CVE-2017-5753

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

References

https://01.org/security/advisories/intel-oss-10002

https://www.synology.com/support/security/Synology_SA_18_01

https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/

https://support.lenovo.com/us/en/solutions/LEN-18282

https://support.f5.com/csp/article/K91229003

https://spectreattack.com/

https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002

https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html

https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/

https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/

https://access.redhat.com/security/vulnerabilities/speculativeexecution

http://xenbits.xen.org/xsa/advisory-254.html

http://www.securitytracker.com/id/1040071

http://www.kb.cert.org/vuls/id/584653

http://nvidia.custhelp.com/app/answers/detail/a_id/4609

https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html

https://www.exploit-db.com/exploits/43427/

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel

https://support.citrix.com/article/CTX231399

https://security.netapp.com/advisory/ntap-20180104-0001/

http://www.securityfocus.com/bid/102371

http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html

http://nvidia.custhelp.com/app/answers/detail/a_id/4614

http://nvidia.custhelp.com/app/answers/detail/a_id/4613

http://nvidia.custhelp.com/app/answers/detail/a_id/4611

http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html

http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html

http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html

http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html

http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html

https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us

https://usn.ubuntu.com/usn/usn-3516-1/

https://access.redhat.com/errata/RHSA-2018:0292

http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt

https://usn.ubuntu.com/3597-2/

https://usn.ubuntu.com/3597-1/

https://usn.ubuntu.com/3580-1/

https://usn.ubuntu.com/3549-1/

https://usn.ubuntu.com/3542-1/

https://usn.ubuntu.com/3541-1/

https://usn.ubuntu.com/3540-1/

https://usn.ubuntu.com/3542-2/

https://usn.ubuntu.com/3541-2/

https://usn.ubuntu.com/3540-2/

http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html

https://www.debian.org/security/2018/dsa-4188

https://www.debian.org/security/2018/dsa-4187

https://cert.vde.com/en-us/advisories/vde-2018-003

https://cert.vde.com/en-us/advisories/vde-2018-002

https://www.kb.cert.org/vuls/id/180049

https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability

https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html

https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html

https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html

https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us

https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001

https://security.gentoo.org/glsa/201810-06

https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes

https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf

https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html

https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html

https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html

https://seclists.org/bugtraq/2019/Jun/36

http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt

https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf

Details

Source: MITRE

Published: 2018-01-04

Updated: 2021-06-24

Type: CWE-203

Risk Information

CVSS v2

Base Score: 4.7

Vector: AV:L/AC:M/Au:N/C:C/I:N/A:N

Impact Score: 6.9

Exploitability Score: 3.4

Severity: MEDIUM

CVSS v3

Base Score: 5.6

Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N

Impact Score: 4

Exploitability Score: 1.1

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c2316:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c2338:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c2350:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c2358:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c2508:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c2516:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c2518:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c2530:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c2538:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c2550:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c2558:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c2758:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c2738:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c2718:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c2750:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c2730:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_j:j1900:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_j:j1850:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_j:j1800:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_j:j1750:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_x3:c3445:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_x3:c3405:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_x3:c3265rk:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_x3:c3295rk:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_x3:c3235rk:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_x3:c3230rk:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_x3:c3205rk:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_x3:c3200rk:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_x3:c3130:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3795:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3785:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3775d:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3775:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3770d:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n4100:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n4000:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n3000:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n3010:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n3050:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n3060:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n3150:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n3160:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n3350:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n2940:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n2930:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n2920:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n2910:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n2840:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n2830:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n2820:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n2815:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n2810:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n2808:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n2807:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n2806:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n2805:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_j:j3355:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_j:j3160:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_j:j3060:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3450:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_m3:7y32:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_m3:7y30:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_m7:6y75:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_m5:6y54:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_m5:6y57:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_m3:6y30:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_m:5y71:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_m:5y70:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_m:5y51:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_m:5y31:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_m:5y10c:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_m:5y10a:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_m:5y10:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2658_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2650l_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2658_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2658_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2658:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1535m_v6:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1505m_v6:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1585_v5:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1585l_v5:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1578l_v5:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1575m_v5:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1565l_v5:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1558l_v5:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1545m_v5:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1535m_v5:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1515m_v5:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x3480:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x3470:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x3460:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x3450:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x3440:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x3430:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:l3426:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:l3406:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:w3690:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:w3680:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:w3670:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x5570:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:lc5528:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x5560:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:lc5518:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x5550:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:ec5549:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:w5590:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:ec5539:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:w5580:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:ec5509:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:l5530:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:l5520:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:l5518:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:l5508:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:l5506:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:e5540:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:e5530:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:e5520:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:e5507:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:e5506:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:e5504:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:e5503:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:e5502:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x5690:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x5687:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x5680:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x5677:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x5675:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x5672:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x5670:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x5667:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x5660:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x5650:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x5647:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:l5640:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:l5638:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:l5630:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:l5618:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:l5609:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:e5649:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:e5645:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:e5640:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:e5630:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:e5620:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:e5607:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:e5606:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:e5603:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x6550:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:e6540:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:e6510:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x7560:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x7550:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:x7542:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:l7555:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:l7545:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:e7540:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:e7530:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon:e7520:*:*:*:*:*:*:*

cpe:2.3:h:intel:pentium_n:n4200:*:*:*:*:*:*:*

cpe:2.3:h:intel:pentium_n:n3540:*:*:*:*:*:*:*

cpe:2.3:h:intel:pentium_n:n3530:*:*:*:*:*:*:*

cpe:2.3:h:intel:pentium_n:n3520:*:*:*:*:*:*:*

cpe:2.3:h:intel:pentium_n:n3510:*:*:*:*:*:*:*

cpe:2.3:h:intel:pentium_n:n3700:*:*:*:*:*:*:*

cpe:2.3:h:intel:pentium_n:n3710:*:*:*:*:*:*:*

cpe:2.3:h:intel:pentium_j:j4205:*:*:*:*:*:*:*

cpe:2.3:h:intel:pentium_j:j3710:*:*:*:*:*:*:*

cpe:2.3:h:intel:pentium_j:j2900:*:*:*:*:*:*:*

cpe:2.3:h:intel:pentium_j:j2850:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e-1105c:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1105c_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1125c:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1125c_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1220:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1220_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1220_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_12201:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_12201_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1220l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1225:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1225_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1225_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1226_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1230:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1230_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1230_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1230l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1231_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1235:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1240:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1240_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1240_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1240l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1241_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1245:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1245_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1245_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1246_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1258l_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1260l:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1265l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1265l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1265l_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1268l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1270:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1270_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1270_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1271_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1275:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1275_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1275_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1275l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1276_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1278l_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1280:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1280_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1280_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1281_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1285_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1285_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1285l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1285l_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1286_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1286l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1290:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1290_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1501l_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1501m_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1505l_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1505l_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1505m_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8870:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8867l:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8860:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8850:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8837:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8830:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4870:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4860:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4850:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4830:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4820:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4807:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:2870:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:2860:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:2850:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:2830:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:2820:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:2803:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8894_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8893_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8891_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8890_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8880_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8870_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8867_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8860_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4850_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4830_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4820_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4809_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8893_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8891_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8890_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8880l_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8880_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8870_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8867_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8860_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4850_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4830_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4820_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4809_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8850_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8857_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8870_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8880_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8880l_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8890_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8891_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8893_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4890_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4880_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4870_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4860_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4850_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4830_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4820_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4809_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:2890_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:2880_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:2870_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:2850_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6154:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6152:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6150:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6148f:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6148:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6146:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6144:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6142m:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6142f:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6142:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6140m:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6140:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6138t:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6138f:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6138:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6136:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6134m:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6134:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6132:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6130t:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6130f:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6130:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6128:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6126t:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6126f:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:6126:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:5122:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:5120t:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:5120:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:5119t:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:5118:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_phi:7290f:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_phi:7290:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_phi:7250f:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_phi:7250:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_phi:7230f:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_phi:7230:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_phi:7210f:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_phi:7210:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_phi:7235:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_phi:7285:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_phi:7295:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4669_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4667_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4660_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4655_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4650_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4640_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4628l_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4627_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4620_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4610_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2699a_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2699r_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2699_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2698_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2697_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2697a_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2695_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2690_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2687w_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2683_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2680_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2667_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2660_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2699_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4669_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4667_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4660_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2698_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4655_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2697_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4650_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4648_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2695_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4640_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2690_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4627_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2687w_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4620_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4610_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2683_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2680_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2670_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2667_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2660_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2658a_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4603_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4607_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4610_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4620_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4624l_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4627_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4640_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4650_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4657l_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2660_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2667_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2670_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2680_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2687w_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2690_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2695_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2697_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4603:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4607:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4610:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4617:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4620:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4640:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4650:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4650l:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2660:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2665:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2667:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2670:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2680:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2687w:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2690:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1428l:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1428l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1428l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1620:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1620_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1620_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1620_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1630_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1630_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1650:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1650_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1650_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1650_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1660:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1660_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1660_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1660_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1680_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1680_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2403:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2403_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2407:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2407_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2408l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2418l:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2418l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2418l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2420:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2420_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2428l:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2428l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2428l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2430:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2430_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2430l:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2430l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2438l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2440:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2440_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2448l:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2448l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2450:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2450_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2450l:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2450l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2470:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2470_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2603:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2603_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2603_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2603_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2608l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2608l_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2609:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2609_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2609_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2609_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2618l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2618l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2618l_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2620:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2620_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2620_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2620_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2623_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2623_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2628l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2628l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2628l_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2630:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2630_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2630_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2630_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2630l:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2630l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2630l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2630l_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2637:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2637_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2637_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2637_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2640:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2640_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2640_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2640_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2643:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2643_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2643_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2643_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2648l:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2648l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2648l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2648l_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2650:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2650_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2650_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2650_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2650l:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2650l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2650l_v3:-:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 4

OR

cpe:2.3:a:oracle:local_service_management_system:13.1:*:*:*:*:*:*:*

cpe:2.3:a:oracle:local_service_management_system:13.2:*:*:*:*:*:*:*

cpe:2.3:a:oracle:local_service_management_system:13.3:*:*:*:*:*:*:*

cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*

cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*

Configuration 5

OR

cpe:2.3:a:synology:diskstation_manager:*:*:*:*:*:*:*:*

cpe:2.3:a:synology:router_manager:*:*:*:*:*:*:*:*

cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*

cpe:2.3:a:synology:virtual_machine_manager:*:*:*:*:*:*:*:*

Configuration 6

AND

OR

cpe:2.3:o:synology:vs960hd_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*

Configuration 7

AND

OR

cpe:2.3:o:synology:vs360hd_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:synology:vs360hd:-:*:*:*:*:*:*:*

Configuration 8

OR

cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*

cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux_enterprise_desktop:12:sp2:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux_enterprise_desktop:12:sp3:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp4:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp2:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp2:*:*:*:*:raspberry_pi:*

cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp3:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux_enterprise_software_development_kit:12:sp2:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux_enterprise_software_development_kit:12:sp3:*:*:*:*:*:*

Configuration 9

AND

OR

cpe:2.3:o:arm:cortex-r7_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:arm:cortex-r7:-:*:*:*:*:*:*:*

Configuration 10

AND

OR

cpe:2.3:o:arm:cortex-r8_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:arm:cortex-r8:-:*:*:*:*:*:*:*

Configuration 11

AND

OR

cpe:2.3:o:arm:cortex-a8_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:arm:cortex-a8:-:*:*:*:*:*:*:*

Configuration 12

AND

OR

cpe:2.3:o:arm:cortex-a9_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:arm:cortex-a9:-:*:*:*:*:*:*:*

Configuration 13

AND

OR

cpe:2.3:o:arm:cortex-a12_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:arm:cortex-a12:-:*:*:*:*:*:*:*

Configuration 14

AND

OR

cpe:2.3:o:arm:cortex-a15_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:arm:cortex-a15:-:*:*:*:*:*:*:*

Configuration 15

AND

OR

cpe:2.3:o:arm:cortex-a17_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:arm:cortex-a17:-:*:*:*:*:*:*:*

Configuration 16

AND

OR

cpe:2.3:o:arm:cortex-a57_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:arm:cortex-a57:-:*:*:*:*:*:*:*

Configuration 17

AND

OR

cpe:2.3:o:arm:cortex-a72_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:arm:cortex-a72:-:*:*:*:*:*:*:*

Configuration 18

AND

OR

cpe:2.3:o:arm:cortex-a73_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:arm:cortex-a73:-:*:*:*:*:*:*:*

Configuration 19

AND

OR

cpe:2.3:o:arm:cortex-a75_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:arm:cortex-a75:-:*:*:*:*:*:*:*

Configuration 20

AND

OR

cpe:2.3:o:arm:cortex-a76_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:arm:cortex-a76:-:*:*:*:*:*:*:*

Configuration 21

OR

cpe:2.3:a:pepperl-fuchs:visunet_rm_shell:-:*:*:*:*:*:*:*

Configuration 22

AND

OR

cpe:2.3:o:pepperl-fuchs:btc12_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:pepperl-fuchs:btc12:-:*:*:*:*:*:*:*

Configuration 23

AND

OR

cpe:2.3:o:pepperl-fuchs:btc14_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:pepperl-fuchs:btc14:-:*:*:*:*:*:*:*

Configuration 24

OR

cpe:2.3:a:netapp:hci:-:*:*:*:*:*:*:*

cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*

Configuration 25

AND

OR

cpe:2.3:o:phoenixcontact:bl_ppc_1000_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:bl_ppc_1000:-:*:*:*:*:*:*:*

Configuration 26

AND

OR

cpe:2.3:o:phoenixcontact:bl_ppc12_1000_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:bl_ppc12_1000:-:*:*:*:*:*:*:*

Configuration 27

AND

OR

cpe:2.3:o:phoenixcontact:bl_ppc15_1000_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:bl_ppc15_1000:-:*:*:*:*:*:*:*

Configuration 28

AND

OR

cpe:2.3:o:phoenixcontact:bl_ppc17_1000_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:bl_ppc17_1000:-:*:*:*:*:*:*:*

Configuration 29

AND

OR

cpe:2.3:o:phoenixcontact:bl_bpc_2000_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:bl_bpc_2000:-:*:*:*:*:*:*:*

Configuration 30

AND

OR

cpe:2.3:o:phoenixcontact:bl_bpc_2001_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:bl_bpc_2001:-:*:*:*:*:*:*:*

Configuration 31

AND

OR

cpe:2.3:o:phoenixcontact:bl_bpc_3000_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:bl_bpc_3000:-:*:*:*:*:*:*:*

Configuration 32

AND

OR

cpe:2.3:o:phoenixcontact:bl_bpc_3001_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:bl_bpc_3001:-:*:*:*:*:*:*:*

Configuration 33

AND

OR

cpe:2.3:o:phoenixcontact:bl_ppc15_3000_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:bl_ppc15_3000:-:*:*:*:*:*:*:*

Configuration 34

AND

OR

cpe:2.3:o:phoenixcontact:bl_ppc17_3000_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:bl_ppc17_3000:-:*:*:*:*:*:*:*

Configuration 35

AND

OR

cpe:2.3:o:phoenixcontact:bl_bpc_7000_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:bl_bpc_7000:-:*:*:*:*:*:*:*

Configuration 36

AND

OR

cpe:2.3:o:phoenixcontact:bl_bpc_7001_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:bl_bpc_7001:-:*:*:*:*:*:*:*

Configuration 37

AND

OR

cpe:2.3:o:phoenixcontact:bl_ppc_7000_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:bl_ppc_7000:-:*:*:*:*:*:*:*

Configuration 38

AND

OR

cpe:2.3:o:phoenixcontact:bl_ppc15_7000_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:bl_ppc15_7000:-:*:*:*:*:*:*:*

Configuration 39

AND

OR

cpe:2.3:o:phoenixcontact:bl_ppc17_7000_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:bl_ppc17_7000:-:*:*:*:*:*:*:*

Configuration 40

AND

OR

cpe:2.3:o:phoenixcontact:bl_rackmount_2u_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:bl_rackmount_2u:-:*:*:*:*:*:*:*

Configuration 41

AND

OR

cpe:2.3:o:phoenixcontact:bl_rackmount_4u_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:bl_rackmount_4u:-:*:*:*:*:*:*:*

Configuration 42

AND

OR

cpe:2.3:o:phoenixcontact:bl2_bpc_1000_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:bl2_bpc_1000:-:*:*:*:*:*:*:*

Configuration 43

AND

OR

cpe:2.3:o:phoenixcontact:bl2_ppc_1000_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:bl2_ppc_1000:-:*:*:*:*:*:*:*

Configuration 44

AND

OR

cpe:2.3:o:phoenixcontact:bl2_bpc_2000_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:bl2_bpc_2000:-:*:*:*:*:*:*:*

Configuration 45

AND

OR

cpe:2.3:o:phoenixcontact:bl2_ppc_2000_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:bl2_ppc_2000:-:*:*:*:*:*:*:*

Configuration 46

AND

OR

cpe:2.3:o:phoenixcontact:bl2_bpc_7000_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:bl2_bpc_7000:-:*:*:*:*:*:*:*

Configuration 47

AND

OR

cpe:2.3:o:phoenixcontact:bl2_ppc_7000_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:bl2_ppc_7000:-:*:*:*:*:*:*:*

Configuration 48

AND

OR

cpe:2.3:o:phoenixcontact:dl_ppc15_1000_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:dl_ppc15_1000:-:*:*:*:*:*:*:*

Configuration 49

AND

OR

cpe:2.3:o:phoenixcontact:dl_ppc15m_7000_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:dl_ppc15m_7000:-:*:*:*:*:*:*:*

Configuration 50

AND

OR

cpe:2.3:o:phoenixcontact:dl_ppc18.5m_7000_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:dl_ppc18.5m_7000:-:*:*:*:*:*:*:*

Configuration 51

AND

OR

cpe:2.3:o:phoenixcontact:dl_ppc21.5m_7000_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:dl_ppc21.5m_7000:-:*:*:*:*:*:*:*

Configuration 52

AND

OR

cpe:2.3:o:phoenixcontact:el_ppc_1000_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:el_ppc_1000:-:*:*:*:*:*:*:*

Configuration 53

AND

OR

cpe:2.3:o:phoenixcontact:el_ppc_1000\/wt_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:el_ppc_1000\/wt:-:*:*:*:*:*:*:*

Configuration 54

AND

OR

cpe:2.3:o:phoenixcontact:el_ppc_1000\/m_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:el_ppc_1000\/m:-:*:*:*:*:*:*:*

Configuration 55

AND

OR

cpe:2.3:o:phoenixcontact:valueline_ipc_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:valueline_ipc:-:*:*:*:*:*:*:*

Configuration 56

AND

OR

cpe:2.3:o:phoenixcontact:vl_bpc_1000_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:vl_bpc_1000:-:*:*:*:*:*:*:*

Configuration 57

AND

OR

cpe:2.3:o:phoenixcontact:vl_bpc_2000_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:vl_bpc_2000:-:*:*:*:*:*:*:*

Configuration 58

AND

OR

cpe:2.3:o:phoenixcontact:vl_ppc_2000_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:vl_ppc_2000:-:*:*:*:*:*:*:*

Configuration 59

AND

OR

cpe:2.3:o:phoenixcontact:vl_bpc_3000_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:vl_bpc_3000:-:*:*:*:*:*:*:*

Configuration 60

AND

OR

cpe:2.3:o:phoenixcontact:vl_ppc_3000_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:vl_ppc_3000:-:*:*:*:*:*:*:*

Configuration 61

AND

OR

cpe:2.3:o:phoenixcontact:vl_ipc_p7000_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:vl_ipc_p7000:-:*:*:*:*:*:*:*

Configuration 62

AND

OR

cpe:2.3:o:phoenixcontact:vl2_bpc_1000_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:vl2_bpc_1000:-:*:*:*:*:*:*:*

Configuration 63

AND

OR

cpe:2.3:o:phoenixcontact:vl2_ppc_1000_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:vl2_ppc_1000:-:*:*:*:*:*:*:*

Configuration 64

AND

OR

cpe:2.3:o:phoenixcontact:vl2_bpc_2000_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:vl2_bpc_2000:-:*:*:*:*:*:*:*

Configuration 65

AND

OR

cpe:2.3:o:phoenixcontact:vl2_ppc_2000_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:vl2_ppc_2000:-:*:*:*:*:*:*:*

Configuration 66

AND

OR

cpe:2.3:o:phoenixcontact:vl2_bpc_3000_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:vl2_bpc_3000:-:*:*:*:*:*:*:*

Configuration 67

AND

OR

cpe:2.3:o:phoenixcontact:vl2_ppc_3000_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:vl2_ppc_3000:-:*:*:*:*:*:*:*

Configuration 68

AND

OR

cpe:2.3:o:phoenixcontact:vl2_bpc_7000_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:vl2_bpc_7000:-:*:*:*:*:*:*:*

Configuration 69

AND

OR

cpe:2.3:o:phoenixcontact:vl2_ppc_7000_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:vl2_ppc_7000:-:*:*:*:*:*:*:*

Configuration 70

AND

OR

cpe:2.3:o:phoenixcontact:vl2_bpc_9000_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:vl2_bpc_9000:-:*:*:*:*:*:*:*

Configuration 71

AND

OR

cpe:2.3:o:phoenixcontact:vl2_ppc_9000_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:vl2_ppc_9000:-:*:*:*:*:*:*:*

Configuration 72

AND

OR

cpe:2.3:o:phoenixcontact:vl2_ppc7_1000_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:vl2_ppc7_1000:-:*:*:*:*:*:*:*

Configuration 73

AND

OR

cpe:2.3:o:phoenixcontact:vl2_ppc9_1000_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:vl2_ppc9_1000:-:*:*:*:*:*:*:*

Configuration 74

AND

OR

cpe:2.3:o:phoenixcontact:vl2_ppc12_1000_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:phoenixcontact:vl2_ppc12_1000:-:*:*:*:*:*:*:*

Configuration 75

AND

OR

cpe:2.3:o:siemens:simatic_itc1500_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_itc1500:v3:*:*:*:*:*:*:*

Configuration 76

AND

OR

cpe:2.3:o:siemens:simatic_itc1500_pro_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_itc1500_pro:v3:*:*:*:*:*:*:*

Configuration 77

AND

OR

cpe:2.3:o:siemens:simatic_itc1900_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_itc1900:v3:*:*:*:*:*:*:*

Configuration 78

AND

OR

cpe:2.3:o:siemens:simatic_itc1900_pro_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_itc1900_pro:v3:*:*:*:*:*:*:*

Configuration 79

AND

OR

cpe:2.3:o:siemens:simatic_itc2200_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_itc2200:v3:*:*:*:*:*:*:*

Configuration 80

AND

OR

cpe:2.3:o:siemens:simatic_itc2200_pro_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_itc2200_pro:v3:*:*:*:*:*:*:*

Configuration 81

AND

OR

cpe:2.3:o:siemens:simatic_winac_rtx_\(f\)_2010_firmware:*:*:*:*:*:*:*:*

cpe:2.3:o:siemens:simatic_winac_rtx_\(f\)_2010_firmware:2010:-:*:*:*:*:*:*

cpe:2.3:o:siemens:simatic_winac_rtx_\(f\)_2010_firmware:2010:sp1:*:*:*:*:*:*

cpe:2.3:o:siemens:simatic_winac_rtx_\(f\)_2010_firmware:2010:sp2:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_winac_rtx_\(f\)_2010:-:*:*:*:*:*:*:*

Configuration 82

OR

cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*

cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:-:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201312101:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201312102:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201312401:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201312402:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201403101:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201403102:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201403201:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201403202:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201403203:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201403205:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201403209:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201403208:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201403211:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201403210:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201403204:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201403207:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201403206:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201404420:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201404402:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201404403:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201404401:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201406401:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201407102:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201407101:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201407403:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201407404:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201407405:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201407402:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201407401:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201409101:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201409202:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201409203:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201409201:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201409205:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201409207:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201409204:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201409206:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201410101:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201410404:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201410405:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201410403:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201410406:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201410402:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201410401:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201501101:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201501402:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201501404:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201501405:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201501403:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201501401:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201502401:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201504201:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201505101:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201505402:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201505403:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201505404:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201505401:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201509102:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201509101:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201509213:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201509202:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201509208:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201509207:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201509206:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201509205:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201509204:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201509211:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201509210:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201509203:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201509209:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201509201:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201509212:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201510401:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201512102:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201512101:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201512402:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201512403:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201512404:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201512401:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201601401:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201602401:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:-:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201504401:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201505401:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201507101:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201507102:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201507403:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201507404:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201507405:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201507402:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201507407:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201507406:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201507401:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201509101:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201509102:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201509205:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201509209:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201509202:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201509206:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201509210:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201509204:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201509203:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201509207:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201509208:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201509201:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201510401:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201511401:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201601102:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201601101:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201601403:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201601402:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201601404:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201601405:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201601401:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201602401:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201603102:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201603101:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201603202:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201603201:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201603204:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201603208:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201603206:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201603207:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201603205:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201603203:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201605401:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201608101:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201608401:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201608403:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201608402:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201608405:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201608404:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201610410:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201611402:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201611401:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201611403:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201702101:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201702102:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201702201:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201702209:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201702202:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201702211:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201702204:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201702203:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201702207:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201702206:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201702205:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201702212:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201702208:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201702210:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201703401:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201706101:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201706102:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201706103:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201608102:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201608101:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201608404:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201608403:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201608402:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201608405:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201608401:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201609102:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201609101:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201609402:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201609403:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201609401:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201612102:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201612101:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201612402:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201612401:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201703401:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201709103:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201709102:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201709101:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201709401:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201709402:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:5.5.0:550-201709403:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201706402:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201706401:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201706403:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:6.0:600-201710301:*:*:*:*:*:*

Configuration 83

AND

OR

cpe:2.3:o:arm:cortex-a77_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:arm:cortex-a77:-:*:*:*:*:*:*:*

Configuration 84

AND

OR

cpe:2.3:o:arm:cortex-a78_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:arm:cortex-a78:-:*:*:*:*:*:*:*

Configuration 85

AND

OR

cpe:2.3:o:arm:cortex-a78ae_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:arm:cortex-a78ae:-:*:*:*:*:*:*:*

Configuration 86

AND

OR

cpe:2.3:o:arm:neoverse_n1_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:arm:neoverse_n1:-:*:*:*:*:*:*:*

Configuration 87

AND

OR

cpe:2.3:o:arm:neoverse_n2_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:arm:neoverse_n2:-:*:*:*:*:*:*:*

Configuration 88

AND

OR

cpe:2.3:o:arm:cortex-x1_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:arm:cortex-x1:-:*:*:*:*:*:*:*

Tenable Plugins

View all (187 total)

IDNameProductFamilySeverity
152956openSUSE 15 Security Update : spectre-meltdown-checker (openSUSE-SU-2021:1212-1)NessusSuSE Local Security Checks
medium
152897openSUSE 15 Security Update : spectre-meltdown-checker (openSUSE-SU-2021:2861-1)NessusSuSE Local Security Checks
medium
152889SUSE SLES12 Security Update : spectre-meltdown-checker (SUSE-SU-2021:2862-1)NessusSuSE Local Security Checks
medium
152888SUSE SLED15 / SLES15 Security Update : spectre-meltdown-checker (SUSE-SU-2021:2861-1)NessusSuSE Local Security Checks
medium
140019OracleVM 3.4 : xen (OVMSA-2020-0039) (Bunker Buster) (Foreshadow) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout) (Meltdown) (POODLE) (Spectre)NessusOracleVM Local Security Checks
critical
132252RancherOS < 1.4.0 Information DisclosureNessusMisc.
high
132134EulerOS 2.0 SP3 : kernel (EulerOS-SA-2019-2599)NessusHuawei Local Security Checks
high
132101Windows Speculative Execution Configuration CheckNessusWindows
medium
129284SUSE SLED15 / SLES15 Security Update : kernel-source-rt (SUSE-SU-2019:2430-1) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout) (SACK Panic) (SACK Slowness) (Spectre)NessusSuSE Local Security Checks
high
127408NewStart CGSL MAIN 4.05 : kernel Multiple Vulnerabilities (NS-SA-2019-0143)NessusNewStart CGSL Local Security Checks
critical
127233NewStart CGSL CORE 5.04 / MAIN 5.04 : kernel-rt Multiple Vulnerabilities (NS-SA-2019-0049)NessusNewStart CGSL Local Security Checks
high
127152NewStart CGSL MAIN 5.04 : kernel Multiple Vulnerabilities (NS-SA-2019-0007)NessusNewStart CGSL Local Security Checks
medium
126045SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2019:1550-1) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout) (SACK Panic) (SACK Slowness) (Spectre)NessusSuSE Local Security Checks
high
125753EulerOS Virtualization 2.5.1 : kernel (EulerOS-SA-2019-1638)NessusHuawei Local Security Checks
medium
125752EulerOS Virtualization 2.5.2 : kernel (EulerOS-SA-2019-1637)NessusHuawei Local Security Checks
medium
125216Processor Speculative Execution Vulnerabilities (Linux)NessusMisc.
medium
124992EulerOS Virtualization for ARM 64 3.0.1.0 : kernel (EulerOS-SA-2019-1539)NessusHuawei Local Security Checks
critical
124836EulerOS Virtualization 3.0.1.0 : kernel (EulerOS-SA-2019-1515)NessusHuawei Local Security Checks
critical
700545Apple iOS < 11.2.2 Multiple Vulnerabilities (Spectre, APPLE-SA-2018-1-8-1)Nessus Network MonitorMobile Devices
low
123420Debian DLA-1731-2 : linux regression update (Spectre)NessusDebian Local Security Checks
medium
123413SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2019:0765-1) (Spectre)NessusSuSE Local Security Checks
high
123226openSUSE Security Update : the Linux Kernel (openSUSE-2019-536) (Spectre)NessusSuSE Local Security Checks
high
123180openSUSE Security Update : xen (openSUSE-2019-418) (Meltdown) (Spectre)NessusSuSE Local Security Checks
medium
121909Photon OS 2.0: Linux PHSA-2018-2.0-0011NessusPhotonOS Local Security Checks
medium
121800Photon OS 1.0: Linux PHSA-2018-1.0-0098NessusPhotonOS Local Security Checks
medium
121569SUSE SLES12 Security Update : kernel (SUSE-SU-2019:0222-1) (Spectre)NessusSuSE Local Security Checks
high
120067SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2018:2092-1) (Spectre)NessusSuSE Local Security Checks
high
118702F5 Networks BIG-IP : Side-channel processor vulnerabilities (K91229003) (Meltdown) (Spectre)NessusF5 Networks Local Security Checks
medium
118506GLSA-201810-06 : Xen: Multiple vulnerabilities (Foreshadow) (Meltdown) (Spectre)NessusGentoo Local Security Checks
critical
118266SUSE SLES12 Security Update : xen (SUSE-SU-2018:1699-2) (Meltdown) (Spectre)NessusSuSE Local Security Checks
medium
117545EulerOS Virtualization 2.5.0 : kernel (EulerOS-SA-2018-1236)NessusHuawei Local Security Checks
medium
112147SUSE SLES11 Security Update : xen (SUSE-SU-2018:2528-1) (Foreshadow) (Meltdown) (Spectre)NessusSuSE Local Security Checks
high
700325Mozilla Firefox < 57.0.4 Multiple VulnerabilitiesNessus Network MonitorWeb Clients
medium
700322Mozilla Firefox < 57 Multiple VulnerabilitiesNessus Network MonitorWeb Clients
critical
111992OracleVM 3.4 : xen (OVMSA-2018-0248) (Bunker Buster) (Foreshadow) (Meltdown) (POODLE) (Spectre)NessusOracleVM Local Security Checks
critical
111911Photon OS 1.0: Linux PHSA-2018-1.0-0098 (deprecated)NessusPhotonOS Local Security Checks
medium
111414openSUSE Security Update : the Linux Kernel (openSUSE-2018-762) (Spectre)NessusSuSE Local Security Checks
high
111282Photon OS 2.0 : linux (PhotonOS-PHSA-2018-2.0-0011) (Spectre) (deprecated)NessusPhotonOS Local Security Checks
medium
111165Debian DLA-1423-1 : linux-4.9 new package (Spectre)NessusDebian Local Security Checks
high
111082Debian DLA-1422-2 : linux security update (Spectre)NessusDebian Local Security Checks
high
110596SUSE SLES12 Security Update : xen (SUSE-SU-2018:1699-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
medium
110509SUSE SLES12 Security Update : xen (SUSE-SU-2018:1658-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
medium
110444SUSE SLES11 Security Update : xen (SUSE-SU-2018:1603-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
medium
110438openSUSE Security Update : xen (openSUSE-2018-599) (Meltdown) (Spectre)NessusSuSE Local Security Checks
medium
110110OracleVM 3.3 : xen (OVMSA-2018-0224) (Meltdown) (Spectre)NessusOracleVM Local Security Checks
high
110041SUSE SLES11 Security Update : kernel (SUSE-SU-2018:1376-1) (Spectre)NessusSuSE Local Security Checks
high
110035SUSE SLES11 Security Update : kernel (SUSE-SU-2018:1368-1) (Spectre)NessusSuSE Local Security Checks
high
109987OracleVM 3.4 : xen (OVMSA-2018-0218) (Meltdown) (Spectre)NessusOracleVM Local Security Checks
high
109881Oracle Linux 6 : Unbreakable Enterprise kernel (ELSA-2018-4110)NessusOracle Linux Local Security Checks
high
109829Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2018-4109)NessusOracle Linux Local Security Checks
high
109518Debian DSA-4188-1 : linux - security update (Spectre)NessusDebian Local Security Checks
high
109517Debian DSA-4187-1 : linux - security update (Spectre)NessusDebian Local Security Checks
critical
109176Oracle Solaris Critical Patch Update : apr2018_SRU11_3_31_6_0 (Spectre)NessusSolaris Local Security Checks
medium
109158OracleVM 3.4 : Unbreakable / etc (OVMSA-2018-0035) (Dirty COW) (Meltdown) (Spectre)NessusOracleVM Local Security Checks
high
109156Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2018-4071)NessusOracle Linux Local Security Checks
high
109127Amazon Linux 2 : kernel (ALAS-2018-956) (Dirty COW) (Spectre)NessusAmazon Linux Local Security Checks
high
109115RHEL 7 : kernel (RHSA-2018:1129) (Meltdown) (Spectre)NessusRed Hat Local Security Checks
medium
109001SUSE SLED12 / SLES12 Security Update : xen (SUSE-SU-2018:0909-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
high
108964KB4093112: Windows 10 Version 1709 and Windows Server Version 1709 April 2018 Security Update (Meltdown)(Spectre)NessusWindows : Microsoft Bulletins
high
108864OracleVM 3.2 : xen (OVMSA-2018-0029) (Meltdown) (Spectre)NessusOracleVM Local Security Checks
medium
108703FreeBSD : webkit2-gtk3 -- multiple vulnerabilities (1ce95bc7-3278-11e8-b527-00012e582166) (Spectre)NessusFreeBSD Local Security Checks
high
108372Ubuntu 16.04 LTS : Linux kernel (HWE) vulnerabilities (USN-3597-2) (Meltdown) (Spectre)NessusUbuntu Local Security Checks
medium
108371Ubuntu 17.10 : Linux kernel vulnerabilities (USN-3597-1) (Meltdown) (Spectre)NessusUbuntu Local Security Checks
medium
108369SUSE SLES11 Security Update : xen (SUSE-SU-2018:0678-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
high
108364Scientific Linux Security Update : kernel on SL6.x i386/x86_64 (20180313) (Meltdown) (Spectre)NessusScientific Linux Local Security Checks
medium
108358Oracle Linux 6 : kernel (ELSA-2018-0512) (Meltdown) (Spectre)NessusOracle Linux Local Security Checks
medium
108341CentOS 6 : kernel (CESA-2018:0512) (Meltdown) (Spectre)NessusCentOS Local Security Checks
medium
108329RHEL 6 : kernel (RHSA-2018:0512) (Meltdown) (Spectre)NessusRed Hat Local Security Checks
medium
108326RHEL 6 : kernel (RHSA-2018:0496) (Meltdown) (Spectre)NessusRed Hat Local Security Checks
medium
108292KB4088880: Windows Server 2012 March 2018 Security Update (Meltdown)(Spectre)NessusWindows : Microsoft Bulletins
high
108291KB4088879: Windows 8.1 and Windows Server 2012 R2 March 2018 Security Update (Meltdown)(Spectre)NessusWindows : Microsoft Bulletins
high
108290KB4088878: Windows 7 and Windows Server 2008 R2 March 2018 Security Update (Meltdown)(Spectre)NessusWindows : Microsoft Bulletins
high
107254SUSE SLES11 Security Update : xen (SUSE-SU-2018:0638-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
high
107144SUSE SLES12 Security Update : xen (SUSE-SU-2018:0609-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
high
107140SUSE SLES12 Security Update : xen (SUSE-SU-2018:0601-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
high
107130OracleVM 3.4 : xen (OVMSA-2018-0021) (Meltdown) (Spectre)NessusOracleVM Local Security Checks
high
107129OracleVM 3.4 : xen (OVMSA-2018-0020) (Meltdown) (Spectre)NessusOracleVM Local Security Checks
high
107058RHEL 5 : kernel (RHSA-2018:0292) (Meltdown) (Spectre)NessusRed Hat Local Security Checks
medium
107006Slackware 14.2 : Slackware 14.2 kernel (SSA:2018-057-01) (Spectre)NessusSlackware Local Security Checks
medium
106950VMware vCenter Server 6.5.x < 6.5u1f Multiple Vulnerabilities (VMSA-2018-0007) (Spectre-1) (Meltdown)NessusMisc.
medium
106933Amazon Linux AMI : kernel (ALAS-2018-956) (Dirty COW) (Spectre)NessusAmazon Linux Local Security Checks
high
106902Xen Multiple Vulnerabilities (Spectre) (Meltdown) (XSA-254)NessusMisc.
medium
106901SUSE SLED12 / SLES12 Security Update : xen (SUSE-SU-2018:0472-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
high
106864openSUSE Security Update : xen (openSUSE-2018-169) (Meltdown) (Spectre)NessusSuSE Local Security Checks
high
106834SUSE SLED12 / SLES12 Security Update : xen (SUSE-SU-2018:0438-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
high
106801KB4074596: Windows 10 February 2018 Security Update (Meltdown)(Spectre)NessusWindows : Microsoft Bulletins
high
106798KB4074592: Windows 10 Version 1703 February 2018 Security Update (Meltdown)(Spectre)NessusWindows : Microsoft Bulletins
high
106797KB4074591: Windows 10 Version 1511 February 2018 Security Update (Meltdown)(Spectre)NessusWindows : Microsoft Bulletins
high
106796KB4074590: Windows 10 Version 1607 and Windows Server 2016 February 2018 Security Update (Meltdown)(Spectre)NessusWindows : Microsoft Bulletins
high
106587Virtuozzo 6 : cpupools / cpupools-features / etc (VZA-2018-006)NessusVirtuozzo Local Security Checks
medium
106549openSUSE Security Update : webkit2gtk3 (openSUSE-2018-118) (Meltdown) (Spectre)NessusSuSE Local Security Checks
high
106524OracleVM 3.3 : Unbreakable / etc (OVMSA-2018-0016) (Meltdown) (Spectre)NessusOracleVM Local Security Checks
medium
106485Google Chrome < 64.0.3282.119 Multiple Vulnerabilities (Spectre)NessusWindows
high
106483Ubuntu 16.04 LTS : linux-kvm vulnerabilities (USN-3549-1) (Spectre)NessusUbuntu Local Security Checks
medium
106469OracleVM 3.4 : Unbreakable / etc (OVMSA-2018-0015) (BlueBorne) (Meltdown) (Spectre) (Stack Clash)NessusOracleVM Local Security Checks
critical
106468Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2018-4022)NessusOracle Linux Local Security Checks
medium
106370SUSE SLED12 / SLES12 Security Update : webkit2gtk3 (SUSE-SU-2018:0219-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
high
106364Oracle Linux 7 : kernel (ELSA-2018-0151)NessusOracle Linux Local Security Checks
high
106353CentOS 7 : kernel (CESA-2018:0151) (Meltdown) (Spectre)NessusCentOS Local Security Checks
high
106342SUSE SLED12 / SLES12 Security Update : wireshark (SUSE-SU-2018:0191-1) (Spectre)NessusSuSE Local Security Checks
high
106340Scientific Linux Security Update : kernel on SL7.x x86_64 (20180125) (Meltdown) (Spectre)NessusScientific Linux Local Security Checks
high
106335RHEL 7 : kernel (RHSA-2018:0182) (Meltdown) (Spectre)NessusRed Hat Local Security Checks
medium
106330RHEL 7 : kernel (RHSA-2018:0151) (Meltdown) (Spectre)NessusRed Hat Local Security Checks
high
106328Oracle Linux 6 : Unbreakable Enterprise kernel (ELSA-2018-4020)NessusOracle Linux Local Security Checks
medium
106316AIX 7.2 TL 2 : spectre_meltdown (IJ03036) (Meltdown) (Spectre)NessusAIX Local Security Checks
medium
106315AIX 7.2 TL 1 : spectre_meltdown (IJ03035) (Meltdown) (Spectre)NessusAIX Local Security Checks
medium
106314AIX 7.2 TL 0 : spectre_meltdown (IJ03034) (Meltdown) (Spectre)NessusAIX Local Security Checks
medium
106313AIX 7.1 TL 5 : spectre_meltdown (IJ03033) (Meltdown) (Spectre)NessusAIX Local Security Checks
medium
106312AIX 7.1 TL 4 : spectre_meltdown (IJ03032) (Meltdown) (Spectre)NessusAIX Local Security Checks
medium
106311AIX 6.1 TL 9 : spectre_meltdown (IJ03030) (Meltdown) (Spectre)NessusAIX Local Security Checks
medium
106310AIX 5.3 TL 12 : spectre_meltdown (IJ03029) (Meltdown) (Spectre)NessusAIX Local Security Checks
medium
106293SUSE SLES11 Security Update : wireshark (SUSE-SU-2018:0179-1) (Spectre)NessusSuSE Local Security Checks
high
106272Ubuntu 14.04 LTS : linux vulnerabilities (USN-3542-1) (Spectre)NessusUbuntu Local Security Checks
medium
106271Ubuntu 16.04 LTS : linux-hwe, linux-azure, linux-gcp, linux-oem vulnerabilities (USN-3541-2) (Meltdown) (Spectre)NessusUbuntu Local Security Checks
medium
106270Ubuntu 17.10 : linux vulnerabilities (USN-3541-1) (Meltdown) (Spectre)NessusUbuntu Local Security Checks
medium
106269Ubuntu 14.04 LTS : linux-lts-xenial, linux-aws vulnerabilities (USN-3540-2) (Meltdown) (Spectre)NessusUbuntu Local Security Checks
medium
106268Ubuntu 16.04 LTS : linux, linux-aws, linux-euclid vulnerabilities (USN-3540-1) (Meltdown) (Spectre)NessusUbuntu Local Security Checks
medium
106260SUSE SLES11 Security Update : kernel (SUSE-SU-2018:0171-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
medium
106226OracleVM 3.4 : Unbreakable / etc (OVMSA-2018-0012) (Spectre)NessusOracleVM Local Security Checks
high
106225Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2018-4017)NessusOracle Linux Local Security Checks
high
106185SUSE SLES11 Security Update : kernel (SUSE-SU-2018:0131-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
medium
106178Fedora 26 : webkitgtk4 (2018-690989736a) (Spectre)NessusFedora Local Security Checks
medium
106127SUSE SLES12 Security Update : kernel (SUSE-SU-2018:0113-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
medium
106095SUSE SLES12 Security Update : kernel (SUSE-SU-2018:0115-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
high
106094SUSE SLES12 Security Update : kernel (SUSE-SU-2018:0114-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
medium
106061openSUSE Security Update : wireshark (openSUSE-2018-32) (Spectre)NessusSuSE Local Security Checks
high
106022Fedora 27 : webkitgtk4 (2018-0590e4af13) (Spectre)NessusFedora Local Security Checks
medium
105777NVIDIA Windows GPU Display Driver 384.x / 385.x / 386.x < 386.07 / 390.x < 390.65 Multiple Vulnerabilities (Meltdown)(Spectre)NessusWindows
medium
105776NVIDIA Linux GPU Display Driver 384.x < 384.111 / 390.x < 390.12 Multiple Vulnerabilities (Meltdown)(Spectre)NessusMisc.
medium
105769Apple iOS < 11.2.2 Multiple Vulnerabilities (Spectre)NessusMobile Devices
medium
105766Ubuntu 16.04 LTS / 17.04 / 17.10 : webkit2gtk vulnerabilities (USN-3530-1) (Spectre)NessusUbuntu Local Security Checks
medium
105765SUSE SLES12 Security Update : kernel (SUSE-SU-2018:0069-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
medium
105761OracleVM 3.4 : Unbreakable / etc (OVMSA-2018-0007) (Spectre)NessusOracleVM Local Security Checks
medium
105759Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2018-4004)NessusOracle Linux Local Security Checks
medium
105723Ubuntu 14.04 LTS / 16.04 LTS / 17.04 / 17.10 : nvidia-graphics-drivers-384 vulnerability (USN-3521-1) (Spectre)NessusUbuntu Local Security Checks
medium
105718OracleVM 3.4 : xen (OVMSA-2018-0006) (Meltdown) (Spectre)NessusOracleVM Local Security Checks
medium
105717OracleVM 3.4 : xen (OVMSA-2018-0005) (Meltdown) (Spectre)NessusOracleVM Local Security Checks
high
105689macOS : Apple Safari <= 11.0.2 (11604.4.7.1.6 / 12604.4.7.1.6 / 13604.4.7.10.6) Information Disclosure (Spectre)NessusMacOS X Local Security Checks
medium
105685SUSE SLES11 Security Update : kernel (SUSE-SU-2018:0040-1) (BlueBorne) (KRACK) (Meltdown) (Spectre)NessusSuSE Local Security Checks
high
105678RHEL 7 : redhat-virtualization-host (RHSA-2018:0047) (Meltdown) (Spectre)NessusRed Hat Local Security Checks
medium
105677RHEL 6 / 7 : rhev-hypervisor7 (RHSA-2018:0046) (Meltdown) (Spectre)NessusRed Hat Local Security Checks
medium
105676RHEL 7 : rhvm-appliance (RHSA-2018:0045) (Meltdown) (Spectre)NessusRed Hat Local Security Checks
medium
105675RHEL 7 : redhat-virtualization-host (RHSA-2018:0044) (Meltdown) (Spectre)NessusRed Hat Local Security Checks
medium
105672RHEL 6 : MRG (RHSA-2018:0021) (Meltdown) (Spectre)NessusRed Hat Local Security Checks
medium
105657Virtuozzo 7 : crit / criu / criu-devel / ksm-vz / libcompel / etc (VZA-2018-003)NessusVirtuozzo Local Security Checks
medium
105655EulerOS 2.0 SP1 : kernel (EulerOS-SA-2018-1002)NessusHuawei Local Security Checks
medium
105649Ubuntu 14.04 LTS / 16.04 LTS / 17.04 / 17.10 : firefox vulnerabilities (USN-3516-1) (Meltdown) (Spectre)NessusUbuntu Local Security Checks
medium
105647SUSE SLES12 Security Update : kernel (SUSE-SU-2018:0031-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
high
105636openSUSE Security Update : the Linux Kernel (openSUSE-2018-3) (Meltdown) (Spectre)NessusSuSE Local Security Checks
high
105619Virtuozzo 6 : parallels-server-bm-release / vzkernel / etc (VZA-2018-002)NessusVirtuozzo Local Security Checks
medium
105618EulerOS 2.0 SP2 : kernel (EulerOS-SA-2018-1001)NessusHuawei Local Security Checks
medium
105617Citrix XenServer Multiple Vulnerabilities (CTX231390) (Meltdown)(Spectre)NessusMisc.
high
105616Mozilla Firefox < 57.0.4 Speculative Execution Side-Channel Attack Vulnerability (Spectre)NessusWindows
medium
105615Mozilla Firefox < 57.0.4 Speculative Execution Side-Channel Attack Vulnerability (Spectre) (macOS)NessusMacOS X Local Security Checks
medium
105613ADV180002: Microsoft SQL Server January 2018 Security Update (Meltdown) (Spectre)NessusWindows : Microsoft Bulletins
medium
105599Oracle Linux 6 : kernel (ELSA-2018-0008)NessusOracle Linux Local Security Checks
medium
105598Oracle Linux 7 : kernel (ELSA-2018-0007)NessusOracle Linux Local Security Checks
medium
105597openSUSE Security Update : the Linux Kernel (openSUSE-2018-2) (Meltdown) (Spectre)NessusSuSE Local Security Checks
high
105589CentOS 6 : kernel (CESA-2018:0008) (Meltdown) (Spectre)NessusCentOS Local Security Checks
medium
105588CentOS 7 : kernel (CESA-2018:0007) (Meltdown) (Spectre)NessusCentOS Local Security Checks
medium
105584VMSA-2018-0002 : VMware ESXi, Workstation and Fusion updates address side-channel analysis due to speculative execution. (Spectre)NessusVMware ESX Local Security Checks
medium
105576SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2018:0012-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
high
105575SUSE SLES11 Security Update : kernel (SUSE-SU-2018:0011-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
high
105574SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2018:0010-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
high
105563RHEL 6 : kernel (RHSA-2018:0022) (Meltdown) (Spectre)NessusRed Hat Local Security Checks
medium
105562RHEL 6 : kernel (RHSA-2018:0020) (Meltdown) (Spectre)NessusRed Hat Local Security Checks
medium
105561RHEL 6 : kernel (RHSA-2018:0018) (Meltdown) (Spectre)NessusRed Hat Local Security Checks
medium
105555VMware Player 12.x < 12.5.8 Multiple Vulnerabilities (VMSA-2017-0021) (VMSA-2018-0002) (Spectre)NessusWindows
high
105553KB4056898: Windows 8.1 and Windows Server 2012 R2 January 2018 Security Update (Meltdown)(Spectre)NessusWindows : Microsoft Bulletins
high
105552KB4056897: Windows 7 and Windows Server 2008 R2 January 2018 Security Update (Meltdown)(Spectre)NessusWindows : Microsoft Bulletins
high
105551KB4056893: Windows 10 LTSB January 2018 Security Update (Meltdown)(Spectre)NessusWindows : Microsoft Bulletins
high
105550KB4056892: Windows 10 Version 1709 and Windows Server Version 1709 January 2018 Security Update (Meltdown)(Spectre)NessusWindows : Microsoft Bulletins
high
105549KB4056891: Windows 10 Version 1703 January 2018 Security Update (Meltdown)(Spectre)NessusWindows : Microsoft Bulletins
high
105548KB4056890: Windows 10 Version 1607 and Windows Server 2016 January 2018 Security Update (Meltdown)(Spectre)NessusWindows : Microsoft Bulletins
high
105547KB4056888: Windows 10 Version 1511 January 2018 Security Update (Meltdown)(Spectre)NessusWindows : Microsoft Bulletins
high
105535Scientific Linux Security Update : kernel on SL7.x x86_64 (20180103) (Meltdown) (Spectre)NessusScientific Linux Local Security Checks
medium
105534Scientific Linux Security Update : kernel on SL6.x i386/x86_64 (20180103) (Meltdown) (Spectre)NessusScientific Linux Local Security Checks
medium
105533RHEL 6 : kernel (RHSA-2018:0017) (Meltdown) (Spectre)NessusRed Hat Local Security Checks
medium
105532RHEL 7 : kernel-rt (RHSA-2018:0016) (Meltdown) (Spectre)NessusRed Hat Local Security Checks
medium
105527RHEL 6 : kernel (RHSA-2018:0011) (Meltdown) (Spectre)NessusRed Hat Local Security Checks
medium
105526RHEL 7 : kernel (RHSA-2018:0010) (Meltdown) (Spectre)NessusRed Hat Local Security Checks
medium
105525RHEL 7 : kernel (RHSA-2018:0009) (Meltdown) (Spectre)NessusRed Hat Local Security Checks
medium
105524RHEL 6 : kernel (RHSA-2018:0008) (Meltdown) (Spectre)NessusRed Hat Local Security Checks
medium
105523RHEL 7 : kernel (RHSA-2018:0007) (Meltdown) (Spectre)NessusRed Hat Local Security Checks
medium
105487VMware Workstation 12.x < 12.5.8 Multiple Vulnerabilities (VMSA-2017-0021) (VMSA-2018-0002) (Spectre)NessusWindows
high
105486ESXi 5.5 / 6.0 / 6.5 / Multiple Vulnerabilities (VMSA-2017-0021) (VMSA-2018-0002) (Spectre) (remote check)NessusMisc.
high
105485VMware Fusion 8.x < 8.5.9 Multiple Vulnerabilities (VMSA-2017-0021) (VMSA-2018-0002) (Spectre) (macOS)NessusMacOS X Local Security Checks
high