MEDIUM
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html
http://nvidia.custhelp.com/app/answers/detail/a_id/4609
http://nvidia.custhelp.com/app/answers/detail/a_id/4611
http://nvidia.custhelp.com/app/answers/detail/a_id/4613
http://nvidia.custhelp.com/app/answers/detail/a_id/4614
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
http://www.kb.cert.org/vuls/id/584653
http://www.securityfocus.com/bid/102378
http://www.securityfocus.com/bid/106128
http://www.securitytracker.com/id/1040071
http://xenbits.xen.org/xsa/advisory-254.html
https://01.org/security/advisories/intel-oss-10003
https://access.redhat.com/errata/RHSA-2018:0292
https://access.redhat.com/security/vulnerabilities/speculativeexecution
https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
https://cert.vde.com/en-us/advisories/vde-2018-002
https://cert.vde.com/en-us/advisories/vde-2018-003
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc
https://security.gentoo.org/glsa/201810-06
https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
https://security.netapp.com/advisory/ntap-20180104-0001/
https://source.android.com/security/bulletin/2018-04-01
https://support.citrix.com/article/CTX231399
https://support.citrix.com/article/CTX234679
https://support.f5.com/csp/article/K91229003
https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
https://support.lenovo.com/us/en/solutions/LEN-18282
https://usn.ubuntu.com/3522-3/
https://usn.ubuntu.com/3522-4/
https://usn.ubuntu.com/3523-1/
https://usn.ubuntu.com/3540-2/
https://usn.ubuntu.com/3541-2/
https://usn.ubuntu.com/3583-1/
https://usn.ubuntu.com/3597-1/
https://usn.ubuntu.com/3597-2/
https://usn.ubuntu.com/usn/usn-3516-1/
https://usn.ubuntu.com/usn/usn-3522-2/
https://usn.ubuntu.com/usn/usn-3523-2/
https://usn.ubuntu.com/usn/usn-3524-2/
https://usn.ubuntu.com/usn/usn-3525-1/
https://www.codeaurora.org/security-bulletin/2018/07/02/july-2018-code-aurora-security-bulletin
https://www.debian.org/security/2018/dsa-4078
https://www.debian.org/security/2018/dsa-4082
https://www.debian.org/security/2018/dsa-4120
https://www.kb.cert.org/vuls/id/180049
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
Source: MITRE
Published: 2018-01-04
Updated: 2020-05-05
Type: CWE-200
Base Score: 4.7
Vector: AV:L/AC:M/Au:N/C:C/I:N/A:N
Impact Score: 6.9
Exploitability Score: 3.4
Severity: MEDIUM
Base Score: 5.6
Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
Impact Score: 4
Exploitability Score: 1.1
Severity: MEDIUM
OR
cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2316:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2338:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2350:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2358:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2508:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2516:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2518:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2530:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2538:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2550:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2558:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2718:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2730:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2738:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2750:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2758:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x3:c3130:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x3:c3200rk:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x3:c3205rk:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x3:c3230rk:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x3:c3235rk:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x3:c3265rk:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x3:c3295rk:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x3:c3405:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x3:c3445:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3770d:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3775:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3775d:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3785:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3795:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j1750:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j1800:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j1850:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j1900:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j3060:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j3160:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j3355:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2805:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2806:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2807:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2808:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2810:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2815:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2820:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2830:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2840:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2910:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2920:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2930:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2940:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n3000:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n3010:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n3050:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n3060:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n3150:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n3160:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n3350:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n4000:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n4100:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3450:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_m:5y10:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_m:5y10a:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_m:5y10c:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_m:5y31:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_m:5y51:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_m:5y70:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_m:5y71:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_m3:6y30:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_m3:7y30:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_m3:7y32:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_m5:6y54:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_m5:6y57:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_m7:6y75:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_j:j2850:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_j:j2900:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_j:j3710:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_j:j4205:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n:n3510:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n:n3520:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n:n3530:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n:n3540:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n:n3700:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n:n3710:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n:n4200:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5502:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5503:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5504:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5506:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5507:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5520:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5530:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5540:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5603:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5606:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5607:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5620:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5630:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5640:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5645:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5649:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e6510:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e6540:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e7520:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e7530:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e7540:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:ec5509:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:ec5539:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:ec5549:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:l3406:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:l3426:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:l5506:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:l5508:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:l5518:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:l5520:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:l5530:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:l5609:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:l5618:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:l5630:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:l5638:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:l5640:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:l7545:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:l7555:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:lc5518:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:lc5528:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:w3670:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:w3680:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:w3690:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:w5580:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:w5590:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x3430:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x3440:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x3450:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x3460:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x3470:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x3480:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x5550:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x5560:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x5570:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x5647:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x5650:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x5660:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x5667:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x5670:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x5672:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x5675:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x5677:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x5680:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x5687:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x5690:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x6550:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x7542:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x7550:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x7560:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e-1105c:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1505m_v6:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1515m_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1535m_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1535m_v6:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1545m_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1558l_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1565l_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1575m_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1578l_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1585_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1585l_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1105c_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1125c:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1125c_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1220:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_12201:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_12201_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1220_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1220_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1220l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1225:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1225_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1225_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1226_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1230:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1230_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1230_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1230l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1231_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1235:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1240:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1240_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1240_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1240l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1241_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1245:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1245_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1245_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1246_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1258l_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1260l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1265l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1265l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1265l_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1268l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1270:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1270_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1270_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1271_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1275:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1275_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1275_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1275l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1276_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1278l_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1280:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1280_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1280_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1281_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1285_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1285_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1285l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1285l_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1286_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1286l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1290:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1290_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1501l_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1501m_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1505l_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1505l_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1505m_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2650l_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2658:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2658_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2658_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2658_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2658a_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2660:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2660_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2660_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2660_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2665:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2667:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2667_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2667_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2667_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2670:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2670_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2670_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2680:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2680_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2680_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2680_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2683_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2683_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2687w:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2687w_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2687w_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2687w_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2690:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2690_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2690_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2690_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2695_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2695_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2695_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2697_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2697_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2697_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2697a_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2698_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2698_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2699_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2699_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2699a_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2699r_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4603:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4603_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4607:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4607_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4610:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4610_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4610_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4610_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4617:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4620:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4620_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4620_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4620_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4624l_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4627_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4627_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4627_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4628l_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4640:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4640_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4640_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4640_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4648_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4650:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4650_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4650_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4650_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4650l:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4655_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4655_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4657l_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4660_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4660_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4667_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4667_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4669_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4669_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1428l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1428l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1428l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1620:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1620_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1620_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1620_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1630_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1630_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1650:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1650_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1650_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1650_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1660:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1660_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1660_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1660_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1680_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1680_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2403:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2403_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2407:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2407_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2408l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2418l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2418l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2418l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2420:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2420_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2428l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2428l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2428l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2430:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2430_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2430l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2430l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2438l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2440:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2440_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2448l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2448l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2450:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2450_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2450l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2450l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2470:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2470_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2603:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2603_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2603_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2603_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2608l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2608l_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2609:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2609_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2609_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2609_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2618l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2618l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2618l_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2620:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2620_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2620_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2620_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2623_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2623_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2628l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2628l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2628l_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2630:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2630_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2630_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2630_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2630l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2630l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2630l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2630l_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2637:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2637_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2637_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2637_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2640:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2640_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2640_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2640_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2643:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2643_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2643_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2643_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2648l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2648l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2648l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2648l_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2650:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2650_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2650_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2650_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2650l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2650l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2650l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2803:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2820:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2830:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2850:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2850_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2860:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2870:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2870_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2880_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2890_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4807:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4809_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4809_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4809_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4820:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4820_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4820_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4820_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4830:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4830_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4830_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4830_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4850:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4850_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4850_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4850_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4860:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4860_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4870:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4870_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4880_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4890_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8830:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8837:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8850:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8850_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8857_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8860:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8860_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8860_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8867_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8867_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8867l:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8870:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8870_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8870_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8870_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8880_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8880_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8880_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8880l_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8880l_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8890_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8890_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8890_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8891_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8891_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8891_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8893_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8893_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8893_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8894_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:5118:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:5119t:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:5120:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:5120t:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:5122:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6126:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6126f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6126t:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6128:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6130:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6130f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6130t:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6132:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6134:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6134m:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6136:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6138:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6138f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6138t:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6140:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6140m:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6142:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6142f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6142m:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6144:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6146:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6148:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6148f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6150:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6152:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6154:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_phi:7210:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_phi:7210f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_phi:7230:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_phi:7230f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_phi:7235:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_phi:7250:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_phi:7250f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_phi:7285:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_phi:7290:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_phi:7290f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_phi:7295:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*
OR
ID | Name | Product | Family | Severity |
---|---|---|---|---|
140019 | OracleVM 3.4 : xen (OVMSA-2020-0039) (Bunker Buster) (Foreshadow) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout) (Meltdown) (POODLE) (Spectre) | Nessus | OracleVM Local Security Checks | critical |
132250 | RancherOS < 1.1.3 Information Disclosure | Nessus | Misc. | medium |
132101 | Windows Speculative Execution Configuration Check | Nessus | Windows | medium |
130736 | EulerOS 2.0 SP3 : kernel (EulerOS-SA-2019-2274) | Nessus | Huawei Local Security Checks | critical |
127408 | NewStart CGSL MAIN 4.05 : kernel Multiple Vulnerabilities (NS-SA-2019-0143) | Nessus | NewStart CGSL Local Security Checks | critical |
127233 | NewStart CGSL CORE 5.04 / MAIN 5.04 : kernel-rt Multiple Vulnerabilities (NS-SA-2019-0049) | Nessus | NewStart CGSL Local Security Checks | high |
127152 | NewStart CGSL MAIN 5.04 : kernel Multiple Vulnerabilities (NS-SA-2019-0007) | Nessus | NewStart CGSL Local Security Checks | medium |
125753 | EulerOS Virtualization 2.5.1 : kernel (EulerOS-SA-2019-1638) | Nessus | Huawei Local Security Checks | medium |
125752 | EulerOS Virtualization 2.5.2 : kernel (EulerOS-SA-2019-1637) | Nessus | Huawei Local Security Checks | medium |
125216 | Processor Speculative Execution Vulnerabilities (Linux) | Nessus | Misc. | medium |
124992 | EulerOS Virtualization for ARM 64 3.0.1.0 : kernel (EulerOS-SA-2019-1539) | Nessus | Huawei Local Security Checks | critical |
124835 | EulerOS Virtualization 3.0.1.0 : kernel (EulerOS-SA-2019-1514) | Nessus | Huawei Local Security Checks | medium |
700513 | macOS 10.13.x < 10.13.2 Multiple Vulnerabilities (Meltdown) | Nessus Network Monitor | Operating System Detection | critical |
123180 | openSUSE Security Update : xen (openSUSE-2019-418) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | medium |
121906 | Photon OS 2.0: Linux PHSA-2018-2.0-0010 | Nessus | PhotonOS Local Security Checks | medium |
121797 | Photon OS 1.0: Linux PHSA-2018-1.0-0097 | Nessus | PhotonOS Local Security Checks | medium |
118702 | F5 Networks BIG-IP : Side-channel processor vulnerabilities (K91229003) (Meltdown) (Spectre) | Nessus | F5 Networks Local Security Checks | medium |
118506 | GLSA-201810-06 : Xen: Multiple vulnerabilities (Foreshadow) (Meltdown) (Spectre) | Nessus | Gentoo Local Security Checks | high |
118304 | SUSE SLES12 Security Update : xen (SUSE-SU-2018:3230-1) (Meltdown) | Nessus | SuSE Local Security Checks | high |
118266 | SUSE SLES12 Security Update : xen (SUSE-SU-2018:1699-2) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | medium |
117545 | EulerOS Virtualization 2.5.0 : kernel (EulerOS-SA-2018-1236) | Nessus | Huawei Local Security Checks | medium |
112147 | SUSE SLES11 Security Update : xen (SUSE-SU-2018:2528-1) (Foreshadow) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | high |
700325 | Mozilla Firefox < 57.0.4 Multiple Vulnerabilities | Nessus Network Monitor | Web Clients | medium |
700322 | Mozilla Firefox < 57 Multiple Vulnerabilities | Nessus Network Monitor | Web Clients | critical |
111992 | OracleVM 3.4 : xen (OVMSA-2018-0248) (Bunker Buster) (Foreshadow) (Meltdown) (POODLE) (Spectre) | Nessus | OracleVM Local Security Checks | critical |
111909 | Photon OS 1.0: Linux PHSA-2018-1.0-0097 (deprecated) | Nessus | PhotonOS Local Security Checks | medium |
111280 | Photon OS 2.0 : linux (PhotonOS-PHSA-2018-2.0-0010) (Meltdown) (deprecated) | Nessus | PhotonOS Local Security Checks | medium |
110596 | SUSE SLES12 Security Update : xen (SUSE-SU-2018:1699-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | medium |
110509 | SUSE SLES12 Security Update : xen (SUSE-SU-2018:1658-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | medium |
110444 | SUSE SLES11 Security Update : xen (SUSE-SU-2018:1603-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | medium |
110438 | openSUSE Security Update : xen (openSUSE-2018-599) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | medium |
110110 | OracleVM 3.3 : xen (OVMSA-2018-0224) (Meltdown) (Spectre) | Nessus | OracleVM Local Security Checks | medium |
109987 | OracleVM 3.4 : xen (OVMSA-2018-0218) (Meltdown) (Spectre) | Nessus | OracleVM Local Security Checks | high |
109881 | Oracle Linux 6 : Unbreakable Enterprise kernel (ELSA-2018-4110) (Meltdown) (Spectre) | Nessus | Oracle Linux Local Security Checks | high |
109829 | Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2018-4109) (Meltdown) (Spectre) | Nessus | Oracle Linux Local Security Checks | high |
109801 | Virtuozzo 6 : parallels-server-bm-release / vzkernel / etc (VZA-2018-029) | Nessus | Virtuozzo Local Security Checks | high |
109756 | SUSE SLES12 Security Update : xen (SUSE-SU-2018:1216-1) (Meltdown) | Nessus | SuSE Local Security Checks | high |
109751 | openSUSE Security Update : xen (openSUSE-2018-454) (Meltdown) | Nessus | SuSE Local Security Checks | high |
109725 | Citrix XenServer Multiple Vulnerabilities (CTX234679) | Nessus | Misc. | high |
109722 | SUSE SLES11 Security Update : xen (SUSE-SU-2018:1203-1) (Meltdown) | Nessus | SuSE Local Security Checks | high |
109721 | SUSE SLES12 Security Update : xen (SUSE-SU-2018:1202-1) (Meltdown) | Nessus | SuSE Local Security Checks | high |
109677 | SUSE SLED12 / SLES12 Security Update : xen (SUSE-SU-2018:1184-1) (Meltdown) | Nessus | SuSE Local Security Checks | high |
109676 | SUSE SLES11 Security Update : xen (SUSE-SU-2018:1181-1) (Meltdown) | Nessus | SuSE Local Security Checks | high |
109672 | SUSE SLES12 Security Update : xen (SUSE-SU-2018:1177-1) (Meltdown) | Nessus | SuSE Local Security Checks | high |
109655 | CentOS 6 : kernel (CESA-2018:1319) (Meltdown) | Nessus | CentOS Local Security Checks | critical |
109643 | Scientific Linux Security Update : kernel on SL6.x i386/x86_64 (20180508) (Meltdown) | Nessus | Scientific Linux Local Security Checks | critical |
109636 | RHEL 6 : kernel (RHSA-2018:1346) (Meltdown) | Nessus | Red Hat Local Security Checks | high |
109634 | RHEL 6 : kernel (RHSA-2018:1319) (Meltdown) | Nessus | Red Hat Local Security Checks | critical |
109629 | Oracle Linux 6 : kernel (ELSA-2018-1319) (Meltdown) | Nessus | Oracle Linux Local Security Checks | critical |
109449 | Scientific Linux Security Update : kernel on SL7.x x86_64 (20180410) (Meltdown) | Nessus | Scientific Linux Local Security Checks | critical |
109158 | OracleVM 3.4 : Unbreakable / etc (OVMSA-2018-0035) (Dirty COW) (Meltdown) (Spectre) | Nessus | OracleVM Local Security Checks | high |
109156 | Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2018-4071) (Dirty COW) (Meltdown) (Spectre) | Nessus | Oracle Linux Local Security Checks | high |
109119 | Amazon Linux 2 : kernel (ALAS-2018-939) (Meltdown) (Spectre) | Nessus | Amazon Linux Local Security Checks | medium |
109115 | RHEL 7 : kernel (RHSA-2018:1129) (Meltdown) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
109038 | pfSense < 2.4.3 Multiple Vulnerabilities (SA-18_01 / SA-18_02 / SA-18_03) (Meltdown) (Spectre) | Nessus | Firewalls | high |
109001 | SUSE SLED12 / SLES12 Security Update : xen (SUSE-SU-2018:0909-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | medium |
108964 | KB4093112: Windows 10 Version 1709 and Windows Server Version 1709 April 2018 Security Update (Meltdown)(Spectre) | Nessus | Windows : Microsoft Bulletins | high |
108864 | OracleVM 3.2 : xen (OVMSA-2018-0029) (Meltdown) (Spectre) | Nessus | OracleVM Local Security Checks | medium |
108372 | Ubuntu 16.04 LTS : Linux kernel (HWE) vulnerabilities (USN-3597-2) (Meltdown) (Spectre) | Nessus | Ubuntu Local Security Checks | medium |
108371 | Ubuntu 17.10 : Linux kernel vulnerabilities (USN-3597-1) (Meltdown) (Spectre) | Nessus | Ubuntu Local Security Checks | medium |
108369 | SUSE SLES11 Security Update : xen (SUSE-SU-2018:0678-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | high |
108364 | Scientific Linux Security Update : kernel on SL6.x i386/x86_64 (20180313) (Meltdown) (Spectre) | Nessus | Scientific Linux Local Security Checks | medium |
108358 | Oracle Linux 6 : kernel (ELSA-2018-0512) (Meltdown) (Spectre) | Nessus | Oracle Linux Local Security Checks | medium |
108352 | FreeBSD : FreeBSD -- Speculative Execution Vulnerabilities (74daa370-2797-11e8-95ec-a4badb2f4699) (Meltdown) (Spectre) | Nessus | FreeBSD Local Security Checks | medium |
108341 | CentOS 6 : kernel (CESA-2018:0512) (Meltdown) (Spectre) | Nessus | CentOS Local Security Checks | medium |
108329 | RHEL 6 : kernel (RHSA-2018:0512) (Meltdown) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
108326 | RHEL 6 : kernel (RHSA-2018:0496) (Meltdown) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
108292 | KB4088880: Windows Server 2012 March 2018 Security Update (Meltdown)(Spectre) | Nessus | Windows : Microsoft Bulletins | high |
108291 | KB4088879: Windows 8.1 and Windows Server 2012 R2 March 2018 Security Update (Meltdown)(Spectre) | Nessus | Windows : Microsoft Bulletins | high |
108290 | KB4088878: Windows 7 and Windows Server 2008 R2 March 2018 Security Update (Meltdown)(Spectre) | Nessus | Windows : Microsoft Bulletins | high |
107254 | SUSE SLES11 Security Update : xen (SUSE-SU-2018:0638-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | high |
107144 | SUSE SLES12 Security Update : xen (SUSE-SU-2018:0609-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | high |
107140 | SUSE SLES12 Security Update : xen (SUSE-SU-2018:0601-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | high |
107130 | OracleVM 3.4 : xen (OVMSA-2018-0021) (Meltdown) (Spectre) | Nessus | OracleVM Local Security Checks | medium |
107129 | OracleVM 3.4 : xen (OVMSA-2018-0020) (Meltdown) (Spectre) | Nessus | OracleVM Local Security Checks | medium |
107058 | RHEL 5 : kernel (RHSA-2018:0292) (Meltdown) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
107055 | SUSE SLES11 Security Update : kernel (SUSE-SU-2018:0555-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | critical |
107003 | Ubuntu 14.04 LTS : linux vulnerabilities (USN-3583-1) (Meltdown) | Nessus | Ubuntu Local Security Checks | critical |
106955 | Debian DSA-4120-1 : linux - security update (Meltdown) (Spectre) | Nessus | Debian Local Security Checks | medium |
106950 | VMware vCenter Server 6.5.x < 6.5u1f Multiple Vulnerabilities (VMSA-2018-0007) (Spectre-1) (Meltdown) | Nessus | Misc. | medium |
106902 | Xen Multiple Vulnerabilities (Spectre) (Meltdown) (XSA-254) | Nessus | Misc. | medium |
106901 | SUSE SLED12 / SLES12 Security Update : xen (SUSE-SU-2018:0472-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | high |
106864 | openSUSE Security Update : xen (openSUSE-2018-169) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | high |
106834 | SUSE SLED12 / SLES12 Security Update : xen (SUSE-SU-2018:0438-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | high |
106801 | KB4074596: Windows 10 February 2018 Security Update (Meltdown)(Spectre) | Nessus | Windows : Microsoft Bulletins | high |
106798 | KB4074592: Windows 10 Version 1703 February 2018 Security Update (Meltdown)(Spectre) | Nessus | Windows : Microsoft Bulletins | high |
106797 | KB4074591: Windows 10 Version 1511 February 2018 Security Update (Meltdown)(Spectre) | Nessus | Windows : Microsoft Bulletins | high |
106796 | KB4074590: Windows 10 Version 1607 and Windows Server 2016 February 2018 Security Update (Meltdown)(Spectre) | Nessus | Windows : Microsoft Bulletins | high |
106706 | OracleVM 3.4 : Unbreakable / etc (OVMSA-2018-0017) (Meltdown) | Nessus | OracleVM Local Security Checks | high |
106670 | Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2018-4025) (Meltdown) | Nessus | Oracle Linux Local Security Checks | high |
106587 | Virtuozzo 6 : cpupools / cpupools-features / etc (VZA-2018-006) | Nessus | Virtuozzo Local Security Checks | medium |
106549 | openSUSE Security Update : webkit2gtk3 (openSUSE-2018-118) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | high |
106524 | OracleVM 3.3 : Unbreakable / etc (OVMSA-2018-0016) (Meltdown) (Spectre) | Nessus | OracleVM Local Security Checks | high |
106469 | OracleVM 3.4 : Unbreakable / etc (OVMSA-2018-0015) (BlueBorne) (Meltdown) (Spectre) (Stack Clash) | Nessus | OracleVM Local Security Checks | critical |
106468 | Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2018-4022) (Meltdown) (Spectre) | Nessus | Oracle Linux Local Security Checks | high |
106370 | SUSE SLED12 / SLES12 Security Update : webkit2gtk3 (SUSE-SU-2018:0219-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | high |
106364 | Oracle Linux 7 : kernel (ELSA-2018-0151) (Meltdown) (Spectre) | Nessus | Oracle Linux Local Security Checks | high |
106353 | CentOS 7 : kernel (CESA-2018:0151) (Meltdown) (Spectre) | Nessus | CentOS Local Security Checks | high |
106340 | Scientific Linux Security Update : kernel on SL7.x x86_64 (20180125) (Meltdown) (Spectre) | Nessus | Scientific Linux Local Security Checks | high |
106335 | RHEL 7 : kernel (RHSA-2018:0182) (Meltdown) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
106330 | RHEL 7 : kernel (RHSA-2018:0151) (Meltdown) (Spectre) | Nessus | Red Hat Local Security Checks | high |
106328 | Oracle Linux 6 : Unbreakable Enterprise kernel (ELSA-2018-4020) (Meltdown) (Spectre) | Nessus | Oracle Linux Local Security Checks | high |
106316 | AIX 7.2 TL 2 : spectre_meltdown (IJ03036) (Meltdown) (Spectre) | Nessus | AIX Local Security Checks | medium |
106315 | AIX 7.2 TL 1 : spectre_meltdown (IJ03035) (Meltdown) (Spectre) | Nessus | AIX Local Security Checks | medium |
106314 | AIX 7.2 TL 0 : spectre_meltdown (IJ03034) (Meltdown) (Spectre) | Nessus | AIX Local Security Checks | medium |
106313 | AIX 7.1 TL 5 : spectre_meltdown (IJ03033) (Meltdown) (Spectre) | Nessus | AIX Local Security Checks | medium |
106312 | AIX 7.1 TL 4 : spectre_meltdown (IJ03032) (Meltdown) (Spectre) | Nessus | AIX Local Security Checks | medium |
106311 | AIX 6.1 TL 9 : spectre_meltdown (IJ03030) (Meltdown) (Spectre) | Nessus | AIX Local Security Checks | medium |
106310 | AIX 5.3 TL 12 : spectre_meltdown (IJ03029) (Meltdown) (Spectre) | Nessus | AIX Local Security Checks | medium |
106297 | macOS and Mac OS X Multiple Vulnerabilities (Security Update 2018-001) (Meltdown) | Nessus | MacOS X Local Security Checks | critical |
106271 | Ubuntu 16.04 LTS : linux-hwe, linux-azure, linux-gcp, linux-oem vulnerabilities (USN-3541-2) (Meltdown) (Spectre) | Nessus | Ubuntu Local Security Checks | medium |
106270 | Ubuntu 17.10 : linux vulnerabilities (USN-3541-1) (Meltdown) (Spectre) | Nessus | Ubuntu Local Security Checks | medium |
106269 | Ubuntu 14.04 LTS : linux-lts-xenial, linux-aws vulnerabilities (USN-3540-2) (Meltdown) (Spectre) | Nessus | Ubuntu Local Security Checks | medium |
106268 | Ubuntu 16.04 LTS : linux, linux-aws, linux-euclid vulnerabilities (USN-3540-1) (Meltdown) (Spectre) | Nessus | Ubuntu Local Security Checks | medium |
106260 | SUSE SLES11 Security Update : kernel (SUSE-SU-2018:0171-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | medium |
106185 | SUSE SLES11 Security Update : kernel (SUSE-SU-2018:0131-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | medium |
106127 | SUSE SLES12 Security Update : kernel (SUSE-SU-2018:0113-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | medium |
106120 | OracleVM 3.4 : Unbreakable / etc (OVMSA-2018-0010) (Meltdown) (Spectre) | Nessus | OracleVM Local Security Checks | medium |
106095 | SUSE SLES12 Security Update : kernel (SUSE-SU-2018:0115-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | high |
106094 | SUSE SLES12 Security Update : kernel (SUSE-SU-2018:0114-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | medium |
106051 | Slackware 14.0 / 14.2 / current : kernel (SSA:2018-016-01) (Meltdown) (Spectre) | Nessus | Slackware Local Security Checks | medium |
106040 | Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2018-4011) (Meltdown) (Spectre) | Nessus | Oracle Linux Local Security Checks | medium |
105777 | NVIDIA Windows GPU Display Driver 384.x / 385.x / 386.x < 386.07 / 390.x < 390.65 Multiple Vulnerabilities (Meltdown)(Spectre) | Nessus | Windows | medium |
105776 | NVIDIA Linux GPU Display Driver 384.x < 384.111 / 390.x < 390.12 Multiple Vulnerabilities (Meltdown)(Spectre) | Nessus | Misc. | medium |
105765 | SUSE SLES12 Security Update : kernel (SUSE-SU-2018:0069-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | medium |
105762 | OracleVM 3.4 : Unbreakable / etc (OVMSA-2018-0008) (Meltdown) (Spectre) | Nessus | OracleVM Local Security Checks | medium |
105760 | Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2018-4006) (Meltdown) (Spectre) | Nessus | Oracle Linux Local Security Checks | medium |
105747 | Ubuntu 16.04 LTS : linux-hwe, linux-azure, linux-gcp, linux-oem vulnerabilities (USN-3523-2) (Meltdown) | Nessus | Ubuntu Local Security Checks | high |
105746 | Ubuntu 14.04 LTS : linux-lts-xenial regression (USN-3522-4) (Meltdown) | Nessus | Ubuntu Local Security Checks | medium |
105745 | Ubuntu 16.04 LTS : linux regression (USN-3522-3) (Meltdown) | Nessus | Ubuntu Local Security Checks | medium |
105727 | Ubuntu 14.04 LTS : linux vulnerability (USN-3524-1) (Meltdown) | Nessus | Ubuntu Local Security Checks | medium |
105726 | Ubuntu 17.10 : linux vulnerabilities (USN-3523-1) (Meltdown) | Nessus | Ubuntu Local Security Checks | high |
105725 | Ubuntu 14.04 LTS : linux-lts-xenial, linux-aws vulnerability (USN-3522-2) (Meltdown) | Nessus | Ubuntu Local Security Checks | medium |
105724 | Ubuntu 16.04 LTS : linux, linux-aws, linux-euclid, linux-kvm vulnerability (USN-3522-1) (Meltdown) | Nessus | Ubuntu Local Security Checks | medium |
105718 | OracleVM 3.4 : xen (OVMSA-2018-0006) (Meltdown) (Spectre) | Nessus | OracleVM Local Security Checks | medium |
105717 | OracleVM 3.4 : xen (OVMSA-2018-0005) (Meltdown) (Spectre) | Nessus | OracleVM Local Security Checks | high |
105704 | Debian DSA-4082-1 : linux - security update (Meltdown) | Nessus | Debian Local Security Checks | high |
105685 | SUSE SLES11 Security Update : kernel (SUSE-SU-2018:0040-1) (BlueBorne) (KRACK) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | high |
105678 | RHEL 7 : redhat-virtualization-host (RHSA-2018:0047) (Meltdown) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105677 | RHEL 6 / 7 : rhev-hypervisor7 (RHSA-2018:0046) (Meltdown) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105676 | RHEL 7 : rhvm-appliance (RHSA-2018:0045) (Meltdown) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105675 | RHEL 7 : redhat-virtualization-host (RHSA-2018:0044) (Meltdown) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105672 | RHEL 6 : MRG (RHSA-2018:0021) (Meltdown) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105657 | Virtuozzo 7 : crit / criu / criu-devel / ksm-vz / libcompel / etc (VZA-2018-003) | Nessus | Virtuozzo Local Security Checks | medium |
105655 | EulerOS 2.0 SP1 : kernel (EulerOS-SA-2018-1002) | Nessus | Huawei Local Security Checks | medium |
105649 | Ubuntu 14.04 LTS / 16.04 LTS / 17.04 / 17.10 : firefox vulnerabilities (USN-3516-1) (Meltdown) (Spectre) | Nessus | Ubuntu Local Security Checks | medium |
105647 | SUSE SLES12 Security Update : kernel (SUSE-SU-2018:0031-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | high |
105636 | openSUSE Security Update : the Linux Kernel (openSUSE-2018-3) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | high |
105622 | Debian DLA-1232-1 : linux security update (Meltdown) | Nessus | Debian Local Security Checks | high |
105619 | Virtuozzo 6 : parallels-server-bm-release / vzkernel / etc (VZA-2018-002) | Nessus | Virtuozzo Local Security Checks | medium |
105618 | EulerOS 2.0 SP2 : kernel (EulerOS-SA-2018-1001) | Nessus | Huawei Local Security Checks | medium |
105617 | Citrix XenServer Multiple Vulnerabilities (CTX231390) (Meltdown)(Spectre) | Nessus | Misc. | medium |
105613 | ADV180002: Microsoft SQL Server January 2018 Security Update (Meltdown) (Spectre) | Nessus | Windows : Microsoft Bulletins | medium |
105599 | Oracle Linux 6 : kernel (ELSA-2018-0008) (Meltdown) (Spectre) | Nessus | Oracle Linux Local Security Checks | medium |
105598 | Oracle Linux 7 : kernel (ELSA-2018-0007) (Meltdown) (Spectre) | Nessus | Oracle Linux Local Security Checks | medium |
105597 | openSUSE Security Update : the Linux Kernel (openSUSE-2018-2) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | high |
105595 | Debian DSA-4078-1 : linux - security update (Meltdown) | Nessus | Debian Local Security Checks | medium |
105589 | CentOS 6 : kernel (CESA-2018:0008) (Meltdown) (Spectre) | Nessus | CentOS Local Security Checks | medium |
105588 | CentOS 7 : kernel (CESA-2018:0007) (Meltdown) (Spectre) | Nessus | CentOS Local Security Checks | medium |
105576 | SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2018:0012-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | high |
105575 | SUSE SLES11 Security Update : kernel (SUSE-SU-2018:0011-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | high |
105574 | SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2018:0010-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | high |
105563 | RHEL 6 : kernel (RHSA-2018:0022) (Meltdown) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105562 | RHEL 6 : kernel (RHSA-2018:0020) (Meltdown) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105561 | RHEL 6 : kernel (RHSA-2018:0018) (Meltdown) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105553 | KB4056898: Windows 8.1 and Windows Server 2012 R2 January 2018 Security Update (Meltdown)(Spectre) | Nessus | Windows : Microsoft Bulletins | high |
105552 | KB4056897: Windows 7 and Windows Server 2008 R2 January 2018 Security Update (Meltdown)(Spectre) | Nessus | Windows : Microsoft Bulletins | high |
105551 | KB4056893: Windows 10 LTSB January 2018 Security Update (Meltdown)(Spectre) | Nessus | Windows : Microsoft Bulletins | high |
105550 | KB4056892: Windows 10 Version 1709 and Windows Server Version 1709 January 2018 Security Update (Meltdown)(Spectre) | Nessus | Windows : Microsoft Bulletins | high |
105549 | KB4056891: Windows 10 Version 1703 January 2018 Security Update (Meltdown)(Spectre) | Nessus | Windows : Microsoft Bulletins | high |
105548 | KB4056890: Windows 10 Version 1607 and Windows Server 2016 January 2018 Security Update (Meltdown)(Spectre) | Nessus | Windows : Microsoft Bulletins | high |
105547 | KB4056888: Windows 10 Version 1511 January 2018 Security Update (Meltdown)(Spectre) | Nessus | Windows : Microsoft Bulletins | high |
105535 | Scientific Linux Security Update : kernel on SL7.x x86_64 (20180103) (Meltdown) (Spectre) | Nessus | Scientific Linux Local Security Checks | medium |
105534 | Scientific Linux Security Update : kernel on SL6.x i386/x86_64 (20180103) (Meltdown) (Spectre) | Nessus | Scientific Linux Local Security Checks | medium |
105533 | RHEL 6 : kernel (RHSA-2018:0017) (Meltdown) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105532 | RHEL 7 : kernel-rt (RHSA-2018:0016) (Meltdown) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105527 | RHEL 6 : kernel (RHSA-2018:0011) (Meltdown) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105526 | RHEL 7 : kernel (RHSA-2018:0010) (Meltdown) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105525 | RHEL 7 : kernel (RHSA-2018:0009) (Meltdown) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105524 | RHEL 6 : kernel (RHSA-2018:0008) (Meltdown) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105523 | RHEL 7 : kernel (RHSA-2018:0007) (Meltdown) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
105517 | Amazon Linux AMI : kernel (ALAS-2018-939) (Meltdown) (Spectre) | Nessus | Amazon Linux Local Security Checks | medium |
105080 | macOS 10.13.x < 10.13.2 Multiple Vulnerabilities (Meltdown) | Nessus | MacOS X Local Security Checks | high |
105075 | Apple iOS < 11.2 Multiple Vulnerabilities | Nessus | Mobile Devices | high |