MEDIUM
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html
http://nvidia.custhelp.com/app/answers/detail/a_id/4609
http://nvidia.custhelp.com/app/answers/detail/a_id/4611
http://nvidia.custhelp.com/app/answers/detail/a_id/4613
http://nvidia.custhelp.com/app/answers/detail/a_id/4614
http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
http://www.kb.cert.org/vuls/id/584653
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/102376
http://www.securitytracker.com/id/1040071
http://xenbits.xen.org/xsa/advisory-254.html
https://access.redhat.com/errata/RHSA-2018:0292
https://access.redhat.com/security/vulnerabilities/speculativeexecution
https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
https://cert.vde.com/en-us/advisories/vde-2018-002
https://cert.vde.com/en-us/advisories/vde-2018-003
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
https://seclists.org/bugtraq/2019/Jun/36
https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc
https://security.gentoo.org/glsa/201810-06
https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
https://security.netapp.com/advisory/ntap-20180104-0001/
https://securityadvisories.paloaltonetworks.com/Home/Detail/121
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
https://support.citrix.com/article/CTX231399
https://support.f5.com/csp/article/K91229003
https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
https://support.lenovo.com/us/en/solutions/LEN-18282
https://usn.ubuntu.com/3531-1/
https://usn.ubuntu.com/3531-3/
https://usn.ubuntu.com/3540-2/
https://usn.ubuntu.com/3541-2/
https://usn.ubuntu.com/3542-2/
https://usn.ubuntu.com/3549-1/
https://usn.ubuntu.com/3560-1/
https://usn.ubuntu.com/3561-1/
https://usn.ubuntu.com/3580-1/
https://usn.ubuntu.com/3581-1/
https://usn.ubuntu.com/3581-2/
https://usn.ubuntu.com/3582-1/
https://usn.ubuntu.com/3582-2/
https://usn.ubuntu.com/3594-1/
https://usn.ubuntu.com/3597-1/
https://usn.ubuntu.com/3597-2/
https://usn.ubuntu.com/3620-2/
https://usn.ubuntu.com/3690-1/
https://usn.ubuntu.com/3777-3/
https://usn.ubuntu.com/usn/usn-3516-1/
https://www.debian.org/security/2018/dsa-4120
https://www.debian.org/security/2018/dsa-4187
https://www.debian.org/security/2018/dsa-4188
https://www.debian.org/security/2018/dsa-4213
https://www.exploit-db.com/exploits/43427/
https://www.kb.cert.org/vuls/id/180049
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
https://www.synology.com/support/security/Synology_SA_18_01
https://www.vmware.com/security/advisories/VMSA-2018-0007.html
https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html
https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html
Source: MITRE
Published: 2018-01-04
Updated: 2018-11-30
Type: CWE-200
Base Score: 4.7
Vector: AV:L/AC:M/Au:N/C:C/I:N/A:N
Impact Score: 6.9
Exploitability Score: 3.4
Severity: MEDIUM
Base Score: 5.6
Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
Impact Score: 4
Exploitability Score: 1.1
Severity: MEDIUM
OR
cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2316:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2338:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2350:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2358:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2508:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2516:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2518:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2530:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2538:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2550:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2558:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2718:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2730:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2738:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2750:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2758:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x3:c3130:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x3:c3200rk:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x3:c3205rk:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x3:c3230rk:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x3:c3235rk:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x3:c3265rk:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x3:c3295rk:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x3:c3405:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x3:c3445:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3770d:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3775:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3775d:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3785:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3795:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j1750:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j1800:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j1850:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j1900:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j3060:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j3160:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j3355:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2805:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2806:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2807:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2808:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2810:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2815:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2820:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2830:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2840:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2910:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2920:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2930:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2940:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n3000:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n3010:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n3050:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n3060:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n3150:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n3160:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n3350:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n4000:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n4100:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3450:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_m:5y10:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_m:5y10a:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_m:5y10c:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_m:5y31:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_m:5y51:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_m:5y70:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_m:5y71:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_m3:6y30:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_m3:7y30:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_m3:7y32:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_m5:6y54:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_m5:6y57:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_m7:6y75:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_j:j2850:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_j:j2900:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_j:j3710:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_j:j4205:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n:n3510:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n:n3520:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n:n3530:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n:n3540:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n:n3700:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n:n3710:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n:n4200:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5502:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5503:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5504:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5506:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5507:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5520:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5530:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5540:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5603:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5606:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5607:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5620:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5630:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5640:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5645:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5649:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e6510:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e6540:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e7520:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e7530:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e7540:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:ec5509:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:ec5539:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:ec5549:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:l3406:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:l3426:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:l5506:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:l5508:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:l5518:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:l5520:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:l5530:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:l5609:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:l5618:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:l5630:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:l5638:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:l5640:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:l7545:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:l7555:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:lc5518:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:lc5528:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:w3670:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:w3680:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:w3690:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:w5580:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:w5590:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x3430:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x3440:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x3450:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x3460:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x3470:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x3480:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x5550:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x5560:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x5570:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x5647:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x5650:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x5660:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x5667:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x5670:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x5672:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x5675:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x5677:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x5680:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x5687:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x5690:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x6550:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x7542:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x7550:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x7560:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_bronze:3104:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_bronze:3106:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1105c:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1105c_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1125c:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1125c_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1220:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1220_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1220_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1220_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1220_v6:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1220l:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1220l_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1220l_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1225:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1225_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1225_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1225_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1225_v6:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1226_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1230:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1230_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1230_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1230_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1230_v6:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1230l_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1231_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1235:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1235l_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1240:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1240_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1240_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1240_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1240_v6:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1240l_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1240l_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1241_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1245:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1245_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1245_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1245_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1245_v6:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1246_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1258l_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1260l:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1260l_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1265l_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1265l_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1265l_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1268l_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1268l_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1270:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1270_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1270_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1270_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1270_v6:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1271_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1275:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1275_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1275_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1275_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1275_v6:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1275l_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1276_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1278l_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1280:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1280_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1280_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1280_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1280_v6:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1281_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1285_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1285_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1285_v6:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1285l_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1285l_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1286_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1286l_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1290:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1290_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1501l_v6:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1501m_v6:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1505l_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1505l_v6:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1505m_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1505m_v6:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1515m_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1535m_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1535m_v6:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1545m_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1558l_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1565l_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1575m_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1578l_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1585_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1585l_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:1428l:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:1428l_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:1428l_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:1620:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:1620_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:1620_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:1620_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:1630_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:1630_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:1650:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:1650_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:1650_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:1650_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:1660:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:1660_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:1660_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:1660_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:1680_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:1680_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2403:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2403_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2407:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2407_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2408l_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2418l:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2418l_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2418l_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2420:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2420_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2428l:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2428l_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2428l_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2430:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2430_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2430l:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2430l_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2438l_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2440:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2440_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2448l:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2448l_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2450:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2450_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2450l:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2450l_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2470:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2470_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2603:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2603_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2603_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2603_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2608l_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2608l_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2609:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2609_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2609_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2609_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2618l_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2618l_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2618l_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2620:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2620_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2620_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2620_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2623_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2623_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2628l_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2628l_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2628l_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2630:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2630_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2630_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2630_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2630l:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2630l_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2630l_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2630l_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2637:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2637_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2637_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2637_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2640:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2640_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2640_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2640_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2643:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2643_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2643_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2643_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2648l:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2648l_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2648l_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2648l_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2650:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2650_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2650_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2650_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2650l:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2650l_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2650l_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2650l_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2658:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2658_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2658_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2658_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2658a_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2660:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2660_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2660_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2660_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2665:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2667:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2667_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2667_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2667_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2670:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2670_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2670_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2680:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2680_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2680_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2680_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2683_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2683_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2687w:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2687w_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2687w_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2687w_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2690:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2690_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2690_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2690_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2695_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2695_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2695_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2697_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2697_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2697_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2697a_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2698_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2698_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2699_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2699_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2699a_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2699r_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4603:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4603_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4607:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4607_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4610:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4610_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4610_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4610_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4617:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4620:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4620_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4620_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4620_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4624l_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4627_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4627_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4627_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4628l_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4640:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4640_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4640_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4640_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4648_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4650:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4650_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4650_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4650_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4650l:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4655_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4655_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4657l_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4660_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4660_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4667_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4667_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4669_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4669_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2803:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2820:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2830:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2850:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2850_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2860:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2870:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2870_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2880_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2890_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4807:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4809_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4809_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4809_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4820:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4820_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4820_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4820_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4830:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4830_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4830_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4830_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4850:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4850_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4850_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4850_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4860:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4860_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4870:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4870_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4880_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4890_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8830:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8837:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8850:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8850_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8857_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8860:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8860_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8860_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8867_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8867_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8867l:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8870:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8870_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8870_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8870_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8880_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8880_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8880_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8880l_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8880l_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8890_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8890_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8890_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8891_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8891_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8891_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8893_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8893_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8893_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8894_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:5118:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:5119t:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:5120:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:5120t:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:5122:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6126:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6126f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6126t:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6128:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6130:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6130f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6130t:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6132:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6134:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6134m:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6136:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6138:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6138f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6138t:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6140:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6140m:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6142:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6142f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6142m:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6144:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6146:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6148:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6148f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6150:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6152:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6154:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_phi:7210:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_phi:7210f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_phi:7230:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_phi:7230f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_phi:7235:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_phi:7250:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_phi:7250f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_phi:7285:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_phi:7290:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_phi:7290f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_phi:7295:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*
OR
cpe:2.3:h:arm:cortex-a:9:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a:15:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a:17:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a:57:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a:72:*:*:*:*:*:*:*
ID | Name | Product | Family | Severity |
---|---|---|---|---|
131297 | FreeBSD : FreeBSD -- Intel CPU Microcode Update (fbe10a8a-05a1-11ea-9dfa-f8b156ac3ff9) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout) (Spectre) | Nessus | FreeBSD Local Security Checks | high |
127373 | NewStart CGSL MAIN 4.05 : kernel Vulnerability (NS-SA-2019-0125) | Nessus | NewStart CGSL Local Security Checks | medium |
127233 | NewStart CGSL CORE 5.04 / MAIN 5.04 : kernel-rt Multiple Vulnerabilities (NS-SA-2019-0049) | Nessus | NewStart CGSL Local Security Checks | high |
127169 | NewStart CGSL MAIN 5.04 : dracut Vulnerability (NS-SA-2019-0016) | Nessus | NewStart CGSL Local Security Checks | medium |
127152 | NewStart CGSL MAIN 5.04 : kernel Multiple Vulnerabilities (NS-SA-2019-0007) | Nessus | NewStart CGSL Local Security Checks | medium |
126670 | OracleVM 3.4 : Unbreakable / etc (OVMSA-2019-0035) (Spectre) | Nessus | OracleVM Local Security Checks | medium |
126610 | Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2019-4710) (Spectre) | Nessus | Oracle Linux Local Security Checks | medium |
125753 | EulerOS Virtualization 2.5.1 : kernel (EulerOS-SA-2019-1638) | Nessus | Huawei Local Security Checks | medium |
125752 | EulerOS Virtualization 2.5.2 : kernel (EulerOS-SA-2019-1637) | Nessus | Huawei Local Security Checks | medium |
125216 | Processor Speculative Execution Vulnerabilities (Linux) | Nessus | Misc. | medium |
124953 | EulerOS Virtualization 3.0.1.0 : kvm (EulerOS-SA-2019-1450) | Nessus | Huawei Local Security Checks | medium |
124836 | EulerOS Virtualization 3.0.1.0 : kernel (EulerOS-SA-2019-1515) | Nessus | Huawei Local Security Checks | critical |
700545 | Apple iOS < 11.2.2 Multiple Vulnerabilities (Spectre, APPLE-SA-2018-1-8-1) | Nessus Network Monitor | Mobile Devices | low |
123554 | SUSE SLES11 Security Update : various KMPs (SUSE-SU-2019:13999-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
123255 | openSUSE Security Update : kernel-firmware (openSUSE-2019-587) (Spectre) | Nessus | SuSE Local Security Checks | medium |
123226 | openSUSE Security Update : the Linux Kernel (openSUSE-2019-536) (Spectre) | Nessus | SuSE Local Security Checks | high |
123180 | openSUSE Security Update : xen (openSUSE-2019-418) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | medium |
121909 | Photon OS 2.0: Linux PHSA-2018-2.0-0011 | Nessus | PhotonOS Local Security Checks | medium |
121800 | Photon OS 1.0: Linux PHSA-2018-1.0-0098 | Nessus | PhotonOS Local Security Checks | medium |
121035 | Security Updates for Windows 10 / Windows Server 2016 (January 2019) (Spectre) | Nessus | Windows : Microsoft Bulletins | medium |
120067 | SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2018:2092-1) (Spectre) | Nessus | SuSE Local Security Checks | high |
119239 | Security Updates for Windows 10 / Windows Server 2016 (September 2018) (Spectre) | Nessus | Windows : Microsoft Bulletins | medium |
118702 | F5 Networks BIG-IP : Side-channel processor vulnerabilities (K91229003) (Meltdown) (Spectre) | Nessus | F5 Networks Local Security Checks | medium |
118506 | GLSA-201810-06 : Xen: Multiple vulnerabilities (Foreshadow) (Meltdown) (Spectre) | Nessus | Gentoo Local Security Checks | high |
118322 | Ubuntu 16.04 LTS / 18.04 LTS : linux-azure vulnerabilities (USN-3777-3) (Spectre) | Nessus | Ubuntu Local Security Checks | high |
118286 | SUSE SLES12 Security Update : libvirt (SUSE-SU-2018:2631-2) (Spectre) | Nessus | SuSE Local Security Checks | medium |
118266 | SUSE SLES12 Security Update : xen (SUSE-SU-2018:1699-2) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | medium |
117545 | EulerOS Virtualization 2.5.0 : kernel (EulerOS-SA-2018-1236) | Nessus | Huawei Local Security Checks | medium |
117542 | EulerOS Virtualization 2.5.0 : kvm (EulerOS-SA-2018-1233) | Nessus | Huawei Local Security Checks | medium |
117502 | Debian DLA-1506-1 : intel-microcode security update (Foreshadow) (Spectre) | Nessus | Debian Local Security Checks | medium |
117354 | SUSE SLES12 Security Update : libvirt (SUSE-SU-2018:2631-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
117351 | Debian DLA-1497-1 : qemu security update (Spectre) | Nessus | Debian Local Security Checks | high |
112147 | SUSE SLES11 Security Update : xen (SUSE-SU-2018:2528-1) (Foreshadow) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | high |
112143 | openSUSE Security Update : kbuild / virtualbox (openSUSE-2018-938) (Spectre) | Nessus | SuSE Local Security Checks | medium |
700325 | Mozilla Firefox < 57.0.4 Multiple Vulnerabilities | Nessus Network Monitor | Web Clients | medium |
700322 | Mozilla Firefox < 57 Multiple Vulnerabilities | Nessus Network Monitor | Web Clients | critical |
700321 | Mozilla Firefox < 56 Multiple Vulnerabilities | Nessus Network Monitor | Web Clients | high |
111992 | OracleVM 3.4 : xen (OVMSA-2018-0248) (Bunker Buster) (Foreshadow) (Meltdown) (POODLE) (Spectre) | Nessus | OracleVM Local Security Checks | critical |
111911 | Photon OS 1.0: Linux PHSA-2018-1.0-0098 (deprecated) | Nessus | PhotonOS Local Security Checks | medium |
111589 | openSUSE Security Update : kernel-firmware (openSUSE-2018-825) (Spectre) | Nessus | SuSE Local Security Checks | medium |
111503 | SUSE SLES12 Security Update : libvirt (SUSE-SU-2018:2141-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
111434 | SUSE SLES12 Security Update : libvirt (SUSE-SU-2018:2082-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
111414 | openSUSE Security Update : the Linux Kernel (openSUSE-2018-762) (Spectre) | Nessus | SuSE Local Security Checks | high |
111282 | Photon OS 2.0 : linux (PhotonOS-PHSA-2018-2.0-0011) (Spectre) (deprecated) | Nessus | PhotonOS Local Security Checks | medium |
111082 | Debian DLA-1422-2 : linux security update (Spectre) | Nessus | Debian Local Security Checks | high |
111023 | OracleVM 3.4 : qemu-kvm (OVMSA-2018-0238) (Spectre) | Nessus | OracleVM Local Security Checks | high |
110951 | Fedora 27 : 2:qemu (2018-9f02e5ed7b) (Spectre) | Nessus | Fedora Local Security Checks | medium |
110939 | Ubuntu 14.04 LTS : amd64-microcode regression (USN-3690-2) (Spectre) | Nessus | Ubuntu Local Security Checks | medium |
110709 | RHEL 7 : kernel-alt (RHSA-2018:1967) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
110684 | SUSE SLES11 Security Update : kernel modules packages (SUSE-SU-2018:1784-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
110641 | Ubuntu 14.04 LTS / 16.04 LTS / 17.10 / 18.04 LTS : amd64-microcode update (USN-3690-1) (Spectre) | Nessus | Ubuntu Local Security Checks | medium |
110621 | SUSE SLES11 Security Update : microcode_ctl (SUSE-SU-2018:1759-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
110596 | SUSE SLES12 Security Update : xen (SUSE-SU-2018:1699-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | medium |
110509 | SUSE SLES12 Security Update : xen (SUSE-SU-2018:1658-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | medium |
110470 | openSUSE Security Update : kernel-firmware (openSUSE-2018-590) (Spectre) | Nessus | SuSE Local Security Checks | medium |
110444 | SUSE SLES11 Security Update : xen (SUSE-SU-2018:1603-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | medium |
110438 | openSUSE Security Update : xen (openSUSE-2018-599) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | medium |
110339 | SUSE SLES12 Security Update : oracleasm kmp (SUSE-SU-2018:1503-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
110338 | SUSE SLES11 Security Update : gcc43 (SUSE-SU-2018:1498-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
110334 | openSUSE Security Update : kernel modules (openSUSE-2018-551) (Spectre) | Nessus | SuSE Local Security Checks | medium |
110208 | Debian DSA-4213-1 : qemu - security update (Spectre) | Nessus | Debian Local Security Checks | high |
110110 | OracleVM 3.3 : xen (OVMSA-2018-0224) (Meltdown) (Spectre) | Nessus | OracleVM Local Security Checks | medium |
110090 | SUSE SLES12 Security Update : qemu (SUSE-SU-2018:1386-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
110041 | SUSE SLES11 Security Update : kernel (SUSE-SU-2018:1376-1) (Spectre) | Nessus | SuSE Local Security Checks | high |
110035 | SUSE SLES11 Security Update : kernel (SUSE-SU-2018:1368-1) (Spectre) | Nessus | SuSE Local Security Checks | high |
110030 | SUSE SLES12 Security Update : qemu (SUSE-SU-2018:1363-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
109987 | OracleVM 3.4 : xen (OVMSA-2018-0218) (Meltdown) (Spectre) | Nessus | OracleVM Local Security Checks | high |
109886 | SUSE SLES11 Security Update : kvm (SUSE-SU-2018:1308-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
109881 | Oracle Linux 6 : Unbreakable Enterprise kernel (ELSA-2018-4110) (Meltdown) (Spectre) | Nessus | Oracle Linux Local Security Checks | high |
109861 | SUSE SLES11 Security Update : libvirt (SUSE-SU-2018:1295-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
109829 | Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2018-4109) (Meltdown) (Spectre) | Nessus | Oracle Linux Local Security Checks | high |
109668 | OracleVM 3.3 : Unbreakable / etc (OVMSA-2018-0041) (Spectre) | Nessus | OracleVM Local Security Checks | high |
109543 | Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2018-4089) (Spectre) | Nessus | Oracle Linux Local Security Checks | high |
109531 | Debian DLA-1369-1 : linux security update (Spectre) | Nessus | Debian Local Security Checks | critical |
109524 | Oracle Linux 6 : Unbreakable Enterprise kernel (ELSA-2018-4088) (Spectre) | Nessus | Oracle Linux Local Security Checks | high |
109518 | Debian DSA-4188-1 : linux - security update (Spectre) | Nessus | Debian Local Security Checks | high |
109517 | Debian DSA-4187-1 : linux - security update (Spectre) | Nessus | Debian Local Security Checks | critical |
109360 | SUSE SLES11 Security Update : kernel (SUSE-SU-2018:1080-1) (Spectre) | Nessus | SuSE Local Security Checks | high |
109358 | SUSE SLES11 Security Update : kvm (SUSE-SU-2018:1077-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
109158 | OracleVM 3.4 : Unbreakable / etc (OVMSA-2018-0035) (Dirty COW) (Meltdown) (Spectre) | Nessus | OracleVM Local Security Checks | high |
109156 | Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2018-4071) (Dirty COW) (Meltdown) (Spectre) | Nessus | Oracle Linux Local Security Checks | high |
109130 | Amazon Linux 2 : linux-firmware (ALAS-2018-962) (Spectre) | Nessus | Amazon Linux Local Security Checks | medium |
109124 | Amazon Linux 2 : microcode_ctl (ALAS-2018-953) (Spectre) | Nessus | Amazon Linux Local Security Checks | medium |
109123 | Amazon Linux 2 : libvirt (ALAS-2018-952) (Spectre) | Nessus | Amazon Linux Local Security Checks | medium |
109120 | Amazon Linux 2 : qemu-kvm (ALAS-2018-942) (Spectre) | Nessus | Amazon Linux Local Security Checks | medium |
109119 | Amazon Linux 2 : kernel (ALAS-2018-939) (Meltdown) (Spectre) | Nessus | Amazon Linux Local Security Checks | medium |
109115 | RHEL 7 : kernel (RHSA-2018:1129) (Meltdown) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
109038 | pfSense < 2.4.3 Multiple Vulnerabilities (SA-18_01 / SA-18_02 / SA-18_03) (Meltdown) (Spectre) | Nessus | Firewalls | high |
109020 | openSUSE Security Update : libvirt (openSUSE-2018-358) (Spectre) | Nessus | SuSE Local Security Checks | medium |
109012 | SUSE SLED12 / SLES12 Security Update : libvirt (SUSE-SU-2018:0920-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
109001 | SUSE SLED12 / SLES12 Security Update : xen (SUSE-SU-2018:0909-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | medium |
108964 | KB4093112: Windows 10 Version 1709 and Windows Server Version 1709 April 2018 Security Update (Meltdown)(Spectre) | Nessus | Windows : Microsoft Bulletins | high |
108929 | GLSA-201804-08 : QEMU: Multiple vulnerabilities (Spectre) | Nessus | Gentoo Local Security Checks | high |
108864 | OracleVM 3.2 : xen (OVMSA-2018-0029) (Meltdown) (Spectre) | Nessus | OracleVM Local Security Checks | medium |
108827 | SUSE SLED12 / SLES12 Security Update : libvirt (SUSE-SU-2018:0861-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
108823 | OracleVM 3.4 : xen (OVMSA-2018-0028) (Spectre) | Nessus | OracleVM Local Security Checks | medium |
108750 | Ubuntu 14.04 LTS / 16.04 LTS / 17.10 : intel-microcode update (USN-3531-3) (Spectre) | Nessus | Ubuntu Local Security Checks | medium |
108745 | SUSE SLES11 Security Update : libvirt (SUSE-SU-2018:0838-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
108703 | FreeBSD : webkit2-gtk3 -- multiple vulnerabilities (1ce95bc7-3278-11e8-b527-00012e582166) (Spectre) | Nessus | FreeBSD Local Security Checks | medium |
108686 | SUSE SLED12 / SLES12 Security Update : qemu (SUSE-SU-2018:0831-1) (Spectre) | Nessus | SuSE Local Security Checks | high |
108576 | openSUSE Security Update : qemu (openSUSE-2018-291) (Spectre) | Nessus | SuSE Local Security Checks | high |
108533 | SUSE SLED12 / SLES12 Security Update : qemu (SUSE-SU-2018:0762-1) (Spectre) | Nessus | SuSE Local Security Checks | high |
108532 | SUSE SLES12 Security Update : crash (SUSE-SU-2018:0757-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
108478 | openSUSE Security Update : various KMPs (openSUSE-2018-284) (Spectre) | Nessus | SuSE Local Security Checks | medium |
108450 | SUSE SLED12 / SLES12 Security Update : ucode-intel (SUSE-SU-2018:0708-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
108449 | SUSE SLES11 Security Update : microcode_ctl (SUSE-SU-2018:0705-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
108437 | openSUSE Security Update : ucode-intel (openSUSE-2018-266) (Spectre) | Nessus | SuSE Local Security Checks | medium |
108372 | Ubuntu 16.04 LTS : linux-hwe vulnerabilities (USN-3597-2) (Meltdown) (Spectre) | Nessus | Ubuntu Local Security Checks | medium |
108371 | Ubuntu 17.10 : linux, linux-raspi2 vulnerabilities (USN-3597-1) (Meltdown) (Spectre) | Nessus | Ubuntu Local Security Checks | medium |
108369 | SUSE SLES11 Security Update : xen (SUSE-SU-2018:0678-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | high |
108364 | Scientific Linux Security Update : kernel on SL6.x i386/x86_64 (Meltdown) (Spectre) | Nessus | Scientific Linux Local Security Checks | medium |
108358 | Oracle Linux 6 : kernel (ELSA-2018-0512) (Meltdown) (Spectre) | Nessus | Oracle Linux Local Security Checks | medium |
108352 | FreeBSD : FreeBSD -- Speculative Execution Vulnerabilities (74daa370-2797-11e8-95ec-a4badb2f4699) (Meltdown) (Spectre) | Nessus | FreeBSD Local Security Checks | medium |
108341 | CentOS 6 : kernel (CESA-2018:0512) (Meltdown) (Spectre) | Nessus | CentOS Local Security Checks | medium |
108329 | RHEL 6 : kernel (RHSA-2018:0512) (Meltdown) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
108326 | RHEL 6 : kernel (RHSA-2018:0496) (Meltdown) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
108292 | KB4088880: Windows Server 2012 March 2018 Security Update (Meltdown)(Spectre) | Nessus | Windows : Microsoft Bulletins | high |
108291 | KB4088879: Windows 8.1 and Windows Server 2012 R2 March 2018 Security Update (Meltdown)(Spectre) | Nessus | Windows : Microsoft Bulletins | high |
108290 | KB4088878: Windows 7 and Windows Server 2008 R2 March 2018 Security Update (Meltdown)(Spectre) | Nessus | Windows : Microsoft Bulletins | high |
108279 | SUSE SLES11 Security Update : kernel (SUSE-SU-2018:0660-1) (Spectre) | Nessus | SuSE Local Security Checks | critical |
107293 | Ubuntu 14.04 LTS : linux vulnerability (USN-3594-1) (Spectre) | Nessus | Ubuntu Local Security Checks | medium |
107254 | SUSE SLES11 Security Update : xen (SUSE-SU-2018:0638-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | high |
107144 | SUSE SLES12 Security Update : xen (SUSE-SU-2018:0609-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | high |
107140 | SUSE SLES12 Security Update : xen (SUSE-SU-2018:0601-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | high |
107130 | OracleVM 3.4 : xen (OVMSA-2018-0021) (Meltdown) (Spectre) | Nessus | OracleVM Local Security Checks | medium |
107129 | OracleVM 3.4 : xen (OVMSA-2018-0020) (Meltdown) (Spectre) | Nessus | OracleVM Local Security Checks | medium |
107058 | RHEL 5 : kernel (RHSA-2018:0292) (Meltdown) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
107055 | SUSE SLES11 Security Update : kernel (SUSE-SU-2018:0555-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | critical |
106973 | Ubuntu 14.04 LTS : linux-lts-xenial, linux-aws vulnerabilities (USN-3582-2) (Spectre) | Nessus | Ubuntu Local Security Checks | high |
106972 | Ubuntu 16.04 LTS : linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon vulnerabilities (USN-3582-1) (Spectre) | Nessus | Ubuntu Local Security Checks | high |
106970 | Ubuntu 16.04 LTS : linux-hwe, linux-azure, linux-gcp, linux-oem vulnerabilities (USN-3581-2) (Spectre) | Nessus | Ubuntu Local Security Checks | high |
106969 | Ubuntu 17.10 : linux vulnerabilities (USN-3581-1) (Spectre) | Nessus | Ubuntu Local Security Checks | high |
106967 | SUSE SLES12 Security Update : kernel (SUSE-SU-2018:0525-1) (Spectre) | Nessus | SuSE Local Security Checks | high |
106955 | Debian DSA-4120-1 : linux - security update (Meltdown) (Spectre) | Nessus | Debian Local Security Checks | medium |
106902 | Xen Multiple Vulnerabilities (Spectre) (Meltdown) (XSA-254) | Nessus | Misc. | medium |
106901 | SUSE SLED12 / SLES12 Security Update : xen (SUSE-SU-2018:0472-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | high |
106864 | openSUSE Security Update : xen (openSUSE-2018-169) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | high |
106834 | SUSE SLED12 / SLES12 Security Update : xen (SUSE-SU-2018:0438-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | high |
106815 | SUSE SLES12 Security Update : kernel (SUSE-SU-2018:0437-1) (Spectre) | Nessus | SuSE Local Security Checks | high |
106801 | KB4074596: Windows 10 February 2018 Security Update (Meltdown)(Spectre) | Nessus | Windows : Microsoft Bulletins | high |
106798 | KB4074592: Windows 10 Version 1703 February 2018 Security Update (Meltdown)(Spectre) | Nessus | Windows : Microsoft Bulletins | high |
106797 | KB4074591: Windows 10 Version 1511 February 2018 Security Update (Meltdown)(Spectre) | Nessus | Windows : Microsoft Bulletins | high |
106796 | KB4074590: Windows 10 Version 1607 and Windows Server 2016 February 2018 Security Update (Meltdown)(Spectre) | Nessus | Windows : Microsoft Bulletins | high |
106748 | SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2018:0416-1) (Spectre) | Nessus | SuSE Local Security Checks | critical |
106740 | openSUSE Security Update : the Linux Kernel (openSUSE-2018-153) (Spectre) | Nessus | SuSE Local Security Checks | critical |
106677 | Ubuntu 14.04 LTS / 16.04 LTS / 17.10 : libvirt update (USN-3561-1) (Spectre) | Nessus | Ubuntu Local Security Checks | medium |
106676 | Ubuntu 14.04 LTS / 16.04 LTS / 17.10 : qemu update (USN-3560-1) (Spectre) | Nessus | Ubuntu Local Security Checks | medium |
106672 | SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2018:0383-1) (Spectre) | Nessus | SuSE Local Security Checks | critical |
106632 | Slackware 14.2 : Slackware 14.2 kernel (SSA:2018-037-01) (Spectre) | Nessus | Slackware Local Security Checks | medium |
106587 | Virtuozzo 6 : cpupools / cpupools-features / etc (VZA-2018-006) | Nessus | Virtuozzo Local Security Checks | medium |
106549 | openSUSE Security Update : webkit2gtk3 (openSUSE-2018-118) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | high |
106524 | OracleVM 3.3 : Unbreakable / etc (OVMSA-2018-0016) (Meltdown) (Spectre) | Nessus | OracleVM Local Security Checks | high |
106485 | Google Chrome < 64.0.3282.119 Multiple Vulnerabilities (Spectre) | Nessus | Windows | medium |
106483 | Ubuntu 16.04 LTS : linux-kvm vulnerabilities (USN-3549-1) (Spectre) | Nessus | Ubuntu Local Security Checks | medium |
106469 | OracleVM 3.4 : Unbreakable / etc (OVMSA-2018-0015) (BlueBorne) (Meltdown) (Spectre) (Stack Clash) | Nessus | OracleVM Local Security Checks | critical |
106468 | Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2018-4022) (Meltdown) (Spectre) | Nessus | Oracle Linux Local Security Checks | high |
106370 | SUSE SLED12 / SLES12 Security Update : webkit2gtk3 (SUSE-SU-2018:0219-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | high |
106364 | Oracle Linux 7 : kernel (ELSA-2018-0151) (Meltdown) (Spectre) | Nessus | Oracle Linux Local Security Checks | high |
106353 | CentOS 7 : kernel (CESA-2018:0151) (Meltdown) (Spectre) | Nessus | CentOS Local Security Checks | high |
106340 | Scientific Linux Security Update : kernel on SL7.x x86_64 (Meltdown) (Spectre) | Nessus | Scientific Linux Local Security Checks | high |
106335 | RHEL 7 : kernel (RHSA-2018:0182) (Meltdown) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
106330 | RHEL 7 : kernel (RHSA-2018:0151) (Meltdown) (Spectre) | Nessus | Red Hat Local Security Checks | high |
106328 | Oracle Linux 6 : Unbreakable Enterprise kernel (ELSA-2018-4020) (Meltdown) (Spectre) | Nessus | Oracle Linux Local Security Checks | high |
106316 | AIX 7.2 TL 2 : spectre_meltdown (IJ03036) (Meltdown) (Spectre) | Nessus | AIX Local Security Checks | medium |
106315 | AIX 7.2 TL 1 : spectre_meltdown (IJ03035) (Meltdown) (Spectre) | Nessus | AIX Local Security Checks | medium |
106314 | AIX 7.2 TL 0 : spectre_meltdown (IJ03034) (Meltdown) (Spectre) | Nessus | AIX Local Security Checks | medium |
106313 | AIX 7.1 TL 5 : spectre_meltdown (IJ03033) (Meltdown) (Spectre) | Nessus | AIX Local Security Checks | medium |
106312 | AIX 7.1 TL 4 : spectre_meltdown (IJ03032) (Meltdown) (Spectre) | Nessus | AIX Local Security Checks | medium |
106311 | AIX 6.1 TL 9 : spectre_meltdown (IJ03030) (Meltdown) (Spectre) | Nessus | AIX Local Security Checks | medium |
106310 | AIX 5.3 TL 12 : spectre_meltdown (IJ03029) (Meltdown) (Spectre) | Nessus | AIX Local Security Checks | medium |
106289 | openSUSE Security Update : virtualbox (openSUSE-2018-75) (Spectre) | Nessus | SuSE Local Security Checks | medium |
106272 | Ubuntu 14.04 LTS : linux vulnerabilities (USN-3542-1) (Spectre) | Nessus | Ubuntu Local Security Checks | medium |
106271 | Ubuntu 16.04 LTS : linux-hwe, linux-azure, linux-gcp, linux-oem vulnerabilities (USN-3541-2) (Meltdown) (Spectre) | Nessus | Ubuntu Local Security Checks | medium |
106270 | Ubuntu 17.10 : linux vulnerabilities (USN-3541-1) (Meltdown) (Spectre) | Nessus | Ubuntu Local Security Checks | medium |
106269 | Ubuntu 14.04 LTS : linux-lts-xenial, linux-aws vulnerabilities (USN-3540-2) (Meltdown) (Spectre) | Nessus | Ubuntu Local Security Checks | medium |
106268 | Ubuntu 16.04 LTS : linux, linux-aws, linux-euclid vulnerabilities (USN-3540-1) (Meltdown) (Spectre) | Nessus | Ubuntu Local Security Checks | medium |
106264 | Ubuntu 14.04 LTS / 16.04 LTS / 17.10 : intel-microcode regression (USN-3531-2) (Spectre) | Nessus | Ubuntu Local Security Checks | medium |
106260 | SUSE SLES11 Security Update : kernel (SUSE-SU-2018:0171-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | medium |
106255 | RHEL 6 : libvirt (RHSA-2018:0112) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
106254 | RHEL 6 : libvirt (RHSA-2018:0111) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
106253 | RHEL 6 : libvirt (RHSA-2018:0110) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
106252 | RHEL 6 : libvirt (RHSA-2018:0109) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
106251 | RHEL 6 : libvirt (RHSA-2018:0108) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
106250 | RHEL 6 : qemu-kvm (RHSA-2018:0107) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
106249 | RHEL 6 : qemu-kvm (RHSA-2018:0106) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
106248 | RHEL 6 : qemu-kvm (RHSA-2018:0105) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
106247 | RHEL 6 : qemu-kvm (RHSA-2018:0104) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
106246 | RHEL 6 : qemu-kvm (RHSA-2018:0103) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
106243 | OracleVM 3.4 : microcode_ctl (OVMSA-2018-0013) (Spectre) | Nessus | OracleVM Local Security Checks | medium |
106242 | Oracle Linux 6 : microcode_ctl (ELSA-2018-4019) (Spectre) | Nessus | Oracle Linux Local Security Checks | medium |
106241 | Oracle Linux 7 : microcode_ctl (ELSA-2018-4018) (Spectre) | Nessus | Oracle Linux Local Security Checks | medium |
106227 | Scientific Linux Security Update : microcode_ctl on SL6.x, SL7.x i386/x86_64 (Spectre) | Nessus | Scientific Linux Local Security Checks | medium |
106185 | SUSE SLES11 Security Update : kernel (SUSE-SU-2018:0131-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | medium |
106178 | Fedora 26 : webkitgtk4 (2018-690989736a) (Spectre) | Nessus | Fedora Local Security Checks | medium |
106169 | Amazon Linux AMI : qemu-kvm (ALAS-2018-942) (Spectre) | Nessus | Amazon Linux Local Security Checks | medium |
106162 | EulerOS 2.0 SP2 : dracut (EulerOS-SA-2018-1021) | Nessus | Huawei Local Security Checks | medium |
106161 | EulerOS 2.0 SP1 : dracut (EulerOS-SA-2018-1020) | Nessus | Huawei Local Security Checks | medium |
106158 | EulerOS 2.0 SP2 : libvirt (EulerOS-SA-2018-1017) | Nessus | Huawei Local Security Checks | medium |
106157 | EulerOS 2.0 SP1 : libvirt (EulerOS-SA-2018-1016) | Nessus | Huawei Local Security Checks | medium |
106156 | EulerOS 2.0 SP2 : qemu-kvm (EulerOS-SA-2018-1015) | Nessus | Huawei Local Security Checks | medium |
106155 | EulerOS 2.0 SP1 : qemu-kvm (EulerOS-SA-2018-1014) | Nessus | Huawei Local Security Checks | medium |
106127 | SUSE SLES12 Security Update : kernel (SUSE-SU-2018:0113-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | medium |
106123 | Scientific Linux Security Update : linux-firmware on SL7.x (noarch) (Spectre) | Nessus | Scientific Linux Local Security Checks | medium |
106121 | OracleVM 3.4 : microcode_ctl (OVMSA-2018-0011) (Spectre) | Nessus | OracleVM Local Security Checks | medium |
106120 | OracleVM 3.4 : Unbreakable / etc (OVMSA-2018-0010) (Meltdown) (Spectre) | Nessus | OracleVM Local Security Checks | medium |
106118 | Oracle Linux 6 / 7 : microcode_ctl (ELSA-2018-0093) (Spectre) | Nessus | Oracle Linux Local Security Checks | medium |
106108 | CentOS 7 : linux-firmware (CESA-2018:0094) (Spectre) | Nessus | CentOS Local Security Checks | medium |
106107 | CentOS 6 / 7 : microcode_ctl (CESA-2018:0093) (Spectre) | Nessus | CentOS Local Security Checks | medium |
106104 | Oracle VM VirtualBox 5.1.x < 5.1.32 / 5.2.x < 5.2.6 (January 2018 CPU) | Nessus | Misc. | medium |
106095 | SUSE SLES12 Security Update : kernel (SUSE-SU-2018:0115-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | high |
106094 | SUSE SLES12 Security Update : kernel (SUSE-SU-2018:0114-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | medium |
106089 | RHEL 7 : linux-firmware (RHSA-2018:0094) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
106088 | RHEL 6 / 7 : microcode_ctl (RHSA-2018:0093) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
106051 | Slackware 14.0 / 14.2 / current : kernel (SSA:2018-016-01) (Meltdown) (Spectre) | Nessus | Slackware Local Security Checks | medium |
106040 | Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2018-4011) (Meltdown) (Spectre) | Nessus | Oracle Linux Local Security Checks | medium |
106022 | Fedora 27 : webkitgtk4 (2018-0590e4af13) (Spectre) | Nessus | Fedora Local Security Checks | medium |
105785 | VMware Workstation 12.x < 12.5.9 / 14.x < 14.1.1 Multiple Vulnerabilities (VMSA-2018-0004) (VMSA-2018-0005) (Spectre) | Nessus | Windows | medium |
105784 | VMware vCenter Server 5.5.x < 5.5U3g / 6.0.x < 6.0U3d / 6.5.x < 6.5U1e Hypervisor-Assisted Guest Remediation (VMSA-2018-0004) (Spectre) | Nessus | Misc. | medium |
105783 | VMware Player 12.x < 12.5.9 / 14.x < 14.1.1 Multiple Vulnerabilities (VMSA-2018-0004) (VMSA-2018-0005) (Spectre) | Nessus | Windows | medium |
105782 | ESXi 5.5 / 6.0 / 6.5 / Hypervisor-Assisted Guest Remediation for Speculative Execution (VMSA-2018-0004) (Spectre) (remote check) | Nessus | Misc. | medium |
105781 | VMware Fusion 8.x < 8.5.10 / 10.x < 10.1.1 Multiple Vulnerabilities (VMSA-2018-0004) (VMSA-2018-0005) (Spectre) (macOS) | Nessus | MacOS X Local Security Checks | medium |
105777 | NVIDIA Windows GPU Display Driver 384.x / 385.x / 386.x < 386.07 / 390.x < 390.65 Multiple Vulnerabilities (Meltdown)(Spectre) | Nessus | Windows | medium |
105776 | NVIDIA Linux GPU Display Driver 384.x < 384.111 / 390.x < 390.12 Multiple Vulnerabilities (Meltdown)(Spectre) | Nessus | Misc. | medium |
105769 | Apple iOS < 11.2.2 Multiple Vulnerabilities (Spectre) | Nessus | Mobile Devices | medium |
105768 | VMSA-2018-0004 : VMware vSphere, Workstation and Fusion updates add Hypervisor-Assisted Guest Remediation for speculative execution issue (Spectre) | Nessus | VMware ESX Local Security Checks | medium |
105767 | Ubuntu 14.04 LTS / 16.04 LTS / 17.04 / 17.10 : intel-microcode update (USN-3531-1) (Spectre) | Nessus | Ubuntu Local Security Checks | medium |
105766 | Ubuntu 16.04 LTS / 17.04 / 17.10 : webkit2gtk vulnerabilities (USN-3530-1) (Spectre) | Nessus | Ubuntu Local Security Checks | medium |
105765 | SUSE SLES12 Security Update : kernel (SUSE-SU-2018:0069-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | medium |
105764 | SUSE SLES11 Security Update : microcode_ctl (SUSE-SU-2018:0068-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
105763 | SUSE SLED12 / SLES12 Security Update : ucode-intel (SUSE-SU-2018:0067-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
105762 | OracleVM 3.4 : Unbreakable / etc (OVMSA-2018-0008) (Meltdown) (Spectre) | Nessus | OracleVM Local Security Checks | medium |
105761 | OracleVM 3.4 : Unbreakable / etc (OVMSA-2018-0007) (Spectre) | Nessus | OracleVM Local Security Checks | medium |
105760 | Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2018-4006) (Meltdown) (Spectre) | Nessus | Oracle Linux Local Security Checks | medium |
105759 | Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2018-4004) (Spectre) | Nessus | Oracle Linux Local Security Checks | medium |
105758 | openSUSE Security Update : ucode-intel (openSUSE-2018-24) (Spectre) | Nessus | SuSE Local Security Checks | medium |
105741 | openSUSE Security Update : qemu (openSUSE-2018-20) (Spectre) | Nessus | SuSE Local Security Checks | medium |
105722 | SUSE SLES12 Security Update : qemu (SUSE-SU-2018:0056-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
105718 | OracleVM 3.4 : xen (OVMSA-2018-0006) (Meltdown) (Spectre) | Nessus | OracleVM Local Security Checks | medium |
105717 | OracleVM 3.4 : xen (OVMSA-2018-0005) (Meltdown) (Spectre) | Nessus | OracleVM Local Security Checks | high |
105689 | macOS : Apple Safari <= 11.0.2 (11604.4.7.1.6 / 12604.4.7.1.6 / 13604.4.7.10.6) Information Disclosure (Spectre) | Nessus | MacOS X Local Security Checks | medium |
105685 | SUSE SLES11 Security Update : kernel (SUSE-SU-2018:0040-1) (BlueBorne) (KRACK) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | high |
105684 | SUSE SLES11 Security Update : kvm (SUSE-SU-2018:0039-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
105682 | RHEL 6 : rhevm-setup-plugins (RHSA-2018:0052) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105681 | RHEL 7 : rhevm-setup-plugins (RHSA-2018:0051) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105680 | RHEL 7 : Virtualization (RHSA-2018:0050) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105679 | RHEL 7 : Virtualization (RHSA-2018:0048) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105678 | RHEL 7 : redhat-virtualization-host (RHSA-2018:0047) (Meltdown) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105677 | RHEL 6 / 7 : rhev-hypervisor7 (RHSA-2018:0046) (Meltdown) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105676 | RHEL 7 : rhvm-appliance (RHSA-2018:0045) (Meltdown) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105675 | RHEL 7 : redhat-virtualization-host (RHSA-2018:0044) (Meltdown) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105674 | RHEL 7 : Virtualization (RHSA-2018:0028) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105673 | RHEL 7 : Virtualization (RHSA-2018:0025) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105672 | RHEL 6 : MRG (RHSA-2018:0021) (Meltdown) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105670 | Oracle Linux 6 : libvirt (ELSA-2018-0030) (Spectre) | Nessus | Oracle Linux Local Security Checks | medium |
105669 | Oracle Linux 7 : libvirt (ELSA-2018-0029) (Spectre) | Nessus | Oracle Linux Local Security Checks | medium |
105668 | Oracle Linux 6 : qemu-kvm (ELSA-2018-0024) (Spectre) | Nessus | Oracle Linux Local Security Checks | medium |
105667 | Oracle Linux 7 : qemu-kvm (ELSA-2018-0023) (Spectre) | Nessus | Oracle Linux Local Security Checks | medium |
105657 | Virtuozzo 7 : crit / criu / criu-devel / ksm-vz / libcompel / etc (VZA-2018-003) | Nessus | Virtuozzo Local Security Checks | medium |
105655 | EulerOS 2.0 SP1 : kernel (EulerOS-SA-2018-1002) | Nessus | Huawei Local Security Checks | medium |
105649 | Ubuntu 14.04 LTS / 16.04 LTS / 17.04 / 17.10 : firefox vulnerabilities (USN-3516-1) (Meltdown) (Spectre) | Nessus | Ubuntu Local Security Checks | medium |
105648 | SUSE SLED12 / SLES12 Security Update : qemu (SUSE-SU-2018:0036-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
105647 | SUSE SLES12 Security Update : kernel (SUSE-SU-2018:0031-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | high |
105645 | RHEL 7 : linux-firmware (RHSA-2018:0053) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105644 | OracleVM 3.4 : qemu-kvm (OVMSA-2018-0004) (Spectre) | Nessus | OracleVM Local Security Checks | medium |
105642 | openSUSE Security Update : kernel-firmware (openSUSE-2018-9) (Spectre) | Nessus | SuSE Local Security Checks | medium |
105641 | openSUSE Security Update : qemu (openSUSE-2018-8) (Spectre) | Nessus | SuSE Local Security Checks | medium |
105637 | openSUSE Security Update : ucode-intel (openSUSE-2018-4) (Spectre) | Nessus | SuSE Local Security Checks | medium |
105636 | openSUSE Security Update : the Linux Kernel (openSUSE-2018-3) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | high |
105619 | Virtuozzo 6 : parallels-server-bm-release / vzkernel / etc (VZA-2018-002) | Nessus | Virtuozzo Local Security Checks | medium |
105618 | EulerOS 2.0 SP2 : kernel (EulerOS-SA-2018-1001) | Nessus | Huawei Local Security Checks | medium |
105617 | Citrix XenServer Multiple Vulnerabilities (CTX231390) (Meltdown)(Spectre) | Nessus | Misc. | medium |
105616 | Mozilla Firefox < 57.0.4 Speculative Execution Side-Channel Attack Vulnerability (Spectre) | Nessus | Windows | medium |
105615 | Mozilla Firefox < 57.0.4 Speculative Execution Side-Channel Attack Vulnerability (Spectre) (macOS) | Nessus | MacOS X Local Security Checks | medium |
105613 | ADV180002: Microsoft SQL Server January 2018 Security Update (Meltdown) (Spectre) | Nessus | Windows : Microsoft Bulletins | medium |
105611 | Scientific Linux Security Update : libvirt on SL7.x x86_64 (Spectre) | Nessus | Scientific Linux Local Security Checks | medium |
105610 | RHEL 6 : microcode_ctl (RHSA-2018:0040) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105609 | RHEL 6 : microcode_ctl (RHSA-2018:0039) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105608 | RHEL 6 : microcode_ctl (RHSA-2018:0038) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105607 | RHEL 6 : microcode_ctl (RHSA-2018:0037) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105606 | RHEL 6 : microcode_ctl (RHSA-2018:0036) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105605 | RHEL 7 : microcode_ctl (RHSA-2018:0035) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105604 | RHEL 7 : microcode_ctl (RHSA-2018:0034) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105603 | RHEL 7 : libvirt (RHSA-2018:0031) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105602 | RHEL 7 : libvirt (RHSA-2018:0029) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105601 | Oracle Linux 6 : microcode_ctl (ELSA-2018-0013) (Spectre) | Nessus | Oracle Linux Local Security Checks | medium |
105600 | Oracle Linux 7 : microcode_ctl (ELSA-2018-0012) (Spectre) | Nessus | Oracle Linux Local Security Checks | medium |
105599 | Oracle Linux 6 : kernel (ELSA-2018-0008) (Meltdown) (Spectre) | Nessus | Oracle Linux Local Security Checks | medium |
105598 | Oracle Linux 7 : kernel (ELSA-2018-0007) (Meltdown) (Spectre) | Nessus | Oracle Linux Local Security Checks | medium |
105597 | openSUSE Security Update : the Linux Kernel (openSUSE-2018-2) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | high |
105594 | CentOS 6 : libvirt (CESA-2018:0030) (Spectre) | Nessus | CentOS Local Security Checks | medium |
105593 | CentOS 7 : libvirt (CESA-2018:0029) (Spectre) | Nessus | CentOS Local Security Checks | medium |
105592 | CentOS 7 : qemu-kvm (CESA-2018:0023) (Spectre) | Nessus | CentOS Local Security Checks | medium |
105591 | CentOS 7 : linux-firmware (CESA-2018:0014) (Spectre) | Nessus | CentOS Local Security Checks | medium |
105590 | CentOS 6 : microcode_ctl (CESA-2018:0013) (Spectre) | Nessus | CentOS Local Security Checks | medium |
105589 | CentOS 6 : kernel (CESA-2018:0008) (Meltdown) (Spectre) | Nessus | CentOS Local Security Checks | medium |
105588 | CentOS 7 : kernel (CESA-2018:0007) (Meltdown) (Spectre) | Nessus | CentOS Local Security Checks | medium |
105584 | VMSA-2018-0002 : VMware ESXi, Workstation and Fusion updates address side-channel analysis due to speculative execution. (Spectre) | Nessus | VMware ESX Local Security Checks | medium |
105582 | SUSE SLES12 Security Update : qemu (SUSE-SU-2018:0020-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
105581 | SUSE SLES11 Security Update : kvm (SUSE-SU-2018:0019-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
105576 | SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2018:0012-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | high |
105575 | SUSE SLES11 Security Update : kernel (SUSE-SU-2018:0011-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | high |
105574 | SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2018:0010-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | high |
105573 | Scientific Linux Security Update : qemu-kvm on SL7.x x86_64 (Spectre) | Nessus | Scientific Linux Local Security Checks | medium |
105572 | Scientific Linux Security Update : qemu-kvm on SL6.x i386/x86_64 (Spectre) | Nessus | Scientific Linux Local Security Checks | medium |
105571 | Scientific Linux Security Update : linux-firmware on SL7.x (noarch) (Spectre) | Nessus | Scientific Linux Local Security Checks | medium |
105570 | Scientific Linux Security Update : libvirt on SL6.x i386/x86_64 (Spectre) | Nessus | Scientific Linux Local Security Checks | medium |
105569 | RHEL 7 : libvirt (RHSA-2018:0032) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105568 | RHEL 6 : libvirt (RHSA-2018:0030) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105567 | RHEL 7 : qemu-kvm (RHSA-2018:0027) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105566 | RHEL 7 : qemu-kvm (RHSA-2018:0026) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105565 | RHEL 6 : qemu-kvm (RHSA-2018:0024) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105564 | RHEL 7 : qemu-kvm (RHSA-2018:0023) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105563 | RHEL 6 : kernel (RHSA-2018:0022) (Meltdown) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105562 | RHEL 6 : kernel (RHSA-2018:0020) (Meltdown) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105561 | RHEL 6 : kernel (RHSA-2018:0018) (Meltdown) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105558 | openSUSE Security Update : kernel-firmware (openSUSE-2018-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
105556 | CentOS 7 : microcode_ctl (CESA-2018:0012) (Spectre) | Nessus | CentOS Local Security Checks | medium |
105555 | VMware Player 12.x < 12.5.8 Multiple Vulnerabilities (VMSA-2017-0021) (VMSA-2018-0002) (Spectre) | Nessus | Windows | medium |
105553 | KB4056898: Windows 8.1 and Windows Server 2012 R2 January 2018 Security Update (Meltdown)(Spectre) | Nessus | Windows : Microsoft Bulletins | high |
105552 | KB4056897: Windows 7 and Windows Server 2008 R2 January 2018 Security Update (Meltdown)(Spectre) | Nessus | Windows : Microsoft Bulletins | high |
105551 | KB4056893: Windows 10 LTSB January 2018 Security Update (Meltdown)(Spectre) | Nessus | Windows : Microsoft Bulletins | high |
105550 | KB4056892: Windows 10 Version 1709 and Windows Server Version 1709 January 2018 Security Update (Meltdown)(Spectre) | Nessus | Windows : Microsoft Bulletins | high |
105549 | KB4056891: Windows 10 Version 1703 January 2018 Security Update (Meltdown)(Spectre) | Nessus | Windows : Microsoft Bulletins | high |
105548 | KB4056890: Windows 10 Version 1607 and Windows Server 2016 January 2018 Security Update (Meltdown)(Spectre) | Nessus | Windows : Microsoft Bulletins | high |
105547 | KB4056888: Windows 10 Version 1511 January 2018 Security Update (Meltdown)(Spectre) | Nessus | Windows : Microsoft Bulletins | high |
105541 | SUSE SLES11 Security Update : microcode_ctl (SUSE-SU-2018:0009-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
105540 | SUSE SLED12 / SLES12 Security Update : qemu (SUSE-SU-2018:0007-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
105539 | SUSE SLED12 / SLES12 Security Update : ucode-intel (SUSE-SU-2018:0006-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
105537 | Scientific Linux Security Update : microcode_ctl on SL7.x x86_64 (Spectre) | Nessus | Scientific Linux Local Security Checks | medium |
105536 | Scientific Linux Security Update : microcode_ctl on SL6.x i386/x86_64 (Spectre) | Nessus | Scientific Linux Local Security Checks | medium |
105535 | Scientific Linux Security Update : kernel on SL7.x x86_64 (Meltdown) (Spectre) | Nessus | Scientific Linux Local Security Checks | medium |
105534 | Scientific Linux Security Update : kernel on SL6.x i386/x86_64 (Meltdown) (Spectre) | Nessus | Scientific Linux Local Security Checks | medium |
105533 | RHEL 6 : kernel (RHSA-2018:0017) (Meltdown) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105532 | RHEL 7 : kernel-rt (RHSA-2018:0016) (Meltdown) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105531 | RHEL 7 : linux-firmware (RHSA-2018:0015) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105530 | RHEL 7 : linux-firmware (RHSA-2018:0014) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105529 | RHEL 6 : microcode_ctl (RHSA-2018:0013) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105528 | RHEL 7 : microcode_ctl (RHSA-2018:0012) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105527 | RHEL 6 : kernel (RHSA-2018:0011) (Meltdown) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105526 | RHEL 7 : kernel (RHSA-2018:0010) (Meltdown) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105525 | RHEL 7 : kernel (RHSA-2018:0009) (Meltdown) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105524 | RHEL 6 : kernel (RHSA-2018:0008) (Meltdown) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105523 | RHEL 7 : kernel (RHSA-2018:0007) (Meltdown) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105517 | Amazon Linux AMI : kernel (ALAS-2018-939) (Meltdown) (Spectre) | Nessus | Amazon Linux Local Security Checks | medium |
105487 | VMware Workstation 12.x < 12.5.8 Multiple Vulnerabilities (VMSA-2017-0021) (VMSA-2018-0002) (Spectre) | Nessus | Windows | medium |
105486 | ESXi 5.5 / 6.0 / 6.5 / Multiple Vulnerabilities (VMSA-2017-0021) (VMSA-2018-0002) (Spectre) (remote check) | Nessus | Misc. | medium |
105485 | VMware Fusion 8.x < 8.5.9 Multiple Vulnerabilities (VMSA-2017-0021) (VMSA-2018-0002) (Spectre) (macOS) | Nessus | MacOS X Local Security Checks | medium |