CVE-2017-5715

MEDIUM
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

References

https://www.synology.com/support/security/Synology_SA_18_01

https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/

https://support.lenovo.com/us/en/solutions/LEN-18282

https://support.f5.com/csp/article/K91229003

https://spectreattack.com/

https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr

https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002

https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html

https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/

https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/

https://access.redhat.com/security/vulnerabilities/speculativeexecution

http://xenbits.xen.org/xsa/advisory-254.html

http://www.securitytracker.com/id/1040071

http://www.kb.cert.org/vuls/id/584653

http://nvidia.custhelp.com/app/answers/detail/a_id/4609

https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html

https://www.exploit-db.com/exploits/43427/

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel

https://support.citrix.com/article/CTX231399

https://security.netapp.com/advisory/ntap-20180104-0001/

http://www.securityfocus.com/bid/102376

http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html

http://nvidia.custhelp.com/app/answers/detail/a_id/4614

http://nvidia.custhelp.com/app/answers/detail/a_id/4613

http://nvidia.custhelp.com/app/answers/detail/a_id/4611

http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html

http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html

http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html

http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html

http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html

http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html

http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html

http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html

http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html

http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html

http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html

http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html

https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html

https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us

https://usn.ubuntu.com/usn/usn-3516-1/

http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html

https://access.redhat.com/errata/RHSA-2018:0292

https://www.debian.org/security/2018/dsa-4120

http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt

https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc

https://usn.ubuntu.com/3597-2/

https://usn.ubuntu.com/3597-1/

https://usn.ubuntu.com/3594-1/

https://usn.ubuntu.com/3582-2/

https://usn.ubuntu.com/3582-1/

https://usn.ubuntu.com/3581-2/

https://usn.ubuntu.com/3581-1/

https://usn.ubuntu.com/3580-1/

https://usn.ubuntu.com/3561-1/

https://usn.ubuntu.com/3560-1/

https://usn.ubuntu.com/3549-1/

https://usn.ubuntu.com/3531-1/

https://usn.ubuntu.com/3542-2/

https://www.vmware.com/security/advisories/VMSA-2018-0007.html

https://usn.ubuntu.com/3541-2/

https://usn.ubuntu.com/3540-2/

https://usn.ubuntu.com/3531-3/

https://usn.ubuntu.com/3620-2/

https://www.debian.org/security/2018/dsa-4188

https://www.debian.org/security/2018/dsa-4187

https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html

https://cert.vde.com/en-us/advisories/vde-2018-003

https://cert.vde.com/en-us/advisories/vde-2018-002

https://www.kb.cert.org/vuls/id/180049

https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability

https://www.debian.org/security/2018/dsa-4213

https://usn.ubuntu.com/3690-1/

https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html

https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html

http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html

https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us

https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html

https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html

http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html

https://usn.ubuntu.com/3777-3/

https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001

https://security.gentoo.org/glsa/201810-06

https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes

https://seclists.org/bugtraq/2019/Jun/36

http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt

https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html

https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf

https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc

https://seclists.org/bugtraq/2019/Nov/16

http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html

https://security.paloaltonetworks.com/CVE-2017-5715

https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html

Details

Source: MITRE

Published: 2018-01-04

Updated: 2021-04-14

Type: CWE-203

Risk Information

CVSS v2

Base Score: 1.9

Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N

Impact Score: 2.9

Exploitability Score: 3.4

Severity: LOW

CVSS v3

Base Score: 5.6

Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N

Impact Score: 4

Exploitability Score: 1.1

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c2316:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c2338:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c2350:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c2358:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c2508:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c2516:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c2518:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c2530:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c2538:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c2550:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c2558:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c2718:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c2730:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c2738:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c2750:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c2758:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_x3:c3130:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_x3:c3200rk:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_x3:c3205rk:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_x3:c3230rk:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_x3:c3235rk:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_x3:c3265rk:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_x3:c3295rk:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_x3:c3405:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_x3:c3445:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3770d:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3775:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3775d:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3785:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3795:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_j:j1750:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_j:j1800:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_j:j1850:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_j:j1900:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_j:j3060:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_j:j3160:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_j:j3355:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n2805:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n2806:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n2807:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n2808:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n2810:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n2815:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n2820:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n2830:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n2840:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n2910:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n2920:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n2930:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n2940:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n3000:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n3010:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n3050:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n3060:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n3150:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n3160:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n3350:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n4000:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n4100:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3450:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_m:5y10:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_m:5y10a:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_m:5y10c:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_m:5y31:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_m:5y51:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_m:5y70:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_m:5y71:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_m3:6y30:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_m3:7y30:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_m3:7y32:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_m5:6y54:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_m5:6y57:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_m7:6y75:*:*:*:*:*:*:*

cpe:2.3:h:intel:pentium_j:j2850:*:*:*:*:*:*:*

cpe:2.3:h:intel:pentium_j:j2900:*:*:*:*:*:*:*

cpe:2.3:h:intel:pentium_j:j3710:*:*:*:*:*:*:*

cpe:2.3:h:intel:pentium_j:j4205:*:*:*:*:*:*:*

cpe:2.3:h:intel:pentium_n:n3510:*:*:*:*:*:*:*

cpe:2.3:h:intel:pentium_n:n3520:*:*:*:*:*:*:*

cpe:2.3:h:intel:pentium_n:n3530:*:*:*:*:*:*:*

cpe:2.3:h:intel:pentium_n:n3540:*:*:*:*:*:*:*

cpe:2.3:h:intel:pentium_n:n3700:*:*:*:*:*:*:*

cpe:2.3:h:intel:pentium_n:n3710:*:*:*:*:*:*:*

cpe:2.3:h:intel:pentium_n:n4200:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:e5502:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:e5503:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:e5504:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:e5506:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:e5507:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:e5520:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:e5530:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:e5540:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:e5603:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:e5606:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:e5607:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:e5620:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:e5630:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:e5640:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:e5645:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:e5649:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:e6510:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:e6540:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:e7520:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:e7530:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:e7540:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:ec5509:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:ec5539:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:ec5549:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:l3406:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:l3426:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:l5506:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:l5508:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:l5518:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:l5520:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:l5530:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:l5609:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:l5618:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:l5630:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:l5638:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:l5640:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:l7545:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:l7555:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:lc5518:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:lc5528:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:w3670:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:w3680:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:w3690:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:w5580:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:w5590:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x3430:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x3440:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x3450:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x3460:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x3470:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x3480:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x5550:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x5560:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x5570:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x5647:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x5650:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x5660:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x5667:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x5670:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x5672:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x5675:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x5677:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x5680:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x5687:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x5690:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x6550:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x7542:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x7550:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x7560:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e-1105c:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1505m_v6:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1515m_v5:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1535m_v5:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1535m_v6:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1545m_v5:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1558l_v5:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1565l_v5:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1575m_v5:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1578l_v5:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1585_v5:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1585l_v5:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1105c_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1125c:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1125c_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1220:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_12201:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_12201_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1220_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1220_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1220l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1225:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1225_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1225_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1226_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1230:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1230_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1230_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1230l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1231_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1235:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1240:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1240_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1240_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1240l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1241_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1245:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1245_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1245_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1246_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1258l_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1260l:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1265l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1265l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1265l_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1268l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1270:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1270_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1270_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1271_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1275:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1275_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1275_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1275l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1276_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1278l_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1280:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1280_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1280_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1281_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1285_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1285_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1285l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1285l_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1286_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1286l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1290:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1290_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1501l_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1501m_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1505l_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1505l_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1505m_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2650l_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2658:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2658_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2658_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2658_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2658a_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2660:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2660_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2660_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2660_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2665:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2667:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2667_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2667_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2667_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2670:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2670_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2670_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2680:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2680_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2680_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2680_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2683_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2683_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2687w:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2687w_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2687w_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2687w_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2690:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2690_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2690_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2690_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2695_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2695_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2695_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2697_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2697_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2697_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2697a_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2698_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2698_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2699_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2699_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2699a_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2699r_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4603:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4603_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4607:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4607_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4610:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4610_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4610_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4610_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4617:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4620:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4620_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4620_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4620_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4624l_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4627_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4627_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4627_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4628l_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4640:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4640_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4640_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4640_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4648_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4650:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4650_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4650_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4650_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4650l:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4655_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4655_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4657l_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4660_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4660_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4667_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4667_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4669_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4669_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1428l:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1428l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1428l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1620:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1620_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1620_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1620_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1630_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1630_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1650:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1650_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1650_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1650_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1660:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1660_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1660_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1660_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1680_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1680_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2403:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2403_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2407:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2407_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2408l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2418l:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2418l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2418l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2420:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2420_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2428l:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2428l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2428l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2430:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2430_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2430l:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2430l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2438l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2440:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2440_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2448l:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2448l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2450:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2450_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2450l:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2450l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2470:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2470_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2603:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2603_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2603_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2603_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2608l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2608l_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2609:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2609_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2609_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2609_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2618l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2618l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2618l_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2620:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2620_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2620_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2620_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2623_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2623_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2628l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2628l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2628l_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2630:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2630_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2630_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2630_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2630l:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2630l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2630l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2630l_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2637:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2637_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2637_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2637_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2640:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2640_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2640_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2640_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2643:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2643_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2643_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2643_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2648l:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2648l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2648l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2648l_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2650:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2650_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2650_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2650_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2650l:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2650l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2650l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:2803:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:2820:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:2830:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:2850:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:2850_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:2860:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:2870:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:2870_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:2880_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:2890_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4807:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4809_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4809_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4809_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4820:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4820_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4820_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4820_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4830:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4830_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4830_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4830_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4850:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4850_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4850_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4850_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4860:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4860_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4870:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4870_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4880_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4890_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8830:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8837:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8850:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8850_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8857_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8860:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8860_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8860_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8867_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8867_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8867l:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8870:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8870_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8870_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8870_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8880_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8880_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8880_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8880l_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8880l_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8890_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8890_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8890_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8891_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8891_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8891_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8893_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8893_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8893_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8894_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:5118:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:5119t:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:5120:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:5120t:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:5122:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6126:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6126f:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6126t:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6128:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6130:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6130f:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6130t:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6132:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6134:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6134m:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6136:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6138:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6138f:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6138t:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6140:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6140m:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6142:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6142f:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6142m:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6144:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6146:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6148:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6148f:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6150:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6152:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6154:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_phi:7210:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_phi:7210f:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_phi:7230:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_phi:7230f:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_phi:7235:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_phi:7250:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_phi:7250f:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_phi:7285:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_phi:7290:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_phi:7290f:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_phi:7295:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:h:arm:cortex-a:73:*:*:*:*:*:*:*

cpe:2.3:h:arm:cortex-a:75:*:*:*:*:*:*:*

cpe:2.3:h:arm:cortex-a:9:*:*:*:*:*:*:*

cpe:2.3:h:arm:cortex-a:15:*:*:*:*:*:*:*

cpe:2.3:h:arm:cortex-a:17:*:*:*:*:*:*:*

cpe:2.3:h:arm:cortex-a:57:*:*:*:*:*:*:*

cpe:2.3:h:arm:cortex-a:72:*:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*

Configuration 4

OR

cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*

cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*

cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*

Configuration 5

AND

OR

cpe:2.3:o:siemens:simatic_winac_rtx_\(f\)_firmware:2010:-:*:*:*:*:*:*

cpe:2.3:o:siemens:simatic_winac_rtx_\(f\)_firmware:2010:sp1:*:*:*:*:*:*

cpe:2.3:o:siemens:simatic_winac_rtx_\(f\)_firmware:2010:sp2:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_winac_rtx_\(f\)_2010:-:*:*:*:*:*:*:*

Configuration 6

OR

cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 7

OR

cpe:2.3:a:oracle:communications_diameter_signaling_router:8.0.0:*:*:*:*:*:*:*

cpe:2.3:a:oracle:communications_diameter_signaling_router:8.1:*:*:*:*:*:*:*

cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2:*:*:*:*:*:*:*

cpe:2.3:a:oracle:communications_diameter_signaling_router:8.3:*:*:*:*:*:*:*

cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*

cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*

Tenable Plugins

View all (352 total)

IDNameProductFamilySeverity
140019OracleVM 3.4 : xen (OVMSA-2020-0039) (Bunker Buster) (Foreshadow) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout) (Meltdown) (POODLE) (Spectre)NessusOracleVM Local Security Checks
critical
137739OracleVM 3.3 / 3.4 : microcode_ctl (OVMSA-2020-0026) (Spectre)NessusOracleVM Local Security Checks
medium
134766Debian DLA-2148-1 : amd64-microcode security update (Spectre)NessusDebian Local Security Checks
medium
132251RancherOS < 1.1.4 Information DisclosureNessusMisc.
medium
132101Windows Speculative Execution Configuration CheckNessusWindows
medium
131297FreeBSD : FreeBSD -- Intel CPU Microcode Update (fbe10a8a-05a1-11ea-9dfa-f8b156ac3ff9) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout) (Spectre)NessusFreeBSD Local Security Checks
critical
127373NewStart CGSL MAIN 4.05 : kernel Vulnerability (NS-SA-2019-0125)NessusNewStart CGSL Local Security Checks
medium
127233NewStart CGSL CORE 5.04 / MAIN 5.04 : kernel-rt Multiple Vulnerabilities (NS-SA-2019-0049)NessusNewStart CGSL Local Security Checks
high
127169NewStart CGSL MAIN 5.04 : dracut Vulnerability (NS-SA-2019-0016)NessusNewStart CGSL Local Security Checks
medium
127152NewStart CGSL MAIN 5.04 : kernel Multiple Vulnerabilities (NS-SA-2019-0007)NessusNewStart CGSL Local Security Checks
medium
126670OracleVM 3.4 : Unbreakable / etc (OVMSA-2019-0035) (Spectre)NessusOracleVM Local Security Checks
medium
126610Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2019-4710) (Spectre)NessusOracle Linux Local Security Checks
medium
125753EulerOS Virtualization 2.5.1 : kernel (EulerOS-SA-2019-1638)NessusHuawei Local Security Checks
medium
125752EulerOS Virtualization 2.5.2 : kernel (EulerOS-SA-2019-1637)NessusHuawei Local Security Checks
medium
125216Processor Speculative Execution Vulnerabilities (Linux)NessusMisc.
medium
124953EulerOS Virtualization 3.0.1.0 : kvm (EulerOS-SA-2019-1450)NessusHuawei Local Security Checks
high
124836EulerOS Virtualization 3.0.1.0 : kernel (EulerOS-SA-2019-1515)NessusHuawei Local Security Checks
critical
700545Apple iOS < 11.2.2 Multiple Vulnerabilities (Spectre, APPLE-SA-2018-1-8-1)Nessus Network MonitorMobile Devices
low
123554SUSE SLES11 Security Update : various KMPs (SUSE-SU-2019:13999-1) (Spectre)NessusSuSE Local Security Checks
medium
123255openSUSE Security Update : kernel-firmware (openSUSE-2019-587) (Spectre)NessusSuSE Local Security Checks
medium
123226openSUSE Security Update : the Linux Kernel (openSUSE-2019-536) (Spectre)NessusSuSE Local Security Checks
high
123180openSUSE Security Update : xen (openSUSE-2019-418) (Meltdown) (Spectre)NessusSuSE Local Security Checks
medium
121909Photon OS 2.0: Linux PHSA-2018-2.0-0011NessusPhotonOS Local Security Checks
medium
121800Photon OS 1.0: Linux PHSA-2018-1.0-0098NessusPhotonOS Local Security Checks
medium
121035Security Updates for Windows 10 / Windows Server 2016 (January 2019) (Spectre)NessusWindows : Microsoft Bulletins
medium
120067SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2018:2092-1) (Spectre)NessusSuSE Local Security Checks
high
119239Security Updates for Windows 10 / Windows Server 2016 (September 2018) (Spectre)NessusWindows : Microsoft Bulletins
medium
118702F5 Networks BIG-IP : Side-channel processor vulnerabilities (K91229003) (Meltdown) (Spectre)NessusF5 Networks Local Security Checks
medium
118506GLSA-201810-06 : Xen: Multiple vulnerabilities (Foreshadow) (Meltdown) (Spectre)NessusGentoo Local Security Checks
critical
118322Ubuntu 16.04 LTS / 18.04 LTS : Linux kernel (Azure) vulnerabilities (USN-3777-3) (Spectre)NessusUbuntu Local Security Checks
high
118286SUSE SLES12 Security Update : libvirt (SUSE-SU-2018:2631-2) (Spectre)NessusSuSE Local Security Checks
medium
118266SUSE SLES12 Security Update : xen (SUSE-SU-2018:1699-2) (Meltdown) (Spectre)NessusSuSE Local Security Checks
medium
117545EulerOS Virtualization 2.5.0 : kernel (EulerOS-SA-2018-1236)NessusHuawei Local Security Checks
medium
117542EulerOS Virtualization 2.5.0 : kvm (EulerOS-SA-2018-1233)NessusHuawei Local Security Checks
medium
117502Debian DLA-1506-1 : intel-microcode security update (Foreshadow) (Spectre)NessusDebian Local Security Checks
medium
117354SUSE SLES12 Security Update : libvirt (SUSE-SU-2018:2631-1) (Spectre)NessusSuSE Local Security Checks
medium
117351Debian DLA-1497-1 : qemu security update (Spectre)NessusDebian Local Security Checks
critical
112147SUSE SLES11 Security Update : xen (SUSE-SU-2018:2528-1) (Foreshadow) (Meltdown) (Spectre)NessusSuSE Local Security Checks
high
112143openSUSE Security Update : kbuild / virtualbox (openSUSE-2018-938) (Spectre)NessusSuSE Local Security Checks
high
700325Mozilla Firefox < 57.0.4 Multiple VulnerabilitiesNessus Network MonitorWeb Clients
medium
700322Mozilla Firefox < 57 Multiple VulnerabilitiesNessus Network MonitorWeb Clients
critical
700321Mozilla Firefox < 56 Multiple VulnerabilitiesNessus Network MonitorWeb Clients
high
111992OracleVM 3.4 : xen (OVMSA-2018-0248) (Bunker Buster) (Foreshadow) (Meltdown) (POODLE) (Spectre)NessusOracleVM Local Security Checks
critical
111911Photon OS 1.0: Linux PHSA-2018-1.0-0098 (deprecated)NessusPhotonOS Local Security Checks
medium
111589openSUSE Security Update : kernel-firmware (openSUSE-2018-825) (Spectre)NessusSuSE Local Security Checks
medium
111503SUSE SLES12 Security Update : libvirt (SUSE-SU-2018:2141-1) (Spectre)NessusSuSE Local Security Checks
critical
111434SUSE SLES12 Security Update : libvirt (SUSE-SU-2018:2082-1) (Spectre)NessusSuSE Local Security Checks
high
111414openSUSE Security Update : the Linux Kernel (openSUSE-2018-762) (Spectre)NessusSuSE Local Security Checks
high
111282Photon OS 2.0 : linux (PhotonOS-PHSA-2018-2.0-0011) (Spectre) (deprecated)NessusPhotonOS Local Security Checks
medium
111082Debian DLA-1422-2 : linux security update (Spectre)NessusDebian Local Security Checks
high
111023OracleVM 3.4 : qemu-kvm (OVMSA-2018-0238) (Spectre)NessusOracleVM Local Security Checks
critical
110951Fedora 27 : 2:qemu (2018-9f02e5ed7b) (Spectre)NessusFedora Local Security Checks
medium
110939Ubuntu 14.04 LTS : amd64-microcode regression (USN-3690-2) (Spectre)NessusUbuntu Local Security Checks
medium
110709RHEL 7 : kernel-alt (RHSA-2018:1967) (Spectre)NessusRed Hat Local Security Checks
medium
110684SUSE SLES11 Security Update : kernel modules packages (SUSE-SU-2018:1784-1) (Spectre)NessusSuSE Local Security Checks
medium
110641Ubuntu 14.04 LTS / 16.04 LTS / 17.10 / 18.04 LTS : AMD Microcode update (USN-3690-1) (Spectre)NessusUbuntu Local Security Checks
medium
110621SUSE SLES11 Security Update : microcode_ctl (SUSE-SU-2018:1759-1) (Spectre)NessusSuSE Local Security Checks
medium
110596SUSE SLES12 Security Update : xen (SUSE-SU-2018:1699-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
medium
110509SUSE SLES12 Security Update : xen (SUSE-SU-2018:1658-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
medium
110470openSUSE Security Update : kernel-firmware (openSUSE-2018-590) (Spectre)NessusSuSE Local Security Checks
medium
110444SUSE SLES11 Security Update : xen (SUSE-SU-2018:1603-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
medium
110438openSUSE Security Update : xen (openSUSE-2018-599) (Meltdown) (Spectre)NessusSuSE Local Security Checks
medium
110339SUSE SLES12 Security Update : oracleasm kmp (SUSE-SU-2018:1503-1) (Spectre)NessusSuSE Local Security Checks
medium
110338SUSE SLES11 Security Update : gcc43 (SUSE-SU-2018:1498-1) (Spectre)NessusSuSE Local Security Checks
medium
110334openSUSE Security Update : kernel modules (openSUSE-2018-551) (Spectre)NessusSuSE Local Security Checks
medium
110208Debian DSA-4213-1 : qemu - security update (Spectre)NessusDebian Local Security Checks
critical
110110OracleVM 3.3 : xen (OVMSA-2018-0224) (Meltdown) (Spectre)NessusOracleVM Local Security Checks
high
110090SUSE SLES12 Security Update : qemu (SUSE-SU-2018:1386-1) (Spectre)NessusSuSE Local Security Checks
medium
110041SUSE SLES11 Security Update : kernel (SUSE-SU-2018:1376-1) (Spectre)NessusSuSE Local Security Checks
high
110035SUSE SLES11 Security Update : kernel (SUSE-SU-2018:1368-1) (Spectre)NessusSuSE Local Security Checks
high
110030SUSE SLES12 Security Update : qemu (SUSE-SU-2018:1363-1) (Spectre)NessusSuSE Local Security Checks
medium
109987OracleVM 3.4 : xen (OVMSA-2018-0218) (Meltdown) (Spectre)NessusOracleVM Local Security Checks
high
109886SUSE SLES11 Security Update : kvm (SUSE-SU-2018:1308-1) (Spectre)NessusSuSE Local Security Checks
high
109881Oracle Linux 6 : Unbreakable Enterprise kernel (ELSA-2018-4110) (Meltdown) (Spectre)NessusOracle Linux Local Security Checks
high
109861SUSE SLES11 Security Update : libvirt (SUSE-SU-2018:1295-1) (Spectre)NessusSuSE Local Security Checks
high
109829Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2018-4109) (Meltdown) (Spectre)NessusOracle Linux Local Security Checks
high
109668OracleVM 3.3 : Unbreakable / etc (OVMSA-2018-0041) (Spectre)NessusOracleVM Local Security Checks
high
109543Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2018-4089) (Spectre)NessusOracle Linux Local Security Checks
high
109531Debian DLA-1369-1 : linux security update (Spectre)NessusDebian Local Security Checks
critical
109524Oracle Linux 6 : Unbreakable Enterprise kernel (ELSA-2018-4088) (Spectre)NessusOracle Linux Local Security Checks
high
109518Debian DSA-4188-1 : linux - security update (Spectre)NessusDebian Local Security Checks
high
109517Debian DSA-4187-1 : linux - security update (Spectre)NessusDebian Local Security Checks
critical
109360SUSE SLES11 Security Update : kernel (SUSE-SU-2018:1080-1) (Spectre)NessusSuSE Local Security Checks
high
109358SUSE SLES11 Security Update : kvm (SUSE-SU-2018:1077-1) (Spectre)NessusSuSE Local Security Checks
high
109158OracleVM 3.4 : Unbreakable / etc (OVMSA-2018-0035) (Dirty COW) (Meltdown) (Spectre)NessusOracleVM Local Security Checks
high
109156Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2018-4071) (Dirty COW) (Meltdown) (Spectre)NessusOracle Linux Local Security Checks
high
109130Amazon Linux 2 : linux-firmware (ALAS-2018-962) (Spectre)NessusAmazon Linux Local Security Checks
medium
109124Amazon Linux 2 : microcode_ctl (ALAS-2018-953) (Spectre)NessusAmazon Linux Local Security Checks
medium
109123Amazon Linux 2 : libvirt (ALAS-2018-952) (Spectre)NessusAmazon Linux Local Security Checks
medium
109120Amazon Linux 2 : qemu-kvm (ALAS-2018-942) (Spectre)NessusAmazon Linux Local Security Checks
medium
109119Amazon Linux 2 : kernel (ALAS-2018-939) (Meltdown) (Spectre)NessusAmazon Linux Local Security Checks
medium
109115RHEL 7 : kernel (RHSA-2018:1129) (Meltdown) (Spectre)NessusRed Hat Local Security Checks
medium
109038pfSense < 2.4.3 Multiple Vulnerabilities (SA-18_01 / SA-18_02 / SA-18_03) (Meltdown) (Spectre)NessusFirewalls
critical
109020openSUSE Security Update : libvirt (openSUSE-2018-358) (Spectre)NessusSuSE Local Security Checks
high
109012SUSE SLED12 / SLES12 Security Update : libvirt (SUSE-SU-2018:0920-1) (Spectre)NessusSuSE Local Security Checks
high
109001SUSE SLED12 / SLES12 Security Update : xen (SUSE-SU-2018:0909-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
high
108964KB4093112: Windows 10 Version 1709 and Windows Server Version 1709 April 2018 Security Update (Meltdown)(Spectre)NessusWindows : Microsoft Bulletins
high
108929GLSA-201804-08 : QEMU: Multiple vulnerabilities (Spectre)NessusGentoo Local Security Checks
critical
108864OracleVM 3.2 : xen (OVMSA-2018-0029) (Meltdown) (Spectre)NessusOracleVM Local Security Checks
medium
108827SUSE SLED12 / SLES12 Security Update : libvirt (SUSE-SU-2018:0861-1) (Spectre)NessusSuSE Local Security Checks
high
108823OracleVM 3.4 : xen (OVMSA-2018-0028) (Spectre)NessusOracleVM Local Security Checks
medium
108750Ubuntu 14.04 LTS / 16.04 LTS / 17.10 : intel-microcode update (USN-3531-3) (Spectre)NessusUbuntu Local Security Checks
medium
108745SUSE SLES11 Security Update : libvirt (SUSE-SU-2018:0838-1) (Spectre)NessusSuSE Local Security Checks
high
108703FreeBSD : webkit2-gtk3 -- multiple vulnerabilities (1ce95bc7-3278-11e8-b527-00012e582166) (Spectre)NessusFreeBSD Local Security Checks
high
108686SUSE SLED12 / SLES12 Security Update : qemu (SUSE-SU-2018:0831-1) (Spectre)NessusSuSE Local Security Checks
critical
108576openSUSE Security Update : qemu (openSUSE-2018-291) (Spectre)NessusSuSE Local Security Checks
critical
108533SUSE SLED12 / SLES12 Security Update : qemu (SUSE-SU-2018:0762-1) (Spectre)NessusSuSE Local Security Checks
critical
108532SUSE SLES12 Security Update : crash (SUSE-SU-2018:0757-1) (Spectre)NessusSuSE Local Security Checks
medium
108478openSUSE Security Update : various KMPs (openSUSE-2018-284) (Spectre)NessusSuSE Local Security Checks
medium
108450SUSE SLED12 / SLES12 Security Update : ucode-intel (SUSE-SU-2018:0708-1) (Spectre)NessusSuSE Local Security Checks
medium
108449SUSE SLES11 Security Update : microcode_ctl (SUSE-SU-2018:0705-1) (Spectre)NessusSuSE Local Security Checks
medium
108437openSUSE Security Update : ucode-intel (openSUSE-2018-266) (Spectre)NessusSuSE Local Security Checks
medium
108372Ubuntu 16.04 LTS : Linux kernel (HWE) vulnerabilities (USN-3597-2) (Meltdown) (Spectre)NessusUbuntu Local Security Checks
medium
108371Ubuntu 17.10 : Linux kernel vulnerabilities (USN-3597-1) (Meltdown) (Spectre)NessusUbuntu Local Security Checks
medium
108369SUSE SLES11 Security Update : xen (SUSE-SU-2018:0678-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
high
108364Scientific Linux Security Update : kernel on SL6.x i386/x86_64 (20180313) (Meltdown) (Spectre)NessusScientific Linux Local Security Checks
medium
108358Oracle Linux 6 : kernel (ELSA-2018-0512) (Meltdown) (Spectre)NessusOracle Linux Local Security Checks
medium
108352FreeBSD : FreeBSD -- Speculative Execution Vulnerabilities (74daa370-2797-11e8-95ec-a4badb2f4699) (Meltdown) (Spectre)NessusFreeBSD Local Security Checks
medium
108341CentOS 6 : kernel (CESA-2018:0512) (Meltdown) (Spectre)NessusCentOS Local Security Checks
medium
108329RHEL 6 : kernel (RHSA-2018:0512) (Meltdown) (Spectre)NessusRed Hat Local Security Checks
medium
108326RHEL 6 : kernel (RHSA-2018:0496) (Meltdown) (Spectre)NessusRed Hat Local Security Checks
medium
108292KB4088880: Windows Server 2012 March 2018 Security Update (Meltdown)(Spectre)NessusWindows : Microsoft Bulletins
high
108291KB4088879: Windows 8.1 and Windows Server 2012 R2 March 2018 Security Update (Meltdown)(Spectre)NessusWindows : Microsoft Bulletins
high
108290KB4088878: Windows 7 and Windows Server 2008 R2 March 2018 Security Update (Meltdown)(Spectre)NessusWindows : Microsoft Bulletins
high
108279SUSE SLES11 Security Update : kernel (SUSE-SU-2018:0660-1) (Spectre)NessusSuSE Local Security Checks
critical
107293Ubuntu 14.04 LTS : linux vulnerability (USN-3594-1) (Spectre)NessusUbuntu Local Security Checks
medium
107254SUSE SLES11 Security Update : xen (SUSE-SU-2018:0638-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
high
107144SUSE SLES12 Security Update : xen (SUSE-SU-2018:0609-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
high
107140SUSE SLES12 Security Update : xen (SUSE-SU-2018:0601-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
high
107130OracleVM 3.4 : xen (OVMSA-2018-0021) (Meltdown) (Spectre)NessusOracleVM Local Security Checks
high
107129OracleVM 3.4 : xen (OVMSA-2018-0020) (Meltdown) (Spectre)NessusOracleVM Local Security Checks
high
107058RHEL 5 : kernel (RHSA-2018:0292) (Meltdown) (Spectre)NessusRed Hat Local Security Checks
medium
107055SUSE SLES11 Security Update : kernel (SUSE-SU-2018:0555-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
critical
106973Ubuntu 14.04 LTS : linux-lts-xenial, linux-aws vulnerabilities (USN-3582-2) (Spectre)NessusUbuntu Local Security Checks
high
106972Ubuntu 16.04 LTS : linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon vulnerabilities (USN-3582-1) (Spectre)NessusUbuntu Local Security Checks
high
106970Ubuntu 16.04 LTS : linux-hwe, linux-azure, linux-gcp, linux-oem vulnerabilities (USN-3581-2) (Spectre)NessusUbuntu Local Security Checks
high
106969Ubuntu 17.10 : linux vulnerabilities (USN-3581-1) (Spectre)NessusUbuntu Local Security Checks
high
106967SUSE SLES12 Security Update : kernel (SUSE-SU-2018:0525-1) (Spectre)NessusSuSE Local Security Checks
high
106955Debian DSA-4120-1 : linux - security update (Meltdown) (Spectre)NessusDebian Local Security Checks
high
106902Xen Multiple Vulnerabilities (Spectre) (Meltdown) (XSA-254)NessusMisc.
medium
106901SUSE SLED12 / SLES12 Security Update : xen (SUSE-SU-2018:0472-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
high
106864openSUSE Security Update : xen (openSUSE-2018-169) (Meltdown) (Spectre)NessusSuSE Local Security Checks
high
106834SUSE SLED12 / SLES12 Security Update : xen (SUSE-SU-2018:0438-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
high
106815SUSE SLES12 Security Update : kernel (SUSE-SU-2018:0437-1) (Spectre)NessusSuSE Local Security Checks
high
106801KB4074596: Windows 10 February 2018 Security Update (Meltdown)(Spectre)NessusWindows : Microsoft Bulletins
high
106798KB4074592: Windows 10 Version 1703 February 2018 Security Update (Meltdown)(Spectre)NessusWindows : Microsoft Bulletins
high
106797KB4074591: Windows 10 Version 1511 February 2018 Security Update (Meltdown)(Spectre)NessusWindows : Microsoft Bulletins
high
106796KB4074590: Windows 10 Version 1607 and Windows Server 2016 February 2018 Security Update (Meltdown)(Spectre)NessusWindows : Microsoft Bulletins
high
106748SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2018:0416-1) (Spectre)NessusSuSE Local Security Checks
critical
106740openSUSE Security Update : the Linux Kernel (openSUSE-2018-153) (Spectre)NessusSuSE Local Security Checks
critical
106677Ubuntu 14.04 LTS / 16.04 LTS / 17.10 : libvirt update (USN-3561-1) (Spectre)NessusUbuntu Local Security Checks
medium
106676Ubuntu 14.04 LTS / 16.04 LTS / 17.10 : qemu update (USN-3560-1) (Spectre)NessusUbuntu Local Security Checks
medium
106672SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2018:0383-1) (Spectre)NessusSuSE Local Security Checks
critical
106632Slackware 14.2 : Slackware 14.2 kernel (SSA:2018-037-01) (Spectre)NessusSlackware Local Security Checks
medium
106587Virtuozzo 6 : cpupools / cpupools-features / etc (VZA-2018-006)NessusVirtuozzo Local Security Checks
medium
106549openSUSE Security Update : webkit2gtk3 (openSUSE-2018-118) (Meltdown) (Spectre)NessusSuSE Local Security Checks
high
106524OracleVM 3.3 : Unbreakable / etc (OVMSA-2018-0016) (Meltdown) (Spectre)NessusOracleVM Local Security Checks
medium
106485Google Chrome < 64.0.3282.119 Multiple Vulnerabilities (Spectre)NessusWindows
high
106483Ubuntu 16.04 LTS : linux-kvm vulnerabilities (USN-3549-1) (Spectre)NessusUbuntu Local Security Checks
medium
106469OracleVM 3.4 : Unbreakable / etc (OVMSA-2018-0015) (BlueBorne) (Meltdown) (Spectre) (Stack Clash)NessusOracleVM Local Security Checks
critical
106468Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2018-4022) (Meltdown) (Spectre)NessusOracle Linux Local Security Checks
medium
106370SUSE SLED12 / SLES12 Security Update : webkit2gtk3 (SUSE-SU-2018:0219-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
high
106364Oracle Linux 7 : kernel (ELSA-2018-0151) (Meltdown) (Spectre)NessusOracle Linux Local Security Checks
high
106353CentOS 7 : kernel (CESA-2018:0151) (Meltdown) (Spectre)NessusCentOS Local Security Checks
high
106340Scientific Linux Security Update : kernel on SL7.x x86_64 (20180125) (Meltdown) (Spectre)NessusScientific Linux Local Security Checks
high
106335RHEL 7 : kernel (RHSA-2018:0182) (Meltdown) (Spectre)NessusRed Hat Local Security Checks
medium
106330RHEL 7 : kernel (RHSA-2018:0151) (Meltdown) (Spectre)NessusRed Hat Local Security Checks
high
106328Oracle Linux 6 : Unbreakable Enterprise kernel (ELSA-2018-4020) (Meltdown) (Spectre)NessusOracle Linux Local Security Checks
medium
106316AIX 7.2 TL 2 : spectre_meltdown (IJ03036) (Meltdown) (Spectre)NessusAIX Local Security Checks
medium
106315AIX 7.2 TL 1 : spectre_meltdown (IJ03035) (Meltdown) (Spectre)NessusAIX Local Security Checks
medium
106314AIX 7.2 TL 0 : spectre_meltdown (IJ03034) (Meltdown) (Spectre)NessusAIX Local Security Checks
medium
106313AIX 7.1 TL 5 : spectre_meltdown (IJ03033) (Meltdown) (Spectre)NessusAIX Local Security Checks
medium
106312AIX 7.1 TL 4 : spectre_meltdown (IJ03032) (Meltdown) (Spectre)NessusAIX Local Security Checks
medium
106311AIX 6.1 TL 9 : spectre_meltdown (IJ03030) (Meltdown) (Spectre)NessusAIX Local Security Checks
medium
106310AIX 5.3 TL 12 : spectre_meltdown (IJ03029) (Meltdown) (Spectre)NessusAIX Local Security Checks
medium
106289openSUSE Security Update : virtualbox (openSUSE-2018-75) (Spectre)NessusSuSE Local Security Checks
high
106272Ubuntu 14.04 LTS : linux vulnerabilities (USN-3542-1) (Spectre)NessusUbuntu Local Security Checks
medium
106271Ubuntu 16.04 LTS : linux-hwe, linux-azure, linux-gcp, linux-oem vulnerabilities (USN-3541-2) (Meltdown) (Spectre)NessusUbuntu Local Security Checks
medium
106270Ubuntu 17.10 : linux vulnerabilities (USN-3541-1) (Meltdown) (Spectre)NessusUbuntu Local Security Checks
medium
106269Ubuntu 14.04 LTS : linux-lts-xenial, linux-aws vulnerabilities (USN-3540-2) (Meltdown) (Spectre)NessusUbuntu Local Security Checks
medium
106268Ubuntu 16.04 LTS : linux, linux-aws, linux-euclid vulnerabilities (USN-3540-1) (Meltdown) (Spectre)NessusUbuntu Local Security Checks
medium
106264Ubuntu 14.04 LTS / 16.04 LTS / 17.10 : intel-microcode regression (USN-3531-2) (Spectre)NessusUbuntu Local Security Checks
medium
106260SUSE SLES11 Security Update : kernel (SUSE-SU-2018:0171-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
medium
106255RHEL 6 : libvirt (RHSA-2018:0112) (Spectre)NessusRed Hat Local Security Checks
medium
106254RHEL 6 : libvirt (RHSA-2018:0111) (Spectre)NessusRed Hat Local Security Checks
medium
106253RHEL 6 : libvirt (RHSA-2018:0110) (Spectre)NessusRed Hat Local Security Checks
medium
106252RHEL 6 : libvirt (RHSA-2018:0109) (Spectre)NessusRed Hat Local Security Checks
medium
106251RHEL 6 : libvirt (RHSA-2018:0108) (Spectre)NessusRed Hat Local Security Checks
medium
106250RHEL 6 : qemu-kvm (RHSA-2018:0107) (Spectre)NessusRed Hat Local Security Checks
medium
106249RHEL 6 : qemu-kvm (RHSA-2018:0106) (Spectre)NessusRed Hat Local Security Checks
medium
106248RHEL 6 : qemu-kvm (RHSA-2018:0105) (Spectre)NessusRed Hat Local Security Checks
medium
106247RHEL 6 : qemu-kvm (RHSA-2018:0104) (Spectre)NessusRed Hat Local Security Checks
medium
106246RHEL 6 : qemu-kvm (RHSA-2018:0103) (Spectre)NessusRed Hat Local Security Checks
medium
106243OracleVM 3.4 : microcode_ctl (OVMSA-2018-0013) (Spectre)NessusOracleVM Local Security Checks
medium
106242Oracle Linux 6 : microcode_ctl (ELSA-2018-4019) (Spectre)NessusOracle Linux Local Security Checks
medium
106241Oracle Linux 7 : microcode_ctl (ELSA-2018-4018) (Spectre)NessusOracle Linux Local Security Checks
medium
106227Scientific Linux Security Update : microcode_ctl on SL6.x, SL7.x i386/x86_64 (20180116) (Spectre)NessusScientific Linux Local Security Checks
medium
106185SUSE SLES11 Security Update : kernel (SUSE-SU-2018:0131-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
medium
106178Fedora 26 : webkitgtk4 (2018-690989736a) (Spectre)NessusFedora Local Security Checks
medium
106169Amazon Linux AMI : qemu-kvm (ALAS-2018-942) (Spectre)NessusAmazon Linux Local Security Checks
medium
106162EulerOS 2.0 SP2 : dracut (EulerOS-SA-2018-1021)NessusHuawei Local Security Checks
medium
106161EulerOS 2.0 SP1 : dracut (EulerOS-SA-2018-1020)NessusHuawei Local Security Checks
medium
106158EulerOS 2.0 SP2 : libvirt (EulerOS-SA-2018-1017)NessusHuawei Local Security Checks
medium
106157EulerOS 2.0 SP1 : libvirt (EulerOS-SA-2018-1016)NessusHuawei Local Security Checks
medium
106156EulerOS 2.0 SP2 : qemu-kvm (EulerOS-SA-2018-1015)NessusHuawei Local Security Checks
medium
106155EulerOS 2.0 SP1 : qemu-kvm (EulerOS-SA-2018-1014)NessusHuawei Local Security Checks
medium
106127SUSE SLES12 Security Update : kernel (SUSE-SU-2018:0113-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
medium
106123Scientific Linux Security Update : linux-firmware on SL7.x (noarch) (20180116) (Spectre)NessusScientific Linux Local Security Checks
medium
106121OracleVM 3.4 : microcode_ctl (OVMSA-2018-0011) (Spectre)NessusOracleVM Local Security Checks
medium
106120OracleVM 3.4 : Unbreakable / etc (OVMSA-2018-0010) (Meltdown) (Spectre)NessusOracleVM Local Security Checks
medium
106118Oracle Linux 6 / 7 : microcode_ctl (ELSA-2018-0093) (Spectre)NessusOracle Linux Local Security Checks
medium
106108CentOS 7 : linux-firmware (CESA-2018:0094) (Spectre)NessusCentOS Local Security Checks
medium
106107CentOS 6 / 7 : microcode_ctl (CESA-2018:0093) (Spectre)NessusCentOS Local Security Checks
medium
106104Oracle VM VirtualBox 5.1.x < 5.1.32 / 5.2.x < 5.2.6 (January 2018 CPU)NessusMisc.
medium
106095SUSE SLES12 Security Update : kernel (SUSE-SU-2018:0115-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
high
106094SUSE SLES12 Security Update : kernel (SUSE-SU-2018:0114-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
medium
106089RHEL 7 : linux-firmware (RHSA-2018:0094) (Spectre)NessusRed Hat Local Security Checks
medium
106088RHEL 6 / 7 : microcode_ctl (RHSA-2018:0093) (Spectre)NessusRed Hat Local Security Checks
medium
106051Slackware 14.0 / 14.2 / current : kernel (SSA:2018-016-01) (Meltdown) (Spectre)NessusSlackware Local Security Checks
medium
106040Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2018-4011) (Meltdown) (Spectre)NessusOracle Linux Local Security Checks
medium
106022Fedora 27 : webkitgtk4 (2018-0590e4af13) (Spectre)NessusFedora Local Security Checks
medium
105785VMware Workstation 12.x < 12.5.9 / 14.x < 14.1.1 Multiple Vulnerabilities (VMSA-2018-0004) (VMSA-2018-0005) (Spectre)NessusWindows
high
105784VMware vCenter Server 5.5.x < 5.5U3g / 6.0.x < 6.0U3d / 6.5.x < 6.5U1e Hypervisor-Assisted Guest Remediation (VMSA-2018-0004) (Spectre)NessusMisc.
medium
105783VMware Player 12.x < 12.5.9 / 14.x < 14.1.1 Multiple Vulnerabilities (VMSA-2018-0004) (VMSA-2018-0005) (Spectre)NessusWindows
high
105782ESXi 5.5 / 6.0 / 6.5 / Hypervisor-Assisted Guest Remediation for Speculative Execution (VMSA-2018-0004) (Spectre) (remote check)NessusMisc.
medium
105781VMware Fusion 8.x < 8.5.10 / 10.x < 10.1.1 Multiple Vulnerabilities (VMSA-2018-0004) (VMSA-2018-0005) (Spectre) (macOS)NessusMacOS X Local Security Checks
high
105777NVIDIA Windows GPU Display Driver 384.x / 385.x / 386.x < 386.07 / 390.x < 390.65 Multiple Vulnerabilities (Meltdown)(Spectre)NessusWindows
medium
105776NVIDIA Linux GPU Display Driver 384.x < 384.111 / 390.x < 390.12 Multiple Vulnerabilities (Meltdown)(Spectre)NessusMisc.
medium
105769Apple iOS < 11.2.2 Multiple Vulnerabilities (Spectre)NessusMobile Devices
medium
105768VMSA-2018-0004 : VMware vSphere, Workstation and Fusion updates add Hypervisor-Assisted Guest Remediation for speculative execution issue (Spectre)NessusVMware ESX Local Security Checks
medium
105767Ubuntu 14.04 LTS / 16.04 LTS / 17.04 / 17.10 : intel-microcode update (USN-3531-1) (Spectre)NessusUbuntu Local Security Checks
medium
105766Ubuntu 16.04 LTS / 17.04 / 17.10 : webkit2gtk vulnerabilities (USN-3530-1) (Spectre)NessusUbuntu Local Security Checks
medium
105765SUSE SLES12 Security Update : kernel (SUSE-SU-2018:0069-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
medium
105764SUSE SLES11 Security Update : microcode_ctl (SUSE-SU-2018:0068-1) (Spectre)NessusSuSE Local Security Checks
medium
105763SUSE SLED12 / SLES12 Security Update : ucode-intel (SUSE-SU-2018:0067-1) (Spectre)NessusSuSE Local Security Checks
medium
105762OracleVM 3.4 : Unbreakable / etc (OVMSA-2018-0008) (Meltdown) (Spectre)NessusOracleVM Local Security Checks
medium
105761OracleVM 3.4 : Unbreakable / etc (OVMSA-2018-0007) (Spectre)NessusOracleVM Local Security Checks
medium
105760Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2018-4006) (Meltdown) (Spectre)NessusOracle Linux Local Security Checks
medium
105759Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2018-4004) (Spectre)NessusOracle Linux Local Security Checks
medium
105758openSUSE Security Update : ucode-intel (openSUSE-2018-24) (Spectre)NessusSuSE Local Security Checks
medium
105741openSUSE Security Update : qemu (openSUSE-2018-20) (Spectre)NessusSuSE Local Security Checks
medium
105722SUSE SLES12 Security Update : qemu (SUSE-SU-2018:0056-1) (Spectre)NessusSuSE Local Security Checks
medium
105718OracleVM 3.4 : xen (OVMSA-2018-0006) (Meltdown) (Spectre)NessusOracleVM Local Security Checks
medium
105717OracleVM 3.4 : xen (OVMSA-2018-0005) (Meltdown) (Spectre)NessusOracleVM Local Security Checks
high
105689macOS : Apple Safari <= 11.0.2 (11604.4.7.1.6 / 12604.4.7.1.6 / 13604.4.7.10.6) Information Disclosure (Spectre)NessusMacOS X Local Security Checks
medium
105685SUSE SLES11 Security Update : kernel (SUSE-SU-2018:0040-1) (BlueBorne) (KRACK) (Meltdown) (Spectre)NessusSuSE Local Security Checks
high
105684SUSE SLES11 Security Update : kvm (SUSE-SU-2018:0039-1) (Spectre)NessusSuSE Local Security Checks
medium
105682RHEL 6 : rhevm-setup-plugins (RHSA-2018:0052) (Spectre)NessusRed Hat Local Security Checks
medium
105681RHEL 7 : rhevm-setup-plugins (RHSA-2018:0051) (Spectre)NessusRed Hat Local Security Checks
medium
105680RHEL 7 : Virtualization (RHSA-2018:0050) (Spectre)NessusRed Hat Local Security Checks
medium
105679RHEL 7 : Virtualization (RHSA-2018:0048) (Spectre)NessusRed Hat Local Security Checks
medium
105678RHEL 7 : redhat-virtualization-host (RHSA-2018:0047) (Meltdown) (Spectre)NessusRed Hat Local Security Checks
medium
105677RHEL 6 / 7 : rhev-hypervisor7 (RHSA-2018:0046) (Meltdown) (Spectre)NessusRed Hat Local Security Checks
medium
105676RHEL 7 : rhvm-appliance (RHSA-2018:0045) (Meltdown) (Spectre)NessusRed Hat Local Security Checks
medium
105675RHEL 7 : redhat-virtualization-host (RHSA-2018:0044) (Meltdown) (Spectre)NessusRed Hat Local Security Checks
medium
105674RHEL 7 : Virtualization (RHSA-2018:0028) (Spectre)NessusRed Hat Local Security Checks
medium
105673RHEL 7 : Virtualization (RHSA-2018:0025) (Spectre)NessusRed Hat Local Security Checks
medium
105672RHEL 6 : MRG (RHSA-2018:0021) (Meltdown) (Spectre)NessusRed Hat Local Security Checks
medium
105670Oracle Linux 6 : libvirt (ELSA-2018-0030) (Spectre)NessusOracle Linux Local Security Checks
medium
105669Oracle Linux 7 : libvirt (ELSA-2018-0029) (Spectre)NessusOracle Linux Local Security Checks
medium
105668Oracle Linux 6 : qemu-kvm (ELSA-2018-0024) (Spectre)NessusOracle Linux Local Security Checks
medium
105667Oracle Linux 7 : qemu-kvm (ELSA-2018-0023) (Spectre)NessusOracle Linux Local Security Checks
medium
105657Virtuozzo 7 : crit / criu / criu-devel / ksm-vz / libcompel / etc (VZA-2018-003)NessusVirtuozzo Local Security Checks
medium
105655EulerOS 2.0 SP1 : kernel (EulerOS-SA-2018-1002)NessusHuawei Local Security Checks
medium
105649Ubuntu 14.04 LTS / 16.04 LTS / 17.04 / 17.10 : firefox vulnerabilities (USN-3516-1) (Meltdown) (Spectre)NessusUbuntu Local Security Checks
medium
105648SUSE SLED12 / SLES12 Security Update : qemu (SUSE-SU-2018:0036-1) (Spectre)NessusSuSE Local Security Checks
medium
105647SUSE SLES12 Security Update : kernel (SUSE-SU-2018:0031-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
high
105645RHEL 7 : linux-firmware (RHSA-2018:0053) (Spectre)NessusRed Hat Local Security Checks
medium
105644OracleVM 3.4 : qemu-kvm (OVMSA-2018-0004) (Spectre)NessusOracleVM Local Security Checks
medium
105642openSUSE Security Update : kernel-firmware (openSUSE-2018-9) (Spectre)NessusSuSE Local Security Checks
medium
105641openSUSE Security Update : qemu (openSUSE-2018-8) (Spectre)NessusSuSE Local Security Checks
medium
105637openSUSE Security Update : ucode-intel (openSUSE-2018-4) (Spectre)NessusSuSE Local Security Checks
medium
105636openSUSE Security Update : the Linux Kernel (openSUSE-2018-3) (Meltdown) (Spectre)NessusSuSE Local Security Checks
high
105619Virtuozzo 6 : parallels-server-bm-release / vzkernel / etc (VZA-2018-002)NessusVirtuozzo Local Security Checks
medium
105618EulerOS 2.0 SP2 : kernel (EulerOS-SA-2018-1001)NessusHuawei Local Security Checks
medium
105617Citrix XenServer Multiple Vulnerabilities (CTX231390) (Meltdown)(Spectre)NessusMisc.
high
105616Mozilla Firefox < 57.0.4 Speculative Execution Side-Channel Attack Vulnerability (Spectre)NessusWindows
medium
105615Mozilla Firefox < 57.0.4 Speculative Execution Side-Channel Attack Vulnerability (Spectre) (macOS)NessusMacOS X Local Security Checks
medium
105613ADV180002: Microsoft SQL Server January 2018 Security Update (Meltdown) (Spectre)NessusWindows : Microsoft Bulletins
medium
105611Scientific Linux Security Update : libvirt on SL7.x x86_64 (20180104) (Spectre)NessusScientific Linux Local Security Checks
medium
105610RHEL 6 : microcode_ctl (RHSA-2018:0040) (Spectre)NessusRed Hat Local Security Checks
medium
105609RHEL 6 : microcode_ctl (RHSA-2018:0039) (Spectre)NessusRed Hat Local Security Checks
medium
105608RHEL 6 : microcode_ctl (RHSA-2018:0038) (Spectre)NessusRed Hat Local Security Checks
medium
105607RHEL 6 : microcode_ctl (RHSA-2018:0037) (Spectre)NessusRed Hat Local Security Checks
medium
105606RHEL 6 : microcode_ctl (RHSA-2018:0036) (Spectre)NessusRed Hat Local Security Checks
medium
105605RHEL 7 : microcode_ctl (RHSA-2018:0035) (Spectre)NessusRed Hat Local Security Checks
medium
105604RHEL 7 : microcode_ctl (RHSA-2018:0034) (Spectre)NessusRed Hat Local Security Checks
medium
105603RHEL 7 : libvirt (RHSA-2018:0031) (Spectre)NessusRed Hat Local Security Checks
medium
105602RHEL 7 : libvirt (RHSA-2018:0029) (Spectre)NessusRed Hat Local Security Checks
medium
105601Oracle Linux 6 : microcode_ctl (ELSA-2018-0013) (Spectre)NessusOracle Linux Local Security Checks
medium
105600Oracle Linux 7 : microcode_ctl (ELSA-2018-0012) (Spectre)NessusOracle Linux Local Security Checks
medium
105599Oracle Linux 6 : kernel (ELSA-2018-0008) (Meltdown) (Spectre)NessusOracle Linux Local Security Checks
medium
105598Oracle Linux 7 : kernel (ELSA-2018-0007) (Meltdown) (Spectre)NessusOracle Linux Local Security Checks
medium
105597openSUSE Security Update : the Linux Kernel (openSUSE-2018-2) (Meltdown) (Spectre)NessusSuSE Local Security Checks
high
105594CentOS 6 : libvirt (CESA-2018:0030) (Spectre)NessusCentOS Local Security Checks
medium
105593CentOS 7 : libvirt (CESA-2018:0029) (Spectre)NessusCentOS Local Security Checks
medium
105592CentOS 7 : qemu-kvm (CESA-2018:0023) (Spectre)NessusCentOS Local Security Checks
medium
105591CentOS 7 : linux-firmware (CESA-2018:0014) (Spectre)NessusCentOS Local Security Checks
medium
105590CentOS 6 : microcode_ctl (CESA-2018:0013) (Spectre)NessusCentOS Local Security Checks
medium
105589CentOS 6 : kernel (CESA-2018:0008) (Meltdown) (Spectre)NessusCentOS Local Security Checks
medium
105588CentOS 7 : kernel (CESA-2018:0007) (Meltdown) (Spectre)NessusCentOS Local Security Checks
medium
105584VMSA-2018-0002 : VMware ESXi, Workstation and Fusion updates address side-channel analysis due to speculative execution. (Spectre)NessusVMware ESX Local Security Checks
medium
105582SUSE SLES12 Security Update : qemu (SUSE-SU-2018:0020-1) (Spectre)NessusSuSE Local Security Checks
medium
105581SUSE SLES11 Security Update : kvm (SUSE-SU-2018:0019-1) (Spectre)NessusSuSE Local Security Checks
medium
105576SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2018:0012-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
high
105575SUSE SLES11 Security Update : kernel (SUSE-SU-2018:0011-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
high
105574SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2018:0010-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
high
105573Scientific Linux Security Update : qemu-kvm on SL7.x x86_64 (20180104) (Spectre)NessusScientific Linux Local Security Checks
medium
105572Scientific Linux Security Update : qemu-kvm on SL6.x i386/x86_64 (20180104) (Spectre)NessusScientific Linux Local Security Checks
medium
105571Scientific Linux Security Update : linux-firmware on SL7.x (noarch) (20180104) (Spectre)NessusScientific Linux Local Security Checks
medium
105570Scientific Linux Security Update : libvirt on SL6.x i386/x86_64 (20180104) (Spectre)NessusScientific Linux Local Security Checks
medium
105569RHEL 7 : libvirt (RHSA-2018:0032) (Spectre)NessusRed Hat Local Security Checks
medium
105568RHEL 6 : libvirt (RHSA-2018:0030) (Spectre)NessusRed Hat Local Security Checks
medium
105567RHEL 7 : qemu-kvm (RHSA-2018:0027) (Spectre)NessusRed Hat Local Security Checks
medium
105566RHEL 7 : qemu-kvm (RHSA-2018:0026) (Spectre)NessusRed Hat Local Security Checks
medium
105565RHEL 6 : qemu-kvm (RHSA-2018:0024) (Spectre)NessusRed Hat Local Security Checks
medium
105564RHEL 7 : qemu-kvm (RHSA-2018:0023) (Spectre)NessusRed Hat Local Security Checks
medium
105563RHEL 6 : kernel (RHSA-2018:0022) (Meltdown) (Spectre)NessusRed Hat Local Security Checks
medium
105562RHEL 6 : kernel (RHSA-2018:0020) (Meltdown) (Spectre)NessusRed Hat Local Security Checks
medium
105561RHEL 6 : kernel (RHSA-2018:0018) (Meltdown) (Spectre)NessusRed Hat Local Security Checks
medium
105558openSUSE Security Update : kernel-firmware (openSUSE-2018-1) (Spectre)NessusSuSE Local Security Checks
medium
105556CentOS 7 : microcode_ctl (CESA-2018:0012) (Spectre)NessusCentOS Local Security Checks
medium
105555VMware Player 12.x < 12.5.8 Multiple Vulnerabilities (VMSA-2017-0021) (VMSA-2018-0002) (Spectre)NessusWindows
high
105553KB4056898: Windows 8.1 and Windows Server 2012 R2 January 2018 Security Update (Meltdown)(Spectre)NessusWindows : Microsoft Bulletins
high
105552KB4056897: Windows 7 and Windows Server 2008 R2 January 2018 Security Update (Meltdown)(Spectre)NessusWindows : Microsoft Bulletins
high
105551KB4056893: Windows 10 LTSB January 2018 Security Update (Meltdown)(Spectre)NessusWindows : Microsoft Bulletins
high
105550KB4056892: Windows 10 Version 1709 and Windows Server Version 1709 January 2018 Security Update (Meltdown)(Spectre)NessusWindows : Microsoft Bulletins
high
105549KB4056891: Windows 10 Version 1703 January 2018 Security Update (Meltdown)(Spectre)NessusWindows : Microsoft Bulletins
high
105548KB4056890: Windows 10 Version 1607 and Windows Server 2016 January 2018 Security Update (Meltdown)(Spectre)NessusWindows : Microsoft Bulletins
high
105547KB4056888: Windows 10 Version 1511 January 2018 Security Update (Meltdown)(Spectre)NessusWindows : Microsoft Bulletins
high
105541SUSE SLES11 Security Update : microcode_ctl (SUSE-SU-2018:0009-1) (Spectre)NessusSuSE Local Security Checks
medium
105540SUSE SLED12 / SLES12 Security Update : qemu (SUSE-SU-2018:0007-1) (Spectre)NessusSuSE Local Security Checks
medium
105539SUSE SLED12 / SLES12 Security Update : ucode-intel (SUSE-SU-2018:0006-1) (Spectre)NessusSuSE Local Security Checks
medium
105537Scientific Linux Security Update : microcode_ctl on SL7.x x86_64 (20180103) (Spectre)NessusScientific Linux Local Security Checks
medium
105536Scientific Linux Security Update : microcode_ctl on SL6.x i386/x86_64 (20180103) (Spectre)NessusScientific Linux Local Security Checks
medium
105535Scientific Linux Security Update : kernel on SL7.x x86_64 (20180103) (Meltdown) (Spectre)NessusScientific Linux Local Security Checks
medium
105534Scientific Linux Security Update : kernel on SL6.x i386/x86_64 (20180103) (Meltdown) (Spectre)NessusScientific Linux Local Security Checks
medium
105533RHEL 6 : kernel (RHSA-2018:0017) (Meltdown) (Spectre)NessusRed Hat Local Security Checks
medium
105532RHEL 7 : kernel-rt (RHSA-2018:0016) (Meltdown) (Spectre)NessusRed Hat Local Security Checks
medium
105531RHEL 7 : linux-firmware (RHSA-2018:0015) (Spectre)NessusRed Hat Local Security Checks
medium
105530RHEL 7 : linux-firmware (RHSA-2018:0014) (Spectre)NessusRed Hat Local Security Checks
medium
105529RHEL 6 : microcode_ctl (RHSA-2018:0013) (Spectre)NessusRed Hat Local Security Checks
medium
105528RHEL 7 : microcode_ctl (RHSA-2018:0012) (Spectre)NessusRed Hat Local Security Checks
medium
105527RHEL 6 : kernel (RHSA-2018:0011) (Meltdown) (Spectre)NessusRed Hat Local Security Checks
medium
105526RHEL 7 : kernel (RHSA-2018:0010) (Meltdown) (Spectre)NessusRed Hat Local Security Checks
medium
105525RHEL 7 : kernel (RHSA-2018:0009) (Meltdown) (Spectre)NessusRed Hat Local Security Checks
medium
105524RHEL 6 : kernel (RHSA-2018:0008) (Meltdown) (Spectre)NessusRed Hat Local Security Checks
medium
105523RHEL 7 : kernel (RHSA-2018:0007) (Meltdown) (Spectre)NessusRed Hat Local Security Checks
medium
105517Amazon Linux AMI : kernel (ALAS-2018-939) (Meltdown) (Spectre)NessusAmazon Linux Local Security Checks
medium
105487VMware Workstation 12.x < 12.5.8 Multiple Vulnerabilities (VMSA-2017-0021) (VMSA-2018-0002) (Spectre)NessusWindows
high
105486ESXi 5.5 / 6.0 / 6.5 / Multiple Vulnerabilities (VMSA-2017-0021) (VMSA-2018-0002) (Spectre) (remote check)NessusMisc.
high
105485VMware Fusion 8.x < 8.5.9 Multiple Vulnerabilities (VMSA-2017-0021) (VMSA-2018-0002) (Spectre) (macOS)NessusMacOS X Local Security Checks
high