MEDIUM
Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html
http://support.lenovo.com/us/en/solutions/LEN-22133
http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html
http://www.openwall.com/lists/oss-security/2020/06/10/1
http://www.openwall.com/lists/oss-security/2020/06/10/2
http://www.openwall.com/lists/oss-security/2020/06/10/5
http://www.securityfocus.com/bid/104232
http://www.securitytracker.com/id/1040949
http://www.securitytracker.com/id/1042004
http://xenbits.xen.org/xsa/advisory-263.html
https://access.redhat.com/errata/RHSA-2018:1629
https://access.redhat.com/errata/RHSA-2018:1630
https://access.redhat.com/errata/RHSA-2018:1632
https://access.redhat.com/errata/RHSA-2018:1633
https://access.redhat.com/errata/RHSA-2018:1635
https://access.redhat.com/errata/RHSA-2018:1636
https://access.redhat.com/errata/RHSA-2018:1637
https://access.redhat.com/errata/RHSA-2018:1638
https://access.redhat.com/errata/RHSA-2018:1639
https://access.redhat.com/errata/RHSA-2018:1640
https://access.redhat.com/errata/RHSA-2018:1641
https://access.redhat.com/errata/RHSA-2018:1642
https://access.redhat.com/errata/RHSA-2018:1643
https://access.redhat.com/errata/RHSA-2018:1644
https://access.redhat.com/errata/RHSA-2018:1645
https://access.redhat.com/errata/RHSA-2018:1646
https://access.redhat.com/errata/RHSA-2018:1647
https://access.redhat.com/errata/RHSA-2018:1648
https://access.redhat.com/errata/RHSA-2018:1649
https://access.redhat.com/errata/RHSA-2018:1650
https://access.redhat.com/errata/RHSA-2018:1651
https://access.redhat.com/errata/RHSA-2018:1652
https://access.redhat.com/errata/RHSA-2018:1653
https://access.redhat.com/errata/RHSA-2018:1654
https://access.redhat.com/errata/RHSA-2018:1655
https://access.redhat.com/errata/RHSA-2018:1656
https://access.redhat.com/errata/RHSA-2018:1657
https://access.redhat.com/errata/RHSA-2018:1658
https://access.redhat.com/errata/RHSA-2018:1659
https://access.redhat.com/errata/RHSA-2018:1660
https://access.redhat.com/errata/RHSA-2018:1661
https://access.redhat.com/errata/RHSA-2018:1662
https://access.redhat.com/errata/RHSA-2018:1663
https://access.redhat.com/errata/RHSA-2018:1664
https://access.redhat.com/errata/RHSA-2018:1665
https://access.redhat.com/errata/RHSA-2018:1666
https://access.redhat.com/errata/RHSA-2018:1667
https://access.redhat.com/errata/RHSA-2018:1668
https://access.redhat.com/errata/RHSA-2018:1669
https://access.redhat.com/errata/RHSA-2018:1674
https://access.redhat.com/errata/RHSA-2018:1675
https://access.redhat.com/errata/RHSA-2018:1676
https://access.redhat.com/errata/RHSA-2018:1686
https://access.redhat.com/errata/RHSA-2018:1688
https://access.redhat.com/errata/RHSA-2018:1689
https://access.redhat.com/errata/RHSA-2018:1690
https://access.redhat.com/errata/RHSA-2018:1696
https://access.redhat.com/errata/RHSA-2018:1710
https://access.redhat.com/errata/RHSA-2018:1711
https://access.redhat.com/errata/RHSA-2018:1737
https://access.redhat.com/errata/RHSA-2018:1738
https://access.redhat.com/errata/RHSA-2018:1826
https://access.redhat.com/errata/RHSA-2018:1854
https://access.redhat.com/errata/RHSA-2018:1965
https://access.redhat.com/errata/RHSA-2018:1967
https://access.redhat.com/errata/RHSA-2018:1997
https://access.redhat.com/errata/RHSA-2018:2001
https://access.redhat.com/errata/RHSA-2018:2003
https://access.redhat.com/errata/RHSA-2018:2006
https://access.redhat.com/errata/RHSA-2018:2060
https://access.redhat.com/errata/RHSA-2018:2161
https://access.redhat.com/errata/RHSA-2018:2162
https://access.redhat.com/errata/RHSA-2018:2164
https://access.redhat.com/errata/RHSA-2018:2171
https://access.redhat.com/errata/RHSA-2018:2172
https://access.redhat.com/errata/RHSA-2018:2216
https://access.redhat.com/errata/RHSA-2018:2228
https://access.redhat.com/errata/RHSA-2018:2246
https://access.redhat.com/errata/RHSA-2018:2250
https://access.redhat.com/errata/RHSA-2018:2258
https://access.redhat.com/errata/RHSA-2018:2289
https://access.redhat.com/errata/RHSA-2018:2309
https://access.redhat.com/errata/RHSA-2018:2328
https://access.redhat.com/errata/RHSA-2018:2363
https://access.redhat.com/errata/RHSA-2018:2364
https://access.redhat.com/errata/RHSA-2018:2387
https://access.redhat.com/errata/RHSA-2018:2394
https://access.redhat.com/errata/RHSA-2018:2396
https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/errata/RHSA-2018:3396
https://access.redhat.com/errata/RHSA-2018:3397
https://access.redhat.com/errata/RHSA-2018:3398
https://access.redhat.com/errata/RHSA-2018:3399
https://access.redhat.com/errata/RHSA-2018:3400
https://access.redhat.com/errata/RHSA-2018:3401
https://access.redhat.com/errata/RHSA-2018:3402
https://access.redhat.com/errata/RHSA-2018:3407
https://access.redhat.com/errata/RHSA-2018:3423
https://access.redhat.com/errata/RHSA-2018:3424
https://access.redhat.com/errata/RHSA-2018:3425
https://access.redhat.com/errata/RHSA-2019:0148
https://access.redhat.com/errata/RHSA-2019:1046
https://bugs.chromium.org/p/project-zero/issues/detail?id=1528
https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html
https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html
https://nvidia.custhelp.com/app/answers/detail/a_id/4787
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004
https://seclists.org/bugtraq/2019/Jun/36
https://security.netapp.com/advisory/ntap-20180521-0001/
https://support.citrix.com/article/CTX235225
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03850en_us
https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html
https://usn.ubuntu.com/3651-1/
https://usn.ubuntu.com/3652-1/
https://usn.ubuntu.com/3653-1/
https://usn.ubuntu.com/3653-2/
https://usn.ubuntu.com/3654-1/
https://usn.ubuntu.com/3654-2/
https://usn.ubuntu.com/3655-1/
https://usn.ubuntu.com/3655-2/
https://usn.ubuntu.com/3679-1/
https://usn.ubuntu.com/3680-1/
https://usn.ubuntu.com/3756-1/
https://usn.ubuntu.com/3777-3/
https://www.debian.org/security/2018/dsa-4210
https://www.debian.org/security/2018/dsa-4273
https://www.exploit-db.com/exploits/44695/
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html
https://www.kb.cert.org/vuls/id/180049
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
Source: MITRE
Published: 2018-05-22
Updated: 2020-09-02
Type: CWE-203
Base Score: 4.9
Vector: AV:L/AC:L/Au:N/C:C/I:N/A:N
Impact Score: 6.9
Exploitability Score: 3.9
Severity: MEDIUM
Base Score: 5.5
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Impact Score: 3.6
Exploitability Score: 1.8
Severity: MEDIUM
OR
cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3770d:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3775:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3775d:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3785:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3795:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:32nm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:45nm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:32nm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:45nm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:32nm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:45nm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_m:32nm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_m:45nm:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium:n4000:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium:n4100:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium:n4200:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_j:j4205:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_silver:j5005:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_silver:n5000:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e-1105c:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:125c_:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1220_:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1275_:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1505m_v6:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1515m_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1535m_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1535m_v6:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1545m_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1558l_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1565l_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1575m_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1578l_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1585_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1585l_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:3600:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:5600:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:7500:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:e5502:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:e5503:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:e5504:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:e5506:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:e5507:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:e5520:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:e5530:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:e5540:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:e6510:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:e6540:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:e6550:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:l3403:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:l3406:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:l3426:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:l5506:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:l5508_:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:l5518_:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:l5520:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:l5530:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:w5580:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:w5590:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:x3430:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:x3440:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:x3450:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:x3460:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:x3470:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:x3480:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:x5550:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:x5560:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:x5570:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1105c_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1125c_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_12201:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_12201_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1220_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1220_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1220l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1225:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1225_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1225_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1226_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1230:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1230_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1230_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1230l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1231_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1235:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1240:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1240_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1240_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1240l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1241_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1245:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1245_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1245_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1246_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1258l_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1260l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1265l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1265l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1265l_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1268l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1270:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1270_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1270_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1271_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1275_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1275_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1275l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1276_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1278l_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1280:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1280_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1280_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1281_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1285_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1285_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1285l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1285l_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1286_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1286l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1290:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1290_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1501l_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1501m_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1505l_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1505l_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1505m_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2650l_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2658:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2658_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2658_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2658_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2658a_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2660:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2660_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2660_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2660_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2665:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2667:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2667_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2667_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2667_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2670:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2670_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2670_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2680:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2680_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2680_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2680_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2683_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2683_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2687w:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2687w_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2687w_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2687w_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2690:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2690_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2690_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2690_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2695_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2695_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2695_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2697_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2697_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2697_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2697a_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2698_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2698_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2699_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2699_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2699a_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2699r_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4603:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4603_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4607:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4607_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4610:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4610_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4610_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4610_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4617:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4620:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4620_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4620_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4620_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4624l_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4627_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4627_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4627_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4628l_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4640:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4640_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4640_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4640_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4648_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4650:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4650_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4650_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4650_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4650l:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4655_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4655_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4657l_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4660_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4660_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4667_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4667_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4669_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4669_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1428l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1428l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1428l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1620:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1620_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1620_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1620_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1630_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1630_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1650:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1650_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1650_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1650_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1660:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1660_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1660_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1660_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1680_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1680_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2403:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2403_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2407:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2407_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2408l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2418l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2418l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2418l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2420:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2420_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2428l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2428l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2428l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2430:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2430_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2430l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2430l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2438l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2440:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2440_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2448l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2448l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2450:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2450_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2450l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2450l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2470:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2470_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2603:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2603_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2603_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2603_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2608l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2608l_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2609:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2609_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2609_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2609_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2618l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2618l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2618l_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2620:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2620_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2620_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2620_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2623_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2623_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2628l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2628l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2628l_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2630:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2630_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2630_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2630_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2630l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2630l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2630l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2630l_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2637:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2637_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2637_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2637_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2640:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2640_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2640_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2640_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2643:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2643_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2643_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2643_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2648l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2648l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2648l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2648l_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2650:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2650_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2650_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2650_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2650l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2650l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2650l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2803:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2820:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2830:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2850:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2850_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2860:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2870:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2870_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2880_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2890_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4807:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4809_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4809_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4809_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4820:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4820_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4820_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4820_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4830:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4830_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4830_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4830_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4850:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4850_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4850_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4850_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4860:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4860_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4870:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4870_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4880_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4890_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8830:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8837:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8850:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8850_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8857_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8860:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8860_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8860_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8867_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8867_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8867l:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8870:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8870_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8870_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8870_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8880_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8880_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8880_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8880l_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8880l_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8890_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8890_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8890_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8891_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8891_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8891_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8893_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8893_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8893_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8894_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:85115:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:85118:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:85119t:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:85120:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:85120t:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:85122:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86126:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86126f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86126t:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86128:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86130:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86130f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86130t:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86132:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86134:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86134m:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86136:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86138:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86138f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86138t:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86140:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86140m:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86142:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86142f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86142m:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86144:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86146:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86148:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86148f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86150:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86152:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86154:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*
OR
cpe:2.3:h:arm:cortex-a:15:*:*:*:*:*:*:*
OR
cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:13.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
OR
OR
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
OR
AND
OR
OR
AND
OR
cpe:2.3:o:siemens:simatic_et_200_sp_firmware:*:*:*:*:*:*:*:*
OR
AND
OR
cpe:2.3:o:siemens:simatic_field_pg_m4_firmware:*:*:*:*:*:*:*:*
OR
AND
OR
cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*
OR
AND
OR
cpe:2.3:o:siemens:simatic_ipc3000_smart_firmware:*:*:*:*:*:*:*:*
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:*
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
OR
AND
OR
cpe:2.3:o:siemens:sinumerik_840_d_sl_firmware:-:*:*:*:*:*:*:*
OR
AND
OR
cpe:2.3:o:siemens:sinumerik_pcu_50.5_firmware:*:*:*:*:*:*:*:*
OR
AND
OR
cpe:2.3:o:siemens:sinumerik_tcu_30.3_firmware:-:*:*:*:*:*:*:*
OR
AND
OR
cpe:2.3:o:siemens:sinema_remote_connect_firmware:-:*:*:*:*:*:*:*
OR
OR
cpe:2.3:a:mitel:micloud_management_portal:*:*:*:*:*:*:*:*
cpe:2.3:a:mitel:micollab:-:*:*:*:*:*:*:*
cpe:2.3:a:mitel:mivoic_mx-one:-:*:*:*:*:*:*:*
cpe:2.3:a:mitel:mivoice_5000:-:*:*:*:*:*:*:*
cpe:2.3:a:mitel:mivoice_border_gateway:-:*:*:*:*:*:*:*
cpe:2.3:a:mitel:mivoice_business:-:*:*:*:*:*:*:*
OR
cpe:2.3:a:sonicwall:cloud_global_management_system:-:*:*:*:*:*:*:*
cpe:2.3:a:sonicwall:email_security:-:*:*:*:*:*:*:*
cpe:2.3:a:sonicwall:global_management_system:-:*:*:*:*:*:*:*
cpe:2.3:a:sonicwall:secure_mobile_access:-:*:*:*:*:*:*:*
cpe:2.3:a:sonicwall:sonicosv:-:*:*:*:*:*:*:*
cpe:2.3:a:sonicwall:web_application_firewall:-:*:*:*:*:*:*:*
OR
cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*
ID | Name | Product | Family | Severity |
---|---|---|---|---|
140385 | SUSE SLES12 Security Update : kernel (SUSE-SU-2020:2540-1) (Spectre) | Nessus | SuSE Local Security Checks | high |
140365 | openSUSE Security Update : the Linux Kernel (openSUSE-2020-1325) (Spectre) | Nessus | SuSE Local Security Checks | high |
140019 | OracleVM 3.4 : xen (OVMSA-2020-0039) (Bunker Buster) (Foreshadow) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout) (Meltdown) (POODLE) (Spectre) | Nessus | OracleVM Local Security Checks | critical |
134877 | VMware ESXi 5.5 / 6.0 / 6.5 / 6.7 Information Disclosure (VMSA-2018-0012) (Spectre) (remote check) | Nessus | Misc. | medium |
132253 | RancherOS < 1.4.1 Multiple Information Disclosure Vulnerabilities | Nessus | Misc. | medium |
132101 | Windows Speculative Execution Configuration Check | Nessus | Windows | medium |
131621 | EulerOS 2.0 SP2 : libvirt (EulerOS-SA-2019-2468) | Nessus | Huawei Local Security Checks | medium |
130234 | Amazon Linux 2 : java-11-openjdk (ALAS-2019-1338) (Spectre) | Nessus | Amazon Linux Local Security Checks | medium |
127758 | SUSE SLED12 / SLES12 Security Update : java-1_7_0-openjdk (SUSE-SU-2019:2028-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
127408 | NewStart CGSL MAIN 4.05 : kernel Multiple Vulnerabilities (NS-SA-2019-0143) | Nessus | NewStart CGSL Local Security Checks | critical |
127397 | NewStart CGSL MAIN 4.05 : java-1.8.0-openjdk Multiple Vulnerabilities (NS-SA-2019-0137) | Nessus | NewStart CGSL Local Security Checks | medium |
127389 | NewStart CGSL MAIN 4.05 : qemu-kvm Multiple Vulnerabilities (NS-SA-2019-0133) | Nessus | NewStart CGSL Local Security Checks | medium |
127387 | NewStart CGSL MAIN 4.05 : libvirt Multiple Vulnerabilities (NS-SA-2019-0132) | Nessus | NewStart CGSL Local Security Checks | medium |
127385 | NewStart CGSL MAIN 4.05 : java-1.7.0-openjdk Multiple Vulnerabilities (NS-SA-2019-0131) | Nessus | NewStart CGSL Local Security Checks | medium |
127233 | NewStart CGSL CORE 5.04 / MAIN 5.04 : kernel-rt Multiple Vulnerabilities (NS-SA-2019-0049) | Nessus | NewStart CGSL Local Security Checks | high |
127222 | NewStart CGSL CORE 5.04 / MAIN 5.04 : kernel Multiple Vulnerabilities (NS-SA-2019-0044) | Nessus | NewStart CGSL Local Security Checks | high |
127199 | NewStart CGSL CORE 5.04 / MAIN 5.04 : java-1.7.0-openjdk Multiple Vulnerabilities (NS-SA-2019-0032) | Nessus | NewStart CGSL Local Security Checks | medium |
127190 | NewStart CGSL CORE 5.04 / MAIN 5.04 : java-1.8.0-openjdk Multiple Vulnerabilities (NS-SA-2019-0027) | Nessus | NewStart CGSL Local Security Checks | medium |
126440 | SUSE SLED15 / SLES15 Security Update : java-1_8_0-openjdk (SUSE-SU-2019:1211-2) (Spectre) | Nessus | SuSE Local Security Checks | medium |
125451 | openSUSE Security Update : java-1_8_0-openjdk (openSUSE-2019-1439) (Spectre) | Nessus | SuSE Local Security Checks | medium |
125450 | openSUSE Security Update : java-1_8_0-openjdk (openSUSE-2019-1438) (Spectre) | Nessus | SuSE Local Security Checks | medium |
125023 | SUSE SLED12 / SLES12 Security Update : java-1_8_0-openjdk (SUSE-SU-2019:1219-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
124991 | EulerOS Virtualization for ARM 64 3.0.1.0 : kernel (EulerOS-SA-2019-1538) | Nessus | Huawei Local Security Checks | high |
124953 | EulerOS Virtualization 3.0.1.0 : kvm (EulerOS-SA-2019-1450) | Nessus | Huawei Local Security Checks | medium |
124857 | SUSE SLED15 / SLES15 Security Update : java-1_8_0-openjdk (SUSE-SU-2019:1211-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
124839 | RHEL 7 : Virtualization Manager (RHSA-2019:1046) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
124836 | EulerOS Virtualization 3.0.1.0 : kernel (EulerOS-SA-2019-1515) | Nessus | Huawei Local Security Checks | critical |
700518 | macOS < 10.14 Multiple Vulnerabilities | Nessus Network Monitor | Operating System Detection | critical |
123443 | openSUSE Security Update : ucode-intel (openSUSE-2019-622) (Foreshadow) (Spectre) | Nessus | SuSE Local Security Checks | medium |
123420 | Debian DLA-1731-2 : linux regression update (Spectre) | Nessus | Debian Local Security Checks | high |
123271 | openSUSE Security Update : qemu (openSUSE-2019-620) (Spectre) | Nessus | SuSE Local Security Checks | high |
123215 | openSUSE Security Update : ucode-intel (openSUSE-2019-510) (Spectre) | Nessus | SuSE Local Security Checks | medium |
123186 | openSUSE Security Update : qemu (openSUSE-2019-426) (Spectre) | Nessus | SuSE Local Security Checks | medium |
123185 | openSUSE Security Update : libvirt (openSUSE-2019-424) (Spectre) | Nessus | SuSE Local Security Checks | medium |
123180 | openSUSE Security Update : xen (openSUSE-2019-418) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | medium |
123175 | openSUSE Security Update : the Linux Kernel (openSUSE-2019-398) (Spectre) | Nessus | SuSE Local Security Checks | medium |
122975 | Security Updates for Windows 10 / Windows Server 2016 / Windows Server 2019 (March 2019) (Spectre) (Meltdown) (Foreshadow) | Nessus | Windows : Microsoft Bulletins | medium |
122974 | Security Updates for Windows 10 / Windows Server 2019 (February 2019) (Spectre) (Meltdown) (Foreshadow) | Nessus | Windows : Microsoft Bulletins | medium |
122879 | Debian DLA-1715-1 : linux-4.9 security update (Spectre) | Nessus | Debian Local Security Checks | high |
122087 | OracleVM 3.4 : Unbreakable / etc (OVMSA-2019-0007) (Spectre) | Nessus | OracleVM Local Security Checks | medium |
121947 | Photon OS 2.0: Linux PHSA-2018-2.0-0049 | Nessus | PhotonOS Local Security Checks | medium |
121851 | Photon OS 1.0: Linux PHSA-2018-1.0-0151 | Nessus | PhotonOS Local Security Checks | medium |
121344 | SUSE SLES12 Security Update : kernel (SUSE-SU-2019:0148-1) (Spectre) | Nessus | SuSE Local Security Checks | high |
121223 | Oracle Solaris Critical Patch Update : jan2019_SRU11_4_3_5_0 (Foreshadow) (Spectre) | Nessus | Solaris Local Security Checks | medium |
121151 | openSUSE Security Update : java-1_7_0-openjdk (openSUSE-2019-42) (Spectre) | Nessus | SuSE Local Security Checks | medium |
121067 | Juniper Junos Space < 18.3R1 Multiple Vulnerabilities (JSA10917) | Nessus | Junos Local Security Checks | high |
121059 | SUSE SLED12 / SLES12 Security Update : java-1_7_0-openjdk (SUSE-SU-2019:0049-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
121017 | KB4480960: Windows 7 and Windows Server 2008 R2 January 2019 Security Update | Nessus | Windows : Microsoft Bulletins | high |
121014 | KB4480964: Windows 8.1 and Windows Server 2012 R2 January 2019 Security Update | Nessus | Windows : Microsoft Bulletins | high |
120842 | Fedora 28 : kernel (2018-db0d3e157e) (Spectre) | Nessus | Fedora Local Security Checks | medium |
120435 | Fedora 28 : xen (2018-5521156807) (Spectre) | Nessus | Fedora Local Security Checks | medium |
120426 | Fedora 28 : libvirt (2018-527698a904) (Spectre) | Nessus | Fedora Local Security Checks | medium |
120385 | Fedora 28 : 2:qemu (2018-44f8a7454d) (Spectre) | Nessus | Fedora Local Security Checks | medium |
120081 | SUSE SLED15 / SLES15 Security Update : qemu (SUSE-SU-2018:2340-1) (Spectre) | Nessus | SuSE Local Security Checks | high |
120080 | SUSE SLED15 / SLES15 Security Update : Security update to ucode-intel (SUSE-SU-2018:2338-1) (Foreshadow) (Spectre) | Nessus | SuSE Local Security Checks | medium |
120067 | SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2018:2092-1) (Spectre) | Nessus | SuSE Local Security Checks | high |
120040 | SUSE SLED15 / SLES15 Security Update : ucode-intel (SUSE-SU-2018:1926-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
119277 | OracleVM 3.4 : xen (OVMSA-2018-0282) (Foreshadow) (Spectre) | Nessus | OracleVM Local Security Checks | medium |
118963 | OracleVM 3.2 : xen (OVMSA-2018-0272) (Foreshadow) (Spectre) | Nessus | OracleVM Local Security Checks | high |
118962 | OracleVM 3.3 : xen (OVMSA-2018-0271) (Foreshadow) (Spectre) | Nessus | OracleVM Local Security Checks | high |
118870 | openSUSE Security Update : qemu (openSUSE-2018-1364) (Spectre) | Nessus | SuSE Local Security Checks | high |
118575 | macOS 10.13.6 Multiple Vulnerabilities (Security Update 2018-002) | Nessus | MacOS X Local Security Checks | critical |
118560 | RHEL 6 : qemu-kvm (RHSA-2018:3425) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
118559 | RHEL 6 : qemu-kvm (RHSA-2018:3424) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
118558 | RHEL 7 : qemu-kvm (RHSA-2018:3423) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
118554 | RHEL 7 : libvirt (RHSA-2018:3407) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
118551 | RHEL 6 : libvirt (RHSA-2018:3402) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
118550 | RHEL 6 : qemu-kvm (RHSA-2018:3401) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
118549 | RHEL 6 : libvirt (RHSA-2018:3400) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
118548 | RHEL 6 : libvirt (RHSA-2018:3399) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
118547 | RHEL 7 : libvirt (RHSA-2018:3398) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
118546 | RHEL 6 : qemu-kvm (RHSA-2018:3397) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
118545 | RHEL 6 : libvirt (RHSA-2018:3396) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
118513 | RHEL 7 : kernel-alt (RHSA-2018:2948) (Spectre) | Nessus | Red Hat Local Security Checks | high |
118502 | SUSE SLED12 / SLES12 Security Update : qemu (SUSE-SU-2018:3555-1) (Spectre) | Nessus | SuSE Local Security Checks | high |
118322 | Ubuntu 16.04 LTS / 18.04 LTS : Linux kernel (Azure) vulnerabilities (USN-3777-3) (Spectre) | Nessus | Ubuntu Local Security Checks | high |
118300 | SUSE SLES12 Security Update : java-1_8_0-openjdk (SUSE-SU-2018:3064-2) (Spectre) | Nessus | SuSE Local Security Checks | medium |
118297 | SUSE SLES12 Security Update : qemu (SUSE-SU-2018:2973-2) (Spectre) | Nessus | SuSE Local Security Checks | high |
118281 | SUSE SLES12 Security Update : Security update to ucode-intel (SUSE-SU-2018:2331-2) (Foreshadow) (Spectre) | Nessus | SuSE Local Security Checks | medium |
118274 | SUSE SLES12 Security Update : Recommended update for ucode-intel (SUSE-SU-2018:1935-2) (Spectre) | Nessus | SuSE Local Security Checks | medium |
118266 | SUSE SLES12 Security Update : xen (SUSE-SU-2018:1699-2) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | medium |
118261 | SUSE SLES12 Security Update : libvirt (SUSE-SU-2018:1614-2) (Spectre) | Nessus | SuSE Local Security Checks | medium |
118256 | SUSE SLES12 Security Update : kernel (SUSE-SU-2018:1377-2) (Spectre) | Nessus | SuSE Local Security Checks | medium |
118255 | SUSE SLES12 Security Update : qemu (SUSE-SU-2018:1362-2) (Spectre) | Nessus | SuSE Local Security Checks | medium |
118178 | macOS < 10.14 Multiple Vulnerabilities | Nessus | MacOS X Local Security Checks | critical |
118109 | openSUSE Security Update : java-1_8_0-openjdk (openSUSE-2018-1143) (Spectre) | Nessus | SuSE Local Security Checks | medium |
117992 | SUSE SLED12 / SLES12 Security Update : java-1_8_0-openjdk (SUSE-SU-2018:3064-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
117900 | SUSE SLES12 Security Update : qemu (SUSE-SU-2018:2973-1) (Spectre) | Nessus | SuSE Local Security Checks | high |
117580 | EulerOS Virtualization 2.5.0 : kvm (EulerOS-SA-2018-1271) | Nessus | Huawei Local Security Checks | medium |
117579 | EulerOS Virtualization 2.5.0 : kernel (EulerOS-SA-2018-1270) | Nessus | Huawei Local Security Checks | high |
117576 | EulerOS Virtualization 2.5.1 : kernel (EulerOS-SA-2018-1267) | Nessus | Huawei Local Security Checks | medium |
117574 | EulerOS Virtualization 2.5.1 : kvm (EulerOS-SA-2018-1265) | Nessus | Huawei Local Security Checks | medium |
117502 | Debian DLA-1506-1 : intel-microcode security update (Foreshadow) (Spectre) | Nessus | Debian Local Security Checks | medium |
117386 | SUSE SLES11 Security Update : kvm (SUSE-SU-2018:2650-1) (Spectre) | Nessus | SuSE Local Security Checks | high |
112287 | SUSE SLES11 Security Update : kvm (SUSE-SU-2018:2615-1) (Spectre) | Nessus | SuSE Local Security Checks | high |
112204 | SUSE SLES12 Security Update : qemu (SUSE-SU-2018:2565-1) (Spectre) | Nessus | SuSE Local Security Checks | high |
112201 | SUSE SLES12 Security Update : qemu (SUSE-SU-2018:2556-1) (Spectre) | Nessus | SuSE Local Security Checks | high |
112151 | Ubuntu 14.04 LTS / 16.04 LTS / 18.04 LTS : Intel Microcode vulnerabilities (USN-3756-1) (Foreshadow) (Spectre) | Nessus | Ubuntu Local Security Checks | medium |
112147 | SUSE SLES11 Security Update : xen (SUSE-SU-2018:2528-1) (Foreshadow) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | high |
112116 | Security Updates for Windows 10 / Windows Server 2016 (August 2018) (Spectre) (Meltdown) (Foreshadow) | Nessus | Windows : Microsoft Bulletins | medium |
112031 | openSUSE Security Update : ucode-intel (openSUSE-2018-887) (Foreshadow) (Spectre) | Nessus | SuSE Local Security Checks | medium |
112003 | openSUSE Security Update : qemu (openSUSE-2018-894) (Spectre) | Nessus | SuSE Local Security Checks | high |
111992 | OracleVM 3.4 : xen (OVMSA-2018-0248) (Bunker Buster) (Foreshadow) (Meltdown) (POODLE) (Spectre) | Nessus | OracleVM Local Security Checks | critical |
111796 | Debian DSA-4273-1 : intel-microcode - security update (Spectre) | Nessus | Debian Local Security Checks | medium |
111783 | SUSE SLES11 Security Update : Security update to ucode-intel (SUSE-SU-2018:2335-1) (Foreshadow) (Spectre) | Nessus | SuSE Local Security Checks | medium |
111781 | SUSE SLED12 / SLES12 Security Update : Security update to ucode-intel (SUSE-SU-2018:2331-1) (Foreshadow) (Spectre) | Nessus | SuSE Local Security Checks | medium |
111775 | RHEL 6 : MRG (RHSA-2018:2396) (Foreshadow) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
111735 | RHEL 6 : kernel (RHSA-2018:2394) (Foreshadow) (Spectre) | Nessus | Red Hat Local Security Checks | high |
111728 | RHEL 7 : kernel (RHSA-2018:2387) (Foreshadow) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
111664 | SUSE SLED12 / SLES12 Security Update : libvirt (SUSE-SU-2018:2304-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
111661 | openSUSE Security Update : libvirt (openSUSE-2018-860) (Spectre) | Nessus | SuSE Local Security Checks | medium |
111516 | RHEL 7 : Virtualization Manager (RHSA-2018:2328) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
111503 | SUSE SLES12 Security Update : libvirt (SUSE-SU-2018:2141-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
111493 | RHEL 6 : kernel (RHSA-2018:2309) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
111434 | SUSE SLES12 Security Update : libvirt (SUSE-SU-2018:2082-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
111413 | Slackware 14.2 : Slackware 14.2 kernel (SSA:2018-208-01) (Spectre) | Nessus | Slackware Local Security Checks | medium |
111373 | SUSE SLES11 Security Update : microcode_ctl (SUSE-SU-2018:2076-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
111359 | Debian DLA-1446-1 : intel-microcode security update (Spectre) | Nessus | Debian Local Security Checks | medium |
111342 | RHEL 6 / 7 : Virtualization (RHSA-2018:2246) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
111336 | Amazon Linux 2 : libvirt (ALAS-2018-1049) (Spectre) | Nessus | Amazon Linux Local Security Checks | medium |
111321 | RHEL 6 : kernel (RHSA-2018:2250) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
111304 | Photon OS 2.0 : linux-esx / linux / patch / linux-aws / linux-secure (PhotonOS-PHSA-2018-2.0-0049) (deprecated) | Nessus | PhotonOS Local Security Checks | medium |
111277 | Photon OS 1.0 : linux / linux-esx (PhotonOS-PHSA-2018-1.0-0151) (Spectre) (deprecated) | Nessus | PhotonOS Local Security Checks | medium |
111165 | Debian DLA-1423-1 : linux-4.9 new package (Spectre) | Nessus | Debian Local Security Checks | high |
111151 | Virtuozzo 6 : parallels-server-bm-release / vzkernel / etc (VZA-2018-048) | Nessus | Virtuozzo Local Security Checks | medium |
111148 | RHEL 7 : kernel (RHSA-2018:2216) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
111077 | CentOS 6 : kernel (CESA-2018:2164) (Spectre) | Nessus | CentOS Local Security Checks | high |
111076 | CentOS 6 : qemu-kvm (CESA-2018:2162) (Spectre) | Nessus | CentOS Local Security Checks | medium |
111051 | SUSE SLED12 / SLES12 Security Update : Recommended update for ucode-intel (SUSE-SU-2018:1935-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
111023 | OracleVM 3.4 : qemu-kvm (OVMSA-2018-0238) (Spectre) | Nessus | OracleVM Local Security Checks | high |
111003 | Scientific Linux Security Update : qemu-kvm on SL6.x i386/x86_64 (20180710) (Spectre) | Nessus | Scientific Linux Local Security Checks | medium |
111002 | Scientific Linux Security Update : kernel on SL6.x i386/x86_64 (20180710) (Spectre) | Nessus | Scientific Linux Local Security Checks | high |
111001 | RHEL 6 : kernel (RHSA-2018:2164) (Spectre) | Nessus | Red Hat Local Security Checks | high |
111000 | RHEL 6 : qemu-kvm (RHSA-2018:2162) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
110999 | RHEL 7 : kernel (RHSA-2018:2161) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
110996 | Oracle Linux 6 : kernel (ELSA-2018-2164) (Spectre) | Nessus | Oracle Linux Local Security Checks | high |
110995 | Oracle Linux 6 : qemu-kvm (ELSA-2018-2162) (Spectre) | Nessus | Oracle Linux Local Security Checks | medium |
110958 | openSUSE Security Update : ucode-intel (openSUSE-2018-700) (Spectre) | Nessus | SuSE Local Security Checks | medium |
110951 | Fedora 27 : 2:qemu (2018-9f02e5ed7b) (Spectre) | Nessus | Fedora Local Security Checks | medium |
110908 | CentOS 7 : qemu-kvm (CESA-2018:2001) (Spectre) | Nessus | CentOS Local Security Checks | medium |
110907 | CentOS 7 : libvirt (CESA-2018:1997) (Spectre) | Nessus | CentOS Local Security Checks | medium |
110905 | CentOS 7 : kernel (CESA-2018:1965) (Spectre) | Nessus | CentOS Local Security Checks | medium |
110901 | VMSA-2018-0012 : VMware vSphere, Workstation and Fusion updates enable Hypervisor-Assisted Guest Mitigations for Speculative Store Bypass issue (Spectre) | Nessus | VMware ESX Local Security Checks | medium |
110887 | Scientific Linux Security Update : kernel on SL6.x i386/x86_64 (20180619) (Spectre) | Nessus | Scientific Linux Local Security Checks | high |
110865 | EulerOS 2.0 SP3 : qemu-kvm (EulerOS-SA-2018-1201) | Nessus | Huawei Local Security Checks | high |
110864 | EulerOS 2.0 SP2 : qemu-kvm (EulerOS-SA-2018-1200) | Nessus | Huawei Local Security Checks | medium |
110861 | EulerOS 2.0 SP3 : libvirt (EulerOS-SA-2018-1197) | Nessus | Huawei Local Security Checks | medium |
110860 | EulerOS 2.0 SP3 : kernel (EulerOS-SA-2018-1196) | Nessus | Huawei Local Security Checks | high |
110859 | EulerOS 2.0 SP3 : java-1.8.0-openjdk (EulerOS-SA-2018-1195) | Nessus | Huawei Local Security Checks | medium |
110858 | EulerOS 2.0 SP2 : java-1.8.0-openjdk (EulerOS-SA-2018-1194) | Nessus | Huawei Local Security Checks | medium |
110857 | EulerOS 2.0 SP3 : java-1.7.0-openjdk (EulerOS-SA-2018-1193) | Nessus | Huawei Local Security Checks | medium |
110856 | EulerOS 2.0 SP2 : java-1.7.0-openjdk (EulerOS-SA-2018-1192) | Nessus | Huawei Local Security Checks | medium |
110795 | RHEL 7 : qemu-kvm-rhev (RHSA-2018:2060) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
110792 | OracleVM 3.4 : xen (OVMSA-2018-0233) (Spectre) | Nessus | OracleVM Local Security Checks | medium |
110791 | OracleVM 3.4 : xen (OVMSA-2018-0232) (Spectre) | Nessus | OracleVM Local Security Checks | medium |
110752 | Oracle Linux 7 : qemu-kvm (ELSA-2018-2001) (Spectre) | Nessus | Oracle Linux Local Security Checks | medium |
110751 | Oracle Linux 7 : libvirt (ELSA-2018-1997) (Spectre) | Nessus | Oracle Linux Local Security Checks | medium |
110749 | Oracle Linux 7 : kernel (ELSA-2018-1965) (Spectre) | Nessus | Oracle Linux Local Security Checks | medium |
110720 | Scientific Linux Security Update : qemu-kvm on SL7.x x86_64 (20180626) (Spectre) | Nessus | Scientific Linux Local Security Checks | medium |
110718 | Scientific Linux Security Update : libvirt on SL7.x x86_64 (20180626) (Spectre) | Nessus | Scientific Linux Local Security Checks | medium |
110717 | Scientific Linux Security Update : kernel on SL7.x x86_64 (20180626) (Spectre) | Nessus | Scientific Linux Local Security Checks | medium |
110714 | RHEL 7 : libvirt (RHSA-2018:2006) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
110713 | RHEL 7 : kernel-rt (RHSA-2018:2003) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
110712 | RHEL 7 : qemu-kvm (RHSA-2018:2001) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
110711 | RHEL 7 : libvirt (RHSA-2018:1997) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
110709 | RHEL 7 : kernel-alt (RHSA-2018:1967) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
110708 | RHEL 7 : kernel (RHSA-2018:1965) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
110701 | Oracle Linux 6 : kernel (ELSA-2018-1854) (Spectre) | Nessus | Oracle Linux Local Security Checks | high |
110658 | openSUSE Security Update : the Linux Kernel (openSUSE-2018-656) (Spectre) | Nessus | SuSE Local Security Checks | high |
110645 | CentOS 6 : kernel (CESA-2018:1854) (Spectre) | Nessus | CentOS Local Security Checks | critical |
110617 | EulerOS 2.0 SP2 : kernel (EulerOS-SA-2018-1153) | Nessus | Huawei Local Security Checks | medium |
110600 | RHEL 6 : kernel (RHSA-2018:1854) (Spectre) | Nessus | Red Hat Local Security Checks | high |
110596 | SUSE SLES12 Security Update : xen (SUSE-SU-2018:1699-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | medium |
110526 | OracleVM 3.4 : Unbreakable / etc (OVMSA-2018-0228) (Spectre) | Nessus | OracleVM Local Security Checks | high |
110515 | Ubuntu 14.04 LTS / 16.04 LTS / 17.10 / 18.04 LTS : libvirt vulnerability and update (USN-3680-1) (Spectre) | Nessus | Ubuntu Local Security Checks | medium |
110514 | Ubuntu 14.04 LTS / 16.04 LTS / 17.10 / 18.04 LTS : QEMU update (USN-3679-1) (Spectre) | Nessus | Ubuntu Local Security Checks | medium |
110509 | SUSE SLES12 Security Update : xen (SUSE-SU-2018:1658-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | medium |
110506 | RHEL 6 : kernel (RHSA-2018:1826) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
110462 | Amazon Linux AMI : java-1.8.0-openjdk (ALAS-2018-1039) (Spectre) | Nessus | Amazon Linux Local Security Checks | medium |
110461 | Amazon Linux AMI : kernel (ALAS-2018-1038) (Spectre) | Nessus | Amazon Linux Local Security Checks | medium |
110460 | Amazon Linux AMI : java-1.7.0-openjdk (ALAS-2018-1037) (Spectre) | Nessus | Amazon Linux Local Security Checks | medium |
110457 | Amazon Linux AMI : qemu-kvm (ALAS-2018-1034) (Spectre) | Nessus | Amazon Linux Local Security Checks | high |
110456 | Amazon Linux 2 : java-1.8.0-openjdk (ALAS-2018-1039) (Spectre) | Nessus | Amazon Linux Local Security Checks | medium |
110455 | Amazon Linux 2 : kernel (ALAS-2018-1038) (Spectre) | Nessus | Amazon Linux Local Security Checks | medium |
110454 | Amazon Linux 2 : java-1.7.0-openjdk (ALAS-2018-1037) (Spectre) | Nessus | Amazon Linux Local Security Checks | medium |
110451 | Amazon Linux 2 : qemu-kvm (ALAS-2018-1034) (Spectre) | Nessus | Amazon Linux Local Security Checks | high |
110450 | Amazon Linux 2 : libvirt (ALAS-2018-1033) (Spectre) | Nessus | Amazon Linux Local Security Checks | medium |
110445 | SUSE SLES12 Security Update : libvirt (SUSE-SU-2018:1614-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
110444 | SUSE SLES11 Security Update : xen (SUSE-SU-2018:1603-1) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | medium |
110442 | openSUSE Security Update : qemu (openSUSE-2018-603) (Spectre) | Nessus | SuSE Local Security Checks | medium |
110441 | openSUSE Security Update : libvirt (openSUSE-2018-602) (Spectre) | Nessus | SuSE Local Security Checks | medium |
110438 | openSUSE Security Update : xen (openSUSE-2018-599) (Meltdown) (Spectre) | Nessus | SuSE Local Security Checks | medium |
110412 | SUSE SLES12 Security Update : xen (SUSE-SU-2018:1582-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
110404 | Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2018-4126) (Spectre) | Nessus | Oracle Linux Local Security Checks | medium |
110402 | Fedora 27 : xen (2018-aec846c0ef) (Spectre) | Nessus | Fedora Local Security Checks | medium |
110309 | openSUSE Security Update : xen (openSUSE-2018-547) (Spectre) | Nessus | SuSE Local Security Checks | high |
110265 | Citrix XenServer Local Memory Disclosure Vulnerability (CTX235225) | Nessus | Misc. | medium |
110261 | SUSE SLES11 Security Update : kvm (SUSE-SU-2018:1479-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
110259 | SUSE SLES11 Security Update : libvirt (SUSE-SU-2018:1475-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
110234 | Virtuozzo 7 : anaconda / anaconda-core / anaconda-dracut / etc (VZA-2018-037) | Nessus | Virtuozzo Local Security Checks | high |
110222 | SUSE SLED12 / SLES12 Security Update : xen (SUSE-SU-2018:1456-1) (Spectre) | Nessus | SuSE Local Security Checks | high |
110221 | RHEL 7 : kernel (RHSA-2018:1738) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
110220 | RHEL 7 : kernel (RHSA-2018:1737) (Spectre) | Nessus | Red Hat Local Security Checks | critical |
110219 | RHEL 6 : kernel (RHSA-2018:1641) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
110218 | RHEL 6 : kernel (RHSA-2018:1640) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
110217 | RHEL 6 : kernel (RHSA-2018:1639) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
110216 | RHEL 6 : kernel (RHSA-2018:1638) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
110215 | RHEL 7 : kernel (RHSA-2018:1637) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
110209 | Fedora 26 : kernel (2018-6367a17aa3) (Spectre) | Nessus | Fedora Local Security Checks | medium |
110203 | CentOS 6 : libvirt (CESA-2018:1669) (Spectre) | Nessus | CentOS Local Security Checks | medium |
110189 | SUSE SLES11 Security Update : libvirt (SUSE-SU-2018:1452-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
110170 | Fedora 27 : kernel (2018-93c2e74446) (Spectre) | Nessus | Fedora Local Security Checks | medium |
110157 | Virtuozzo 6 : cpupools / cpupools-features / etc (VZA-2018-034) | Nessus | Virtuozzo Local Security Checks | medium |
110113 | RHEL 6 / 7 : Virtualization (RHSA-2018:1711) (Spectre) | Nessus | Red Hat Local Security Checks | high |
110112 | RHEL 7 : Virtualization (RHSA-2018:1710) (Spectre) | Nessus | Red Hat Local Security Checks | high |
110111 | RHEL 7 : Virtualization (RHSA-2018:1696) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
110105 | openSUSE Security Update : the Linux Kernel (openSUSE-2018-515) (Spectre) | Nessus | SuSE Local Security Checks | medium |
110104 | openSUSE Security Update : the Linux Kernel (openSUSE-2018-514) (Spectre) | Nessus | SuSE Local Security Checks | high |
110102 | Debian DSA-4210-1 : xen - security update (Spectre) | Nessus | Debian Local Security Checks | medium |
110100 | Virtuozzo 6 : parallels-server-bm-release / vzkernel / etc (VZA-2018-033) | Nessus | Virtuozzo Local Security Checks | medium |
110091 | SUSE SLES11 Security Update : kvm (SUSE-SU-2018:1389-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
110090 | SUSE SLES12 Security Update : qemu (SUSE-SU-2018:1386-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
110081 | RHEL 7 : Virtualization (RHSA-2018:1690) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
110080 | RHEL 6 : Virtualization (RHSA-2018:1689) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
110079 | RHEL 6 : Virtualization (RHSA-2018:1688) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
110078 | RHEL 7 : Virtualization Manager (RHSA-2018:1676) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
110077 | RHEL 7 : Virtualization (RHSA-2018:1675) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
110076 | RHEL 7 : Virtualization Manager (RHSA-2018:1674) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
110075 | RHEL 7 : Virtualization (RHSA-2018:1655) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
110074 | RHEL 7 : Virtualization (RHSA-2018:1654) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
110073 | RHEL 6 : MRG (RHSA-2018:1642) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
110072 | OracleVM 3.4 : Unbreakable / etc (OVMSA-2018-0223) (Spectre) | Nessus | OracleVM Local Security Checks | high |
110071 | Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2018-4114) (Spectre) | Nessus | Oracle Linux Local Security Checks | high |
110063 | openSUSE Security Update : qemu (openSUSE-2018-489) (Spectre) | Nessus | SuSE Local Security Checks | medium |
110050 | Ubuntu 14.04 LTS : Linux kernel vulnerabilities (USN-3655-1) (Spectre) | Nessus | Ubuntu Local Security Checks | high |
110049 | Ubuntu 14.04 LTS : Linux kernel (Xenial HWE) vulnerabilities (USN-3654-2) (Spectre) | Nessus | Ubuntu Local Security Checks | high |
110048 | Ubuntu 16.04 LTS : Linux kernel vulnerabilities (USN-3654-1) (Spectre) | Nessus | Ubuntu Local Security Checks | high |
110047 | Ubuntu 16.04 LTS : Linux kernel (HWE) vulnerabilities (USN-3653-2) (Spectre) | Nessus | Ubuntu Local Security Checks | high |
110046 | Ubuntu 17.10 : Linux kernel vulnerabilities (USN-3653-1) (Spectre) | Nessus | Ubuntu Local Security Checks | high |
110045 | Ubuntu 18.04 LTS : Linux kernel vulnerability (USN-3652-1) (Spectre) | Nessus | Ubuntu Local Security Checks | medium |
110043 | SUSE SLED12 / SLES12 Security Update : qemu (SUSE-SU-2018:1378-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
110042 | SUSE SLES12 Security Update : kernel (SUSE-SU-2018:1377-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
110041 | SUSE SLES11 Security Update : kernel (SUSE-SU-2018:1376-1) (Spectre) | Nessus | SuSE Local Security Checks | high |
110040 | SUSE SLES12 Security Update : kernel (SUSE-SU-2018:1375-1) (Spectre) | Nessus | SuSE Local Security Checks | high |
110039 | SUSE SLES12 Security Update : kernel (SUSE-SU-2018:1374-1) (Spectre) | Nessus | SuSE Local Security Checks | high |
110035 | SUSE SLES11 Security Update : kernel (SUSE-SU-2018:1368-1) (Spectre) | Nessus | SuSE Local Security Checks | high |
110033 | SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2018:1366-1) (Spectre) | Nessus | SuSE Local Security Checks | high |
110030 | SUSE SLES12 Security Update : qemu (SUSE-SU-2018:1363-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
110029 | SUSE SLES12 Security Update : qemu (SUSE-SU-2018:1362-1) (Spectre) | Nessus | SuSE Local Security Checks | medium |
110028 | Scientific Linux Security Update : qemu-kvm on SL7.x x86_64 (20180522) (Spectre) | Nessus | Scientific Linux Local Security Checks | medium |
110027 | Scientific Linux Security Update : libvirt on SL7.x x86_64 (20180522) (Spectre) | Nessus | Scientific Linux Local Security Checks | medium |
110026 | Scientific Linux Security Update : libvirt on SL6.x i386/x86_64 (20180522) (Spectre) | Nessus | Scientific Linux Local Security Checks | medium |
110025 | Scientific Linux Security Update : kernel on SL7.x x86_64 (20180522) (Spectre) | Nessus | Scientific Linux Local Security Checks | medium |
110024 | Scientific Linux Security Update : kernel on SL6.x i386/x86_64 (20180522) (Spectre) | Nessus | Scientific Linux Local Security Checks | medium |
110023 | Scientific Linux Security Update : java-1.8.0-openjdk on SL7.x x86_64 (20180522) (Spectre) | Nessus | Scientific Linux Local Security Checks | medium |
110022 | Scientific Linux Security Update : java-1.8.0-openjdk on SL6.x i386/x86_64 (20180522) (Spectre) | Nessus | Scientific Linux Local Security Checks | medium |
110021 | Scientific Linux Security Update : java-1.7.0-openjdk on SL7.x x86_64 (20180522) (Spectre) | Nessus | Scientific Linux Local Security Checks | medium |
110020 | Scientific Linux Security Update : qemu-kvm on SL6.x i386/x86_64 (20180521) (Spectre) | Nessus | Scientific Linux Local Security Checks | medium |
110019 | Scientific Linux Security Update : java-1.7.0-openjdk on SL6.x i386/x86_64 (20180521) (Spectre) | Nessus | Scientific Linux Local Security Checks | medium |
110018 | RHEL 6 : libvirt (RHSA-2018:1669) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
110017 | RHEL 7 : libvirt (RHSA-2018:1668) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
110016 | RHEL 6 : libvirt (RHSA-2018:1667) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
110015 | RHEL 6 : libvirt (RHSA-2018:1666) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
110014 | RHEL 6 : libvirt (RHSA-2018:1665) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
110013 | RHEL 6 : libvirt (RHSA-2018:1664) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
110012 | RHEL 7 : qemu-kvm (RHSA-2018:1663) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
110011 | RHEL 7 : qemu-kvm (RHSA-2018:1662) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
110010 | RHEL 7 : qemu-kvm (RHSA-2018:1661) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
110009 | RHEL 6 : qemu-kvm (RHSA-2018:1660) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
110008 | RHEL 6 : qemu-kvm (RHSA-2018:1659) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
110007 | RHEL 6 : qemu-kvm (RHSA-2018:1658) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
110006 | RHEL 6 : qemu-kvm (RHSA-2018:1657) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
110005 | RHEL 6 : qemu-kvm (RHSA-2018:1656) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
110004 | RHEL 7 : libvirt (RHSA-2018:1653) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
110003 | RHEL 7 : libvirt (RHSA-2018:1652) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
110002 | RHEL 6 : kernel (RHSA-2018:1651) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
110001 | RHEL 6 : java-1.8.0-openjdk (RHSA-2018:1650) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
110000 | RHEL 7 : java-1.8.0-openjdk (RHSA-2018:1649) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
109999 | RHEL 7 : java-1.7.0-openjdk (RHSA-2018:1648) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
109998 | RHEL 6 : java-1.7.0-openjdk (RHSA-2018:1647) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
109997 | RHEL 7 : kernel (RHSA-2018:1636) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
109996 | RHEL 7 : kernel (RHSA-2018:1635) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
109995 | RHEL 7 : qemu-kvm (RHSA-2018:1633) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
109994 | RHEL 7 : libvirt (RHSA-2018:1632) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
109993 | RHEL 7 : kernel-rt (RHSA-2018:1630) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
109992 | RHEL 7 : kernel (RHSA-2018:1629) (Spectre) | Nessus | Red Hat Local Security Checks | medium |
109988 | OracleVM 3.4 : qemu-kvm (OVMSA-2018-0219) (Spectre) | Nessus | OracleVM Local Security Checks | medium |
109986 | Oracle Linux 6 : libvirt (ELSA-2018-1669) (Spectre) | Nessus | Oracle Linux Local Security Checks | medium |
109985 | Oracle Linux 6 : qemu-kvm (ELSA-2018-1660) (Spectre) | Nessus | Oracle Linux Local Security Checks | medium |
109984 | Oracle Linux 6 : kernel (ELSA-2018-1651) (Spectre) | Nessus | Oracle Linux Local Security Checks | medium |
109983 | Oracle Linux 6 : java-1.8.0-openjdk (ELSA-2018-1650) (Spectre) | Nessus | Oracle Linux Local Security Checks | medium |
109982 | Oracle Linux 7 : java-1.8.0-openjdk (ELSA-2018-1649) (Spectre) | Nessus | Oracle Linux Local Security Checks | medium |
109981 | Oracle Linux 7 : java-1.7.0-openjdk (ELSA-2018-1648) (Spectre) | Nessus | Oracle Linux Local Security Checks | medium |
109980 | Oracle Linux 6 : java-1.7.0-openjdk (ELSA-2018-1647) (Spectre) | Nessus | Oracle Linux Local Security Checks | medium |
109979 | Oracle Linux 7 : qemu-kvm (ELSA-2018-1633) (Spectre) | Nessus | Oracle Linux Local Security Checks | medium |
109978 | Oracle Linux 7 : libvirt (ELSA-2018-1632) (Spectre) | Nessus | Oracle Linux Local Security Checks | medium |
109977 | Oracle Linux 7 : kernel (ELSA-2018-1629) (Spectre) | Nessus | Oracle Linux Local Security Checks | medium |
109966 | CentOS 6 : qemu-kvm (CESA-2018:1660) (Spectre) | Nessus | CentOS Local Security Checks | medium |
109965 | CentOS 6 : kernel (CESA-2018:1651) (Spectre) | Nessus | CentOS Local Security Checks | medium |
109964 | CentOS 6 : java-1.8.0-openjdk (CESA-2018:1650) (Spectre) | Nessus | CentOS Local Security Checks | medium |
109963 | CentOS 7 : java-1.8.0-openjdk (CESA-2018:1649) (Spectre) | Nessus | CentOS Local Security Checks | medium |
109962 | CentOS 7 : java-1.7.0-openjdk (CESA-2018:1648) (Spectre) | Nessus | CentOS Local Security Checks | medium |
109961 | CentOS 6 : java-1.7.0-openjdk (CESA-2018:1647) (Spectre) | Nessus | CentOS Local Security Checks | medium |
109960 | CentOS 7 : qemu-kvm (CESA-2018:1633) (Spectre) | Nessus | CentOS Local Security Checks | medium |
109959 | CentOS 7 : libvirt (CESA-2018:1632) (Spectre) | Nessus | CentOS Local Security Checks | medium |
109958 | CentOS 7 : kernel (CESA-2018:1629) (Spectre) | Nessus | CentOS Local Security Checks | medium |
109957 | AIX 5.3 TL 12 : variant4 (IJ05826) (Spectre) | Nessus | AIX Local Security Checks | medium |
109956 | AIX 6.1 TL 9 : variant4 (IJ05824) (Spectre) | Nessus | AIX Local Security Checks | medium |
109955 | AIX 7.1 TL 4 : variant4 (IJ05823) (Spectre) | Nessus | AIX Local Security Checks | medium |
109954 | AIX 7.1 TL 5 : variant4 (IJ05822) (Spectre) | Nessus | AIX Local Security Checks | medium |
109953 | AIX 7.2 TL 0 : variant4 (IJ05821) (Spectre) | Nessus | AIX Local Security Checks | medium |
109952 | AIX 7.2 TL 1 : variant4 (IJ05820) (Spectre) | Nessus | AIX Local Security Checks | medium |
109951 | AIX 7.2 TL 2 : variant4 (IJ05818) (Spectre) | Nessus | AIX Local Security Checks | medium |