F865-4160-AA24-1DAFAE63729C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D034E7F-4D17-49D7-BDB2-90CB4C709B30",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C18E6B4-E947-403B-80FB-7095420D482B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*",
                     matchCriteriaId: "2814CC9F-E027-4C5A-93AF-84EA445E6C12",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*",
                     matchCriteriaId: "24A470C3-AAAA-4A6E-B738-FEB69DB78B9D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1236944-4942-40E4-9BA1-029FEAE94BBC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*",
                     matchCriteriaId: "086CAB4B-A10A-4165-BC33-33CADCD23C0F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1A6A1EB-B3AB-4CB4-827E-CCAAD783F8E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*",
                     matchCriteriaId: "AAFB6B30-BFB0-4397-9E16-37D1A772E639",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFCB9D7B-7D0A-435D-8499-C16BE09E19FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*",
                     matchCriteriaId: "64277594-9713-436B-8056-542CFA9F4CFC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*",
                     matchCriteriaId: "589BB170-7CBA-4F28-99E3-9242B62E2918",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*",
                     matchCriteriaId: "91B9C4D9-DA09-4377-9DCD-225857BD9FA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*",
                     matchCriteriaId: "03D0265F-840B-45A1-90BD-9ED8846A9F63",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*",
                     matchCriteriaId: "74BAC0EC-2B38-4553-A399-4BD5483C4753",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*",
                     matchCriteriaId: "4477EBA6-F0A7-452B-96E8-BA788370CCA8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*",
                     matchCriteriaId: "1285D817-B5B8-4940-925D-FCDD24810AE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*",
                     matchCriteriaId: "D289F7B4-27CD-4433-BB45-06AF98A59B7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*",
                     matchCriteriaId: "00168903-6012-4414-87D1-2EE52AA6D78E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AE8D524-577E-4994-8A4B-D15022C84D7F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*",
                     matchCriteriaId: "75977B0B-C44D-43BC-8D7A-AF966CDB1901",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE7F5D52-9F41-49A4-B941-E0D777203FF7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*",
                     matchCriteriaId: "52B5B3FD-5BEA-4DE8-B010-55FED1547167",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*",
                     matchCriteriaId: "167B1B04-5823-4038-A019-3975A3B447C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6C7A4EA-0B5E-47CD-8924-3B1B60EB4BE4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BA096E0-5480-47CB-822B-D11D7E20F69F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*",
                     matchCriteriaId: "30357469-0B8F-4385-A282-2F50181EA442",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*",
                     matchCriteriaId: "3BE70772-7796-4594-880A-6AAD046E4D8D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A9E2F8D-2974-4833-9EC2-233CEE257C26",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*",
                     matchCriteriaId: "17EE3078-454F-48F8-B201-3847DB40D5C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE32C500-55C2-41A7-8621-14EBF793BF11",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*",
                     matchCriteriaId: "52D3DF52-501A-4656-98F1-8DD51D04F31F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EA603AD-6CF1-44B2-876D-6F1C0B7EF2C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*",
                     matchCriteriaId: "09578301-CF39-4C24-951A-535743E277EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F4D14AA-7DBF-4B73-BDEF-6248EF5C0F7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A65F303-96C8-4884-8D6F-F439B86BA30C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E046105-9DF5-425F-A97E-16081D54613C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2987BCF-39E6-49B6-8DEE-963A38F12B07",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*",
                     matchCriteriaId: "7AEDE2B7-9AA2-4A14-8A02-9A2BFF0DDCBF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AD92AD8-033A-4AAD-91E5-CB446CCE9732",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*",
                     matchCriteriaId: "77E0E73A-F1B4-4E70-B9F1-EE97785B8891",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*",
                     matchCriteriaId: "61D6E3CC-79B1-4995-9A76-41683C7F254A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9CEB2B1-BD1A-4B89-8E03-4F90F04A0F0E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FE5773D-3CD1-4E63-8983-E0105C46D185",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A7C307A-6576-4A0A-8F4E-0981C9EE2901",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*",
                     matchCriteriaId: "18B3A53B-902C-46A5-8CE7-B55102703278",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB843479-729A-4E58-8027-0FC586F051AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*",
                     matchCriteriaId: "1AF5A233-1E77-49FD-AC2C-60D185481E28",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*",
                     matchCriteriaId: "18519CF2-B0DA-42DD-8A3E-9084298C210A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*",
                     matchCriteriaId: "329D5FCF-7EC5-4471-906B-3619A180BD52",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*",
                     matchCriteriaId: "0DD43EAA-F3A5-4748-9187-A6E6707ACD11",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*",
                     matchCriteriaId: "C6F3C14D-4BFC-4205-8781-95E6B28C83C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*",
                     matchCriteriaId: "20942AD8-ADB7-4A50-BDBE-DB36249F4F52",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EC6ED02-134B-4322-AB72-75A0AB22701E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FA74EEE-54CC-4F80-B1D3-99F7771335ED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6B859F7-0373-4ADD-92B3-0FAB42FCF23C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*",
                     matchCriteriaId: "AAC76F31-00A5-4719-AA50-92F773919B3C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*",
                     matchCriteriaId: "49996F5A-51B2-4D4E-AE04-E98E093A76CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*",
                     matchCriteriaId: "9F8406B0-D1E5-4633-B17E-53DC99FE7622",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D49435C-7C33-454B-9F43-9C10F28A28A1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*",
                     matchCriteriaId: "D17E1A0F-1150-4899-81BC-BE84E4EF5FA3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*",
                     matchCriteriaId: "EADD98AE-BAB0-440D-AB9F-2D76BE5109E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED44A404-8548-4EDC-8928-4094D05A6A38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A6E4AA3-BEBC-4B14-9A52-A8F8B2954D64",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2AAD8F0-0D31-4806-8A88-A30E5BE43630",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*",
                     matchCriteriaId: "8164EE5F-6ABA-4365-8718-2F98C2E57A0F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7110AF9-A407-4EE2-9C46-E5F1E3638E9A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A06696D-37F0-427D-BFC5-1606E7441C31",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9F8A5FC-5EFE-42EC-A49B-D3A312FB5F6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*",
                     matchCriteriaId: "68A76015-0A05-4EC7-B136-DC13B55D881F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*",
                     matchCriteriaId: "C352DCE8-E8D9-40D3-AFE9-B5FB84F7ED33",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*",
                     matchCriteriaId: "54464F6C-9B2D-46BA-AC44-506389F3EE0C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FA11017-EA58-45EE-8408-FCCCF7183643",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A5098A5-E4E8-47E4-8CD0-F607FF0C0C90",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*",
                     matchCriteriaId: "442AD778-D56F-4C30-BBF8-749D6AAC4737",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF7D3F31-AF4D-4C50-8590-A763AAC7AF07",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*",
                     matchCriteriaId: "445BFC2E-38FA-4130-8550-0866EC4EDA33",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6DC2746-CE41-40C9-8CFA-23231BBCAE77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C3A8976-5E4D-490A-A87D-A47D1B2B903C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C8535E6-220E-4747-8992-45B6EAFC555C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7479B49-F484-4DF2-86CB-E52EE89FA238",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6D68512-746D-4E95-857B-13A0B6313C5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*",
                     matchCriteriaId: "4312BA84-F9A0-4BD4-8438-058E1E7D6C0C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*",
                     matchCriteriaId: "60E52DF5-C713-4BC4-B587-FF6BDA8509CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*",
                     matchCriteriaId: "304ADCAC-9E49-42BD-BC92-58D9B2AD52E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*",
                     matchCriteriaId: "2AB02172-B9A7-4801-88F2-98BF5843184A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*",
                     matchCriteriaId: "5141380E-BD18-47C1-A84C-384BA821773D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*",
                     matchCriteriaId: "1AE6C49E-2359-4E44-9979-7D34F8460E35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*",
                     matchCriteriaId: "C004B75F-37AF-4E61-98F3-1B09A7062DDB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7126D19-C6D9-43CB-8809-647B1A20E7DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CC98503-A80A-4114-8BF2-E016659BE84E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*",
                     matchCriteriaId: "01E6F4A7-24BE-4AA0-9CDD-84FBC56FE9BB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*",
                     matchCriteriaId: "3821412D-B010-49C4-A7B4-6C5FB6C603B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*",
                     matchCriteriaId: "A34CA5CC-9EB1-4063-8B9D-3F566C1EFF76",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*",
                     matchCriteriaId: "5CEB5D2D-FF54-4BDB-9E9C-8C1B2719FC9A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AD5B51A-AEA0-4DA2-BA60-94A2D5605352",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*",
                     matchCriteriaId: "F96C6CA0-434D-428F-B629-A971C2937628",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*",
                     matchCriteriaId: "301AB72A-A6F2-42C8-A931-94EF2271443F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*",
                     matchCriteriaId: "59414B5A-05B8-49AF-A197-2A31729DDB65",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*",
                     matchCriteriaId: "0BFDD380-692F-41D7-996F-F97FC74DC7CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*",
                     matchCriteriaId: "49602828-2BFC-4571-9F05-6210FD263DF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*",
                     matchCriteriaId: "87E03978-E16D-4A9B-8AE7-9F4F1171C14A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*",
                     matchCriteriaId: "03096A9A-5758-47E6-81E2-BCFE847C41F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*",
                     matchCriteriaId: "150CC865-7975-45EC-BFF7-A94146442BA8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8FA1308-589B-432B-80F9-9A499D083ED5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*",
                     matchCriteriaId: "6ED2453E-30E1-4620-BEC5-21B0083449E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*",
                     matchCriteriaId: "0FE8DD05-D700-4F89-9B01-D489029DF7A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*",
                     matchCriteriaId: "050957CA-6191-4F9F-9D07-48B342B3B1B8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*",
                     matchCriteriaId: "DACBF998-8B11-45C7-9017-486AED4FAE6C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9F2F3C4-FC94-414A-A208-913A43D57D75",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*",
                     matchCriteriaId: "641152EC-F4B4-4E5E-B396-AC4CAAB805BF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*",
                     matchCriteriaId: "4911E332-B8BA-4336-A448-3F70D2BBB147",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*",
                     matchCriteriaId: "330EC403-3174-4543-9BBE-CEC0ABC1575D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EF585D0-507E-491E-9C3B-78EE26F2F070",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD00F7C6-6762-4DC9-9F6C-5EAC4ACB1C54",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F5D885A-85C4-4A11-B061-61EFF6B6E329",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*",
                     matchCriteriaId: "0502B59F-933C-4E25-A2EC-9296B197E139",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*",
                     matchCriteriaId: "99D9C0A9-2DFF-4760-8FED-AC2DA7968E51",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5A1BAEC-18BF-4607-BFB7-48102E75186A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*",
                     matchCriteriaId: "D49ED138-F42D-4451-A350-0B2DD5AB9444",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ED91472-90FC-4AC8-96D5-1550A8502411",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*",
                     matchCriteriaId: "57CEEFA6-CEED-4CA3-8DDC-B6601D69FB7C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FD25ECD-0605-4CD7-9DC5-294ACD7EF1B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*",
                     matchCriteriaId: "2784E2AF-A5E5-4960-830C-B3EFB84043D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*",
                     matchCriteriaId: "9112FA50-5527-4B20-80F5-2DE9E66D09F6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*",
                     matchCriteriaId: "73CE4E2E-B2BF-409E-B18C-D67DA810FE9B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*",
                     matchCriteriaId: "E2B84D67-0B1D-4B74-BC85-AF8F933D8429",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*",
                     matchCriteriaId: "BCA05A18-1523-4EED-9D2E-0A258A33F24F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*",
                     matchCriteriaId: "C34E70EB-92F0-43F6-8883-FE422BE1A3FC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*",
                     matchCriteriaId: "78D301F1-20C2-4756-9A90-37F14835CE14",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2EEC8B5-1CAB-4FBE-BBA2-D2FFA3EF9489",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA63B803-4D48-42E8-A793-F92ABCB8BFC9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*",
                     matchCriteriaId: "129DB9CB-E878-4856-A954-15FFE1428636",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*",
                     matchCriteriaId: "730DB4AA-FD7D-40C6-8D7F-19937832EF9A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*",
                     matchCriteriaId: "07E86978-4820-422A-8C7C-FF0697DAED05",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A7A9DB5-F544-4FD8-A9CC-0BD6257516AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3450:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF813AD9-D296-4915-861C-8DE929E45FE3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*",
                     matchCriteriaId: "04A65469-083F-40B5-86C5-A2EAE5B2F00A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F1AA82E-BD86-40F5-B417-71DF6AF53A37",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*",
                     matchCriteriaId: "B71A6DB0-5EB0-4712-8480-CF427F521D33",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*",
                     matchCriteriaId: "8223D5A1-ADF1-43C6-AF91-EE5C413BCB37",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DD69605-F52B-4623-921A-983A5A408ECA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1D5685F-6FFE-4A6A-9FF8-940C8DA36499",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*",
                     matchCriteriaId: "B94062D9-8DDA-4B4A-B3B5-07F71F5B97E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*",
                     matchCriteriaId: "3832D0A6-419D-4876-B5C4-920578F713F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1AA5C8A-83A8-4F96-9D7C-7A50ADDB2341",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*",
                     matchCriteriaId: "404E38E6-9EB3-41D0-97A7-DC579688BFB0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*",
                     matchCriteriaId: "40E4A921-AB28-47B7-B5A3-EB82193D15BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0357E48-2300-47B4-B9E5-9FE813A2FC09",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*",
                     matchCriteriaId: "96CC28B6-57D1-4919-AA55-A262CC16AFE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*",
                     matchCriteriaId: "0EB4C54D-1265-425A-B507-E1099844875A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*",
                     matchCriteriaId: "97362147-3A71-430D-9064-4435D45C3B8C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*",
                     matchCriteriaId: "89212CF3-4E99-4389-94CE-F4211DDCA01B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*",
                     matchCriteriaId: "FBEA4DA3-0AFB-4FCE-92DB-5B316775BB17",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*",
                     matchCriteriaId: "611C0A0A-1FA3-42F9-82E8-BFCB71A077DD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*",
                     matchCriteriaId: "36F027D9-DCB4-4A3D-8987-41F2941DBD45",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*",
                     matchCriteriaId: "E23BCEC9-2BFB-4B41-9A7A-18B1347C6202",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*",
                     matchCriteriaId: "4924CE39-A846-4DB4-9547-6322FC5AD6B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9E2C9A-94A1-456B-90D5-54932DF64C22",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC04C652-B2D8-4002-A50E-8AFE83204A25",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*",
                     matchCriteriaId: "10D413F0-CDBC-4A63-B9A7-9E7725BA1E83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*",
                     matchCriteriaId: "754A8826-59F7-4A71-B74B-737BE9C7DE4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*",
                     matchCriteriaId: "FADB6BDA-6825-489B-AB39-7729BA45DFD8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*",
                     matchCriteriaId: "7913F57E-E600-4767-AF51-D045E1898E72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD3783F4-5A05-45AA-9791-A681011FD78C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*",
                     matchCriteriaId: "01E3114D-31D2-4DBF-A664-F4049D8B6266",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8EE6578-981D-470C-BB24-4960B3CB1478",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*",
                     matchCriteriaId: "E3320D50-C5C9-4D75-BF1A-5BB7BCBFE2BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*",
                     matchCriteriaId: "7EE59839-8EB9-47FE-88E2-F0D54BE787A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*",
                     matchCriteriaId: "75694A3D-080A-4AA7-97DF-5A5833C9D9F7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*",
                     matchCriteriaId: "19C5E27D-BBAB-4395-8FC6-8E3D4FB9A1EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E996176-3DEA-46E6-93B7-9C0DF32B59D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*",
                     matchCriteriaId: "4417007D-126A-478B-87EA-039D088A4515",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*",
                     matchCriteriaId: "F78C2825-F6A3-4188-9D25-59EAEC8A7B0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF2FA85D-B117-410D-B247-8C5A3479319A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A041D27-132C-4B15-976F-1750C039A89F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D495E06-BF2B-4C5A-881D-94C93CD2BA2B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C31DFB8-8D8C-47D6-AAFF-BAE829A3D965",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*",
                     matchCriteriaId: "088BC395-06D5-4156-85EB-63C4A9552898",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*",
                     matchCriteriaId: "33A220A2-A6D2-46A7-B168-607400EEDCE3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E79232F-7196-440B-82D4-165885251232",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED866954-77AB-4CA8-8AED-4252C595FC4D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*",
                     matchCriteriaId: "28A1F516-B180-45D4-8EB1-754B7497CB2B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*",
                     matchCriteriaId: "36758A04-64D3-4150-A004-CF042FA31CD9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E01752E-F1DD-400A-A917-216CAF15B0F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD47EC58-F776-4F59-8F15-4B208904CF4B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D3781F4-2123-4FA1-8AF5-D0D1E6C1A5B9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*",
                     matchCriteriaId: "94565E35-8A58-4CB6-A489-C796DCB97FC5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*",
                     matchCriteriaId: "49964D35-5323-4412-BD54-661630F9A8CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0A37E7D-1BF6-4A2A-BF52-5F0EC4B4F341",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0F66468-87D0-41FC-934B-5924BE2956CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E0F93E1-4607-4DF4-AC6E-4B7254D4A8DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C0D99E-443E-4AB1-A07A-900A09FE177E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*",
                     matchCriteriaId: "C6D0FD76-C1FB-43D0-8511-FC0BA6DA7960",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9DAEE52-09C3-4A09-9958-9D6807B2700B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*",
                     matchCriteriaId: "B97690D4-E814-4D40-B170-BE56D7AE2C1B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*",
                     matchCriteriaId: "89804F2C-D32D-4444-ABEA-5B241153D096",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*",
                     matchCriteriaId: "2AAAAF9C-B29B-4020-BAFF-C87B1A08294A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*",
                     matchCriteriaId: "ECE60E1E-AB8D-46E4-A779-A54F2D20B5D5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB958A28-7C9A-4BD0-B002-4E1A65CDB0A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C27B318-2AC1-423D-B0C8-583BB1800D5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E58E3D0-1154-4B13-BA16-67CE67DF0637",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*",
                     matchCriteriaId: "32D2ACB3-B906-4944-A021-03C4645965BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FFF834A-D7F0-4E48-AD3D-DD0BCE6DEC0E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E1A41BA-A1D6-484A-BAD2-68DF85598354",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*",
                     matchCriteriaId: "11260C9D-69A9-4D81-9CCF-2E116DD75F7C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C020F06-FD27-46E3-A48F-3F60F33BB969",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*",
                     matchCriteriaId: "03C74F10-6A7F-4F68-8A34-E981E1760DE5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*",
                     matchCriteriaId: "24741B98-8D0E-4307-AAEF-A14B2531DCA9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D4FA4BA-4304-4A70-9F86-120F2A3D8148",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*",
                     matchCriteriaId: "367FC8BA-F046-4264-A049-49E933E7698F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE9B68D3-1DFB-4468-85C4-AC13E6CBC111",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*",
                     matchCriteriaId: "C966A016-B650-44D9-B8C4-1ED50AB318DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC448FF0-6D3F-4609-864B-4191905EE2B9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*",
                     matchCriteriaId: "0FC246FE-4CA6-4B2D-83C3-D50A386C24A0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*",
                     matchCriteriaId: "758A14DB-1BAF-442A-BA7C-5E9C67847BEA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*",
                     matchCriteriaId: "61309100-CFA7-4607-A236-8910838AA057",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*",
                     matchCriteriaId: "82D76265-7BD0-4C51-AE77-22B22524DE81",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE38B195-BB8D-4747-881D-E8033760B4C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*",
                     matchCriteriaId: "1AA8BE76-168D-48A3-8DF6-E91F44600408",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B656975-5D71-4712-9820-BDB7BC248AFA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA045267-114D-4587-B6D7-E273C28DC9B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*",
                     matchCriteriaId: "77018415-E122-406E-896D-1BC6CF790BE3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*",
                     matchCriteriaId: "3ADF37F1-546B-4EF0-8DEC-DC3B9F5309FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7469256-1A64-46FF-8F5A-A8E9E3CF5BE5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F9069B9-9FE3-4AD5-9A8E-55C0F73BD756",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4E1C012-3E05-44DB-B6D2-BFD619C034B4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*",
                     matchCriteriaId: "15D689D6-8594-42F2-8EEF-DCAEBA885A67",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6446000-0494-4DC5-ABAA-F20A44546068",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*",
                     matchCriteriaId: "99B94EEC-6690-45D0-B086-F4A5B25C25CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B767B6E-B3E6-4424-97A6-89A7E7EB0EEB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*",
                     matchCriteriaId: "832AB3CD-E3A1-4CCB-A210-287973563D0E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A26C0CC-68AD-40F5-96B8-87E6C643F6F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*",
                     matchCriteriaId: "99C4221A-9994-43B3-9C7A-E13815A50A10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*",
                     matchCriteriaId: "20070B1D-B91C-40BA-A9D8-E80170A2933F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*",
                     matchCriteriaId: "A70129C9-371F-4542-A388-C095869E593A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C4DE25F-168A-4C67-8B66-09F61F072BD4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*",
                     matchCriteriaId: "58157F24-D89E-4552-8CE6-2F01E98BD1E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC7FFD78-1E1C-4246-BBD3-73FAC06AA46B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*",
                     matchCriteriaId: "45ACBBEA-EC95-4F3E-B585-893DB6D21A0F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DEC55DF-1950-45E5-A5F2-B5604AFA1CBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6A5EC79-1B21-4BB3-8791-73507BC8D4DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*",
                     matchCriteriaId: "FCB4AFC3-FE30-4F46-ADC1-D03EB14E757D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0387587-AAB6-4284-8516-4DA3E3582D30",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*",
                     matchCriteriaId: "A238C975-9196-449F-9C15-ABB2E9FD1D06",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F17F4A5-120B-4E00-97C8-8A85841ACBC9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*",
                     matchCriteriaId: "2537F047-64C9-4E73-B82C-310253184183",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A55857C-649D-46CE-AEDA-6E553E554FC1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BA4892D-AFDF-4441-821E-5EBF7F64C9F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*",
                     matchCriteriaId: "327E06A3-7F0E-4498-8811-10C8D15398FE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*",
                     matchCriteriaId: "1624E6D6-858E-4085-B0B9-362B819EFD88",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*",
                     matchCriteriaId: "50D61F4A-40F0-477C-8326-7359D3626E77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*",
                     matchCriteriaId: "1455B4DE-7F1C-4CF2-AE02-2EDD20025D62",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B215788-860B-46CD-9A08-43AFF98FAEAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B92FAD5-CA6E-48F7-9613-3A4CE90F5F54",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4EB132B-000C-4A17-AFB3-19F40A73D2CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C4815AE-B635-4545-83C2-5EC4E0128337",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0046C06-E3E6-4674-A4D1-332DD29D9552",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C191851-3DC3-41C7-AD89-81F091CCC83A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*",
                     matchCriteriaId: "21126922-8E81-47F4-82D4-CBCDDACEC4FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*",
                     matchCriteriaId: "209E18B0-BBB5-4C65-B336-44340F7740DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*",
                     matchCriteriaId: "C867C0B8-91A4-482A-B7DD-54AB9599AE52",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*",
                     matchCriteriaId: "30F03843-8A51-4CE1-BE6C-994BDE3A8F97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*",
                     matchCriteriaId: "09854948-2657-4261-A32A-0523058F072E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*",
                     matchCriteriaId: "D13904A5-266D-481C-A42A-734C3823A238",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*",
                     matchCriteriaId: "ACC82FCB-0541-45C4-8B7E-CB612D7F702A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C18BD84-5E9C-4C9E-B0AA-2CEB0D7A58C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F5ABC7E-C4E0-4850-A1E6-07EBCF4A87D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*",
                     matchCriteriaId: "501E9355-0CDD-4951-BCC3-47962788BCCB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3D976D9-62F0-43C3-8359-E51E26B6CD87",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*",
                     matchCriteriaId: "02AFBCD0-9B4B-4CA3-8FA9-D8B6ECB24894",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*",
                     matchCriteriaId: "64ADE9AF-196F-4E0B-BC66-7DE0183F9032",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*",
                     matchCriteriaId: "C90CCA48-1705-4564-AAF9-271201BD5113",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B82BAFF-17F5-465C-8032-67D5ECAB2921",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F694FEC-B97D-4BDA-ADFA-751E8BFB7CD2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*",
                     matchCriteriaId: "F831371E-7437-48D7-8281-1F406215041B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC4F06B5-615A-464A-A0C4-7AABEE8530CD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*",
                     matchCriteriaId: "92AF503A-A2B1-4FC3-858B-264049ADF0F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*",
                     matchCriteriaId: "E702C7EC-B1D9-4BDF-B334-2004CD76B52B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*",
                     matchCriteriaId: "E39F31D6-DC4B-46FE-BE5D-EA612D915A96",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*",
                     matchCriteriaId: "51CB8036-5F36-4CD4-9B3E-D2401F2E64F6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9849BA3-3990-4E30-B99B-ADD043314CDA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*",
                     matchCriteriaId: "A20FB18A-D3DA-4DE9-BEFF-75B7AB9B9A55",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A67CD6F-5E4F-4E69-A2A9-A4033DCE08EA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0A22E92-1EA7-45D9-AC86-EC3D9664C294",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7FA2911-6561-47BF-BEE8-DDA31642C346",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*",
                     matchCriteriaId: "1FA6CA23-6F2B-44D5-B2DA-4F142BA3E48A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F829DED-4D92-401A-BD80-C070DE57FC7C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*",
                     matchCriteriaId: "F560575C-FD8E-485D-B50A-572604BBE903",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*",
                     matchCriteriaId: "6ED8C51B-AE59-46DC-85F9-6D3B2891CB3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A38D00A-B9DC-44DF-8247-70355FF9A6EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "381EFC43-D5D9-4D10-90BE-4C333A9BA074",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBEDED18-2755-4C55-A1A1-04B4D5F40276",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*",
                     matchCriteriaId: "F04B57EC-0731-40C8-939F-1C686A65A0FC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*",
                     matchCriteriaId: "2AB301FB-EB3E-4F5F-868D-5B66CC7E1E6B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE1D28F9-B135-441B-A9BF-792DD356E374",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D01CE3E-5C89-4FC0-9097-CAC483ACD441",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BDD55C4-AFCD-4DF2-921C-DDC1D7556DA3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F52334F-BE6A-4FD4-9F63-AE9BB017115B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7C9BCC3-B9A6-4195-BF2F-E7BBCE8DC269",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A4DFFA7-AA0E-4D7E-97B8-13389FD47D4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*",
                     matchCriteriaId: "707F6671-57AC-4DF4-8024-444502E5C92E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C1FCE07-F9E8-4B14-95CE-01784D472128",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*",
                     matchCriteriaId: "C208711F-FC06-46C8-8849-27054DC1B264",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*",
                     matchCriteriaId: "25AB8041-F201-4BB3-AAD9-199B06697DF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*",
                     matchCriteriaId: "D75C474C-D5EF-42D6-9B2A-A504BEFCB982",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F566CD3-3649-492B-B0AB-A107E51675B9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB9F3D74-AE72-4FC5-83E9-890781AF3093",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E8EA6A7-4AB8-487E-B5DD-9989CC5F1CD8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF63DDC8-A0C1-482B-92F2-CF6135E8C2A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "C69918C6-7AAD-4AA5-AB72-C275367B1008",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*",
                     matchCriteriaId: "06155B0B-A5AD-4A82-8C02-D264981687A6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "F76C19A4-FA26-432A-9443-9F92B2A946EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*",
                     matchCriteriaId: "99BEE9BE-E49A-489B-B333-95D0993F8FA3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "7427A678-EC47-4030-B905-619DD95F5A82",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "86749716-1C9F-4C2A-B2A7-E62DEC10EA30",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD000B53-06DA-4ED4-B0EE-9CB201B75C8D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8424463-C329-4BAA-8AA1-25CD8B63292E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*",
                     matchCriteriaId: "52727E62-0048-4C56-BC8C-B3450D257B21",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D8223AA-F077-45FD-A7E3-3C2C1A8F6E91",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAA34B50-2330-4D77-BF1A-6F05F3EF222C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6421F69-1076-43D2-B273-DE80FB2D5F72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1EDA9E2-CFE7-4917-BE48-A83208BDF0F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A34E7FC-93A4-45F2-A7B6-4A8ABFCAB0F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E611EDD-D44C-4311-B681-431D7C574528",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5E1B6AA-2F9A-43A8-9147-2BD9474E54C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*",
                     matchCriteriaId: "1886D007-85B6-4E5A-968D-A1FD476A08A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "BDDDCB65-4404-49BC-9515-ECECD58A667F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B8D3E00-64C3-407A-9B00-8B6E383F73FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB1B00A1-9C15-47C2-9F57-66586DEACC7D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB5BF932-459F-4DD2-B160-5FE0371C7D83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*",
                     matchCriteriaId: "A58ACE96-F1BE-4261-8F94-FC3C6E7C7561",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*",
                     matchCriteriaId: "783D6EA7-C016-4314-A87B-4FED1DC7114B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*",
                     matchCriteriaId: "7AD0176F-FFAE-4A85-9327-CE72FE059E90",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*",
                     matchCriteriaId: "A56970C7-F8D3-41B2-A78B-0C7F4A2A4E0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*",
                     matchCriteriaId: "26D4CE1F-86C8-4E48-9146-9DB57BF540FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB7F9D65-5537-4C25-B02B-2393F60D1299",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*",
                     matchCriteriaId: "F09C8A92-820D-4572-A797-180E17A7DEB6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA7D77A2-0D9A-4D0D-B0DC-152757917BE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*",
                     matchCriteriaId: "A07D3F1A-16CE-461F-A2F4-80FE5F841CB3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C04557A-C508-4FAD-A535-1C0AEFF08075",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AFAE489-6679-4705-BF9C-BB6D385A1DC3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*",
                     matchCriteriaId: "429A99C8-BC55-4887-893C-7124C1A5DB08",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*",
                     matchCriteriaId: "E3A2B709-CC19-4116-A5BE-5DB5C8B45A12",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "D79DAC74-1F28-4EC8-B417-3FAFFB74C4BB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F1F1377-6220-43FB-BEF9-BAA7B0158147",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "18422CA8-3000-46B1-9065-2369E6B0BE16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D558C66-E80E-4FC7-A0DF-485466390C46",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "E23EA9AE-9E70-47B5-AD9B-0DF13A0939E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*",
                     matchCriteriaId: "860F22F6-4C87-47C5-965E-02A1AFF41A72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "19A2CA86-BFA8-4C78-987D-AD26F32622F7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "EEF64E0A-CDB0-427E-A96F-095EFEBA0A3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "425F6D34-EE60-464B-8EA6-8116EDAA1219",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "CEB9F657-1239-4424-A2E8-F8BD98C0095E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*",
                     matchCriteriaId: "F631403C-0A67-42CB-815C-133EB87E0C95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A4A5A57-B1A2-4BBA-AC36-7EA7DF9CDE06",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "0453C0EA-BA67-49D5-964F-35493F97D905",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D4D237E-ACB7-4382-AF5B-D27E634BF867",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5461EB2-2958-4923-86AF-C74D449120B5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*",
                     matchCriteriaId: "45C22141-E698-4E38-AF50-9CE04C1168FE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*",
                     matchCriteriaId: "49D0E470-427D-4A68-AFD2-982A4F7CE2D7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*",
                     matchCriteriaId: "43AB50F3-14AC-44BD-B7F0-A683C5FD1A3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*",
                     matchCriteriaId: "713C4B7A-C38A-4818-A258-D07DEDEC906E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*",
                     matchCriteriaId: "C59740BE-FC30-4400-B978-1DB41282971C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*",
                     matchCriteriaId: "839728F0-5F23-462F-B493-C37EE4C874F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F1B47DA-BA53-4D7A-9B5B-582238D5E99A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*",
                     matchCriteriaId: "D452F1BF-1FA5-463C-8F13-6357509FB5D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF6D1F4C-B396-468C-BA32-9367A68C95DD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*",
                     matchCriteriaId: "B76A812F-D77A-49C8-B7A5-0C08258D4BBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E001AAB-07EC-47BF-BDE9-BB927872781D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1DF11F5-61E8-4A98-86C8-49D6B3224FCC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "AED153E7-99A2-4C02-B81B-C3DDF8FAE1A0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "D024802A-EA60-4D9B-B04C-027A0703EABD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA731F3C-1F04-4EE2-83EC-9486F5032903",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*",
                     matchCriteriaId: "544A59F6-E731-43C8-8455-69256933E71D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "624258EE-7FFF-4432-9B6D-4D60AA73CD9A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "69A2701A-35A8-4268-B9CF-40BA3219373B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E671F6-8DED-4735-BE97-58A60E5B5C13",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*",
                     matchCriteriaId: "3FC68B2A-8570-4311-BB60-49DBBDAF7430",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*",
                     matchCriteriaId: "9826FA02-937E-4323-B9D5-8AE059ADBE95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*",
                     matchCriteriaId: "9B8630BB-48AA-4688-A6F0-212C1BB4D14C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*",
                     matchCriteriaId: "9AC98D35-D7D5-4C24-B47E-EDE2A80B2B9E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2F8ABCB-12C3-4C45-844E-B07F77DA2DE9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*",
                     matchCriteriaId: "326105AC-3926-437E-8AFF-916960107050",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "866E1275-7541-4B80-8FDF-53246A204C15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "E190929D-D3CC-46E1-A903-0848829061DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*",
                     matchCriteriaId: "81E4EBCB-B660-4F6A-AD73-81B9D8964162",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*",
                     matchCriteriaId: "55D58CC5-CB46-464D-93B8-6AD5A19AF097",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*",
                     matchCriteriaId: "16541D3E-EBBD-4D92-96D8-F169733377AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F08D257-F570-4D39-A6E8-0F60E55472E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "C20ED667-2BFB-41C7-82BA-9F0C0044DA08",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*",
                     matchCriteriaId: "6158ED8A-007E-48B7-99BF-8BA03BF584BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*",
                     matchCriteriaId: "DBA7096A-F321-49A0-911A-F9683ABE6E6A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A471395-7F8F-4BA5-962D-4D8F271FAB47",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9484380-92B9-44DB-8E20-DC8DE02D1CA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*",
                     matchCriteriaId: "8010808D-805D-4CA3-9EA2-55EB1E57964C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*",
                     matchCriteriaId: "9716FE9F-A056-42A3-A241-F2FE37A6386A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "F73422A3-ECA0-4C41-9AA5-CF7D77885CF6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A96A5AF-C9EF-4DED-AE25-4540A2B02915",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5115B12-053A-4866-A833-D6EC88D8F93E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5619D4D-9685-4595-8A5F-A18273FE4213",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*",
                     matchCriteriaId: "B77E00E7-0EA4-4E32-A693-0E0F66BA4C57",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "DAA3457E-7E1A-4878-9752-79382E954A66",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*",
                     matchCriteriaId: "68630C63-4457-4E12-B7BD-AD456B237FC5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6FB5695-2950-4CEC-81B4-FD280F835330",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*",
                     matchCriteriaId: "9F340AF8-508F-449D-9AFA-4E55F069B4F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*",
                     matchCriteriaId: "E944410E-D674-4141-B50C-9F55090325FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6438E07-0AC0-4BF9-B0F2-9072CA9639D6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_m:5y10:*:*:*:*:*:*:*",
                     matchCriteriaId: "5079AA70-C864-4AE2-809C-52B50632F2B3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_m:5y10a:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D124BCB-D8C3-49F5-B05C-E09B3CEBEBCD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_m:5y10c:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A86291B-C986-4320-BCEF-9F5AD8B309D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_m:5y31:*:*:*:*:*:*:*",
                     matchCriteriaId: "1227659F-1393-4189-978B-CC3DC53BF407",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_m:5y51:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C2DB843-638F-41EF-B486-409318AA2DE9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_m:5y70:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0004D8A-A186-4DA2-A7AB-18A6456438FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_m:5y71:*:*:*:*:*:*:*",
                     matchCriteriaId: "75B6BE9F-F113-4976-951D-53F2E183A95A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_m3:6y30:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEB005F1-9719-4985-B9D9-2140C962ADD1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_m3:7y30:*:*:*:*:*:*:*",
                     matchCriteriaId: "A94D0C1B-F30F-4724-915E-192C53FAE58A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_m3:7y32:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F247860-1D2C-415C-AFBD-26BD875AAF02",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_m5:6y54:*:*:*:*:*:*:*",
                     matchCriteriaId: "9697EDCD-A742-4AC6-876E-1080AD684207",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:core_m5:6y57:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E73924A-875B-44D0-8F7C-A822B0488126",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_m7:6y75:*:*:*:*:*:*:*",
                     matchCriteriaId: "03751B92-EE07-4F16-A476-BD25561810BC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:pentium_j:j2850:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3A630E1-6CAE-4809-AB18-5002F158AE90",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:pentium_j:j2900:*:*:*:*:*:*:*",
                     matchCriteriaId: "A67750FF-EF4B-414F-8ED4-299CAF33B0DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:pentium_j:j3710:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A82D885-82F5-4755-BC11-5899E28CEE42",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:pentium_j:j4205:*:*:*:*:*:*:*",
                     matchCriteriaId: "88AF1366-8A14-4741-8146-886C31D8D347",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:pentium_n:n3510:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FD75301-E29C-47DC-B53F-DC44EA0C1885",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:pentium_n:n3520:*:*:*:*:*:*:*",
                     matchCriteriaId: "8C944024-BEAA-43AF-A339-FD69C75E8240",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:pentium_n:n3530:*:*:*:*:*:*:*",
                     matchCriteriaId: "435C69D1-3932-4379-8D18-B1E12D558325",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:pentium_n:n3540:*:*:*:*:*:*:*",
                     matchCriteriaId: "3572B700-73C0-41D1-95FD-FE9D5B0C1F80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:pentium_n:n3700:*:*:*:*:*:*:*",
                     matchCriteriaId: "97A40DC9-0D4E-4C91-8D1B-3CED95B3952E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:pentium_n:n3710:*:*:*:*:*:*:*",
                     matchCriteriaId: "16FB3E4B-05F8-411A-8C86-4ACE03815553",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:pentium_n:n4200:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E55EBC1-6F96-47CD-9503-7855EFB07240",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon:e5502:*:*:*:*:*:*:*",
                     matchCriteriaId: "4208DBA1-7F85-4876-9B6C-D1B43EAAB2AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:e5503:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5ADC8E5-1CE7-4481-A9B5-61BFC6B4FF50",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:e5504:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1789924-FADB-4076-8874-120B29EE6B86",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:e5506:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC246667-2F6F-4024-9EAA-2CE3018235C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:e5507:*:*:*:*:*:*:*",
                     matchCriteriaId: "B21BA7F8-D4B5-4E6B-8FCE-04BBD3501AA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:e5520:*:*:*:*:*:*:*",
                     matchCriteriaId: "1341A5D4-A5CE-4D31-A178-01C3069D7A55",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:e5530:*:*:*:*:*:*:*",
                     matchCriteriaId: "86A5C199-92E5-435C-AC40-175849285104",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:e5540:*:*:*:*:*:*:*",
                     matchCriteriaId: "67589F54-0A54-4DE7-9A47-A73DD05F7965",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:e5603:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDC34C8E-1BB9-43CC-9D89-9E6DC435B7EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:e5606:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BE5163E-9BCF-4BF8-BCB9-B48C4E7E1564",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:e5607:*:*:*:*:*:*:*",
                     matchCriteriaId: "92C5DC8C-3318-440B-8B29-4827F343927B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:e5620:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ECC47D8-F602-4CEA-B19A-209CE76C9D36",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:e5630:*:*:*:*:*:*:*",
                     matchCriteriaId: "7514ADD3-DECC-4CC2-9421-A609E526FDC6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:e5640:*:*:*:*:*:*:*",
                     matchCriteriaId: "6ED2EC97-8B2D-47A9-8EC7-D1E0ACBB6C52",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:e5645:*:*:*:*:*:*:*",
                     matchCriteriaId: "691097C3-F91B-499B-BAEB-4E7E9C43B517",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:e5649:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B3DB1ED-017B-43EF-92A3-A8A88669FBC2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:e6510:*:*:*:*:*:*:*",
                     matchCriteriaId: "19A49AAF-0F08-4151-8F74-4EF9C3415B00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:e6540:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F7A2018-BB4D-4DC1-813D-A4AA3F270893",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:e7520:*:*:*:*:*:*:*",
                     matchCriteriaId: "A95D91C4-C539-4458-A6C9-8AE17207AE30",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:e7530:*:*:*:*:*:*:*",
                     matchCriteriaId: "37F9D218-8198-42C7-88FE-7C5382138324",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:e7540:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF8FDD81-95EE-4241-93C8-925085A4CE7B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:ec5509:*:*:*:*:*:*:*",
                     matchCriteriaId: "614D9E35-10E0-4CCB-B817-C7C8C3947BE4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:ec5539:*:*:*:*:*:*:*",
                     matchCriteriaId: "F75F987E-F4DB-46FF-B048-21B4A4C07B10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:ec5549:*:*:*:*:*:*:*",
                     matchCriteriaId: "05376F2C-30B6-406D-90F7-6C2E00E85171",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:l3406:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCDD3DF6-24BF-4C13-8F07-AF07327E5622",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:l3426:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1520A64-2157-45D7-A135-F900798C4EB5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:l5506:*:*:*:*:*:*:*",
                     matchCriteriaId: "05A30F85-5367-4369-B7A5-176D71279FC3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:l5508:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8803FF9-48D7-4AB0-8A17-4590CABD0BFD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:l5518:*:*:*:*:*:*:*",
                     matchCriteriaId: "1DC63B6B-5D6D-477B-9125-007F835981B4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:l5520:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF385AC9-963E-4670-95A6-BE1EBC3890B7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:l5530:*:*:*:*:*:*:*",
                     matchCriteriaId: "943FA088-2902-45A9-A1BA-D612B46A50D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:l5609:*:*:*:*:*:*:*",
                     matchCriteriaId: "8C80902D-9A6C-47D4-B56F-35C378FC0E63",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:l5618:*:*:*:*:*:*:*",
                     matchCriteriaId: "1100B46C-8485-4048-BFF8-2BAB311EC04A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:l5630:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B9E1646-E154-41BA-B9FA-0839A898023D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:l5638:*:*:*:*:*:*:*",
                     matchCriteriaId: "03F4C8E6-0043-41A8-94EA-EEBAA1A081E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:l5640:*:*:*:*:*:*:*",
                     matchCriteriaId: "31C10985-CBF7-4717-A7D6-2594887D7CB7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:l7545:*:*:*:*:*:*:*",
                     matchCriteriaId: "8C49886C-B6A0-4D95-8533-329FE5A66F6B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:l7555:*:*:*:*:*:*:*",
                     matchCriteriaId: "0788CF23-3FAF-44C9-9AAA-96E4818A1AEC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:lc5518:*:*:*:*:*:*:*",
                     matchCriteriaId: "24AF7001-64D1-4BFB-9280-0BA0FAD97A0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:lc5528:*:*:*:*:*:*:*",
                     matchCriteriaId: "8C6E420E-16DA-4FB1-9968-C93E229614FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:w3670:*:*:*:*:*:*:*",
                     matchCriteriaId: "07469E04-B3D2-41FE-A2E4-E25A977026CD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:w3680:*:*:*:*:*:*:*",
                     matchCriteriaId: "60FF402E-5E4F-414A-A3AB-149548303616",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:w3690:*:*:*:*:*:*:*",
                     matchCriteriaId: "79E2B875-A270-45C0-A1B1-041264E5B290",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:w5580:*:*:*:*:*:*:*",
                     matchCriteriaId: "8C828C8C-7ECB-4167-87A9-0F522C400C66",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:w5590:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C2C887F-1EF7-468A-A6AE-440793C78DAC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:x3430:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F2F3D7F-D884-4ACD-A103-060F57A9867B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:x3440:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD1FCAAD-7072-45EC-9ACB-08556458BAF6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:x3450:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4446224-40E8-4AD0-8197-921D3473E19B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:x3460:*:*:*:*:*:*:*",
                     matchCriteriaId: "4EA159D9-8C7F-4BE5-9093-A21C7D00F7EA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:x3470:*:*:*:*:*:*:*",
                     matchCriteriaId: "B92B68FD-771A-4401-8B1D-B1A252356F62",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:x3480:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B933941-0BE3-4EEB-8FDD-2DAA63343EE5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:x5550:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D060EF0-B29C-4B54-86A0-FD5CFF7B80BB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:x5560:*:*:*:*:*:*:*",
                     matchCriteriaId: "36F737C1-6011-42D2-9690-CA81EA0A283C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:x5570:*:*:*:*:*:*:*",
                     matchCriteriaId: "19CA7EB6-D1C9-48D9-A69A-2618800A6CE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:x5647:*:*:*:*:*:*:*",
                     matchCriteriaId: "0CA1F3E5-ED7F-4E4C-AD0D-0EEC542A9E51",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:x5650:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED6E3C9B-A661-4B37-B76D-A3F7BD638D4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:x5660:*:*:*:*:*:*:*",
                     matchCriteriaId: "56C909B0-8FB2-4220-AF93-EECB8D650CC3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:x5667:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF36BAD0-A762-4F84-BE0B-060FE666ED67",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:x5670:*:*:*:*:*:*:*",
                     matchCriteriaId: "007337CD-94FB-4ED9-B4A3-9E0EC52D79B2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:x5672:*:*:*:*:*:*:*",
                     matchCriteriaId: "BCDFA137-F1FC-46BD-9872-D62671B1434D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:x5675:*:*:*:*:*:*:*",
                     matchCriteriaId: "2E6DBCB3-E912-43A1-914B-5C7CCFAADE25",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:x5677:*:*:*:*:*:*:*",
                     matchCriteriaId: "0FCF36E2-0B42-4F23-97D6-9E79ECCA8FAD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:x5680:*:*:*:*:*:*:*",
                     matchCriteriaId: "E2C67312-E128-4833-A91E-D7A9F96A7AD5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:x5687:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F19F408-FABD-4A68-8CDC-C763F0321FB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:x5690:*:*:*:*:*:*:*",
                     matchCriteriaId: "68A06EC2-E491-4CD5-9904-61A88EBB7FD5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:x6550:*:*:*:*:*:*:*",
                     matchCriteriaId: "789A8CAE-8D9E-4244-880D-FBE28EC53AED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:x7542:*:*:*:*:*:*:*",
                     matchCriteriaId: "F901EE11-D0C9-46F6-8316-D8F4F1D50260",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:x7550:*:*:*:*:*:*:*",
                     matchCriteriaId: "E549F600-B9CE-4843-A772-2DACC528903E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon:x7560:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F28E733-87ED-4610-A8EE-BD37BED7685B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DB488DD-D97C-4E21-A055-E6CECBBBC34E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DC12C97-9966-40E2-8B23-B4453EC9EA6A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e-1105c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2832E8BF-7AC7-444C-B297-66F770860571",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3:1505m_v6:*:*:*:*:*:*:*",
                     matchCriteriaId: "44AA72FB-E78D-419E-AA82-B0538C6504D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3:1515m_v5:*:*:*:*:*:*:*",
                     matchCriteriaId: "687C3BF3-D71A-49AD-8A05-EAC07CBCD949",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3:1535m_v5:*:*:*:*:*:*:*",
                     matchCriteriaId: "90AF90D9-16C4-4F8A-9868-3E2823E3445C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3:1535m_v6:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C063C53-8970-45B1-85F8-FB2080BF4695",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3:1545m_v5:*:*:*:*:*:*:*",
                     matchCriteriaId: "64596ED7-794A-4D23-987B-D9AD59D48EA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3:1558l_v5:*:*:*:*:*:*:*",
                     matchCriteriaId: "C2E52BA6-2F2F-4CD2-A601-5B0ADDE5E23F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3:1565l_v5:*:*:*:*:*:*:*",
                     matchCriteriaId: "3FDA48F0-0F35-4A8F-8117-B0B28E00AB95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3:1575m_v5:*:*:*:*:*:*:*",
                     matchCriteriaId: "A561A8E8-79E2-4071-B57D-590C22EF86A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3:1578l_v5:*:*:*:*:*:*:*",
                     matchCriteriaId: "92E46658-60AB-4758-9236-3AC0E6464383",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3:1585_v5:*:*:*:*:*:*:*",
                     matchCriteriaId: "207B8FBA-E2FF-485A-9AD9-E604AE0FB903",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3:1585l_v5:*:*:*:*:*:*:*",
                     matchCriteriaId: "33F99640-C753-40BE-A0A1-4C2D92E7DB09",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1105c_v2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA1EC6D3-01CD-4CAB-817D-AE2E72FD0D03",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1125c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F98247B-1839-4676-855B-827A4B6C016B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1125c_v2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDBA35BD-1048-4B6E-96B2-1CFF615EB49A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6CEEEE2-D6A2-4342-8A73-934093948824",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1220_v2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "979FEE9F-A957-43B6-BB6D-1A851D6FA11C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1220_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A7AF59D-D05E-47F9-B493-B5CD6781FDDD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7EF7EC93-0170-45A9-86C7-5460320B2AE9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8A7B1C2-D2CE-485A-9376-27E14F3FA05A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_12201:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5F803AC-DCC7-43FC-BEB3-AA7984E0506C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_12201_v2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "560993AA-299D-42B7-B77F-1BD0D2114CCB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1220l_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C582B1C-1DAC-48FD-82DD-7334C10A2175",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1225:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7862B0C-2C44-4110-A62A-083116129612",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1225_v2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "048C5996-F719-4338-B148-0DD1C13E02FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1225_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0196DA2F-CFA7-44D0-BDF5-37C7403E3B9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B9FF7FB-AB5A-4549-8C15-E69458C649E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CEF6608-B650-4C77-9823-0AD57B3484F1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1226_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4BE6A2D7-901C-45F9-B487-D674047D522E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1230:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCFCAC5E-6CF1-4EC1-A24C-688DD1016A96",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1230_v2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1ADCB509-5B0E-4592-8B23-EC25A3F79D41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1230_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB51691F-089F-4016-B25E-238074B06C0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBAAC728-6A0F-4675-9677-AAF7DD5D38ED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB3BFEFD-3D0D-48B0-A5AE-6F3C2D791CE1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1230l_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC7E1AFD-9BCE-4487-A8DE-F9C60529CA7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1231_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7EA37503-FD3D-4220-933C-234631D6EDEF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1235:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "72992831-2A76-456B-A80C-944BDD8591E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A79C2131-5566-4CC2-B6ED-38E3F6964500",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "60BFDAA6-3DFC-4908-BC33-B05BAB462F94",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1240_v2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6266056-770A-4E2D-A4FC-F1475257648E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1240_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "929AA8F3-8BDF-4614-9806-6D4231735616",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "605D7552-8184-4B11-96FD-FE501A6C97DD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3144BBDE-CC96-4408-AA02-ECC3BF902A34",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1240l_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B8BA77A-34E3-4B9E-822A-7B7A90D35790",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7165B43-ED22-4714-8FA4-1E201D1BFA69",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1241_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "67CFB133-FAF0-431A-9765-8A9738D6D87C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1245:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2975B0F2-DB7C-4257-985A-482ED2725883",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1245_v2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "70221E07-3C2E-4A82-8259-AD583EB5CDDD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1245_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "427DFD78-56CD-43C4-948E-F53AF9D669F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E3E6F5F-6B82-43D9-BD6E-D22F9B991DB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75AD7649-3FEA-4971-9886-6C9312B937A1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1246_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4EE972C-6BAE-4342-BA01-1D685487F9C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1258l_v4:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27CDFE3B-C064-49A9-BD43-3F7612257A74",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1260l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3BD0EEC1-D695-41A5-8CD6-9E987A547CC4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C35AA9AC-28B3-49C2-A9B5-5D26DFEDB723",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1265l_v2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DBF25B8-D474-4C6B-8E45-F57DDC7074E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1265l_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3DF18FD1-6670-4C3C-8000-A079C69D575E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1265l_v4:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D760EEAF-5CF5-4F25-8FA2-D4F75F4F5A91",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1268l_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "921EB5A5-F911-4FCE-A6F1-C66818B34678",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "13878C13-1C7C-4B83-AF27-4998E8F659DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1270:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "023063E1-2DD7-487C-A8A7-939FAEE666A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1270_v2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "77255CE6-D7B7-4B48-993C-7100A1170BC6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1270_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B40AC368-3A14-4EFF-A8D0-7EFB4C83045D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3472AA7B-C0CF-4D65-8A6C-B1D52D27F0CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C07E80D5-70A5-49C9-9044-D683C7ECCFF5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1271_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "63668AF4-F29C-4424-8EC5-2F0A5950DD58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1275:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E86616FE-0C3F-4984-A364-8A6A9F01DAD1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1275_v2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "09C1C7CD-538D-4D7A-A81C-10DF5376A479",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1275_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5922F749-2B23-44B8-8A46-F31BCAEAD279",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C48BBAF-6B27-43D6-B86B-40CD8E7BA056",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D75D0EEB-707C-4C86-A569-E91E9F00BA77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1275l_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0FB0E20-0243-40A1-8DEF-37150791222E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1276_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68CFF26D-8AD3-4179-9E4C-F06D7C858C9A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1278l_v4:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7541572C-229F-4963-B7F0-06EB3323E53B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1280:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85DE669C-27FD-4196-8B8C-1DA4EE4C1D6C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1280_v2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "479F7C77-D16F-4E40-9026-3EB8422E0401",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1280_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A242AC2-9AA6-43FD-90F4-5BF6E80DBB5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "04DB08C8-0018-4A8E-A206-097BDDF83B08",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B7193E85-30BE-42D5-A26B-3F88817F3574",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1281_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "446E8515-45FC-4B8B-8D12-60643D64C07F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1285_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBBDF6B2-D388-4639-87D8-064AA3F6B6FC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1285_v4:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "00AAB8B6-B614-4EAA-BA90-C5326CB5D07A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A371DF9-E224-404F-99C2-C2A4607E62D8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1285l_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F40E356-365D-44B7-8C38-A0C89DDD6D3E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1285l_v4:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3132029-89F8-4359-A0DC-A275785266A1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1286_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B02F5685-0636-48AB-B222-434CA1F3B336",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1286l_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E51FDD60-88E5-4A86-BB8E-4C2D7EDEFA03",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1290:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3ED4693C-DECF-4434-90C0-56158F102E7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1290_v2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB408A6B-0842-43DA-9180-B0A299FCBCE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1501l_v6:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6215EBAC-7C75-4647-9970-482120897F1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1501m_v6:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3357FCAC-B6C4-4E3E-A40B-AB5084A7F9B2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1505l_v5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B1BD2B6-1AF6-4AD4-94FA-94B453A21908",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1505l_v6:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D1FD6E8-80EC-461F-9ED1-CE5912399E80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e3_1505m_v5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E96F585E-BDEF-45EE-B0AB-94FE23753AC5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:2650l_v4:*:*:*:*:*:*:*",
                     matchCriteriaId: "3279C067-3058-4D46-A739-05404FD0E9B5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:2658:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB4DF0A7-8BC2-48AE-9036-FED6EEC57DF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:2658_v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0855225-F501-486A-BD03-2A86FD252B5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:2658_v3:*:*:*:*:*:*:*",
                     matchCriteriaId: "214C7B0C-C438-4000-9F9B-6D83294243AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:2658_v4:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C91AA2E-4BB2-49C8-9364-4E363DF42CB0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:2658a_v3:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA26781F-5A1C-4DA5-835E-D984D697F22B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:2660:*:*:*:*:*:*:*",
                     matchCriteriaId: "2EEA4222-F25D-4457-80AA-6D05CA918D68",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:2660_v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "9F3E60D1-5CF9-4F96-9EDB-D87F8CF57272",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:2660_v3:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4D321BC-6B1D-4C71-8E16-5A1319CEFD6C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:2660_v4:*:*:*:*:*:*:*",
                     matchCriteriaId: "6777AC35-9D1F-4153-94AC-B25627D730E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:2665:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5F063F4-8994-4E46-BA7B-A12A112009BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:2667:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D6F2DE5-AF11-439A-8D37-30CB882ECD58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:2667_v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "E213DD86-5419-42C8-BF38-7795DDB3C582",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:2667_v3:*:*:*:*:*:*:*",
                     matchCriteriaId: "A972291E-5231-439D-873B-2F87BCAF800A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:2667_v4:*:*:*:*:*:*:*",
                     matchCriteriaId: "C089CC54-3229-43D7-AA15-73CFA1A43EE3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:2670:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF268D83-C15D-4559-A46F-844E1D9264F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:2670_v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "CFE97C0D-3EA1-4314-A74A-7845C7778FB7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:2670_v3:*:*:*:*:*:*:*",
                     matchCriteriaId: "34293F29-F327-4ADD-BF62-78F63F79BB96",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:2680:*:*:*:*:*:*:*",
                     matchCriteriaId: "528C0A46-1CC4-4882-985A-0BB41525BC6B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:2680_v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "643F3522-A452-4927-944D-532574EC4243",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:2680_v3:*:*:*:*:*:*:*",
                     matchCriteriaId: "58F40B78-4DBA-44EE-8420-086789EFF53D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:2680_v4:*:*:*:*:*:*:*",
                     matchCriteriaId: "423BFD8F-4B50-43DA-9979-75FD18FBC953",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:2683_v3:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BAD4A68-0481-476F-BBBD-3D515331368C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:2683_v4:*:*:*:*:*:*:*",
                     matchCriteriaId: "838CEB7C-7C4C-416C-86CE-6E8DD47EF25B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:2687w:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC7D021F-3C97-45B3-B1F7-0AC26959F22B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:2687w_v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A31AEF3-448D-417B-9589-4BA0A06F2FE8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:2687w_v3:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7A1D96F-7FFD-413F-ABCE-4530C3D63040",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:2687w_v4:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDB2B08B-D3C7-4B82-B170-471D6CDEFAE5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:2690:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B8343FE-1320-40AE-A37F-70EF1A4AC4B7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:2690_v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD42BA5A-7DA0-409D-8685-E43CF9B61D9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:2690_v3:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5FF80E9-CF28-4EF6-9CFE-4B500A434674",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:2690_v4:*:*:*:*:*:*:*",
                     matchCriteriaId: "7896A6C6-5918-4C27-85AF-6FEEFC7F8FD6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:2695_v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "647B77A4-2F49-4989-AF43-961D69037370",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:2695_v3:*:*:*:*:*:*:*",
                     matchCriteriaId: "805B1E33-F279-4303-9DF3-C81039A40C1C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:2695_v4:*:*:*:*:*:*:*",
                     matchCriteriaId: "B971EA9E-AE5C-4A1D-AD55-8241F7B38C9C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:2697_v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE7E0AAE-6539-4024-9055-BE0BAD702143",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:2697_v3:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F1A8828-0765-4799-AD6C-143F45FAAD23",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:2697_v4:*:*:*:*:*:*:*",
                     matchCriteriaId: "12D34618-1CCA-405B-A49C-EB384A09C2C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:2697a_v4:*:*:*:*:*:*:*",
                     matchCriteriaId: "575D6061-66BC-4862-BC84-ECD82D436E2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:2698_v3:*:*:*:*:*:*:*",
                     matchCriteriaId: "56B6EE64-1AD4-46B2-BA65-BB6282E56EB0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:2698_v4:*:*:*:*:*:*:*",
                     matchCriteriaId: "11650B45-0BDA-42BF-AEF3-83B48DD6A71D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:2699_v3:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD3C92BA-827B-48AF-BBB3-FB60A9053C22",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:2699_v4:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC097E24-F6C9-40D9-95E9-7EFDFA61AFF5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:2699a_v4:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EB44CA7-DFE6-4B1A-9A63-97AE30017E49",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:2699r_v4:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B305EFA-6226-412C-90EE-F0691F2DDDE0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:4603:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F3874FA-63CB-4B5D-8B64-CE920320A4E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:4603_v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "0800ED17-50E4-43F3-B46C-591DFA818BA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:4607:*:*:*:*:*:*:*",
                     matchCriteriaId: "A46B0405-F301-4209-8766-6E12EAFAD157",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:4607_v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "F99F9F1F-A967-4884-96CF-4488102DC0A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:4610:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA9B37AD-4599-425B-B39F-E571F4975266",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:4610_v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5A5F1CF-A1E6-45F1-8B09-36566778DB57",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:4610_v3:*:*:*:*:*:*:*",
                     matchCriteriaId: "698C8A49-888B-4675-B3B0-25EDE2FD515E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:4610_v4:*:*:*:*:*:*:*",
                     matchCriteriaId: "70D98F97-8EF4-48B5-84BE-C3CC27031FDA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:4617:*:*:*:*:*:*:*",
                     matchCriteriaId: "B473D1FA-909B-492E-9C5B-94B0E20E1C0E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:4620:*:*:*:*:*:*:*",
                     matchCriteriaId: "BFD5EA7E-322E-4CE6-89D4-7DB1055C9034",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:4620_v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "67836379-4E1A-45CD-9506-7D3F612E47C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:4620_v3:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B1BBC61-8664-4452-93A7-DDB4D2E4C802",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:4620_v4:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4F1B50C-FC5F-47F4-87BC-60E1BD3DD1F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:4624l_v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "044F0375-DF2F-4D9B-AD7E-473D34165E8C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:4627_v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CEE9B72-5C4C-40C0-A8A7-9DF11655DA43",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:4627_v3:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A0655CA-A88C-4632-9A18-560E3F63B2F7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:4627_v4:*:*:*:*:*:*:*",
                     matchCriteriaId: "8C1454DD-DA51-4CBC-8BB2-09D5AB5777DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:4628l_v4:*:*:*:*:*:*:*",
                     matchCriteriaId: "C6965851-3B29-4C21-9556-97FD731EAA85",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:4640:*:*:*:*:*:*:*",
                     matchCriteriaId: "52984FD2-44E0-4E91-B290-0376737EEF6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:4640_v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C5D92E2-E718-4247-BA5D-DFE86C0F6AAE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:4640_v3:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF933366-7503-4F8D-B7AA-F6A16210EC37",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:4640_v4:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E2DAF5D-5BB7-49C6-8426-8B547505B6FC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:4648_v3:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EABB21D-D021-434B-B147-CAF687097A5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:4650:*:*:*:*:*:*:*",
                     matchCriteriaId: "7609424D-95F1-4493-A20C-B1BA4EC6439D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:4650_v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "966DC636-C802-4D9F-8162-652AFB931203",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:4650_v3:*:*:*:*:*:*:*",
                     matchCriteriaId: "A75794EB-A5AF-43F0-985F-D9E36F04C6D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:4650_v4:*:*:*:*:*:*:*",
                     matchCriteriaId: "31C2CFF0-98FD-4A0D-8949-D554B2FE53D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:4650l:*:*:*:*:*:*:*",
                     matchCriteriaId: "05F9217F-5028-4659-AA8E-F60548DE4D52",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:4655_v3:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AC769DC-CF2E-4A3C-A610-264F024E6279",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:4655_v4:*:*:*:*:*:*:*",
                     matchCriteriaId: "9B2B1CBF-D155-49BC-81A4-4172F177A5C2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:4657l_v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "370B2B32-519E-4373-8A04-5C5025D688BB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:4660_v3:*:*:*:*:*:*:*",
                     matchCriteriaId: "83D9B562-C279-4A55-A347-F28FC4F9CD12",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:4660_v4:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A8C2BA0-48A8-4107-8681-A7C34C553D8C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:4667_v3:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1B009DE-A82F-4569-9B42-EC1EC4DA8A40",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:4667_v4:*:*:*:*:*:*:*",
                     matchCriteriaId: "683B6E83-37FF-4F9B-915F-059EBB29DB53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:4669_v3:*:*:*:*:*:*:*",
                     matchCriteriaId: "E218718F-4BE6-48B0-A204-9DD4A932A654",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5:4669_v4:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB0AB327-B60A-473C-9D36-97766EE62D7D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_1428l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3DA249EE-4786-4E27-8787-5E8B88C2AEB9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_1428l_v2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CEBD0529-1CF3-44E5-85B3-19A3323C9493",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_1428l_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D664EE97-07EC-410F-94C3-AEAB2C6A627D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_1620:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D31DB981-03B1-4A84-8D87-CD407C3C149F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_1620_v2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0CBD155D-89D9-4677-A621-4D7613BE65C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_1620_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D02BD0D4-FFFD-4355-97D8-170362F10B9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_1620_v4:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6635781A-2651-4EF2-A5AC-AEEEE63FDE6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_1630_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DCE6930-760A-48C0-B964-1E3ED6A8517C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_1630_v4:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E52DE90-DF96-4CE7-B8D1-226BA50E4D09",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_1650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8EB40E7-9B91-4106-B303-2B70AF395BFA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_1650_v2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EAB0D5CD-8AF3-409D-96A7-718641D4B90D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_1650_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E420B0B-0CD5-41C7-B25A-3DB856055F9E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_1650_v4:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B0C295B-0D63-4BE7-830D-D927E00C301C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_1660:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "605C340D-2220-4669-B827-9009CB099E8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_1660_v2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8791879D-2908-4F57-8DB3-6D24100A9108",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_1660_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CEBEDBBA-0427-4DE0-BA8D-737DE7DF80E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_1660_v4:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E823DC5B-98BE-4656-BFBF-3A7018F8F213",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_1680_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64E8D558-ADE0-4358-9C76-7BD77BF23AA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_1680_v4:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7973B3D0-F244-4E26-88F5-A2D9BF2E4503",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2403:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68E6BAB9-CBA4-4362-BC82-00D2C5CC6FB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2403_v2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD3F4BFF-3CBE-4E4B-8B29-B203F99CFD8A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2407:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F5CB567-4F86-4466-BE4D-BFF557ACAE0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2407_v2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A52611B-6583-4660-90D7-C9472728072B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2408l_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E80C6E89-B57C-47BB-8B95-50C03DFB3B96",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2418l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9AB685B-FEE1-41EF-A046-1B34619E12A1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2418l_v2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB9F6724-967A-4AF0-9896-12BF6164B2CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2418l_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC1116BF-12D7-47CC-98DB-18B200CF9C16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2420:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FBB28DE-726B-4AF0-88A5-35987E1E648B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2420_v2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EA1DB22-8FBF-4CF6-AA96-5B68EE28877D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2428l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1880E2B8-5E0E-4603-8D17-3ABA43D28179",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2428l_v2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FAFBB92-1917-4238-832B-195FBE418271",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2428l_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "91DFDF3F-9A3F-42B8-99A1-A3F76B198358",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2430:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8778F972-BF34-482F-9FA7-71A77F6138E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2430_v2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F288BB0-FE7A-4900-B227-BE80E4F4AADF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2430l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A8DC53A-90C6-47FE-89F1-A1FE8B1C07A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2430l_v2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "57E16338-A094-4CA9-B77F-6FE42D3B422C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2438l_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E07AB33-5351-487D-9602-495489C7C0B8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2440:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22115ED6-1707-4840-B0D1-AD36BC0C75A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2440_v2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7C633BC-831F-4CB7-9D62-16693444B216",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2448l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CF5EE7E-F41B-44EC-9F69-7963B1BF1FB0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2448l_v2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DD501E1-E78F-44C6-8A13-C29337B07EBE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2450:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9085BA0B-B7E2-4908-90C0-B4183891C718",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2450_v2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2267CB8-0EE9-4DBD-AD5F-8A13BB62673C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2450l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "81971C2F-137A-4F11-8C93-3B99D4CD1B58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2450l_v2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "98E0BDAC-398E-406B-B2DB-AE049D6E98B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2470:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FCB66D7E-B465-4A8B-8CBD-7E93CCA2CD6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2470_v2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "86AFDE6C-DE58-4C4D-882E-474EF6C3D934",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2603:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "950C6BF9-AA47-4287-AC01-D183237490FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2603_v2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2355181D-D8EE-4F80-8280-13D5CBCF4779",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2603_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5209343F-66B0-4DC0-9111-E2E64CFF7409",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2603_v4:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "720109A6-B79E-48E1-9AE7-7708B154788E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2608l_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "82FF0DBD-AE13-4232-80F7-F4C2E2CC9721",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2608l_v4:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E5E944ED-8C02-46B8-BF95-0CE4C352753B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2609:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "77AEA3D1-4846-46E2-9B80-20B19F00DC11",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2609_v2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1576978F-E93D-4A47-90B6-6A4E3A7DE558",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2609_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D339FE5-001F-4005-88A5-CFFE37F9B63E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2609_v4:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BDABA86-497E-497E-A5BA-46F913A4840A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2618l_v2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD886F4C-DB6F-4DDD-9807-8BCBB625C226",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2618l_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E16912A-7F6A-4A2B-B70F-D1FCD34BC7DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2618l_v4:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4C454B7-E5F4-4AAE-B577-FD71FA002C8A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2620:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "38BE2781-3A06-4D62-AC8B-68B721DA526B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2620_v2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9AE4EA5-B8C8-4AE2-9614-F9DBDB4D79DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2620_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2DA23772-2EB8-4BEE-8703-26D967EC4503",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2620_v4:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "72DC766A-B1F9-4B83-9F9B-CF603EE476BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2623_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA594740-43C5-4F42-BA5B-00CA8AE7BB60",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2623_v4:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "572B16E2-8118-43A0-9A80-5D96831D55FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2628l_v2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FB5C551-BADC-4A3A-93E5-2EBCA0704C51",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2628l_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5383B7A3-1569-4FEB-B299-B87CE8C8A87B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2628l_v4:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A05BBDE0-6C47-4489-9455-7DA7D230ECA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2630:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1789AA69-EA31-44D1-82E6-228E48E18586",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2630_v2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4A7D5FF-3B1F-4C64-BB81-7A349765520D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2630_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D93A92E9-C8D2-4F6E-A5CA-E8AFFEEC7E13",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2630_v4:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F0498B3-393A-4C32-B338-E6014B956755",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2630l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C451F752-6869-4AFA-BAE5-5C9A54427BF2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2630l_v2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "83710FD1-099B-436D-9640-061D515E10BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2630l_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "517B71CE-6156-40E1-B068-A2B733E205E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2630l_v4:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "11DEEEE5-5055-4CE1-962C-C5F075F4CC02",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2637:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8718DDAB-3208-48CF-9BCE-54DA1257C16A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2637_v2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE1AA901-E822-4240-9D82-C9311E4F87B2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2637_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1CDE3DF-8E79-4997-94EB-B517FFCAE55C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2637_v4:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12A0DE13-EB0B-493B-BC84-3AEB3D454776",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2640:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1727697B-1F59-4E29-B036-C32E9076C523",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2640_v2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E69E827C-C0D0-46C7-913A-1C1E02CEAACE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2640_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2528F3F9-34DC-41DA-8926-382CB3EF5560",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2640_v4:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E452C262-5A8D-4D97-BC7F-A4F5FF53A659",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2643:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D57BF69-D750-4278-98AA-976B0D28E347",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2643_v2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76ADAE30-6CAD-4F5B-B6F7-C18953144C63",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2643_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A25D792-E21D-43EE-8B9D-67DE066DE5DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2643_v4:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C669783-C058-4B4F-BB9A-84B2C4682247",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2648l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "159B088B-9A85-4CAA-854A-AA080E528F95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2648l_v2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FBE74A94-FE8F-4749-A35A-AB7D57E24913",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2648l_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "990AC341-0E67-4A81-87E9-EE3EFD9E847E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2648l_v4:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "53BC18B0-58F1-4477-9978-CA7383C197FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "474992FB-842D-4661-A565-44AF2CD78693",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2650_v2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "476E1B79-5342-4895-96D7-E97DFC1F5334",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2650_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBD318D5-89A6-4E28-939C-C5B61396806B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2650_v4:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "981AD3FF-1D14-4ECD-8B6F-BCEB7F2409AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2650l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A32C7E89-32ED-4328-9313-FA7D3DDBDC58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2650l_v2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2792EED8-2CBD-478E-BC09-05FE830B3147",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e5_2650l_v3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97B1AF2F-6E48-4DBD-A60E-3088CA4C3771",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:2803:*:*:*:*:*:*:*",
                     matchCriteriaId: "34E1691D-65B3-45E4-A544-8B29E38D569D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:2820:*:*:*:*:*:*:*",
                     matchCriteriaId: "E42F2703-B8AB-410E-AF7B-CD0BE777F061",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:2830:*:*:*:*:*:*:*",
                     matchCriteriaId: "31244C94-00A3-499C-A91A-1BEF2FB0E6B9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:2850:*:*:*:*:*:*:*",
                     matchCriteriaId: "878FF6E8-8A6D-44CE-9DD1-2C912AB8A193",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:2850_v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "5078A95B-2BD8-4A37-A356-F53D1A53CB37",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:2860:*:*:*:*:*:*:*",
                     matchCriteriaId: "0BFE67CD-DE53-4C4E-8245-35902AEFA6E8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:2870:*:*:*:*:*:*:*",
                     matchCriteriaId: "9F231D31-3AAD-4C5D-A225-D2DF94486718",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:2870_v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "5998DF5D-E785-45EC-B8D0-1F4EC4F96D50",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:2880_v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "EADFD013-0BFB-427C-98E6-F9E4774DCBC9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:2890_v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "58620B10-FEA6-456D-B6B5-2745F5DBE82D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:4807:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8F698B1-D9CF-4FE5-933D-EFCEA3056E3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:4809_v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4858A1F0-97F2-4258-AB98-027BF1EC5117",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:4809_v3:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C961A8B-EAFD-4F66-9432-BCC0D154ECCE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:4809_v4:*:*:*:*:*:*:*",
                     matchCriteriaId: "052DE6CD-A1E7-4E81-B476-66EF451061C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:4820:*:*:*:*:*:*:*",
                     matchCriteriaId: "3BE1AE1E-6FC0-41D8-857C-C5A99CAF5823",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:4820_v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "751B3AC8-D45E-46B6-83D5-311B693F3C0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:4820_v3:*:*:*:*:*:*:*",
                     matchCriteriaId: "9588277A-0B97-4408-9CF7-11271CDAADD6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:4820_v4:*:*:*:*:*:*:*",
                     matchCriteriaId: "479FE854-85E5-4ED0-BFAF-2618C9053082",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:4830:*:*:*:*:*:*:*",
                     matchCriteriaId: "E048B9BF-77C8-49F7-9F2D-9999F79BA264",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:4830_v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "6CD16D4D-E816-486D-96F4-5A2BF75B959F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:4830_v3:*:*:*:*:*:*:*",
                     matchCriteriaId: "169C558E-1A83-47D5-A66B-035BD1DD56FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:4830_v4:*:*:*:*:*:*:*",
                     matchCriteriaId: "D683E509-3FB2-4175-BCAB-4EB1B5C04958",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:4850:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FCFA915-5445-4732-9F8F-D7561BA4177F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:4850_v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "63A9FD98-C22D-48F6-87A1-60791C818A1E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:4850_v3:*:*:*:*:*:*:*",
                     matchCriteriaId: "85F99F24-1783-4E6E-BE61-04C2E80356ED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:4850_v4:*:*:*:*:*:*:*",
                     matchCriteriaId: "74CC7EB9-3F59-4C0A-B3A1-984BCCFB25BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:4860:*:*:*:*:*:*:*",
                     matchCriteriaId: "85289E4C-C813-4677-867D-EE8E98F4A1A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:4860_v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "27C8150F-BEFA-406D-9F0D-E7CB187E26AB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:4870:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E807F90-819F-4103-B1F7-4CE46971BD63",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:4870_v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD93203F-71B9-4F87-B5D8-FD273451C8A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:4880_v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E652C74-C48D-4F29-9E85-09325632443F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:4890_v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "99158191-3013-4182-8A53-5DFCA1E2C60A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:8830:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7E39A3E-7EAE-47C9-930B-58A980B73FC5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:8837:*:*:*:*:*:*:*",
                     matchCriteriaId: "FFDA54BA-C00D-4890-9B7F-328257607B21",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:8850:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F5EFB1E-334C-4B55-8E2E-6AE19B34774D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:8850_v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8260DCA-2F0C-45F7-B35F-D489AF5639F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:8857_v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "7778F81B-6D05-4666-B1D4-53DB0EC16858",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:8860:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DC6706A-61F7-4AA0-B2FF-0FFDF739A644",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:8860_v3:*:*:*:*:*:*:*",
                     matchCriteriaId: "7EF1B16B-02F2-4ECA-938E-B5CDCFC67816",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:8860_v4:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C5501D8-1B0D-4F5A-AFD7-C63181D3281F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:8867_v3:*:*:*:*:*:*:*",
                     matchCriteriaId: "1751F0CE-A0D3-40E2-8EEC-D31141FE33A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:8867_v4:*:*:*:*:*:*:*",
                     matchCriteriaId: "5FF9AFA7-BBE8-4229-94CB-5A9596728BA5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:8867l:*:*:*:*:*:*:*",
                     matchCriteriaId: "E23A777F-68A4-4217-A75A-4D8A27E6451A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:8870:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CA27DFB-CDD1-4F52-86B3-DB2320A9C7B2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:8870_v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "392A4337-11F6-4980-A138-4FDBCAD0EBA4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:8870_v3:*:*:*:*:*:*:*",
                     matchCriteriaId: "E2E9BB67-F1FF-4190-889F-78B965CCE934",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:8870_v4:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4185A70-5D10-448E-A9AB-AA9D5CDF0FF8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:8880_v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "35607317-0928-4297-A33E-D44BEE1BBEC9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:8880_v3:*:*:*:*:*:*:*",
                     matchCriteriaId: "D48323B1-7FEB-451F-A064-23E7CE7F6403",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:8880_v4:*:*:*:*:*:*:*",
                     matchCriteriaId: "29EF4E8A-EF37-4DCC-B5D4-DA89AF31DD18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:8880l_v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5763189-7980-4A72-92C9-1908FE9E15EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:8880l_v3:*:*:*:*:*:*:*",
                     matchCriteriaId: "C53ACD49-DA21-4DDE-A0AA-FCCD59D29886",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:8890_v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4326D350-EBC2-48E6-A2C6-0499F6826CEE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:8890_v3:*:*:*:*:*:*:*",
                     matchCriteriaId: "8594E6FE-B6DB-4343-B3DD-AEC19923DAF9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:8890_v4:*:*:*:*:*:*:*",
                     matchCriteriaId: "5BCADA00-E453-414D-9933-FCB43D21BBC3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:8891_v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "E62212D9-F707-4A8E-AB2A-A3985E7A4049",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:8891_v3:*:*:*:*:*:*:*",
                     matchCriteriaId: "561755A8-8AAD-4F41-8266-747EFDAF2D55",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:8891_v4:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6F4BB0F-DAF4-479B-B78A-7929C151AA1B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:8893_v2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A207312E-1D35-4464-A111-22C4C793E146",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:8893_v3:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9B16E32-07D5-445B-BAA5-4E4A0881BFC1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:8893_v4:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CF08F6B-2ECB-414C-82D7-C06085BF8B10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e7:8894_v4:*:*:*:*:*:*:*",
                     matchCriteriaId: "21032BE3-74D8-4C3F-B461-158F475B6853",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F9AC992-59B7-44EE-9FF3-567AC48938AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:5118:*:*:*:*:*:*:*",
                     matchCriteriaId: "B44B3BFF-649A-4C1E-9564-EFA007FA2BD5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:5119t:*:*:*:*:*:*:*",
                     matchCriteriaId: "C04EDD71-15B3-4085-828C-BB7A43DBDCC0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:5120:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC1BA7AC-989B-4093-841A-C6D5978BF17F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:5120t:*:*:*:*:*:*:*",
                     matchCriteriaId: "1874F848-B15B-4369-A164-5FA11D2B9AFE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:5122:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E46F934-9765-43ED-88A7-A4778C99A976",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6126:*:*:*:*:*:*:*",
                     matchCriteriaId: "380A8F4F-7D1F-4F79-B555-E5AE18EF9F5F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6126f:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8D5217E-9520-4FDB-9330-C8DC2CDDAA70",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6126t:*:*:*:*:*:*:*",
                     matchCriteriaId: "B206674F-1A34-470B-820C-05F9C37792CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6128:*:*:*:*:*:*:*",
                     matchCriteriaId: "63AE2051-9F8E-4477-8E1E-38A1E06AD247",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6130:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B39281F-990C-4AA3-9287-CCB5BA7E8AC8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6130f:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EDC0FCF-BD22-42AD-8044-9A64215B91CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6130t:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E0ED8AA-56D8-4CB6-A765-706BE87C9E30",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6132:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA890C07-7940-4DF4-96FB-8F71A2EFE5C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6134:*:*:*:*:*:*:*",
                     matchCriteriaId: "E95A34F0-0B74-4031-BC9E-CBC93665BE68",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6134m:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CD3CF38-0DDD-4C1C-B420-4DE0B1C932CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6136:*:*:*:*:*:*:*",
                     matchCriteriaId: "0BB22DF7-15CE-4340-A05F-BD39FCA41F50",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6138:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BA72DC8-2E4E-453A-A3FB-20F31D32B973",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6138f:*:*:*:*:*:*:*",
                     matchCriteriaId: "758E45B6-7C7A-432D-891D-CB99077AE3B5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6138t:*:*:*:*:*:*:*",
                     matchCriteriaId: "06B3CDFF-B055-4BB4-98FB-DFF4B2E63A29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6140:*:*:*:*:*:*:*",
                     matchCriteriaId: "26D7A401-BCE1-4673-93C9-67F009B75A39",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6140m:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E62119B-2A65-4473-B570-F118614B0ED6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6142:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E5319E0-909C-4688-AAA6-6A0B5D19FFDF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6142f:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F83F9F9-D2DB-4D40-AD61-29E66B050B45",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6142m:*:*:*:*:*:*:*",
                     matchCriteriaId: "91BE6238-312E-4CF7-9E74-48CB5603B0FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6144:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC09EB6D-7FAC-4B61-83A5-B0DC18D54EB3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6146:*:*:*:*:*:*:*",
                     matchCriteriaId: "33BA1BE0-0A78-4E94-A619-35735C913180",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6148:*:*:*:*:*:*:*",
                     matchCriteriaId: "3FDD838C-8037-49E1-BAB4-C1D7D29BB9D5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6148f:*:*:*:*:*:*:*",
                     matchCriteriaId: "24CA40FE-80C5-4A20-8219-CEF51F3162FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6150:*:*:*:*:*:*:*",
                     matchCriteriaId: "B10305C5-0C2C-48B7-A0AD-2B24AD722EBC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6152:*:*:*:*:*:*:*",
                     matchCriteriaId: "33E8F127-6EAE-4302-BD52-7C3FCCA307D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_gold:6154:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D675EA9-33E7-45ED-B6A9-7117AD2FEE26",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_phi:7210:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6E468FE-73BE-4B20-B774-58EC7CD20CDB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_phi:7210f:*:*:*:*:*:*:*",
                     matchCriteriaId: "0FF6B19B-7D45-44B3-8524-407253B93EEE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_phi:7230:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B803FAD-E54D-49FE-A078-029B8FFBBB98",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_phi:7230f:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC511505-ED67-45B4-B76C-56AB750C4408",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_phi:7235:*:*:*:*:*:*:*",
                     matchCriteriaId: "A430C232-79EB-4264-AE24-41D4A2A5D990",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_phi:7250:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A9E3D4B-A3DF-4858-8C64-0316B6E57435",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_phi:7250f:*:*:*:*:*:*:*",
                     matchCriteriaId: "19108672-E1AA-41CC-B86C-061D3721C8B8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_phi:7285:*:*:*:*:*:*:*",
                     matchCriteriaId: "200D36CF-AEDE-4183-8C54-748E6E5A3218",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_phi:7290:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CF13A44-5163-4282-8EE8-7DC05499B5E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_phi:7290f:*:*:*:*:*:*:*",
                     matchCriteriaId: "827C12CE-D87D-489D-ABA7-BE0405EC33D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_phi:7295:*:*:*:*:*:*:*",
                     matchCriteriaId: "16AA78F7-520B-4FFC-838C-DC74FEE8E13F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*",
                     matchCriteriaId: "8CB2949C-4699-49EF-83EB-31199E0CE2DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*",
                     matchCriteriaId: "66C169DC-EEFE-4DE6-A3D0-65B606527240",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD28227A-8888-43B2-BC41-8D54B49DA58C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*",
                     matchCriteriaId: "7984BAEA-4518-4E17-830E-B34D09648BD8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C2214E5-491E-448F-A4B6-A497FB44D722",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*",
                     matchCriteriaId: "2AE93013-C262-46A5-8E77-D647881EE632",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*",
                     matchCriteriaId: "85B53CEC-943F-4966-8EC1-CB2C6AD6A15B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*",
                     matchCriteriaId: "EEAC04A3-EBE3-406B-B784-A3547162ECE4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*",
                     matchCriteriaId: "15720FFE-B2A4-4347-BCD7-DFA6774C0B8F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*",
                     matchCriteriaId: "50F46B0E-C746-44B4-B343-E3DCAB4B98DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AE30903-4F75-4D71-A8BB-44D1099E9837",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*",
                     matchCriteriaId: "98311EAA-26C8-4092-8BE5-4E7BEAA68DD4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB8CF348-811C-4342-ACB9-AFCABCC34331",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*",
                     matchCriteriaId: "71998EC5-EC0F-496C-B658-3CD91D824944",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1F19B2A-E7A1-4B97-AC40-02B0D3673555",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB6387C9-C0A8-4B26-BC62-802775CD0AD3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*",
                     matchCriteriaId: "EFEB0164-77C2-4EC2-92FD-5FCE246119CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDB20210-337C-4220-8CA1-F4B2BC54EBC3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*",
                     matchCriteriaId: "F699569F-4F52-4CC0-90D9-CC4CBC32428A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBAED22B-D097-49C4-ADDF-4B3F3E1262D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*",
                     matchCriteriaId: "ACF5C3C2-EE69-4DE7-A76C-C797192EE7A1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*",
                     matchCriteriaId: "7756B588-5A63-4508-8BDD-92DB8CB0F4AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*",
                     matchCriteriaId: "316E26AE-67A5-4E75-8F9B-ECF4A03AED51",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:arm:cortex-a:8:*:*:*:*:*:*:*",
                     matchCriteriaId: "55E27011-7CEB-423B-A122-A0BFE563E884",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:arm:cortex-a:9:*:*:*:*:*:*:*",
                     matchCriteriaId: "A51E86F5-8F94-4E7C-9A63-DAA3FCBE0438",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:arm:cortex-a:12:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F2840B8-0E47-4003-9168-4AF94D7AB146",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:arm:cortex-a:15:*:*:*:*:*:*:*",
                     matchCriteriaId: "001AB619-157E-40B4-B86C-5DB18245D62F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:arm:cortex-a:17:*:*:*:*:*:*:*",
                     matchCriteriaId: "1221FB4F-488A-4A52-8788-82ECBF92113B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:arm:cortex-a:57:*:*:*:*:*:*:*",
                     matchCriteriaId: "38D51E27-28A3-47A1-9C36-1A223858E352",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:arm:cortex-a:72:*:*:*:*:*:*:*",
                     matchCriteriaId: "365DF3EF-E7D1-41FC-8382-D3B095542D59",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:arm:cortex-a:73:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0B2B122-34A9-4534-A996-8FEAACA71A05",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:arm:cortex-a:75:*:*:*:*:*:*:*",
                     matchCriteriaId: "C850453B-CDB1-490D-B551-9AC0B27D8A67",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:arm:cortex-a:76:*:*:*:*:*:*:*",
                     matchCriteriaId: "E46D6A37-5E4F-4DC0-BA02-6C9994FE1178",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:arm:cortex-r:7:*:*:*:*:*:*:*",
                     matchCriteriaId: "01849B7E-AA70-4301-AECB-81167DC03675",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:arm:cortex-r:8:*:*:*:*:*:*:*",
                     matchCriteriaId: "37960E0A-0D5B-4847-BD9C-E34C99FE7AAD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:oracle:communications_eagle_application_processor:16.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C0B6815-6F8F-422D-8A9C-2C22691787FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_eagle_application_processor:16.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B63EF130-191C-47A1-9D54-0AB3159EB303",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_lsms:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F361FE13-CB9B-4BBA-AB61-6EE2C5E9A6E5",
                     versionEndIncluding: "13.3",
                     versionStartIncluding: "13.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:schneider-electric:struxureware_data_center_expert:7.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8263DD50-D5F0-42BC-810E-A27155655154",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:netapp:solidfire_element_os_management_node:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AD8D649-8F3E-4B22-912C-FE94CDC88A67",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "142AD0DD-4CF3-4D74-9442-459CE3347E3A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "33C068A4-3780-4EAB-A937-6082DF847564",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "F96E3779-F56A-45FF-BB3D-4980527D721E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BBCD86A-E6C7-4444-9D74-F861084090F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "51EF4996-72F4-4FA4-814F-F5991E7A8318",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "D99A687E-EAE6-417E-A88E-D0082BC194CD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "B353CE99-D57C-465B-AAB0-73EF581127D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF77CDCF-B9C9-427D-B2BF-36650FB2148C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5F7E11E-FB34-4467-8919-2B6BEAABF665",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E5ED5807-55B7-47C5-97A6-03233F4FBC3A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "825ECE2D-E232-46E0-A047-074B34DB1E97",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fujitsu:m12-1_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "484B376F-23DA-4477-BFF5-174B9542E2DD",
                     versionEndExcluding: "xcp3090",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:fujitsu:m12-1:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE0CF40B-E5BD-4558-9321-184D58EF621D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fujitsu:m12-2_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2BDE31B-87D6-4DB8-BF36-AF35F5583A1D",
                     versionEndExcluding: "xcp3090",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:fujitsu:m12-2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F3C9C09-7B2B-4DB6-8BE0-35302ED35776",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fujitsu:m12-2s_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4507F493-1DA5-4F08-9D03-07E8961378B0",
                     versionEndExcluding: "xcp3090",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:fujitsu:m12-2s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "95503CE5-1D06-4092-A60D-D310AADCAFB1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a speculative buffer overflow and side-channel analysis.",
      },
      {
         lang: "es",
         value: "Los sistemas con microprocesadores que emplean la ejecución especulativa y la predicción de ramas podría permitir la divulgación no autorizada de información a un atacante con acceso de usuario local mediante un desbordamiento de búfer especulativo y el análisis de canal lateral.",
      },
   ],
   id: "CVE-2018-3693",
   lastModified: "2024-11-21T04:05:53.970",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.7,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:M/Au:N/C:C/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.4,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.6,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "CHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.1,
            impactScore: 4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-07-10T21:29:01.340",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2018:2384",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2018:2390",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2018:2395",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2019:1946",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2020:0174",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://cdrdv2.intel.com/v1/dl/getContent/685359",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20180823-0001/",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpujul2020.html",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2018:2384",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2018:2390",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2018:2395",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2019:1946",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2020:0174",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://cdrdv2.intel.com/v1/dl/getContent/685359",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20180823-0001/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpujul2020.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-03-21 21:29
Modified
2024-11-21 04:00
Summary
A Denial of Service vulnerability related to preemptive item deletion in lmgrd and vendor daemon components of FlexNet Publisher version 11.16.1.0 and earlier allows a remote attacker to send a combination of messages to lmgrd or the vendor daemon, causing the heartbeat between lmgrd and the vendor daemon to stop, and the vendor daemon to shut down.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:flexera:flexnet_publisher:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C7C03AE-8A93-4E82-B1EC-CEB6C4402FDF",
                     versionEndIncluding: "11.16.1.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:oracle:communications_lsms:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "806AF4AF-12FB-4222-84E4-BC9D44EFF09F",
                     versionEndIncluding: "13.4",
                     versionStartIncluding: "13.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A Denial of Service vulnerability related to preemptive item deletion in lmgrd and vendor daemon components of FlexNet Publisher version 11.16.1.0 and earlier allows a remote attacker to send a combination of messages to lmgrd or the vendor daemon, causing the heartbeat between lmgrd and the vendor daemon to stop, and the vendor daemon to shut down.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad de denegación de servicio (DoS) relacionada con la eliminación de ítems preferentes en los componentes del demonio lmgrd y del fabricante de FlexNet Publisher, en versiones 11.16.1.0 y anteriores, permite que un atacante remoto envíe una combinación de mensajes a los demonios lmgrd o del fabricante, haciendo que el latido entre los demonios lmgrd y del fabricante se detengan y el demonio del fabricante se cierre.",
      },
   ],
   id: "CVE-2018-20031",
   lastModified: "2024-11-21T04:00:47.747",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.5,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-03-21T21:29:00.310",
   references: [
      {
         source: "PSIRT-CNA@flexerasoftware.com",
         tags: [
            "Broken Link",
         ],
         url: "http://www.securityfocus.com/bid/109155",
      },
      {
         source: "PSIRT-CNA@flexerasoftware.com",
         tags: [
            "Not Applicable",
            "Vendor Advisory",
         ],
         url: "https://secuniaresearch.flexerasoftware.com/advisories/85979/",
      },
      {
         source: "PSIRT-CNA@flexerasoftware.com",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://www.securityfocus.com/bid/109155",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Not Applicable",
            "Vendor Advisory",
         ],
         url: "https://secuniaresearch.flexerasoftware.com/advisories/85979/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
      },
   ],
   sourceIdentifier: "PSIRT-CNA@flexerasoftware.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-06-05 14:15
Modified
2024-11-21 04:55
Summary
Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow.
References
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.htmlMailing List, Third Party Advisory
cve@mitre.orghttps://github.com/Perl/perl5/blob/blead/pod/perl5303delta.podThird Party Advisory
cve@mitre.orghttps://github.com/Perl/perl5/compare/v5.30.2...v5.30.3Third Party Advisory
cve@mitre.orghttps://github.com/perl/perl5/commit/897d1f7fd515b828e4b198d8b8bef76c6faf03edPatch, Third Party Advisory
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/
cve@mitre.orghttps://security.gentoo.org/glsa/202006-03Third Party Advisory
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20200611-0001/Third Party Advisory
cve@mitre.orghttps://www.oracle.com//security-alerts/cpujul2021.htmlPatch, Third Party Advisory
cve@mitre.orghttps://www.oracle.com/security-alerts/cpuApr2021.htmlPatch, Third Party Advisory
cve@mitre.orghttps://www.oracle.com/security-alerts/cpuapr2022.htmlPatch, Third Party Advisory
cve@mitre.orghttps://www.oracle.com/security-alerts/cpujan2021.htmlPatch, Third Party Advisory
cve@mitre.orghttps://www.oracle.com/security-alerts/cpujan2022.htmlPatch, Third Party Advisory
cve@mitre.orghttps://www.oracle.com/security-alerts/cpuoct2020.htmlPatch, Third Party Advisory
cve@mitre.orghttps://www.oracle.com/security-alerts/cpuoct2021.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.podThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/perl/perl5/commit/897d1f7fd515b828e4b198d8b8bef76c6faf03edPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202006-03Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20200611-0001/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com//security-alerts/cpujul2021.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpuApr2021.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpuapr2022.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpujan2021.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpujan2022.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpuoct2020.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpuoct2021.htmlPatch, Third Party Advisory



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:perl:perl:*:*:*:*:*:*:x86:*",
                     matchCriteriaId: "FF17E933-217A-4DDA-91C2-FEF2739550A1",
                     versionEndExcluding: "5.30.3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F0FA5D-8D3B-4C0E-81E2-87998286AF33",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B620311B-34A3-48A6-82DF-6F078D7A4493",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2ECD5E79-5C1B-42E9-BE0B-A034EE2D632D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E39D442D-1997-49AF-8B02-5640BE2A26CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C88D46AF-459D-4917-9403-0F63FEC83512",
                     versionEndIncluding: "8.5.0",
                     versionStartIncluding: "8.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_eagle_application_processor:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A0E3537-CB5A-40BF-B42C-CED9211B8892",
                     versionEndIncluding: "16.4.0",
                     versionStartIncluding: "16.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:10.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "996861FC-0089-4BED-8E46-F2B76037EA65",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:10.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "37764AF5-E42E-461E-AA43-763D21B3DCE2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:46.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "879FE18D-6B1C-4CF7-B409-C379E9F60D0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:46.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2BE3FB3-5619-4381-BE4E-FBADB3C747F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:46.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AB3C447-DA3F-44FF-91FD-8985C0527940",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_lsms:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "806AF4AF-12FB-4222-84E4-BC9D44EFF09F",
                     versionEndIncluding: "13.4",
                     versionStartIncluding: "13.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "49ACFC73-A509-4D1C-8FC3-F68F495AB055",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_performance_intelligence_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "977CA754-6CE0-4FCB-9683-D81B7A15449D",
                     versionEndIncluding: "10.3.0.2.1",
                     versionStartIncluding: "10.3.0.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_performance_intelligence_center:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "29A3F7EF-2A69-427F-9F75-DDDBEE34BA2B",
                     versionEndIncluding: "10.4.0.3.1",
                     versionStartIncluding: "10.4.0.1.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7B49D71-6A31-497A-B6A9-06E84F086E7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:configuration_manager:12.1.2.0.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "495DECD7-B14F-4D59-B3E1-30BF9B267475",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D26F3E23-F1A9-45E7-9E5F-0C0A24EE3783",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:sd-wan_edge:8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "78C99571-0F3C-43E6-84B3-7D80E045EF8E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:sd-wan_edge:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "77E39D5C-5EFA-4FEB-909E-0A92004F2563",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:sd-wan_edge:9.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "06816711-7C49-47B9-A9D7-FB18CC3F42F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:tekelec_platform_distribution:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "26F05F85-7458-4C8F-B93F-93C92E506A40",
                     versionEndIncluding: "7.7.1",
                     versionStartIncluding: "7.4.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow.",
      },
      {
         lang: "es",
         value: "Perl versiones anteriores a 5.30.3 en plataformas de 32 bits permite un desbordamiento del búfer en la región heap de la memoria porque los cuantificadores de expresiones regulares anidadas presentan un desbordamiento de enteros",
      },
   ],
   id: "CVE-2020-10543",
   lastModified: "2024-11-21T04:55:32.927",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 6.4,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.2,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 4.2,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-06-05T14:15:10.467",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/perl/perl5/commit/897d1f7fd515b828e4b198d8b8bef76c6faf03ed",
      },
      {
         source: "cve@mitre.org",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.gentoo.org/glsa/202006-03",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20200611-0001/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com//security-alerts/cpujul2021.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuApr2021.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuapr2022.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpujan2021.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpujan2022.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://github.com/perl/perl5/commit/897d1f7fd515b828e4b198d8b8bef76c6faf03ed",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.gentoo.org/glsa/202006-03",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20200611-0001/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com//security-alerts/cpujul2021.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuApr2021.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuapr2022.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpujan2021.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpujan2022.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-190",
            },
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2015-01-28 19:59
Modified
2025-04-12 10:46
Severity ?
Summary
Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."
References
secalert@redhat.comhttp://blogs.sophos.com/2015/01/29/sophos-products-and-the-ghost-vulnerability-affecting-linux/Third Party Advisory
secalert@redhat.comhttp://linux.oracle.com/errata/ELSA-2015-0090.htmlThird Party Advisory
secalert@redhat.comhttp://linux.oracle.com/errata/ELSA-2015-0092.htmlThird Party Advisory
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2015/Jun/msg00002.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2015/Oct/msg00005.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2015/Sep/msg00008.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=142296726407499&w=2Issue Tracking, Mailing List, Third Party Advisory
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=142721102728110&w=2Issue Tracking, Mailing List, Third Party Advisory
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=142721102728110&w=2Issue Tracking, Mailing List, Third Party Advisory
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=142722450701342&w=2Issue Tracking, Mailing List, Third Party Advisory
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=142781412222323&w=2Issue Tracking, Mailing List, Third Party Advisory
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=142781412222323&w=2Issue Tracking, Mailing List, Third Party Advisory
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=143145428124857&w=2Issue Tracking, Mailing List, Third Party Advisory
secalert@redhat.comhttp://packetstormsecurity.com/files/130171/Exim-ESMTP-GHOST-Denial-Of-Service.htmlExploit, Third Party Advisory, VDB Entry
secalert@redhat.comhttp://packetstormsecurity.com/files/130768/EMC-Secure-Remote-Services-GHOST-SQL-Injection-Command-Injection.htmlThird Party Advisory, VDB Entry
secalert@redhat.comhttp://packetstormsecurity.com/files/130974/Exim-GHOST-glibc-gethostbyname-Buffer-Overflow.htmlExploit, Third Party Advisory, VDB Entry
secalert@redhat.comhttp://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.htmlExploit, Third Party Advisory, VDB Entry
secalert@redhat.comhttp://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.htmlExploit, Third Party Advisory, VDB Entry
secalert@redhat.comhttp://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.htmlExploit, Third Party Advisory, VDB Entry
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2015-0126.htmlThird Party Advisory
secalert@redhat.comhttp://seclists.org/fulldisclosure/2015/Jan/111Mailing List, Third Party Advisory
secalert@redhat.comhttp://seclists.org/fulldisclosure/2019/Jun/18Exploit, Mailing List, Third Party Advisory
secalert@redhat.comhttp://seclists.org/fulldisclosure/2021/Sep/0Exploit, Mailing List, Third Party Advisory
secalert@redhat.comhttp://seclists.org/fulldisclosure/2022/Jun/36Exploit, Mailing List, Third Party Advisory
secalert@redhat.comhttp://seclists.org/oss-sec/2015/q1/269Mailing List, Third Party Advisory
secalert@redhat.comhttp://seclists.org/oss-sec/2015/q1/274Exploit, Mailing List, Third Party Advisory
secalert@redhat.comhttp://secunia.com/advisories/62517Not Applicable
secalert@redhat.comhttp://secunia.com/advisories/62640Not Applicable
secalert@redhat.comhttp://secunia.com/advisories/62667Not Applicable
secalert@redhat.comhttp://secunia.com/advisories/62680Not Applicable
secalert@redhat.comhttp://secunia.com/advisories/62681Not Applicable
secalert@redhat.comhttp://secunia.com/advisories/62688Not Applicable
secalert@redhat.comhttp://secunia.com/advisories/62690Not Applicable
secalert@redhat.comhttp://secunia.com/advisories/62691Not Applicable
secalert@redhat.comhttp://secunia.com/advisories/62692Not Applicable
secalert@redhat.comhttp://secunia.com/advisories/62698Not Applicable
secalert@redhat.comhttp://secunia.com/advisories/62715Not Applicable
secalert@redhat.comhttp://secunia.com/advisories/62758Not Applicable
secalert@redhat.comhttp://secunia.com/advisories/62812Not Applicable
secalert@redhat.comhttp://secunia.com/advisories/62813Not Applicable
secalert@redhat.comhttp://secunia.com/advisories/62816Not Applicable
secalert@redhat.comhttp://secunia.com/advisories/62865Not Applicable
secalert@redhat.comhttp://secunia.com/advisories/62870Not Applicable
secalert@redhat.comhttp://secunia.com/advisories/62871Not Applicable
secalert@redhat.comhttp://secunia.com/advisories/62879Not Applicable
secalert@redhat.comhttp://secunia.com/advisories/62883Not Applicable
secalert@redhat.comhttp://support.apple.com/kb/HT204942Third Party Advisory
secalert@redhat.comhttp://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150128-ghostThird Party Advisory
secalert@redhat.comhttp://www-01.ibm.com/support/docview.wss?uid=swg21695695Third Party Advisory
secalert@redhat.comhttp://www-01.ibm.com/support/docview.wss?uid=swg21695774Third Party Advisory
secalert@redhat.comhttp://www-01.ibm.com/support/docview.wss?uid=swg21695835Third Party Advisory
secalert@redhat.comhttp://www-01.ibm.com/support/docview.wss?uid=swg21695860Third Party Advisory
secalert@redhat.comhttp://www-01.ibm.com/support/docview.wss?uid=swg21696131Third Party Advisory
secalert@redhat.comhttp://www-01.ibm.com/support/docview.wss?uid=swg21696243Third Party Advisory
secalert@redhat.comhttp://www-01.ibm.com/support/docview.wss?uid=swg21696526Third Party Advisory
secalert@redhat.comhttp://www-01.ibm.com/support/docview.wss?uid=swg21696600Third Party Advisory
secalert@redhat.comhttp://www-01.ibm.com/support/docview.wss?uid=swg21696602Third Party Advisory
secalert@redhat.comhttp://www-01.ibm.com/support/docview.wss?uid=swg21696618Third Party Advisory
secalert@redhat.comhttp://www.debian.org/security/2015/dsa-3142Third Party Advisory
secalert@redhat.comhttp://www.idirect.net/Partners/~/media/Files/CVE/iDirect-Posted-Common-Vulnerabilities-and-Exposures.pdfBroken Link, URL Repurposed
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2015:039Third Party Advisory
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2021/05/04/7Exploit, Mailing List
secalert@redhat.comhttp://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.htmlPatch, Third Party Advisory
secalert@redhat.comhttp://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.htmlPatch, Third Party Advisory
secalert@redhat.comhttp://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.htmlPatch, Third Party Advisory
secalert@redhat.comhttp://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.htmlPatch, Third Party Advisory
secalert@redhat.comhttp://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.htmlPatch, Third Party Advisory
secalert@redhat.comhttp://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.htmlThird Party Advisory
secalert@redhat.comhttp://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.htmlThird Party Advisory
secalert@redhat.comhttp://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.htmlThird Party Advisory
secalert@redhat.comhttp://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.htmlThird Party Advisory
secalert@redhat.comhttp://www.securityfocus.com/archive/1/534845/100/0/threadedExploit, Third Party Advisory, VDB Entry
secalert@redhat.comhttp://www.securityfocus.com/bid/72325Third Party Advisory, VDB Entry
secalert@redhat.comhttp://www.securityfocus.com/bid/91787Third Party Advisory, VDB Entry
secalert@redhat.comhttp://www.securitytracker.com/id/1032909Third Party Advisory, VDB Entry
secalert@redhat.comhttp://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0Broken Link, Permissions Required
secalert@redhat.comhttps://bto.bluecoat.com/security-advisory/sa90Third Party Advisory
secalert@redhat.comhttps://cert-portal.siemens.com/productcert/pdf/ssa-994726.pdfThird Party Advisory
secalert@redhat.comhttps://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/27/the-ghost-vulnerabilityThird Party Advisory
secalert@redhat.comhttps://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04874668Third Party Advisory
secalert@redhat.comhttps://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+FixesThird Party Advisory
secalert@redhat.comhttps://kb.juniper.net/InfoCenter/index?page=content&id=JSA10671Third Party Advisory
secalert@redhat.comhttps://kc.mcafee.com/corporate/index?page=content&id=SB10100Third Party Advisory
secalert@redhat.comhttps://seclists.org/bugtraq/2019/Jun/14Exploit, Mailing List, Third Party Advisory
secalert@redhat.comhttps://security.gentoo.org/glsa/201503-04Third Party Advisory
secalert@redhat.comhttps://security.netapp.com/advisory/ntap-20150127-0001/Third Party Advisory
secalert@redhat.comhttps://support.apple.com/HT205267Third Party Advisory
secalert@redhat.comhttps://support.apple.com/HT205375Third Party Advisory
secalert@redhat.comhttps://www.arista.com/en/support/advisories-notices/security-advisories/1053-security-advisory-9Third Party Advisory
secalert@redhat.comhttps://www.f-secure.com/en/web/labs_global/fsc-2015-1Third Party Advisory
secalert@redhat.comhttps://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txtThird Party Advisory
secalert@redhat.comhttps://www.sophos.com/en-us/support/knowledgebase/121879.aspxThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://blogs.sophos.com/2015/01/29/sophos-products-and-the-ghost-vulnerability-affecting-linux/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://linux.oracle.com/errata/ELSA-2015-0090.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://linux.oracle.com/errata/ELSA-2015-0092.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=142296726407499&w=2Issue Tracking, Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=142721102728110&w=2Issue Tracking, Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=142721102728110&w=2Issue Tracking, Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=142722450701342&w=2Issue Tracking, Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=142781412222323&w=2Issue Tracking, Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=142781412222323&w=2Issue Tracking, Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=143145428124857&w=2Issue Tracking, Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/130171/Exim-ESMTP-GHOST-Denial-Of-Service.htmlExploit, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/130768/EMC-Secure-Remote-Services-GHOST-SQL-Injection-Command-Injection.htmlThird Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/130974/Exim-GHOST-glibc-gethostbyname-Buffer-Overflow.htmlExploit, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.htmlExploit, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.htmlExploit, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.htmlExploit, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-0126.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/fulldisclosure/2015/Jan/111Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/fulldisclosure/2019/Jun/18Exploit, Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/fulldisclosure/2021/Sep/0Exploit, Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/fulldisclosure/2022/Jun/36Exploit, Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/oss-sec/2015/q1/269Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/oss-sec/2015/q1/274Exploit, Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/62517Not Applicable
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/62640Not Applicable
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/62667Not Applicable
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/62680Not Applicable
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/62681Not Applicable
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/62688Not Applicable
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/62690Not Applicable
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/62691Not Applicable
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/62692Not Applicable
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/62698Not Applicable
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/62715Not Applicable
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/62758Not Applicable
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/62812Not Applicable
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/62813Not Applicable
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/62816Not Applicable
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/62865Not Applicable
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/62870Not Applicable
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/62871Not Applicable
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/62879Not Applicable
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/62883Not Applicable
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT204942Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150128-ghostThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www-01.ibm.com/support/docview.wss?uid=swg21695695Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www-01.ibm.com/support/docview.wss?uid=swg21695774Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www-01.ibm.com/support/docview.wss?uid=swg21695835Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www-01.ibm.com/support/docview.wss?uid=swg21695860Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www-01.ibm.com/support/docview.wss?uid=swg21696131Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www-01.ibm.com/support/docview.wss?uid=swg21696243Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www-01.ibm.com/support/docview.wss?uid=swg21696526Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www-01.ibm.com/support/docview.wss?uid=swg21696600Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www-01.ibm.com/support/docview.wss?uid=swg21696602Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www-01.ibm.com/support/docview.wss?uid=swg21696618Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2015/dsa-3142Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.idirect.net/Partners/~/media/Files/CVE/iDirect-Posted-Common-Vulnerabilities-and-Exposures.pdfBroken Link, URL Repurposed
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2015:039Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2021/05/04/7Exploit, Mailing List
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/534845/100/0/threadedExploit, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/72325Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/91787Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1032909Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0Broken Link, Permissions Required
af854a3a-2127-422b-91ae-364da2661108https://bto.bluecoat.com/security-advisory/sa90Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://cert-portal.siemens.com/productcert/pdf/ssa-994726.pdfThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/27/the-ghost-vulnerabilityThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04874668Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+FixesThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10671Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://kc.mcafee.com/corporate/index?page=content&id=SB10100Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://seclists.org/bugtraq/2019/Jun/14Exploit, Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201503-04Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20150127-0001/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://support.apple.com/HT205267Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://support.apple.com/HT205375Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.arista.com/en/support/advisories-notices/security-advisories/1053-security-advisory-9Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.f-secure.com/en/web/labs_global/fsc-2015-1Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txtThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.sophos.com/en-us/support/knowledgebase/121879.aspxThird Party Advisory



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "66C0FCBE-FCED-4169-AEED-E70F5B34094D",
                     versionEndExcluding: "2.18",
                     versionStartIncluding: "2.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:oracle:communications_application_session_controller:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "03E73D34-9239-46F7-9E98-4132964B2CD8",
                     versionEndExcluding: "3.7.1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_eagle_application_processor:16.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9FDB6EE-EC5D-44F2-AEA0-0B605D5C6742",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D195BC4C-DAC2-4C71-B83B-4149E86B5F42",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_lsms:13.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E14AECDA-5C63-40F0-81FF-17BBFA487577",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_policy_management:9.7.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CFEA80F-FC5D-4DAA-8810-3C26F6D8377F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_policy_management:9.9.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C1B1DA1-CB11-42D6-9F28-C1588A7A7D45",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_policy_management:10.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "F696923E-E5AB-4473-B404-A6CCB33B6DB8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_policy_management:11.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "6234C878-15CE-4B71-B825-DA088554A2FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_policy_management:12.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE69A446-E765-4141-83F6-B58EA7E3783A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_session_border_controller:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "11A5042B-79F8-4A86-996A-F56B925AAA05",
                     versionEndExcluding: "7.2.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_session_border_controller:7.2.0:-:*:*:*:*:*:*",
                     matchCriteriaId: "1F38C38F-5669-448C-9566-783BEC7AB04B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F59AE20-7B9D-47A5-9E0D-A73F4A0E7D34",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_user_data_repository:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D37A84E-1FC0-43B2-A8E5-A8E3B26EF0E0",
                     versionEndIncluding: "10.0.1",
                     versionStartIncluding: "10.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_webrtc_session_controller:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "EFDB5ADE-F4DF-4054-8628-5EF6C5DB864B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_webrtc_session_controller:7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "59C4F882-5B42-43E6-9CCC-D2AB23117A7C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "726DB59B-00C7-444E-83F7-CB31032482AB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:exalogic_infrastructure:1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB059A52-DE6D-47FB-98E8-5A788E1C0FC0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:exalogic_infrastructure:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D70580AD-2134-49D3-BE15-020023A10E87",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "90F6AEA6-D52A-4655-9B89-CE5F8AA21E95",
                     versionEndExcluding: "5.1.24",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*",
                     matchCriteriaId: "62A2AC02-A933-4E51-810E-5D040B476B7B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:oracle:linux:7:0:*:*:*:*:*:*",
                     matchCriteriaId: "D1137279-81F0-4F6B-8E91-95590106BADF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "16F59A04-14CF-49E2-9973-645477EA09DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:redhat:virtualization:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "37BA55FC-D350-4DEB-9802-40AF59C99E79",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC5E0720-43A6-4E46-83B2-A9C228824AB3",
                     versionEndExcluding: "10.11.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:ibm:pureapplication_system:1.0.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D7AB60B-E38B-42C7-B785-D9520C1F5564",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:pureapplication_system:1.1.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D657332-C9B9-4E7B-89D9-5AEF3501141A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:pureapplication_system:2.0.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "575894EE-F13C-4D56-8B63-59A379F63BD2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:ibm:security_access_manager_for_enterprise_single_sign-on:8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "18430B37-84B3-4B88-A256-7BE9B48A3A52",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "82D9C83C-2968-4C63-851D-AE8DBEF02296",
                     versionEndExcluding: "5.4.38",
                     versionStartIncluding: "5.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B70DA5B9-36FC-44F1-A372-4A736D1CB043",
                     versionEndExcluding: "5.5.22",
                     versionStartIncluding: "5.5.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E88B9450-0A63-4FEA-98FE-AE92F7E54AA9",
                     versionEndExcluding: "5.6.6",
                     versionStartIncluding: "5.6.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka \"GHOST.\"",
      },
      {
         lang: "es",
         value: "Desbordamiento de buffer basado en memoria dinámica en la función __nss_hostname_digits_dots en glibc 2.2, y otras versiones 2.x anteriores a 2.18, permite a atacantes dependientes de contexto ejecutar código arbitrario a través de vectores relacionados con la funciín (1) gethostbyname o (2) gethostbyname2, también conocido como 'GHOST.'",
      },
   ],
   id: "CVE-2015-0235",
   lastModified: "2025-04-12T10:46:40.837",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 10,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2015-01-28T19:59:00.063",
   references: [
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://blogs.sophos.com/2015/01/29/sophos-products-and-the-ghost-vulnerability-affecting-linux/",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://linux.oracle.com/errata/ELSA-2015-0090.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://linux.oracle.com/errata/ELSA-2015-0092.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Issue Tracking",
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://marc.info/?l=bugtraq&m=142296726407499&w=2",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Issue Tracking",
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://marc.info/?l=bugtraq&m=142721102728110&w=2",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Issue Tracking",
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://marc.info/?l=bugtraq&m=142721102728110&w=2",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Issue Tracking",
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://marc.info/?l=bugtraq&m=142722450701342&w=2",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Issue Tracking",
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://marc.info/?l=bugtraq&m=142781412222323&w=2",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Issue Tracking",
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://marc.info/?l=bugtraq&m=142781412222323&w=2",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Issue Tracking",
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://marc.info/?l=bugtraq&m=143145428124857&w=2",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/130171/Exim-ESMTP-GHOST-Denial-Of-Service.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/130768/EMC-Secure-Remote-Services-GHOST-SQL-Injection-Command-Injection.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/130974/Exim-GHOST-glibc-gethostbyname-Buffer-Overflow.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2015-0126.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://seclists.org/fulldisclosure/2015/Jan/111",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Exploit",
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://seclists.org/fulldisclosure/2019/Jun/18",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Exploit",
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://seclists.org/fulldisclosure/2021/Sep/0",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Exploit",
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://seclists.org/fulldisclosure/2022/Jun/36",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://seclists.org/oss-sec/2015/q1/269",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Exploit",
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://seclists.org/oss-sec/2015/q1/274",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Not Applicable",
         ],
         url: "http://secunia.com/advisories/62517",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Not Applicable",
         ],
         url: "http://secunia.com/advisories/62640",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Not Applicable",
         ],
         url: "http://secunia.com/advisories/62667",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Not Applicable",
         ],
         url: "http://secunia.com/advisories/62680",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Not Applicable",
         ],
         url: "http://secunia.com/advisories/62681",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Not Applicable",
         ],
         url: "http://secunia.com/advisories/62688",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Not Applicable",
         ],
         url: "http://secunia.com/advisories/62690",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Not Applicable",
         ],
         url: "http://secunia.com/advisories/62691",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Not Applicable",
         ],
         url: "http://secunia.com/advisories/62692",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Not Applicable",
         ],
         url: "http://secunia.com/advisories/62698",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Not Applicable",
         ],
         url: "http://secunia.com/advisories/62715",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Not Applicable",
         ],
         url: "http://secunia.com/advisories/62758",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Not Applicable",
         ],
         url: "http://secunia.com/advisories/62812",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Not Applicable",
         ],
         url: "http://secunia.com/advisories/62813",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Not Applicable",
         ],
         url: "http://secunia.com/advisories/62816",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Not Applicable",
         ],
         url: "http://secunia.com/advisories/62865",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Not Applicable",
         ],
         url: "http://secunia.com/advisories/62870",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Not Applicable",
         ],
         url: "http://secunia.com/advisories/62871",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Not Applicable",
         ],
         url: "http://secunia.com/advisories/62879",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Not Applicable",
         ],
         url: "http://secunia.com/advisories/62883",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://support.apple.com/kb/HT204942",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150128-ghost",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www-01.ibm.com/support/docview.wss?uid=swg21695695",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www-01.ibm.com/support/docview.wss?uid=swg21695774",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www-01.ibm.com/support/docview.wss?uid=swg21695835",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www-01.ibm.com/support/docview.wss?uid=swg21695860",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www-01.ibm.com/support/docview.wss?uid=swg21696131",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www-01.ibm.com/support/docview.wss?uid=swg21696243",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www-01.ibm.com/support/docview.wss?uid=swg21696526",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www-01.ibm.com/support/docview.wss?uid=swg21696600",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www-01.ibm.com/support/docview.wss?uid=swg21696602",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www-01.ibm.com/support/docview.wss?uid=swg21696618",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.debian.org/security/2015/dsa-3142",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Broken Link",
            "URL Repurposed",
         ],
         url: "http://www.idirect.net/Partners/~/media/Files/CVE/iDirect-Posted-Common-Vulnerabilities-and-Exposures.pdf",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:039",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Exploit",
            "Mailing List",
         ],
         url: "http://www.openwall.com/lists/oss-security/2021/05/04/7",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/archive/1/534845/100/0/threaded",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/72325",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/91787",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1032909",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Broken Link",
            "Permissions Required",
         ],
         url: "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://bto.bluecoat.com/security-advisory/sa90",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://cert-portal.siemens.com/productcert/pdf/ssa-994726.pdf",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/27/the-ghost-vulnerability",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04874668",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10671",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10100",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Exploit",
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://seclists.org/bugtraq/2019/Jun/14",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.gentoo.org/glsa/201503-04",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20150127-0001/",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://support.apple.com/HT205267",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://support.apple.com/HT205375",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.arista.com/en/support/advisories-notices/security-advisories/1053-security-advisory-9",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.f-secure.com/en/web/labs_global/fsc-2015-1",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.sophos.com/en-us/support/knowledgebase/121879.aspx",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://blogs.sophos.com/2015/01/29/sophos-products-and-the-ghost-vulnerability-affecting-linux/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://linux.oracle.com/errata/ELSA-2015-0090.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://linux.oracle.com/errata/ELSA-2015-0092.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://marc.info/?l=bugtraq&m=142296726407499&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://marc.info/?l=bugtraq&m=142721102728110&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://marc.info/?l=bugtraq&m=142721102728110&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://marc.info/?l=bugtraq&m=142722450701342&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://marc.info/?l=bugtraq&m=142781412222323&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://marc.info/?l=bugtraq&m=142781412222323&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Issue Tracking",
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://marc.info/?l=bugtraq&m=143145428124857&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/130171/Exim-ESMTP-GHOST-Denial-Of-Service.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/130768/EMC-Secure-Remote-Services-GHOST-SQL-Injection-Command-Injection.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/130974/Exim-GHOST-glibc-gethostbyname-Buffer-Overflow.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://rhn.redhat.com/errata/RHSA-2015-0126.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://seclists.org/fulldisclosure/2015/Jan/111",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://seclists.org/fulldisclosure/2019/Jun/18",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://seclists.org/fulldisclosure/2021/Sep/0",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://seclists.org/fulldisclosure/2022/Jun/36",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://seclists.org/oss-sec/2015/q1/269",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://seclists.org/oss-sec/2015/q1/274",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Not Applicable",
         ],
         url: "http://secunia.com/advisories/62517",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Not Applicable",
         ],
         url: "http://secunia.com/advisories/62640",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Not Applicable",
         ],
         url: "http://secunia.com/advisories/62667",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Not Applicable",
         ],
         url: "http://secunia.com/advisories/62680",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Not Applicable",
         ],
         url: "http://secunia.com/advisories/62681",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Not Applicable",
         ],
         url: "http://secunia.com/advisories/62688",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Not Applicable",
         ],
         url: "http://secunia.com/advisories/62690",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Not Applicable",
         ],
         url: "http://secunia.com/advisories/62691",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Not Applicable",
         ],
         url: "http://secunia.com/advisories/62692",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Not Applicable",
         ],
         url: "http://secunia.com/advisories/62698",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Not Applicable",
         ],
         url: "http://secunia.com/advisories/62715",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Not Applicable",
         ],
         url: "http://secunia.com/advisories/62758",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Not Applicable",
         ],
         url: "http://secunia.com/advisories/62812",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Not Applicable",
         ],
         url: "http://secunia.com/advisories/62813",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Not Applicable",
         ],
         url: "http://secunia.com/advisories/62816",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Not Applicable",
         ],
         url: "http://secunia.com/advisories/62865",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Not Applicable",
         ],
         url: "http://secunia.com/advisories/62870",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Not Applicable",
         ],
         url: "http://secunia.com/advisories/62871",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Not Applicable",
         ],
         url: "http://secunia.com/advisories/62879",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Not Applicable",
         ],
         url: "http://secunia.com/advisories/62883",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://support.apple.com/kb/HT204942",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150128-ghost",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www-01.ibm.com/support/docview.wss?uid=swg21695695",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www-01.ibm.com/support/docview.wss?uid=swg21695774",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www-01.ibm.com/support/docview.wss?uid=swg21695835",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www-01.ibm.com/support/docview.wss?uid=swg21695860",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www-01.ibm.com/support/docview.wss?uid=swg21696131",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www-01.ibm.com/support/docview.wss?uid=swg21696243",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www-01.ibm.com/support/docview.wss?uid=swg21696526",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www-01.ibm.com/support/docview.wss?uid=swg21696600",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www-01.ibm.com/support/docview.wss?uid=swg21696602",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www-01.ibm.com/support/docview.wss?uid=swg21696618",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.debian.org/security/2015/dsa-3142",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "URL Repurposed",
         ],
         url: "http://www.idirect.net/Partners/~/media/Files/CVE/iDirect-Posted-Common-Vulnerabilities-and-Exposures.pdf",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:039",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Mailing List",
         ],
         url: "http://www.openwall.com/lists/oss-security/2021/05/04/7",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/archive/1/534845/100/0/threaded",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/72325",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/91787",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id/1032909",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Permissions Required",
         ],
         url: "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://bto.bluecoat.com/security-advisory/sa90",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://cert-portal.siemens.com/productcert/pdf/ssa-994726.pdf",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/27/the-ghost-vulnerability",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04874668",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10671",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10100",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://seclists.org/bugtraq/2019/Jun/14",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.gentoo.org/glsa/201503-04",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20150127-0001/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://support.apple.com/HT205267",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://support.apple.com/HT205375",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.arista.com/en/support/advisories-notices/security-advisories/1053-security-advisory-9",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.f-secure.com/en/web/labs_global/fsc-2015-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.sophos.com/en-us/support/knowledgebase/121879.aspx",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}