Vulnerabilites related to slackware - slackware
cve-2019-11135
Vulnerability from cvelistv5
Published
2019-11-14 18:19
Modified
2024-08-04 22:48
Severity ?
Summary
TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.
References
https://seclists.org/bugtraq/2019/Nov/26mailing-list, x_refsource_BUGTRAQ
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00046.htmlvendor-advisory, x_refsource_SUSE
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00045.htmlvendor-advisory, x_refsource_SUSE
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5WWPW4BSZDDW7VHU427XTVXV7ROOFFW/vendor-advisory, x_refsource_FEDORA
https://access.redhat.com/errata/RHSA-2019:3936vendor-advisory, x_refsource_REDHAT
https://usn.ubuntu.com/4186-2/vendor-advisory, x_refsource_UBUNTU
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IZYATWNUGHRBG6I3TC24YHP5Y3J7I6KH/vendor-advisory, x_refsource_FEDORA
http://www.openwall.com/lists/oss-security/2019/12/10/3mailing-list, x_refsource_MLIST
http://www.openwall.com/lists/oss-security/2019/12/10/4mailing-list, x_refsource_MLIST
http://www.openwall.com/lists/oss-security/2019/12/11/1mailing-list, x_refsource_MLIST
https://seclists.org/bugtraq/2019/Dec/28mailing-list, x_refsource_BUGTRAQ
https://lists.debian.org/debian-lts-announce/2019/12/msg00035.htmlmailing-list, x_refsource_MLIST
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00042.htmlvendor-advisory, x_refsource_SUSE
https://access.redhat.com/errata/RHSA-2020:0026vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2020:0028vendor-advisory, x_refsource_REDHAT
https://www.debian.org/security/2020/dsa-4602vendor-advisory, x_refsource_DEBIAN
https://seclists.org/bugtraq/2020/Jan/21mailing-list, x_refsource_BUGTRAQ
https://access.redhat.com/errata/RHSA-2020:0204vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2020:0279vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2020:0366vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2020:0555vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2020:0666vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2020:0730vendor-advisory, x_refsource_REDHAT
https://security.gentoo.org/glsa/202003-56vendor-advisory, x_refsource_GENTOO
https://www.oracle.com/security-alerts/cpujan2021.htmlx_refsource_MISC
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.htmlx_refsource_MISC
https://support.f5.com/csp/article/K02912734?utm_source=f5support&amp%3Butm_medium=RSSx_refsource_CONFIRM
http://packetstormsecurity.com/files/155375/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.htmlx_refsource_MISC
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03968en_usx_refsource_CONFIRM
https://kc.mcafee.com/corporate/index?page=content&id=SB10306x_refsource_CONFIRM
Impacted products
Vendor Product Version
n/a 2019.2 IPU – TSX Asynchronous Abort Version: See provided reference
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T22:48:09.004Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "20191118 [slackware-security] Slackware 14.2 kernel (SSA:2019-320-01)",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "https://seclists.org/bugtraq/2019/Nov/26",
               },
               {
                  name: "openSUSE-SU-2019:2527",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00046.html",
               },
               {
                  name: "openSUSE-SU-2019:2528",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00045.html",
               },
               {
                  name: "FEDORA-2019-376ec5c107",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5WWPW4BSZDDW7VHU427XTVXV7ROOFFW/",
               },
               {
                  name: "RHSA-2019:3936",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2019:3936",
               },
               {
                  name: "USN-4186-2",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/4186-2/",
               },
               {
                  name: "FEDORA-2019-cbb732f760",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IZYATWNUGHRBG6I3TC24YHP5Y3J7I6KH/",
               },
               {
                  name: "[oss-security] 20191210 CVE-2019-19338 Kernel: KVM: export MSR_IA32_TSX_CTRL to guest - incomplete fix for TAA (CVE-2019-11135)",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2019/12/10/3",
               },
               {
                  name: "[oss-security] 20191210 Re: CVE-2019-19338 Kernel: KVM: export MSR_IA32_TSX_CTRL to guest - incomplete fix for TAA (CVE-2019-11135)",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2019/12/10/4",
               },
               {
                  name: "[oss-security] 20191211 Re: CVE-2019-19338 Kernel: KVM: export MSR_IA32_TSX_CTRL to guest - incomplete fix for TAA (CVE-2019-11135)",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2019/12/11/1",
               },
               {
                  name: "20191216 [SECURITY] [DSA 4565-2] intel-microcode security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "https://seclists.org/bugtraq/2019/Dec/28",
               },
               {
                  name: "[debian-lts-announce] 20191230 [SECURITY] [DLA 2051-1] intel-microcode security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2019/12/msg00035.html",
               },
               {
                  name: "openSUSE-SU-2019:2710",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00042.html",
               },
               {
                  name: "RHSA-2020:0026",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2020:0026",
               },
               {
                  name: "RHSA-2020:0028",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2020:0028",
               },
               {
                  name: "DSA-4602",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "https://www.debian.org/security/2020/dsa-4602",
               },
               {
                  name: "20200114 [SECURITY] [DSA 4602-1] xen security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "https://seclists.org/bugtraq/2020/Jan/21",
               },
               {
                  name: "RHSA-2020:0204",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2020:0204",
               },
               {
                  name: "RHSA-2020:0279",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2020:0279",
               },
               {
                  name: "RHSA-2020:0366",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2020:0366",
               },
               {
                  name: "RHSA-2020:0555",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2020:0555",
               },
               {
                  name: "RHSA-2020:0666",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2020:0666",
               },
               {
                  name: "RHSA-2020:0730",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2020:0730",
               },
               {
                  name: "GLSA-202003-56",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "https://security.gentoo.org/glsa/202003-56",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpujan2021.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://support.f5.com/csp/article/K02912734?utm_source=f5support&amp%3Butm_medium=RSS",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://packetstormsecurity.com/files/155375/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03968en_us",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10306",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "2019.2 IPU – TSX Asynchronous Abort",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "See provided reference",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-01-20T14:42:00",
            orgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
            shortName: "intel",
         },
         references: [
            {
               name: "20191118 [slackware-security] Slackware 14.2 kernel (SSA:2019-320-01)",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "https://seclists.org/bugtraq/2019/Nov/26",
            },
            {
               name: "openSUSE-SU-2019:2527",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00046.html",
            },
            {
               name: "openSUSE-SU-2019:2528",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00045.html",
            },
            {
               name: "FEDORA-2019-376ec5c107",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5WWPW4BSZDDW7VHU427XTVXV7ROOFFW/",
            },
            {
               name: "RHSA-2019:3936",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2019:3936",
            },
            {
               name: "USN-4186-2",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/4186-2/",
            },
            {
               name: "FEDORA-2019-cbb732f760",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IZYATWNUGHRBG6I3TC24YHP5Y3J7I6KH/",
            },
            {
               name: "[oss-security] 20191210 CVE-2019-19338 Kernel: KVM: export MSR_IA32_TSX_CTRL to guest - incomplete fix for TAA (CVE-2019-11135)",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2019/12/10/3",
            },
            {
               name: "[oss-security] 20191210 Re: CVE-2019-19338 Kernel: KVM: export MSR_IA32_TSX_CTRL to guest - incomplete fix for TAA (CVE-2019-11135)",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2019/12/10/4",
            },
            {
               name: "[oss-security] 20191211 Re: CVE-2019-19338 Kernel: KVM: export MSR_IA32_TSX_CTRL to guest - incomplete fix for TAA (CVE-2019-11135)",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2019/12/11/1",
            },
            {
               name: "20191216 [SECURITY] [DSA 4565-2] intel-microcode security update",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "https://seclists.org/bugtraq/2019/Dec/28",
            },
            {
               name: "[debian-lts-announce] 20191230 [SECURITY] [DLA 2051-1] intel-microcode security update",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2019/12/msg00035.html",
            },
            {
               name: "openSUSE-SU-2019:2710",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00042.html",
            },
            {
               name: "RHSA-2020:0026",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2020:0026",
            },
            {
               name: "RHSA-2020:0028",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2020:0028",
            },
            {
               name: "DSA-4602",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "https://www.debian.org/security/2020/dsa-4602",
            },
            {
               name: "20200114 [SECURITY] [DSA 4602-1] xen security update",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "https://seclists.org/bugtraq/2020/Jan/21",
            },
            {
               name: "RHSA-2020:0204",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2020:0204",
            },
            {
               name: "RHSA-2020:0279",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2020:0279",
            },
            {
               name: "RHSA-2020:0366",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2020:0366",
            },
            {
               name: "RHSA-2020:0555",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2020:0555",
            },
            {
               name: "RHSA-2020:0666",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2020:0666",
            },
            {
               name: "RHSA-2020:0730",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2020:0730",
            },
            {
               name: "GLSA-202003-56",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "https://security.gentoo.org/glsa/202003-56",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.oracle.com/security-alerts/cpujan2021.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://support.f5.com/csp/article/K02912734?utm_source=f5support&amp%3Butm_medium=RSS",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://packetstormsecurity.com/files/155375/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03968en_us",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10306",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "secure@intel.com",
               ID: "CVE-2019-11135",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "2019.2 IPU – TSX Asynchronous Abort",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "See provided reference",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "20191118 [slackware-security] Slackware 14.2 kernel (SSA:2019-320-01)",
                     refsource: "BUGTRAQ",
                     url: "https://seclists.org/bugtraq/2019/Nov/26",
                  },
                  {
                     name: "openSUSE-SU-2019:2527",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00046.html",
                  },
                  {
                     name: "openSUSE-SU-2019:2528",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00045.html",
                  },
                  {
                     name: "FEDORA-2019-376ec5c107",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I5WWPW4BSZDDW7VHU427XTVXV7ROOFFW/",
                  },
                  {
                     name: "RHSA-2019:3936",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2019:3936",
                  },
                  {
                     name: "USN-4186-2",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/4186-2/",
                  },
                  {
                     name: "FEDORA-2019-cbb732f760",
                     refsource: "FEDORA",
                     url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZYATWNUGHRBG6I3TC24YHP5Y3J7I6KH/",
                  },
                  {
                     name: "[oss-security] 20191210 CVE-2019-19338 Kernel: KVM: export MSR_IA32_TSX_CTRL to guest - incomplete fix for TAA (CVE-2019-11135)",
                     refsource: "MLIST",
                     url: "http://www.openwall.com/lists/oss-security/2019/12/10/3",
                  },
                  {
                     name: "[oss-security] 20191210 Re: CVE-2019-19338 Kernel: KVM: export MSR_IA32_TSX_CTRL to guest - incomplete fix for TAA (CVE-2019-11135)",
                     refsource: "MLIST",
                     url: "http://www.openwall.com/lists/oss-security/2019/12/10/4",
                  },
                  {
                     name: "[oss-security] 20191211 Re: CVE-2019-19338 Kernel: KVM: export MSR_IA32_TSX_CTRL to guest - incomplete fix for TAA (CVE-2019-11135)",
                     refsource: "MLIST",
                     url: "http://www.openwall.com/lists/oss-security/2019/12/11/1",
                  },
                  {
                     name: "20191216 [SECURITY] [DSA 4565-2] intel-microcode security update",
                     refsource: "BUGTRAQ",
                     url: "https://seclists.org/bugtraq/2019/Dec/28",
                  },
                  {
                     name: "[debian-lts-announce] 20191230 [SECURITY] [DLA 2051-1] intel-microcode security update",
                     refsource: "MLIST",
                     url: "https://lists.debian.org/debian-lts-announce/2019/12/msg00035.html",
                  },
                  {
                     name: "openSUSE-SU-2019:2710",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00042.html",
                  },
                  {
                     name: "RHSA-2020:0026",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2020:0026",
                  },
                  {
                     name: "RHSA-2020:0028",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2020:0028",
                  },
                  {
                     name: "DSA-4602",
                     refsource: "DEBIAN",
                     url: "https://www.debian.org/security/2020/dsa-4602",
                  },
                  {
                     name: "20200114 [SECURITY] [DSA 4602-1] xen security update",
                     refsource: "BUGTRAQ",
                     url: "https://seclists.org/bugtraq/2020/Jan/21",
                  },
                  {
                     name: "RHSA-2020:0204",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2020:0204",
                  },
                  {
                     name: "RHSA-2020:0279",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2020:0279",
                  },
                  {
                     name: "RHSA-2020:0366",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2020:0366",
                  },
                  {
                     name: "RHSA-2020:0555",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2020:0555",
                  },
                  {
                     name: "RHSA-2020:0666",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2020:0666",
                  },
                  {
                     name: "RHSA-2020:0730",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2020:0730",
                  },
                  {
                     name: "GLSA-202003-56",
                     refsource: "GENTOO",
                     url: "https://security.gentoo.org/glsa/202003-56",
                  },
                  {
                     name: "https://www.oracle.com/security-alerts/cpujan2021.html",
                     refsource: "MISC",
                     url: "https://www.oracle.com/security-alerts/cpujan2021.html",
                  },
                  {
                     name: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
                     refsource: "MISC",
                     url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
                  },
                  {
                     name: "https://support.f5.com/csp/article/K02912734?utm_source=f5support&utm_medium=RSS",
                     refsource: "CONFIRM",
                     url: "https://support.f5.com/csp/article/K02912734?utm_source=f5support&utm_medium=RSS",
                  },
                  {
                     name: "http://packetstormsecurity.com/files/155375/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html",
                     refsource: "MISC",
                     url: "http://packetstormsecurity.com/files/155375/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html",
                  },
                  {
                     name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03968en_us",
                     refsource: "CONFIRM",
                     url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03968en_us",
                  },
                  {
                     name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10306",
                     refsource: "CONFIRM",
                     url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10306",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "6dda929c-bb53-4a77-a76d-48e79601a1ce",
      assignerShortName: "intel",
      cveId: "CVE-2019-11135",
      datePublished: "2019-11-14T18:19:25",
      dateReserved: "2019-04-11T00:00:00",
      dateUpdated: "2024-08-04T22:48:09.004Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2007-3798
Vulnerability from cvelistv5
Published
2007-07-16 22:00
Modified
2024-10-15 14:18
Severity ?
Summary
Integer overflow in print-bgp.c in the BGP dissector in tcpdump 3.9.6 and earlier allows remote attackers to execute arbitrary code via crafted TLVs in a BGP packet, related to an unchecked return value.
References
http://www.redhat.com/support/errata/RHSA-2007-0387.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/26231third-party-advisory, x_refsource_SECUNIA
http://www.novell.com/linux/security/advisories/2007_16_sr.htmlvendor-advisory, x_refsource_SUSE
http://www.vupen.com/english/advisories/2007/4238vdb-entry, x_refsource_VUPEN
http://www.us-cert.gov/cas/techalerts/TA07-352A.htmlthird-party-advisory, x_refsource_CERT
http://secunia.com/advisories/26168third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/27580third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/28136third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/26286third-party-advisory, x_refsource_SECUNIA
http://www.digit-labs.org/files/exploits/private/tcpdump-bgp.cx_refsource_MISC
http://bugs.gentoo.org/show_bug.cgi?id=184815x_refsource_CONFIRM
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.449313vendor-advisory, x_refsource_SLACKWARE
http://www.mandriva.com/security/advisories?name=MDKSA-2007:148vendor-advisory, x_refsource_MANDRIVA
http://www.securitytracker.com/id?1018434vdb-entry, x_refsource_SECTRACK
http://www.redhat.com/support/errata/RHSA-2007-0368.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/26263third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/474225/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/26223third-party-advisory, x_refsource_SECUNIA
http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.htmlvendor-advisory, x_refsource_APPLE
http://www.trustix.org/errata/2007/0023/vendor-advisory, x_refsource_TRUSTIX
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9771vdb-entry, signature, x_refsource_OVAL
http://security.freebsd.org/advisories/FreeBSD-SA-07:06.tcpdump.ascvendor-advisory, x_refsource_FREEBSD
http://cvs.tcpdump.org/cgi-bin/cvsweb/tcpdump/print-bgp.c?r1=1.91.2.11&r2=1.91.2.12x_refsource_MISC
http://docs.info.apple.com/article.html?artnum=307179x_refsource_CONFIRM
http://secunia.com/advisories/26395third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/26266third-party-advisory, x_refsource_SECUNIA
http://www.turbolinux.com/security/2007/TLSA-2007-46.txtvendor-advisory, x_refsource_TURBO
http://secunia.com/advisories/26521third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2007/2578vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/26404third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/26135third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/usn-492-1vendor-advisory, x_refsource_UBUNTU
http://www.debian.org/security/2007/dsa-1353vendor-advisory, x_refsource_DEBIAN
http://security.gentoo.org/glsa/glsa-200707-14.xmlvendor-advisory, x_refsource_GENTOO
http://www.securityfocus.com/bid/24965vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T14:28:52.458Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "RHSA-2007:0387",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2007-0387.html",
               },
               {
                  name: "26231",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/26231",
               },
               {
                  name: "SUSE-SR:2007:016",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://www.novell.com/linux/security/advisories/2007_16_sr.html",
               },
               {
                  name: "ADV-2007-4238",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2007/4238",
               },
               {
                  name: "TA07-352A",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT",
                     "x_transferred",
                  ],
                  url: "http://www.us-cert.gov/cas/techalerts/TA07-352A.html",
               },
               {
                  name: "26168",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/26168",
               },
               {
                  name: "27580",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/27580",
               },
               {
                  name: "28136",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/28136",
               },
               {
                  name: "26286",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/26286",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://www.digit-labs.org/files/exploits/private/tcpdump-bgp.c",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://bugs.gentoo.org/show_bug.cgi?id=184815",
               },
               {
                  name: "SSA:2007-230-01",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SLACKWARE",
                     "x_transferred",
                  ],
                  url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.449313",
               },
               {
                  name: "MDKSA-2007:148",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:148",
               },
               {
                  name: "1018434",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id?1018434",
               },
               {
                  name: "RHSA-2007:0368",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2007-0368.html",
               },
               {
                  name: "26263",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/26263",
               },
               {
                  name: "20070720 rPSA-2007-0147-1 tcpdump",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/474225/100/0/threaded",
               },
               {
                  name: "26223",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/26223",
               },
               {
                  name: "APPLE-SA-2007-12-17",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_APPLE",
                     "x_transferred",
                  ],
                  url: "http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html",
               },
               {
                  name: "2007-0023",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_TRUSTIX",
                     "x_transferred",
                  ],
                  url: "http://www.trustix.org/errata/2007/0023/",
               },
               {
                  name: "oval:org.mitre.oval:def:9771",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9771",
               },
               {
                  name: "FreeBSD-SA-07:06",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FREEBSD",
                     "x_transferred",
                  ],
                  url: "http://security.freebsd.org/advisories/FreeBSD-SA-07:06.tcpdump.asc",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://cvs.tcpdump.org/cgi-bin/cvsweb/tcpdump/print-bgp.c?r1=1.91.2.11&r2=1.91.2.12",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://docs.info.apple.com/article.html?artnum=307179",
               },
               {
                  name: "26395",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/26395",
               },
               {
                  name: "26266",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/26266",
               },
               {
                  name: "TLSA-2007-46",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_TURBO",
                     "x_transferred",
                  ],
                  url: "http://www.turbolinux.com/security/2007/TLSA-2007-46.txt",
               },
               {
                  name: "26521",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/26521",
               },
               {
                  name: "ADV-2007-2578",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2007/2578",
               },
               {
                  name: "26404",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/26404",
               },
               {
                  name: "26135",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/26135",
               },
               {
                  name: "USN-492-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/usn-492-1",
               },
               {
                  name: "DSA-1353",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2007/dsa-1353",
               },
               {
                  name: "GLSA-200707-14",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://security.gentoo.org/glsa/glsa-200707-14.xml",
               },
               {
                  name: "24965",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/24965",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "NETWORK",
                     availabilityImpact: "HIGH",
                     baseScore: 9.8,
                     baseSeverity: "CRITICAL",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "NONE",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2007-3798",
                        options: [
                           {
                              Exploitation: "poc",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-10-15T14:17:36.142524Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-252",
                        description: "CWE-252 Unchecked Return Value",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-10-15T14:18:21.831Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2007-07-16T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Integer overflow in print-bgp.c in the BGP dissector in tcpdump 3.9.6 and earlier allows remote attackers to execute arbitrary code via crafted TLVs in a BGP packet, related to an unchecked return value.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-10-15T20:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "RHSA-2007:0387",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2007-0387.html",
            },
            {
               name: "26231",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/26231",
            },
            {
               name: "SUSE-SR:2007:016",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://www.novell.com/linux/security/advisories/2007_16_sr.html",
            },
            {
               name: "ADV-2007-4238",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2007/4238",
            },
            {
               name: "TA07-352A",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT",
               ],
               url: "http://www.us-cert.gov/cas/techalerts/TA07-352A.html",
            },
            {
               name: "26168",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/26168",
            },
            {
               name: "27580",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/27580",
            },
            {
               name: "28136",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/28136",
            },
            {
               name: "26286",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/26286",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://www.digit-labs.org/files/exploits/private/tcpdump-bgp.c",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://bugs.gentoo.org/show_bug.cgi?id=184815",
            },
            {
               name: "SSA:2007-230-01",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SLACKWARE",
               ],
               url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.449313",
            },
            {
               name: "MDKSA-2007:148",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:148",
            },
            {
               name: "1018434",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id?1018434",
            },
            {
               name: "RHSA-2007:0368",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2007-0368.html",
            },
            {
               name: "26263",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/26263",
            },
            {
               name: "20070720 rPSA-2007-0147-1 tcpdump",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://www.securityfocus.com/archive/1/474225/100/0/threaded",
            },
            {
               name: "26223",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/26223",
            },
            {
               name: "APPLE-SA-2007-12-17",
               tags: [
                  "vendor-advisory",
                  "x_refsource_APPLE",
               ],
               url: "http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html",
            },
            {
               name: "2007-0023",
               tags: [
                  "vendor-advisory",
                  "x_refsource_TRUSTIX",
               ],
               url: "http://www.trustix.org/errata/2007/0023/",
            },
            {
               name: "oval:org.mitre.oval:def:9771",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9771",
            },
            {
               name: "FreeBSD-SA-07:06",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FREEBSD",
               ],
               url: "http://security.freebsd.org/advisories/FreeBSD-SA-07:06.tcpdump.asc",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://cvs.tcpdump.org/cgi-bin/cvsweb/tcpdump/print-bgp.c?r1=1.91.2.11&r2=1.91.2.12",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://docs.info.apple.com/article.html?artnum=307179",
            },
            {
               name: "26395",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/26395",
            },
            {
               name: "26266",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/26266",
            },
            {
               name: "TLSA-2007-46",
               tags: [
                  "vendor-advisory",
                  "x_refsource_TURBO",
               ],
               url: "http://www.turbolinux.com/security/2007/TLSA-2007-46.txt",
            },
            {
               name: "26521",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/26521",
            },
            {
               name: "ADV-2007-2578",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2007/2578",
            },
            {
               name: "26404",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/26404",
            },
            {
               name: "26135",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/26135",
            },
            {
               name: "USN-492-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/usn-492-1",
            },
            {
               name: "DSA-1353",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2007/dsa-1353",
            },
            {
               name: "GLSA-200707-14",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://security.gentoo.org/glsa/glsa-200707-14.xml",
            },
            {
               name: "24965",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/24965",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2007-3798",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Integer overflow in print-bgp.c in the BGP dissector in tcpdump 3.9.6 and earlier allows remote attackers to execute arbitrary code via crafted TLVs in a BGP packet, related to an unchecked return value.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "RHSA-2007:0387",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2007-0387.html",
                  },
                  {
                     name: "26231",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/26231",
                  },
                  {
                     name: "SUSE-SR:2007:016",
                     refsource: "SUSE",
                     url: "http://www.novell.com/linux/security/advisories/2007_16_sr.html",
                  },
                  {
                     name: "ADV-2007-4238",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2007/4238",
                  },
                  {
                     name: "TA07-352A",
                     refsource: "CERT",
                     url: "http://www.us-cert.gov/cas/techalerts/TA07-352A.html",
                  },
                  {
                     name: "26168",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/26168",
                  },
                  {
                     name: "27580",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/27580",
                  },
                  {
                     name: "28136",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/28136",
                  },
                  {
                     name: "26286",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/26286",
                  },
                  {
                     name: "http://www.digit-labs.org/files/exploits/private/tcpdump-bgp.c",
                     refsource: "MISC",
                     url: "http://www.digit-labs.org/files/exploits/private/tcpdump-bgp.c",
                  },
                  {
                     name: "http://bugs.gentoo.org/show_bug.cgi?id=184815",
                     refsource: "CONFIRM",
                     url: "http://bugs.gentoo.org/show_bug.cgi?id=184815",
                  },
                  {
                     name: "SSA:2007-230-01",
                     refsource: "SLACKWARE",
                     url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.449313",
                  },
                  {
                     name: "MDKSA-2007:148",
                     refsource: "MANDRIVA",
                     url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:148",
                  },
                  {
                     name: "1018434",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id?1018434",
                  },
                  {
                     name: "RHSA-2007:0368",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2007-0368.html",
                  },
                  {
                     name: "26263",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/26263",
                  },
                  {
                     name: "20070720 rPSA-2007-0147-1 tcpdump",
                     refsource: "BUGTRAQ",
                     url: "http://www.securityfocus.com/archive/1/474225/100/0/threaded",
                  },
                  {
                     name: "26223",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/26223",
                  },
                  {
                     name: "APPLE-SA-2007-12-17",
                     refsource: "APPLE",
                     url: "http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html",
                  },
                  {
                     name: "2007-0023",
                     refsource: "TRUSTIX",
                     url: "http://www.trustix.org/errata/2007/0023/",
                  },
                  {
                     name: "oval:org.mitre.oval:def:9771",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9771",
                  },
                  {
                     name: "FreeBSD-SA-07:06",
                     refsource: "FREEBSD",
                     url: "http://security.freebsd.org/advisories/FreeBSD-SA-07:06.tcpdump.asc",
                  },
                  {
                     name: "http://cvs.tcpdump.org/cgi-bin/cvsweb/tcpdump/print-bgp.c?r1=1.91.2.11&r2=1.91.2.12",
                     refsource: "MISC",
                     url: "http://cvs.tcpdump.org/cgi-bin/cvsweb/tcpdump/print-bgp.c?r1=1.91.2.11&r2=1.91.2.12",
                  },
                  {
                     name: "http://docs.info.apple.com/article.html?artnum=307179",
                     refsource: "CONFIRM",
                     url: "http://docs.info.apple.com/article.html?artnum=307179",
                  },
                  {
                     name: "26395",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/26395",
                  },
                  {
                     name: "26266",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/26266",
                  },
                  {
                     name: "TLSA-2007-46",
                     refsource: "TURBO",
                     url: "http://www.turbolinux.com/security/2007/TLSA-2007-46.txt",
                  },
                  {
                     name: "26521",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/26521",
                  },
                  {
                     name: "ADV-2007-2578",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2007/2578",
                  },
                  {
                     name: "26404",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/26404",
                  },
                  {
                     name: "26135",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/26135",
                  },
                  {
                     name: "USN-492-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/usn-492-1",
                  },
                  {
                     name: "DSA-1353",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2007/dsa-1353",
                  },
                  {
                     name: "GLSA-200707-14",
                     refsource: "GENTOO",
                     url: "http://security.gentoo.org/glsa/glsa-200707-14.xml",
                  },
                  {
                     name: "24965",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/24965",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2007-3798",
      datePublished: "2007-07-16T22:00:00",
      dateReserved: "2007-07-16T00:00:00",
      dateUpdated: "2024-10-15T14:18:21.831Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

Vulnerability from fkie_nvd
Published
2019-11-14 19:15
Modified
2024-11-21 04:20
Summary
TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.
References
secure@intel.comhttp://lists.opensuse.org/opensuse-security-announce/2019-11/msg00045.htmlMailing List, Third Party Advisory
secure@intel.comhttp://lists.opensuse.org/opensuse-security-announce/2019-11/msg00046.htmlMailing List, Third Party Advisory
secure@intel.comhttp://lists.opensuse.org/opensuse-security-announce/2019-12/msg00042.htmlMailing List, Third Party Advisory
secure@intel.comhttp://packetstormsecurity.com/files/155375/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.htmlPatch, Third Party Advisory, VDB Entry
secure@intel.comhttp://www.openwall.com/lists/oss-security/2019/12/10/3Mailing List, Third Party Advisory
secure@intel.comhttp://www.openwall.com/lists/oss-security/2019/12/10/4Mailing List, Third Party Advisory
secure@intel.comhttp://www.openwall.com/lists/oss-security/2019/12/11/1Mailing List, Third Party Advisory
secure@intel.comhttps://access.redhat.com/errata/RHSA-2019:3936Third Party Advisory
secure@intel.comhttps://access.redhat.com/errata/RHSA-2020:0026Third Party Advisory
secure@intel.comhttps://access.redhat.com/errata/RHSA-2020:0028Third Party Advisory
secure@intel.comhttps://access.redhat.com/errata/RHSA-2020:0204Third Party Advisory
secure@intel.comhttps://access.redhat.com/errata/RHSA-2020:0279Third Party Advisory
secure@intel.comhttps://access.redhat.com/errata/RHSA-2020:0366Third Party Advisory
secure@intel.comhttps://access.redhat.com/errata/RHSA-2020:0555Third Party Advisory
secure@intel.comhttps://access.redhat.com/errata/RHSA-2020:0666Third Party Advisory
secure@intel.comhttps://access.redhat.com/errata/RHSA-2020:0730Third Party Advisory
secure@intel.comhttps://kc.mcafee.com/corporate/index?page=content&id=SB10306Third Party Advisory
secure@intel.comhttps://lists.debian.org/debian-lts-announce/2019/12/msg00035.htmlMailing List, Third Party Advisory
secure@intel.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5WWPW4BSZDDW7VHU427XTVXV7ROOFFW/
secure@intel.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IZYATWNUGHRBG6I3TC24YHP5Y3J7I6KH/
secure@intel.comhttps://seclists.org/bugtraq/2019/Dec/28Mailing List, Third Party Advisory
secure@intel.comhttps://seclists.org/bugtraq/2019/Nov/26Mailing List, Patch, Third Party Advisory
secure@intel.comhttps://seclists.org/bugtraq/2020/Jan/21Mailing List, Third Party Advisory
secure@intel.comhttps://security.gentoo.org/glsa/202003-56Third Party Advisory
secure@intel.comhttps://support.f5.com/csp/article/K02912734?utm_source=f5support&amp%3Butm_medium=RSS
secure@intel.comhttps://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03968en_usThird Party Advisory
secure@intel.comhttps://usn.ubuntu.com/4186-2/Third Party Advisory
secure@intel.comhttps://www.debian.org/security/2020/dsa-4602Third Party Advisory
secure@intel.comhttps://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.htmlVendor Advisory
secure@intel.comhttps://www.oracle.com/security-alerts/cpujan2021.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00045.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00046.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00042.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/155375/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.htmlPatch, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2019/12/10/3Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2019/12/10/4Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2019/12/11/1Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2019:3936Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2020:0026Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2020:0028Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2020:0204Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2020:0279Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2020:0366Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2020:0555Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2020:0666Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2020:0730Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://kc.mcafee.com/corporate/index?page=content&id=SB10306Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2019/12/msg00035.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5WWPW4BSZDDW7VHU427XTVXV7ROOFFW/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IZYATWNUGHRBG6I3TC24YHP5Y3J7I6KH/
af854a3a-2127-422b-91ae-364da2661108https://seclists.org/bugtraq/2019/Dec/28Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://seclists.org/bugtraq/2019/Nov/26Mailing List, Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://seclists.org/bugtraq/2020/Jan/21Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202003-56Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://support.f5.com/csp/article/K02912734?utm_source=f5support&amp%3Butm_medium=RSS
af854a3a-2127-422b-91ae-364da2661108https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03968en_usThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/4186-2/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2020/dsa-4602Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpujan2021.htmlPatch, Third Party Advisory
Impacted products
Vendor Product Version
opensuse leap 15.0
opensuse leap 15.1
fedoraproject fedora 30
fedoraproject fedora 31
slackware slackware 14.2
hp apollo_4200_firmware *
hp apollo_4200 gen10
hp apollo_2000_firmware *
hp apollo_2000 -
hp proliant_bl460c_firmware *
hp proliant_bl460c gen10
hp proliant_dl580_firmware *
hp proliant_dl580 gen10
hp proliant_dl560_firmware *
hp proliant_dl560 gen10
hp proliant_dl380_firmware *
hp proliant_dl380 gen10
hp proliant_dl360_firmware *
hp proliant_dl360 gen10
hp proliant_dl180_firmware *
hp proliant_dl180 gen10
hp proliant_dl160_firmware *
hp proliant_dl160 gen10
hp proliant_dl120_firmware *
hp proliant_dl120 gen10
hp proliant_dl20_firmware *
hp proliant_dl20 gen10
hp proliant_ml350_firmware *
hp proliant_ml350 gen10
hp proliant_ml110_firmware *
hp proliant_ml110 gen10
hp proliant_ml30_firmware *
hp proliant_ml30 gen10
hp proliant_xl450_firmware *
hp proliant_xl450 gen10
hp proliant_xl270d_firmware *
hp proliant_xl270d gen10
hp proliant_xl230k_firmware *
hp proliant_xl230k gen10
hp proliant_xl190r_firmware *
hp proliant_xl190r gen10
hp proliant_xl170r_firmware *
hp proliant_xl170r gen10
hp synergy_480_firmware *
hp synergy_480 gen10
hp synergy_660_firmware *
hp synergy_660 gen10
hp proliant_e910_firmware *
hp proliant_e910 -
intel core_i7-10510y_firmware -
intel core_i7-10510y -
intel core_i5-10310y_firmware -
intel core_i5-10310y -
intel core_i5-10210y_firmware -
intel core_i5-10210y -
intel core_i5-10110y_firmware -
intel core_i5-10110y -
intel core_i7-8500y_firmware -
intel core_i7-8500y -
intel core_i5-8310y_firmware -
intel core_i5-8310y -
intel core_i5-8210y_firmware -
intel core_i5-8210y -
intel core_i5-8200y_firmware -
intel core_i5-8200y -
intel core_m3-8100y_firmware -
intel core_m3-8100y -
intel xeon_8253_firmware -
intel xeon_8253 -
intel xeon_8256_firmware -
intel xeon_8256 -
intel xeon_8260_firmware -
intel xeon_8260 -
intel xeon_8260l_firmware -
intel xeon_8260l -
intel xeon_8260m_firmware -
intel xeon_8260m -
intel xeon_8260y_firmware -
intel xeon_8260y -
intel xeon_8268_firmware -
intel xeon_8268 -
intel xeon_8270_firmware -
intel xeon_8270 -
intel xeon_8276_firmware -
intel xeon_8276 -
intel xeon_8276l_firmware -
intel xeon_8276l -
intel xeon_8276m_firmware -
intel xeon_8276m -
intel xeon_8280_firmware -
intel xeon_8280 -
intel xeon_8280l_firmware -
intel xeon_8280l -
intel xeon_8280m_firmware -
intel xeon_8280m -
intel xeon_9220_firmware -
intel xeon_9220 -
intel xeon_9221_firmware -
intel xeon_9221 -
intel xeon_9222_firmware -
intel xeon_9222 -
intel xeon_9242_firmware -
intel xeon_9242 -
intel xeon_9282_firmware -
intel xeon_9282 -
intel xeon_5215_firmware -
intel xeon_5215 -
intel xeon_5215l_firmware -
intel xeon_5215l -
intel xeon_5215m_firmware -
intel xeon_5215m -
intel xeon_5215r_firmware -
intel xeon_5215r -
intel xeon_5217_firmware -
intel xeon_5217 -
intel xeon_5218_firmware -
intel xeon_5218 -
intel xeon_5218b_firmware -
intel xeon_5218b -
intel xeon_5218n_firmware -
intel xeon_5218n -
intel xeon_5218t_firmware -
intel xeon_5218t -
intel xeon_5220_firmware -
intel xeon_5220 -
intel xeon_5220r_firmware -
intel xeon_5220r -
intel xeon_5220s_firmware -
intel xeon_5220s -
intel xeon_5220t_firmware -
intel xeon_5220t -
intel xeon_5222_firmware -
intel xeon_5222 -
intel xeon_6222v_firmware -
intel xeon_6222v -
intel xeon_6226_firmware -
intel xeon_6226 -
intel xeon_6230_firmware -
intel xeon_6230 -
intel xeon_6230n_firmware -
intel xeon_6230n -
intel xeon_6230t_firmware -
intel xeon_6230t -
intel xeon_6234_firmware -
intel xeon_6234 -
intel xeon_6238_firmware -
intel xeon_6238 -
intel xeon_6238l_firmware -
intel xeon_6238l -
intel xeon_6238m_firmware -
intel xeon_6238m -
intel xeon_6238t_firmware -
intel xeon_6238t -
intel xeon_6240_firmware -
intel xeon_6240 -
intel xeon_6240l_firmware -
intel xeon_6240l -
intel xeon_6240m_firmware -
intel xeon_6240m -
intel xeon_6240y_firmware -
intel xeon_6240y -
intel xeon_6242_firmware -
intel xeon_6242 -
intel xeon_6244_firmware -
intel xeon_6244 -
intel xeon_6246_firmware -
intel xeon_6246 -
intel xeon_6248_firmware -
intel xeon_6248 -
intel xeon_6252_firmware -
intel xeon_6252 -
intel xeon_6252n_firmware -
intel xeon_6252n -
intel xeon_6254_firmware -
intel xeon_6254 -
intel xeon_6262v_firmware -
intel xeon_6262v -
intel xeon_4208_firmware -
intel xeon_4208 -
intel xeon_4208r_firmware -
intel xeon_4208r -
intel xeon_4209t_firmware -
intel xeon_4209t -
intel xeon_4210_firmware -
intel xeon_4210 -
intel xeon_4210r_firmware -
intel xeon_4210r -
intel xeon_4214_firmware -
intel xeon_4214 -
intel xeon_4214c_firmware -
intel xeon_4214c -
intel xeon_4214r_firmware -
intel xeon_4214r -
intel xeon_4214y_firmware -
intel xeon_4214y -
intel xeon_4215_firmware -
intel xeon_4215 -
intel xeon_4216_firmware -
intel xeon_4216 -
intel xeon_4216r_firmware -
intel xeon_4216r -
intel xeon_3204_firmware -
intel xeon_3204 -
intel xeon_3206r_firmware -
intel xeon_3206r -
intel xeon_w-3275m_firmware -
intel xeon_w-3275m -
intel xeon_w-3275_firmware -
intel xeon_w-3275 -
intel xeon_w-3265m_firmware -
intel xeon_w-3265m -
intel xeon_w-3265_firmware -
intel xeon_w-3265 -
intel xeon_w-3245m_firmware -
intel xeon_w-3245m -
intel xeon_w-3245_firmware -
intel xeon_w-3245 -
intel xeon_w-3235_firmware -
intel xeon_w-3235 -
intel xeon_w-3225_firmware -
intel xeon_w-3225 -
intel xeon_w-3223_firmware -
intel xeon_w-3223 -
intel xeon_w-2295_firmware -
intel xeon_w-2295 -
intel xeon_w-2275_firmware -
intel xeon_w-2275 -
intel xeon_w-2265_firmware -
intel xeon_w-2265 -
intel xeon_w-2255_firmware -
intel xeon_w-2255 -
intel xeon_w-2245_firmware -
intel xeon_w-2245 -
intel xeon_w-2235_firmware -
intel xeon_w-2235 -
intel xeon_w-2225_firmware -
intel xeon_w-2225 -
intel xeon_w-2223_firmware -
intel xeon_w-2223 -
intel core_i9-9980hk_firmware -
intel core_i9-9980hk -
intel core_i9-9880h_firmware -
intel core_i9-9880h -
intel core_i7-9850h_firmware -
intel core_i7-9850h -
intel core_i7-9750hf_firmware -
intel core_i7-9750hf -
intel core_i5-9400h_firmware -
intel core_i5-9400h -
intel core_i5-9300h_firmware -
intel core_i5-9300h -
intel core_i9-9900k_firmware -
intel core_i9-9900k -
intel core_i9-9900kf_firmware -
intel core_i9-9900kf -
intel core_i7-9700k_firmware -
intel core_i7-9700k -
intel core_i7-9700kf_firmware -
intel core_i7-9700kf -
intel core_i5-9600k_firmware -
intel core_i5-9600k -
intel core_i5-9600kf_firmware -
intel core_i5-9600kf -
intel core_i5-9400_firmware -
intel core_i5-9400 -
intel core_i5-9400f_firmware -
intel core_i5-9400f -
intel xeon_e-2288g_firmware -
intel xeon_e-2288g -
intel xeon_e-2286m_firmware -
intel xeon_e-2286m -
intel xeon_e-2278gel_firmware -
intel xeon_e-2278gel -
intel xeon_e-2278ge_firmware -
intel xeon_e-2278ge -
intel xeon_e-2278g_firmware -
intel xeon_e-2278g -
intel core_i7-10510u_firmware -
intel core_i7-10510u -
intel core_i5-10210u_firmware -
intel core_i5-10210u -
intel pentium_6405u_firmware -
intel pentium_6405u -
intel celeron_5305u_firmware -
intel celeron_5305u -
intel core_i7-8565u_firmware -
intel core_i7-8565u -
intel core_i7-8665u_firmware -
intel core_i7-8665u -
intel core_i5-8365u_firmware -
intel core_i5-8365u -
intel core_i5-8265u_firmware -
intel core_i5-8265u -
canonical ubuntu_linux 14.04
debian debian_linux 8.0
debian debian_linux 9.0
debian debian_linux 10.0
redhat codeready_linux_builder 8.0
redhat codeready_linux_builder_eus 8.1
redhat codeready_linux_builder_eus 8.2
redhat codeready_linux_builder_eus 8.4
redhat codeready_linux_builder_eus 8.6
redhat virtualization_manager 4.2
redhat enterprise_linux 8.0
redhat enterprise_linux_desktop 7.0
redhat enterprise_linux_eus 7.6
redhat enterprise_linux_eus 7.7
redhat enterprise_linux_eus 8.1
redhat enterprise_linux_eus 8.2
redhat enterprise_linux_eus 8.4
redhat enterprise_linux_eus 8.6
redhat enterprise_linux_server 7.0
redhat enterprise_linux_server_aus 7.6
redhat enterprise_linux_server_aus 7.7
redhat enterprise_linux_server_aus 8.2
redhat enterprise_linux_server_aus 8.4
redhat enterprise_linux_server_aus 8.6
redhat enterprise_linux_server_tus 7.6
redhat enterprise_linux_server_tus 7.7
redhat enterprise_linux_server_tus 8.2
redhat enterprise_linux_server_tus 8.4
redhat enterprise_linux_server_tus 8.6
redhat enterprise_linux_workstation 7.0
oracle zfs_storage_appliance_kit 8.8



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F1E78106-58E6-4D59-990F-75DA575BFAD9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B620311B-34A3-48A6-82DF-6F078D7A4493",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                     matchCriteriaId: "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                     matchCriteriaId: "80F0FA5D-8D3B-4C0E-81E2-87998286AF33",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:slackware:slackware:14.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "92A1C406-4737-463F-BB57-FAC6C8D2F2E5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:hp:apollo_4200_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C3CEC11E-34BC-48D3-8CA4-BC5C2E4D9BBC",
                     versionEndExcluding: "2.20",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:hp:apollo_4200:gen10:*:*:*:*:*:*:*",
                     matchCriteriaId: "28CD6A70-DC5A-453B-9551-D79A130380E8",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:hp:apollo_2000_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9F402DDC-BAAC-4BE4-AB5F-8C96640CC280",
                     versionEndExcluding: "2.20",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:hp:apollo_2000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9FF05F7-F7FC-4817-805B-A69B22BBEDFC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:hp:proliant_bl460c_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D90D90B-821E-4A73-9B27-3AC0A6225A16",
                     versionEndExcluding: "2.20",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:hp:proliant_bl460c:gen10:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEBE6F01-0FC8-4792-A1F2-290BCC4F6FEB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:hp:proliant_dl580_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D79DF433-D488-4107-B193-46686559968E",
                     versionEndExcluding: "2.20",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl580:gen10:*:*:*:*:*:*:*",
                     matchCriteriaId: "A85D585D-3324-420F-BE09-1BB656510DFB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:hp:proliant_dl560_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D736B2EC-E017-40A7-AEF0-F03F40CBD942",
                     versionEndExcluding: "2.20",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl560:gen10:*:*:*:*:*:*:*",
                     matchCriteriaId: "57437358-2BB2-40B2-B6C7-A184E0989040",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:hp:proliant_dl380_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D377C96-3076-4EA0-BCAA-CC7420A068FE",
                     versionEndExcluding: "2.20",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl380:gen10:*:*:*:*:*:*:*",
                     matchCriteriaId: "B7125071-68F6-4832-BED4-2005A6BB34CC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:hp:proliant_dl360_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3FC37A3E-57D5-473C-9467-3F63C2E7751E",
                     versionEndExcluding: "2.20",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl360:gen10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E243D38-0202-4198-90F4-3D55ADB46F2B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:hp:proliant_dl180_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF4FBC54-0557-442F-8DF2-6A67638063BB",
                     versionEndExcluding: "2.20",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl180:gen10:*:*:*:*:*:*:*",
                     matchCriteriaId: "134B7262-F1BA-4D09-A44F-25C8CF5970BE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:hp:proliant_dl160_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A09C6807-228E-485B-A1E2-0D07106D0E75",
                     versionEndExcluding: "2.20",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl160:gen10:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1F0C75D-049E-4C1D-8B2D-FE728DC17D3E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:hp:proliant_dl120_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BA6B1D6-816A-4603-B7A4-2EB2C8573D98",
                     versionEndExcluding: "2.20",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl120:gen10:*:*:*:*:*:*:*",
                     matchCriteriaId: "B66CA53C-E0DD-4AEE-ABDD-2E72795FE50B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:hp:proliant_dl20_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "23C4F525-5AAB-4215-9A3D-0EF42ADCF470",
                     versionEndExcluding: "2.10",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:hp:proliant_dl20:gen10:*:*:*:*:*:*:*",
                     matchCriteriaId: "CECC4A42-31FB-4353-B436-F9658BB1A525",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:hp:proliant_ml350_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCAE30BC-B101-4350-B268-61CBF41000BD",
                     versionEndExcluding: "2.20",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:hp:proliant_ml350:gen10:*:*:*:*:*:*:*",
                     matchCriteriaId: "45915CF8-D93A-4AF1-B4F8-83603B4F38F7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:hp:proliant_ml110_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B46B4176-7B49-40E4-96D2-DDF13917E9E1",
                     versionEndExcluding: "2.20",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:hp:proliant_ml110:gen10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8273537-FAC9-4E1E-9D04-EEB20A0160F0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:hp:proliant_ml30_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A41EE882-6975-4A42-A861-E9A86D1AB1D9",
                     versionEndExcluding: "2.10",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:hp:proliant_ml30:gen10:*:*:*:*:*:*:*",
                     matchCriteriaId: "84E46134-6B1D-4FD5-B86A-721B7035DC58",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:hp:proliant_xl450_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5B63F2C-66A6-439A-A931-79B17894B1E0",
                     versionEndExcluding: "2.20",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:hp:proliant_xl450:gen10:*:*:*:*:*:*:*",
                     matchCriteriaId: "B71F8154-1816-4289-B466-6CE56A4F336A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:hp:proliant_xl270d_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "72B3E5C1-8F87-4B70-8DB0-FBDC6C50D01E",
                     versionEndExcluding: "2.20",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:hp:proliant_xl270d:gen10:*:*:*:*:*:*:*",
                     matchCriteriaId: "13F75491-BE42-4A2C-9BD2-A041EA7BA893",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:hp:proliant_xl230k_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D46BAB31-57E8-4382-B208-DB8B7BF17E57",
                     versionEndExcluding: "2.20",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:hp:proliant_xl230k:gen10:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE4E1276-FE6B-4E1B-BFDC-E104AD766DEC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:hp:proliant_xl190r_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7867023B-EDFA-4E1E-8EFD-D351855F9C56",
                     versionEndExcluding: "2.20",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:hp:proliant_xl190r:gen10:*:*:*:*:*:*:*",
                     matchCriteriaId: "FFF2E8DC-BE8B-4BA0-B25A-46B6D950AF8A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:hp:proliant_xl170r_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "01244BE2-B003-4474-A2A7-57DF9760A5EB",
                     versionEndExcluding: "2.20",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:hp:proliant_xl170r:gen10:*:*:*:*:*:*:*",
                     matchCriteriaId: "701CA686-2167-45B8-8795-265B80547608",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:hp:synergy_480_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "575B564D-D52C-4194-843D-3F14FEC199E4",
                     versionEndExcluding: "2.20",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:hp:synergy_480:gen10:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D953D08-A1BA-49D0-ADB9-2A032E5C96A3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:hp:synergy_660_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "96685483-7716-4227-8ADC-D42150E33814",
                     versionEndExcluding: "2.20",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:hp:synergy_660:gen10:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6B0989B-8548-4902-90E6-294FA5AB768E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:hp:proliant_e910_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA7706E3-68D3-4DD6-A3AE-748B1158995C",
                     versionEndExcluding: "2.20",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:hp:proliant_e910:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "236284B7-DC2E-40F8-A265-EE91469ADD9C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:core_i7-10510y_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "27E24442-6697-4D2D-9515-43E4370474B4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD97F84B-ED73-4FFD-8634-10631FEE03EA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:core_i5-10310y_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "95BC9762-7F9A-483A-8C20-94481FD54000",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8515D29-3823-4F9B-9578-8BB52336A2A7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:core_i5-10210y_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D188A7A-9456-4535-A230-C16033A22F21",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "376B6DD7-1284-4BD9-88A4-5C34303CC5D1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:core_i5-10110y_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F130A798-2FCC-43DB-9A42-367C4BB580E4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i5-10110y:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "62BFF15A-0C78-45BC-8E71-EDF624AC162D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:core_i7-8500y_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2495E71F-8DE8-482E-A903-FA00E9A3C697",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "957F3AC9-D071-4932-B2C9-1643FB78BC7A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:core_i5-8310y_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CE8EAB7-E619-4140-9FF2-F01DD57DD286",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "71294A32-F3DD-45EA-A0FC-C3EA0351FA29",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:core_i5-8210y_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "813C2CF3-2370-4FC9-86F1-85FA6597EDA6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E62309E-1071-4569-8C9A-11748D629CAB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:core_i5-8200y_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9C3DCA2-6087-4286-A84A-6091149083C9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2AC12E92-33CB-4603-AC14-3351CE1D4E3A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:core_m3-8100y_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E600C57D-AF4C-44F2-B1FB-E6B7D6CBE58F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E5AFFC8B-3AC1-49B4-9A73-18A3EC928591",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_8253_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D927F922-CAA0-4704-BA73-064AFAC3A7F8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_8253:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0BF2BB51-3C3C-470E-8D2B-4DF68BABD783",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_8256_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F98BA9B-65E5-4D65-8606-692D3141C779",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_8256:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D29BE6E2-3F84-4D59-9081-5D496F3CAA88",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_8260_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A6DD2CE-76B9-4197-B097-F62678B870FC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_8260:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "11AEDC86-EF7D-4770-A77C-C8D1945A3452",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_8260l_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "48A16123-A5D2-49A6-8DBB-C739B58CD8C0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_8260l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F986CC11-55A4-494C-BCB9-8DA8DAB8933C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_8260m_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9651F3F9-CC5C-464B-A6D7-2F2FC8D32036",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_8260m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F294F87-6173-4EA5-B58B-85F4F3FC9A82",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_8260y_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF361B23-A0FB-4188-9397-227C040E0716",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_8260y:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADB582F2-85D7-4E14-B915-2C1D32775122",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_8268_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9AE46C6-610D-48BE-9D77-47BEE8254D62",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_8268:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D1FC83B-1699-4761-BC26-EF40B70FC997",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_8270_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3319E69E-8BE8-42DD-8CC6-01B90CD198F2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_8270:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A197DA8A-C3EF-4A50-AFD4-8C9FACE7BAFF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_8276_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E913C215-27E1-4708-BBBA-A71BE1897509",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_8276:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6EE4C360-A12A-4FDC-9B50-DFCBEA48DCB2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_8276l_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD98AF43-A79D-48DF-8343-C74009FDAF95",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_8276l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "94C08C64-ECA6-45ED-A413-8F44A7D1FBC7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_8276m_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "00BD95C4-E1FA-4A94-9E7E-E551AA2EA1A5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_8276m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C8EFA24-FE2F-4B47-B73C-FAE6E50193F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_8280_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E726303-685C-4807-8AA9-8A4D7F16D7DB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_8280:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "138173B1-68AB-47AD-A4EE-239304CDE372",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_8280l_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "91E282BA-E56C-4C0F-A764-166825C8A040",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_8280l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D486B8BA-D431-4FF8-8541-25D7705C3AFA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_8280m_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A1BDB61-DBDC-4C67-A0B9-736130487789",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_8280m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2A1158F-6165-41C4-91AE-5E9AC7210AFC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_9220_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D644C7B6-D15E-4B5F-81DE-79290EB99611",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_9220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E2F4BE5-9026-48CA-AB29-25BFE86E08E6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_9221_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E8176AD-62A8-4B4E-8426-7F1235E929D3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_9221:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4BF66FD-AD34-47C3-8703-666B4D7D9036",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_9222_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA25A1DA-2914-405F-B493-837D87BFD657",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_9222:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCA9A267-33F3-47CC-A0DE-785417CB11A3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_9242_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7850F33C-4D9C-4639-B927-A82207EF2157",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_9242:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D833D03-6242-404D-984F-EFC891A4D54B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_9282_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "700B7592-D460-49E8-BCA8-410F370337AA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_9282:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "61326A4A-B670-49FF-9CC1-77405920E969",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_5215_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCAE7305-6637-4927-B46C-29B487C11D33",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_5215:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "49517E33-D5F7-41BA-9FFD-909FC659A4E7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_5215l_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FB705C1-0919-4AA2-9393-9BBCAC23C1A2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_5215l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0BBE3F53-5DCC-40CF-83DE-3FA8A883CBF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_5215m_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E23DA7D4-3086-493E-97F6-3C84345A28A7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_5215m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0EA0CC2-E673-4875-8A87-60927049DB6F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_5215r_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A6972D2-390D-4707-A293-F86191D60F6E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_5215r:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE35136C-540F-4C31-ACE3-6BAAE27B9EA3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_5217_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6AF41286-0AB6-4354-AAA9-4C3120EF6DAF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_5217:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D483E398-B918-4F02-A409-B8BD584C18E1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_5218_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "951795AD-3799-4090-80BC-D2DAF7B9197E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_5218:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8ED911C-340F-4D10-9DF3-C156EFD8D8F7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_5218b_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E71DA16-070C-4CD1-81F8-30F211DAD76A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_5218b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3043F2BC-FB45-48F2-A3BC-D57E1243F17E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_5218n_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "31B39E6E-9013-4545-9EB3-1766084E6144",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_5218n:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA39123E-A4D4-4273-88BC-94BB8E2E80FB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_5218t_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C1DC0F9-72D9-4E9C-A969-493D7C6FD970",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_5218t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "24CABD15-90E7-4E34-9929-18C0FCA18770",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_5220_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FA2ED7A-5D38-4F16-B3C2-3D7FED7C994E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_5220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "011670EB-2D98-4AC9-9D63-C5331F16AAB7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_5220r_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C4E67D7-F377-4E4B-9499-8ACC91A105F3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_5220r:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "663E7CBA-AB87-4593-B5E1-EB0D35910CF3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_5220s_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D8161A8-1DBD-4E6B-8DA8-79E124CD56B6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_5220s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9290D21E-278C-426D-972C-D5A4923B30E6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_5220t_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6744FAB2-671B-4006-B373-DBC27820252C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_5220t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1FE8564-85F9-4947-A688-5985D1AE6AC1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_5222_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "609A2317-B20E-4025-97F8-BA74D6DA0A7C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_5222:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5FDAEEA6-C3A9-4C1B-B9DA-63B67E67A6E7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_6222v_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "83284F5B-A039-4556-BA4C-27BF16811898",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_6222v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "660A7920-8AB2-4C8F-BF63-38FE9968F2DD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_6226_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF6A2447-37E3-4D02-86DF-75BA200FF367",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_6226:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "89628842-78DE-486E-9670-C46F9E0A695E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_6230_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68D0EA02-C8A4-4683-A4FE-8AF2E72FD346",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_6230:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A64CB0E-0E96-4A3E-A091-8CA769393C7E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_6230n_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AC959F6-9671-44C7-B055-5F0E1263350D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_6230n:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "984EA8D2-9D83-45A1-824D-BF9082896F4C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_6230t_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52793911-3034-4084-940B-7C721EEF725F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_6230t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "57357F28-5263-4F70-A193-BC7FE4DF1CE8",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_6234_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "967259F1-4DC9-49FC-BBA3-FF37A74A988D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_6234:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "668A4B4F-9C05-4284-AB45-A4A5B5D2FBAD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_6238_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FC0D948-631F-494B-AB35-8A0966ABA4CF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_6238:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FA293C8-DFD0-4AEF-AFC6-02A61C7CAD33",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_6238l_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E2884D7D-A9A0-4F74-A34C-00B754547474",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_6238l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5697841-097A-4C8A-B07F-B411EDB2D38F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_6238m_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A10F05D5-1AE7-400A-AC7A-F00AA1AFA6F8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_6238m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "745950EF-ED9F-4FF1-9714-2CE8AA4CDF07",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_6238t_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "58D2A705-571E-45B8-AF09-7647C29D2A9A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_6238t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BDEE8054-5683-4DF1-A58C-2638E6708CA8",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_6240_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F10DB4A-744B-4C6C-A7A6-2CF182F13963",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_6240:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C82B8484-1FEE-444B-B422-2AADDCA8C4D3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_6240l_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "17636B30-24E1-4C3B-85B0-D1FCF32B3DA5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_6240l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12FB8906-F4E5-41E7-9CD4-CFC80BE41020",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_6240m_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D3B3D30A-37A7-4B51-9050-7E1EA3CB9ABA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_6240m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "67CE28D3-108E-4811-9480-FCC1B95FE132",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_6240y_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "000F0EDB-370A-483C-B428-288CAAF6261B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_6240y:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1D1EA80-08AB-4C6C-A8E8-8C6B7C3B4CE2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_6242_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FFFCE38-6325-4466-9871-F40390B4E54D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_6242:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A80346B-12C4-468C-8E87-049269C732C2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_6244_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AEF0DD92-E739-4AE1-8E51-83E2A27E0DF0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_6244:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75DBCDC5-1388-43A9-AF8E-BE6A05DEFC81",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_6246_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B29865B-EC51-4164-8F5E-05289CA0D198",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_6246:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7ECB174B-B235-4D26-9FFA-233AFE428A82",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_6248_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03907542-C9AE-4E0B-A3F2-58D300D62A22",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_6248:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBB5BBDE-E5E2-474A-94FC-3CBF14A61D2F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_6252_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "51FD732F-F5D3-4DBE-AEF4-4C2B2784D68F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_6252:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D9451F2-04B7-4C1F-83F8-2766A866E401",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_6252n_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A8846E0-BA7A-4426-A5D9-E91B01C00236",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_6252n:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "92783A72-5A43-470F-A402-0ACC21722E73",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_6254_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6339774-DD97-4D95-A12D-7A9CA2659F92",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_6254:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "23EDBF24-8D46-4006-A690-D79428DCFB44",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_6262v_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B182CE6B-50DA-41FC-89CB-D74A0BBD2B68",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_6262v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A459FF4-07AC-49C7-B7CA-AF97A997F3C1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_4208_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "41DE84DE-214E-4125-93C5-DB1E4291EA6B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_4208:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8EF69471-E209-4C2C-8ECD-D6231B9069A7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_4208r_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DF7E7AA-39C9-4006-814E-FE3AAFCB25C1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_4208r:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A155856F-F279-4095-AF87-268BB90AA9D9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_4209t_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B7DCE4E-3195-4228-9491-C3374F0A610E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_4209t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3732AE58-8496-4314-86E2-B8039BF1B1C8",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_4210_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8CC38C7-FD58-445C-BF21-6DA485E10E75",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_4210:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2F83818-64D0-4219-8DEB-716F0614B842",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_4210r_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE8AD5AC-7CED-4C57-83CB-CAF5FB891F5D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_4210r:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8DBEAE8-0313-40DA-9C81-EDD14A16D2D4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_4214_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BDF2252C-624F-456A-A73F-3EEF6901F3AB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_4214:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6F6A060-985A-4357-AF1B-79E22D20F01E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_4214c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9298728-1039-44E0-8364-0BA535D8439A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_4214c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8CCEAF57-5F6C-4EE7-A256-FC93C493CA46",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_4214r_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0392E515-7C04-4003-BC42-0674E55B97FC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_4214r:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22A52E84-1D29-400A-AD48-0C126D5F2362",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_4214y_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "65E5E40A-84C0-4C47-9BCB-12038D8F18D9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_4214y:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "472453F1-923B-4BAC-A424-23660A850ADD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_4215_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "07862A92-E3A0-4482-AF95-E8EA22F6B00E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_4215:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "44179A12-7879-4BC7-86E8-7CC74DD0B6F2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_4216_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4416A15B-1B14-4C3F-BC84-CB90B93CF254",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_4216:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E70BE52-A032-44BE-B492-8890AC5A634E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_4216r_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B14C3F2C-A5FD-4106-8D05-9AC52B70A30C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_4216r:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "12EF1D06-814A-4F46-AAA3-A04B1C54FE78",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_3204_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF093B50-2F3C-4B20-9F3D-66CD306B1F4F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_3204:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8A7CA0D-9DB0-4905-B65A-52F731B33904",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_3206r_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "990CA598-5320-49F8-8307-B482E8A87F82",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_3206r:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4F262205-C8F7-4BBC-9062-24B64AA9D386",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_w-3275m_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2550330E-3A54-45BD-8B2F-8CD8D5561DA1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F693457C-3529-4E62-A672-1B862F235D0F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_w-3275_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "25CC3D78-CE53-4ADF-9D6B-73255508FCDA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE519C62-F5BB-461C-91EF-2979CD506C63",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_w-3265m_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E23B39A-513F-4388-8F28-C711414E2BF6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "020B6FED-EAE2-478C-8FF4-CB75F24E9A9D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_w-3265_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "97A8F5B9-B820-4E84-9863-FF734DE45B9E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2215D655-0EA9-4530-AB68-7B1C7360D692",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_w-3245m_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "93849DA1-D6A5-4FA2-99F1-D8AD3B4DE8CE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "35380FB9-90FF-405F-8E2E-01C1DD209540",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_w-3245_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A054F0CE-BD0C-4E56-9EBA-79A113FCA659",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF9E723E-1095-424E-A90D-380CA0D2795E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_w-3235_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF1FA2A8-5000-4E03-B659-1112C4EAA1A4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_w-3235:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C39B6A99-7060-4011-8FA3-E5ABE5C02813",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_w-3225_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D53DDDB1-DA94-4BC2-A934-4FFE55F0D1E7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3ECEBDB0-2E0A-416B-9737-82C1FC65A06C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_w-3223_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F619828-436D-4A0B-84F6-968893B96710",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADA1FA19-A836-4D6A-8C2D-718ECE6866D2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_w-2295_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "87F3E569-3A87-4D31-B80A-E0FD74B25AFE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_w-2295:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1340A29-3428-4FAD-AA07-7F625915E34D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_w-2275_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "21189344-DC9C-4DAD-A33A-C0A9004BFD4F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_w-2275:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "750A77C5-1367-4E04-9ABF-1AB2D46C29C6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_w-2265_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8EF592A6-20F6-4220-8A9C-282F21EBCBF7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_w-2265:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C6D23470-A702-426D-A63C-4F7BAC158762",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_w-2255_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D0A0072-4ECD-4F88-8BA5-8BDB026F95B2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_w-2255:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2ADF328B-D286-4C36-9F21-11A58D55D03A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_w-2245_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "42A4C795-500D-4B83-8DC5-327E011BA7E5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_w-2245:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D132291B-AADD-49E3-ADD6-333E1F1D8DFE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_w-2235_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E8852E4-C6AF-41D1-AF12-646B06C99600",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_w-2235:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC75E5CF-4241-45A8-AD45-1F7F077CEEA1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_w-2225_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "32D47430-800D-43F5-AA6E-8852969BEFAB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_w-2225:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0CD8EE0E-2BA3-49DD-91D1-81AB67F16475",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_w-2223_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D44FD82-EEBB-4388-B346-EB29B852F2EA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_w-2223:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "708D6E00-A2E5-4B08-88E7-C872ACFC341D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:core_i9-9980hk_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD455EBB-69AE-464A-93AA-13227FBD17E2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i9-9980hk:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A48A2969-DC53-48E2-A5CA-4DF2B00D1960",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:core_i9-9880h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9A727A1-219F-4B78-B490-0E47340B38F3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i9-9880h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "659206BB-510A-47F8-8B6E-FD030A6BE1DA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:core_i7-9850h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BB8CB49-D52E-4C92-9CD5-465615916213",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D0320CB-05E3-4D5B-BCEF-D862566B0AA2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:core_i7-9750hf_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "455BC769-5B19-4B91-844B-15B4FB2401E2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i7-9750hf:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "31CD303F-AAE9-4635-987D-742031232BDD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:core_i5-9400h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D95AB3F9-7B28-46F8-8882-4976DBBCC767",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i5-9400h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85F465BF-4548-45EB-AC40-384F4E6248EE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:core_i5-9300h_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "37E9BA09-E255-438E-9938-3F51A78A3331",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i5-9300h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A735A90-47E1-44C6-AE76-F6C7FFDCD4D0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:core_i9-9900k_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA036BD6-38AF-4763-9B84-8CD7019BF262",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C3257F5-CA55-4F35-9D09-5B85253DE786",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:core_i9-9900kf_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD9D4C3C-BD9C-4AF1-92BF-127D9A6B7B44",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i9-9900kf:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6F8CEA0-1CD6-4F17-85E3-C1CB04D9833A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:core_i7-9700k_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6CCE2EBC-82FE-49AB-857B-403C7ACE5091",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1FB0C1DA-60C6-4C9E-99D6-7A47696DACD8",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:core_i7-9700kf_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1163CF40-4D70-4965-8229-B102D754ECD2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i7-9700kf:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2EB81B1-7DEF-4CC3-ADC9-A4CB1042E406",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:core_i5-9600k_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B26CE379-73B5-4E3C-B0B2-7550A3A670BC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i5-9600k:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1DFFFEB-CC63-4F51-8828-C5D4E0287264",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:core_i5-9600kf_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "79F5E016-5AB5-4DB5-BDB0-75AE14253413",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i5-9600kf:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B176D141-26B0-477E-B2DB-2E48D6FB82AE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:core_i5-9400_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AA0AF35-BED8-41EC-831A-57CFA7A5F0D0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i5-9400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AC9F52F-6669-459A-A0A9-8F472E1F2761",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:core_i5-9400f_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC4DDD41-51CD-40FF-BCB0-29D559C1CAD5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i5-9400f:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7E91B92-4DB7-4866-8370-C6F8616D3D81",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_e-2288g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3540784A-1B0B-41EE-AB66-A293AC400C39",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EA930BC-EF68-4AD5-AA1B-0659358028D5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_e-2286m_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "39616E34-9182-485B-B6AE-566DE2E77AA5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "556637E1-9502-41E7-B91D-082C92F233A1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_e-2278gel_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F68C14E0-5711-4D18-B529-AA0EE3BDC99C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "60B582A1-784C-4BE8-A0D5-706DE01D769E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_e-2278ge_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0DFD79A0-2F24-484C-AD4A-D58B7414788E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "00912C9C-D386-445E-B390-E96361ECDFA6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:xeon_e-2278g_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C02909B-E06F-4786-ABB9-ACF5D9C5E4D0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "63650DBF-4DBD-4655-AE93-5CBE53F8E0FB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:core_i7-10510u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D449326-502E-488D-9933-863B9CF997FC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "494A828B-F2BF-40CA-AAFB-7D2AF2BAF3AA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:core_i5-10210u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "16920A34-D1CE-4F1A-BCF7-045E3B3AA9AC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "71615EAF-4DF4-4B9E-BF34-6ED0371A53D7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:pentium_6405u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3408FB7-9D72-4FC2-8E54-5248B6722755",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:pentium_6405u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "65FEB59A-6AF4-4E64-8BE9-437178D1EA0B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:celeron_5305u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C2F8F8B9-FBAC-43AE-AB18-86FF0A2C5DA9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:celeron_5305u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "39831D4E-743A-4C09-900F-24DDAB5D1B22",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:core_i7-8565u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "50E893B9-92D2-4EA9-BDC6-0E73CA4EE484",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F41025AC-6EFE-4562-B1D1-BAB004875B06",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:core_i7-8665u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DF86B5D-4B93-4DFA-945E-723F49D90F1C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "34DD3CCB-91D5-48D6-80BC-CA643385BCE4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:core_i5-8365u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78DB74AB-9D98-40B0-9715-EF934125C228",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9054F35-AAB5-481E-B512-EDF4C3F2EA2F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:intel:core_i5-8265u_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7001A74-CFF9-4CBB-A72B-E476C22ADF07",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D3E166F-3D9F-4D0D-924A-147883598EA3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
                     matchCriteriaId: "815D70A8-47D3-459C-A32C-9FEACA0659D1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:redhat:codeready_linux_builder:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "93A089E2-D66E-455C-969A-3140D991BAF4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:codeready_linux_builder_eus:8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "445D0C8B-E07B-4F58-9F88-D5B244DAF41B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:codeready_linux_builder_eus:8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "860EA789-CC44-409C-882D-4FC4CAB42912",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:codeready_linux_builder_eus:8.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "B399239A-5211-4174-9A47-A71DBA786426",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:codeready_linux_builder_eus:8.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BE16CC2-C6B4-4B73-98A1-F28475A92F49",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:virtualization_manager:4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "E938A8EB-68FE-427B-B67E-C880FBF54BBE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4CFF558-3C47-480D-A2F0-BABF26042943",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "33C068A4-3780-4EAB-A937-6082DF847564",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "5BF3C7A5-9117-42C7-BEA1-4AA378A582EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "83737173-E12E-4641-BC49-0BD84A6B29D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "92BC9265-6959-4D37-BE5E-8C45E98992F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "831F0F47-3565-4763-B16F-C87B1FF2035E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E3F09B5-569F-4C58-9FCA-3C0953D107B5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C3741B8-851F-475D-B428-523F4F722350",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "51EF4996-72F4-4FA4-814F-F5991E7A8318",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "B353CE99-D57C-465B-AAB0-73EF581127D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "7431ABC1-9252-419E-8CC1-311B41360078",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "6897676D-53F9-45B3-B27F-7FF9A4C58D33",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "E28F226A-CBC7-4A32-BE58-398FA5B42481",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "76C24D94-834A-4E9D-8F73-624AFA99AAA2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "17F256A9-D3B9-4C72-B013-4EFD878BFEA8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "B09ACF2D-D83F-4A86-8185-9569605D8EE1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC10D919-57FD-4725-B8D2-39ECB476902F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "1272DF03-7674-4BD4-8E64-94004B195448",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "825ECE2D-E232-46E0-A047-074B34DB1E97",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "D3E503FB-6279-4D4A-91D8-E237ECF9D2B0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.",
      },
      {
         lang: "es",
         value: "Una condición de tipo TSX Asynchronous Abort en algunas CPU que utilizan ejecución especulativa puede habilitar a un usuario autenticado para permitir potencialmente una divulgación de información por medio de un canal lateral con acceso local.",
      },
   ],
   id: "CVE-2019-11135",
   lastModified: "2024-11-21T04:20:35.583",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 6.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "CHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2,
            impactScore: 4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-11-14T19:15:13.113",
   references: [
      {
         source: "secure@intel.com",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00045.html",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00046.html",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00042.html",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Patch",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/155375/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2019/12/10/3",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2019/12/10/4",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2019/12/11/1",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2019:3936",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2020:0026",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2020:0028",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2020:0204",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2020:0279",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2020:0366",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2020:0555",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2020:0666",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2020:0730",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10306",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2019/12/msg00035.html",
      },
      {
         source: "secure@intel.com",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5WWPW4BSZDDW7VHU427XTVXV7ROOFFW/",
      },
      {
         source: "secure@intel.com",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IZYATWNUGHRBG6I3TC24YHP5Y3J7I6KH/",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://seclists.org/bugtraq/2019/Dec/28",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Mailing List",
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://seclists.org/bugtraq/2019/Nov/26",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://seclists.org/bugtraq/2020/Jan/21",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.gentoo.org/glsa/202003-56",
      },
      {
         source: "secure@intel.com",
         url: "https://support.f5.com/csp/article/K02912734?utm_source=f5support&amp%3Butm_medium=RSS",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03968en_us",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://usn.ubuntu.com/4186-2/",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2020/dsa-4602",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
      },
      {
         source: "secure@intel.com",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpujan2021.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00045.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00046.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00042.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/155375/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2019/12/10/3",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2019/12/10/4",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://www.openwall.com/lists/oss-security/2019/12/11/1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2019:3936",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2020:0026",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2020:0028",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2020:0204",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2020:0279",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2020:0366",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2020:0555",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2020:0666",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2020:0730",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10306",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2019/12/msg00035.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5WWPW4BSZDDW7VHU427XTVXV7ROOFFW/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IZYATWNUGHRBG6I3TC24YHP5Y3J7I6KH/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://seclists.org/bugtraq/2019/Dec/28",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://seclists.org/bugtraq/2019/Nov/26",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://seclists.org/bugtraq/2020/Jan/21",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.gentoo.org/glsa/202003-56",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://support.f5.com/csp/article/K02912734?utm_source=f5support&amp%3Butm_medium=RSS",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03968en_us",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://usn.ubuntu.com/4186-2/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.debian.org/security/2020/dsa-4602",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://www.oracle.com/security-alerts/cpujan2021.html",
      },
   ],
   sourceIdentifier: "secure@intel.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2007-07-16 22:30
Modified
2024-11-21 00:34
Summary
Integer overflow in print-bgp.c in the BGP dissector in tcpdump 3.9.6 and earlier allows remote attackers to execute arbitrary code via crafted TLVs in a BGP packet, related to an unchecked return value.
References
cve@mitre.orghttp://bugs.gentoo.org/show_bug.cgi?id=184815Third Party Advisory
cve@mitre.orghttp://cvs.tcpdump.org/cgi-bin/cvsweb/tcpdump/print-bgp.c?r1=1.91.2.11&r2=1.91.2.12Broken Link
cve@mitre.orghttp://docs.info.apple.com/article.html?artnum=307179Broken Link
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2007/Dec/msg00002.htmlMailing List
cve@mitre.orghttp://secunia.com/advisories/26135Broken Link, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26168Broken Link, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26223Broken Link, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26231Broken Link, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26263Broken Link, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26266Broken Link, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26286Broken Link, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26395Broken Link, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26404Broken Link, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26521Broken Link, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/27580Broken Link, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/28136Broken Link, Vendor Advisory
cve@mitre.orghttp://security.freebsd.org/advisories/FreeBSD-SA-07:06.tcpdump.ascThird Party Advisory
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200707-14.xmlThird Party Advisory
cve@mitre.orghttp://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.449313Mailing List, Patch
cve@mitre.orghttp://www.debian.org/security/2007/dsa-1353Third Party Advisory
cve@mitre.orghttp://www.digit-labs.org/files/exploits/private/tcpdump-bgp.cExploit
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2007:148Third Party Advisory
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2007_16_sr.htmlBroken Link
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2007-0368.htmlBroken Link
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2007-0387.htmlBroken Link, Vendor Advisory
cve@mitre.orghttp://www.securityfocus.com/archive/1/474225/100/0/threadedBroken Link, Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.securityfocus.com/bid/24965Broken Link, Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.securitytracker.com/id?1018434Broken Link, Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.trustix.org/errata/2007/0023/Broken Link
cve@mitre.orghttp://www.turbolinux.com/security/2007/TLSA-2007-46.txtBroken Link
cve@mitre.orghttp://www.ubuntu.com/usn/usn-492-1Third Party Advisory
cve@mitre.orghttp://www.us-cert.gov/cas/techalerts/TA07-352A.htmlBroken Link, Third Party Advisory, US Government Resource
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/2578Broken Link, Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/4238Broken Link, Vendor Advisory
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9771Broken Link
af854a3a-2127-422b-91ae-364da2661108http://bugs.gentoo.org/show_bug.cgi?id=184815Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://cvs.tcpdump.org/cgi-bin/cvsweb/tcpdump/print-bgp.c?r1=1.91.2.11&r2=1.91.2.12Broken Link
af854a3a-2127-422b-91ae-364da2661108http://docs.info.apple.com/article.html?artnum=307179Broken Link
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.htmlMailing List
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26135Broken Link, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26168Broken Link, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26223Broken Link, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26231Broken Link, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26263Broken Link, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26266Broken Link, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26286Broken Link, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26395Broken Link, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26404Broken Link, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26521Broken Link, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27580Broken Link, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28136Broken Link, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://security.freebsd.org/advisories/FreeBSD-SA-07:06.tcpdump.ascThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200707-14.xmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.449313Mailing List, Patch
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2007/dsa-1353Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.digit-labs.org/files/exploits/private/tcpdump-bgp.cExploit
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:148Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2007_16_sr.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-0368.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-0387.htmlBroken Link, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/474225/100/0/threadedBroken Link, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/24965Broken Link, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1018434Broken Link, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2007/0023/Broken Link
af854a3a-2127-422b-91ae-364da2661108http://www.turbolinux.com/security/2007/TLSA-2007-46.txtBroken Link
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-492-1Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA07-352A.htmlBroken Link, Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2578Broken Link, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/4238Broken Link, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9771Broken Link



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:tcpdump:tcpdump:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BFFEF20-AB6E-4D82-81A9-B7AED327540C",
                     versionEndIncluding: "3.9.6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
                     matchCriteriaId: "454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "23E304C9-F780-4358-A58D-1E4C93977704",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*",
                     matchCriteriaId: "6EBDAFF8-DE44-4E80-B6BD-E341F767F501",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2E0C1F8-31F5-4F61-9DF7-E49B43D3C873",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F92AB32-E7DE-43F4-B877-1F41FA162EC7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:slackware:slackware:9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "399C55D7-0D4D-4D1F-B0C0-5BEF084BBFA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:slackware:slackware:9.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "644AEB96-EABA-4637-8C51-6E8AE7BB7299",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:slackware:slackware:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "258358F0-DC55-44D8-9440-C803C8C5FDC7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:slackware:slackware:10.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "653831E7-C117-4CD7-ADA4-11E6FE15A897",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:slackware:slackware:10.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1BACED6-11B1-44C7-82CC-AAD7C424112E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:slackware:slackware:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "4BE76350-E2BF-499C-BC2B-A82ADCC20037",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:slackware:slackware:12.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FD92835-0C55-4FD8-9808-393AC77F45B6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C25C4C48-0C37-4B55-9124-4D3EFA6A7B98",
                     versionEndExcluding: "5.5",
                     versionStartIncluding: "5.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5CD4018D-F0ED-407F-8C94-CD6095871948",
                     versionEndExcluding: "6.1",
                     versionStartIncluding: "6.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.5:-:*:*:*:*:*:*",
                     matchCriteriaId: "4E63AC19-08C0-476A-B557-0CCC24A4DC88",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.5:p1:*:*:*:*:*:*",
                     matchCriteriaId: "46589B30-1A6C-4764-BBC5-969E2BE82F65",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.5:p11:*:*:*:*:*:*",
                     matchCriteriaId: "C3565238-C0D8-4196-BE25-5A0E9CB18F07",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.5:p12:*:*:*:*:*:*",
                     matchCriteriaId: "9EEBA213-0CE9-4C14-B543-02323421698B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.5:p13:*:*:*:*:*:*",
                     matchCriteriaId: "33229F64-E6CA-436B-A495-C753CF268068",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.5:p14:*:*:*:*:*:*",
                     matchCriteriaId: "EF3D3B09-4505-4FBE-BD78-CF106530B9F7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.5:p2:*:*:*:*:*:*",
                     matchCriteriaId: "EB8ED096-29AB-4509-92C9-E9AA9D3653FE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.5:p3:*:*:*:*:*:*",
                     matchCriteriaId: "A6751AB8-2F96-45CE-A2B1-F13621599009",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.5:p4:*:*:*:*:*:*",
                     matchCriteriaId: "DA3B6BBC-3EA2-445B-94B1-B079ABB0B22D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.5:p5:*:*:*:*:*:*",
                     matchCriteriaId: "44136741-534D-4D3B-83E2-E1D2D367953B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.5:p7:*:*:*:*:*:*",
                     matchCriteriaId: "5050EAD4-3635-4EBA-BA53-3CCF4D291269",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.5:p8:*:*:*:*:*:*",
                     matchCriteriaId: "C21700B9-9A63-41C2-92AA-3F4FB9DA68C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:5.5:p9:*:*:*:*:*:*",
                     matchCriteriaId: "0DE96008-FDC8-480A-B144-079086CCCE29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:6.1:-:*:*:*:*:*:*",
                     matchCriteriaId: "B513BA9C-C121-4DCB-912F-529727217E8C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:6.1:p1:*:*:*:*:*:*",
                     matchCriteriaId: "25273989-AC00-4649-BEAE-68F27DA09E15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:6.1:p10:*:*:*:*:*:*",
                     matchCriteriaId: "3F756D1C-1DF7-484E-8A28-FE4886EC8DA7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:6.1:p11:*:*:*:*:*:*",
                     matchCriteriaId: "6CA31CA1-A913-4E5B-A38B-F39A734602DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:6.1:p12:*:*:*:*:*:*",
                     matchCriteriaId: "B4439012-E5BD-4D24-8E37-B78368AFFCDD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:6.1:p13:*:*:*:*:*:*",
                     matchCriteriaId: "11CDF5CE-C4E8-4DEF-A1FC-C6FF8386D227",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:6.1:p16:*:*:*:*:*:*",
                     matchCriteriaId: "DF0868FD-2166-4C97-BA26-AB04FFDD53D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:6.1:p17:*:*:*:*:*:*",
                     matchCriteriaId: "E9D30D8B-0A80-4D57-BC7A-6E948CD03E61",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:6.1:p18:*:*:*:*:*:*",
                     matchCriteriaId: "B8C40E1F-F185-4FBF-A93D-86222DBE4BC1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:6.1:p2:*:*:*:*:*:*",
                     matchCriteriaId: "AB7A908F-7983-479D-B17F-5E8C0DB1E2B5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:6.1:p4:*:*:*:*:*:*",
                     matchCriteriaId: "B1057593-E615-45AE-AFED-BEB83BBA8B03",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:6.1:p6:*:*:*:*:*:*",
                     matchCriteriaId: "FBF6AEE8-F623-4DAF-88D6-D2996C3E4371",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:6.1:p7:*:*:*:*:*:*",
                     matchCriteriaId: "644CDF2C-D0E2-47CC-B891-50F75FE9AD41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:6.1:p9:*:*:*:*:*:*",
                     matchCriteriaId: "6B7A0851-82B7-4AFE-B497-143770AC2BEF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:6.2:-:*:*:*:*:*:*",
                     matchCriteriaId: "99009B85-61C6-4113-B3EF-40B8F330B65C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:6.2:p1:*:*:*:*:*:*",
                     matchCriteriaId: "34B2D56E-32CE-4892-958A-CE339F69D63C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:6.2:p4:*:*:*:*:*:*",
                     matchCriteriaId: "BBCED956-7969-40E0-8E45-8A8DB8C4473F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:6.2:p5:*:*:*:*:*:*",
                     matchCriteriaId: "285D90AC-242A-403F-BB38-A52459523B4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:6.2:p6:*:*:*:*:*:*",
                     matchCriteriaId: "B7749CCD-6474-4E81-8C08-F44EF0C306A9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F5DEE66-117C-4844-8FD4-065D0820A808",
                     versionEndExcluding: "10.4.11",
                     versionStartIncluding: "10.0.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9ACE85A-56A0-404C-AB58-A4F5CA73243C",
                     versionEndExcluding: "10.4.11",
                     versionStartIncluding: "10.0.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Integer overflow in print-bgp.c in the BGP dissector in tcpdump 3.9.6 and earlier allows remote attackers to execute arbitrary code via crafted TLVs in a BGP packet, related to an unchecked return value.",
      },
      {
         lang: "es",
         value: "Un desbordamiento de enteros en el archivo print-bgp.c en el disector BGP en tcpdump versión 3.9.6 y anteriores, permite a atacantes remotos ejecutar código arbitrario por medio de TLVs especialmente diseñados en un paquete BGP, relacionado a un valor de retorno no comprobado.",
      },
   ],
   id: "CVE-2007-3798",
   lastModified: "2024-11-21T00:34:05.410",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 6.8,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
            type: "Secondary",
         },
      ],
   },
   published: "2007-07-16T22:30:00.000",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://bugs.gentoo.org/show_bug.cgi?id=184815",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://cvs.tcpdump.org/cgi-bin/cvsweb/tcpdump/print-bgp.c?r1=1.91.2.11&r2=1.91.2.12",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://docs.info.apple.com/article.html?artnum=307179",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/26135",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/26168",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/26223",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/26231",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/26263",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/26266",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/26286",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/26395",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/26404",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/26521",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/27580",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/28136",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://security.freebsd.org/advisories/FreeBSD-SA-07:06.tcpdump.asc",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://security.gentoo.org/glsa/glsa-200707-14.xml",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Mailing List",
            "Patch",
         ],
         url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.449313",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.debian.org/security/2007/dsa-1353",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
         ],
         url: "http://www.digit-labs.org/files/exploits/private/tcpdump-bgp.c",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:148",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://www.novell.com/linux/security/advisories/2007_16_sr.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2007-0368.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2007-0387.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/archive/1/474225/100/0/threaded",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/24965",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id?1018434",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://www.trustix.org/errata/2007/0023/",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "http://www.turbolinux.com/security/2007/TLSA-2007-46.txt",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.ubuntu.com/usn/usn-492-1",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.us-cert.gov/cas/techalerts/TA07-352A.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
            "Vendor Advisory",
         ],
         url: "http://www.vupen.com/english/advisories/2007/2578",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
            "Vendor Advisory",
         ],
         url: "http://www.vupen.com/english/advisories/2007/4238",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Broken Link",
         ],
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9771",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://bugs.gentoo.org/show_bug.cgi?id=184815",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://cvs.tcpdump.org/cgi-bin/cvsweb/tcpdump/print-bgp.c?r1=1.91.2.11&r2=1.91.2.12",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://docs.info.apple.com/article.html?artnum=307179",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
         ],
         url: "http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/26135",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/26168",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/26223",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/26231",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/26263",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/26266",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/26286",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/26395",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/26404",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/26521",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/27580",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/28136",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://security.freebsd.org/advisories/FreeBSD-SA-07:06.tcpdump.asc",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://security.gentoo.org/glsa/glsa-200707-14.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Patch",
         ],
         url: "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.449313",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.debian.org/security/2007/dsa-1353",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
         ],
         url: "http://www.digit-labs.org/files/exploits/private/tcpdump-bgp.c",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.mandriva.com/security/advisories?name=MDKSA-2007:148",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://www.novell.com/linux/security/advisories/2007_16_sr.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2007-0368.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Vendor Advisory",
         ],
         url: "http://www.redhat.com/support/errata/RHSA-2007-0387.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/archive/1/474225/100/0/threaded",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/24965",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securitytracker.com/id?1018434",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://www.trustix.org/errata/2007/0023/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "http://www.turbolinux.com/security/2007/TLSA-2007-46.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.ubuntu.com/usn/usn-492-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.us-cert.gov/cas/techalerts/TA07-352A.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Vendor Advisory",
         ],
         url: "http://www.vupen.com/english/advisories/2007/2578",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
            "Vendor Advisory",
         ],
         url: "http://www.vupen.com/english/advisories/2007/4238",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Broken Link",
         ],
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9771",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vendorComments: [
      {
         comment: "This issue does not affect the version of tcpdump shipped in Red Hat Enterprise Linux 2.1 or 3.\n\nRed Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=250275\n\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.  More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/",
         lastModified: "2007-07-31T00:00:00",
         organization: "Red Hat",
      },
   ],
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-252",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-252",
            },
         ],
         source: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         type: "Secondary",
      },
   ],
}