CVE-2018-3639

LOW

Description

Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.

References

https://www.us-cert.gov/ncas/alerts/TA18-141A

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html

https://www.synology.com/support/security/Synology_SA_18_23

https://www.kb.cert.org/vuls/id/180049

https://usn.ubuntu.com/3655-2/

https://usn.ubuntu.com/3654-2/

https://usn.ubuntu.com/3654-1/

https://usn.ubuntu.com/3653-2/

https://usn.ubuntu.com/3653-1/

https://usn.ubuntu.com/3652-1/

https://usn.ubuntu.com/3651-1/

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel

https://support.citrix.com/article/CTX235225

https://security.netapp.com/advisory/ntap-20180521-0001/

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012

https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability

https://bugs.chromium.org/p/project-zero/issues/detail?id=1528

https://access.redhat.com/errata/RHSA-2018:1660

https://access.redhat.com/errata/RHSA-2018:1655

https://access.redhat.com/errata/RHSA-2018:1647

https://access.redhat.com/errata/RHSA-2018:1630

http://xenbits.xen.org/xsa/advisory-263.html

http://www.securitytracker.com/id/1040949

http://support.lenovo.com/us/en/solutions/LEN-22133

https://access.redhat.com/errata/RHSA-2018:1690

https://access.redhat.com/errata/RHSA-2018:1689

https://access.redhat.com/errata/RHSA-2018:1688

https://access.redhat.com/errata/RHSA-2018:1686

https://access.redhat.com/errata/RHSA-2018:1676

https://access.redhat.com/errata/RHSA-2018:1675

https://access.redhat.com/errata/RHSA-2018:1674

https://access.redhat.com/errata/RHSA-2018:1669

https://access.redhat.com/errata/RHSA-2018:1668

https://access.redhat.com/errata/RHSA-2018:1667

https://access.redhat.com/errata/RHSA-2018:1666

https://access.redhat.com/errata/RHSA-2018:1665

https://access.redhat.com/errata/RHSA-2018:1664

https://access.redhat.com/errata/RHSA-2018:1663

https://access.redhat.com/errata/RHSA-2018:1662

https://access.redhat.com/errata/RHSA-2018:1661

https://access.redhat.com/errata/RHSA-2018:1659

https://access.redhat.com/errata/RHSA-2018:1658

https://access.redhat.com/errata/RHSA-2018:1657

https://access.redhat.com/errata/RHSA-2018:1656

https://access.redhat.com/errata/RHSA-2018:1654

https://access.redhat.com/errata/RHSA-2018:1653

https://access.redhat.com/errata/RHSA-2018:1652

https://access.redhat.com/errata/RHSA-2018:1651

https://access.redhat.com/errata/RHSA-2018:1650

https://access.redhat.com/errata/RHSA-2018:1649

https://access.redhat.com/errata/RHSA-2018:1648

https://access.redhat.com/errata/RHSA-2018:1646

https://access.redhat.com/errata/RHSA-2018:1645

https://access.redhat.com/errata/RHSA-2018:1644

https://access.redhat.com/errata/RHSA-2018:1643

https://access.redhat.com/errata/RHSA-2018:1642

https://access.redhat.com/errata/RHSA-2018:1636

https://access.redhat.com/errata/RHSA-2018:1635

https://access.redhat.com/errata/RHSA-2018:1633

https://access.redhat.com/errata/RHSA-2018:1632

https://access.redhat.com/errata/RHSA-2018:1629

http://www.securityfocus.com/bid/104232

https://www.exploit-db.com/exploits/44695/

https://access.redhat.com/errata/RHSA-2018:1711

https://access.redhat.com/errata/RHSA-2018:1710

https://access.redhat.com/errata/RHSA-2018:1696

https://www.debian.org/security/2018/dsa-4210

https://usn.ubuntu.com/3655-1/

https://access.redhat.com/errata/RHSA-2018:1738

https://access.redhat.com/errata/RHSA-2018:1737

https://access.redhat.com/errata/RHSA-2018:1641

https://access.redhat.com/errata/RHSA-2018:1640

https://access.redhat.com/errata/RHSA-2018:1639

https://access.redhat.com/errata/RHSA-2018:1638

https://access.redhat.com/errata/RHSA-2018:1637

http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html

https://usn.ubuntu.com/3680-1/

https://usn.ubuntu.com/3679-1/

https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03850en_us

https://access.redhat.com/errata/RHSA-2018:1826

https://access.redhat.com/errata/RHSA-2018:1854

https://access.redhat.com/errata/RHSA-2018:2006

https://access.redhat.com/errata/RHSA-2018:2003

https://access.redhat.com/errata/RHSA-2018:2001

https://access.redhat.com/errata/RHSA-2018:1997

https://access.redhat.com/errata/RHSA-2018:1967

https://access.redhat.com/errata/RHSA-2018:1965

https://access.redhat.com/errata/RHSA-2018:2060

https://access.redhat.com/errata/RHSA-2018:2164

https://access.redhat.com/errata/RHSA-2018:2162

https://access.redhat.com/errata/RHSA-2018:2161

https://access.redhat.com/errata/RHSA-2018:2172

https://access.redhat.com/errata/RHSA-2018:2171

https://access.redhat.com/errata/RHSA-2018:2216

https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html

https://access.redhat.com/errata/RHSA-2018:2228

https://access.redhat.com/errata/RHSA-2018:2250

https://access.redhat.com/errata/RHSA-2018:2246

https://access.redhat.com/errata/RHSA-2018:2258

https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html

https://access.redhat.com/errata/RHSA-2018:2289

https://access.redhat.com/errata/RHSA-2018:2328

https://access.redhat.com/errata/RHSA-2018:2309

https://access.redhat.com/errata/RHSA-2018:2364

https://access.redhat.com/errata/RHSA-2018:2363

https://access.redhat.com/errata/RHSA-2018:2396

https://access.redhat.com/errata/RHSA-2018:2394

https://access.redhat.com/errata/RHSA-2018:2387

https://www.debian.org/security/2018/dsa-4273

https://usn.ubuntu.com/3756-1/

https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf

https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004

https://usn.ubuntu.com/3777-3/

https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006

https://access.redhat.com/errata/RHSA-2018:3425

https://access.redhat.com/errata/RHSA-2018:3424

https://access.redhat.com/errata/RHSA-2018:3423

https://access.redhat.com/errata/RHSA-2018:3407

https://access.redhat.com/errata/RHSA-2018:3402

https://access.redhat.com/errata/RHSA-2018:3401

https://access.redhat.com/errata/RHSA-2018:3400

https://access.redhat.com/errata/RHSA-2018:3399

https://access.redhat.com/errata/RHSA-2018:3398

https://access.redhat.com/errata/RHSA-2018:3397

https://access.redhat.com/errata/RHSA-2018:3396

https://access.redhat.com/errata/RHSA-2018:2948

http://www.securitytracker.com/id/1042004

https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0

https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html

https://access.redhat.com/errata/RHSA-2019:0148

https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf

https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html

https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html

https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html

https://nvidia.custhelp.com/app/answers/detail/a_id/4787

https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html

https://access.redhat.com/errata/RHSA-2019:1046

http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html

http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html

https://seclists.org/bugtraq/2019/Jun/36

https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf

http://www.openwall.com/lists/oss-security/2020/06/10/1

http://www.openwall.com/lists/oss-security/2020/06/10/2

http://www.openwall.com/lists/oss-security/2020/06/10/5

https://www.oracle.com/security-alerts/cpujul2020.html

http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html

Details

Source: MITRE

Published: 2018-05-22

Updated: 2021-04-14

Type: CWE-203

Risk Information

CVSS v2.0

Base Score: 2.1

Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Impact Score: 2.9

Exploitability Score: 3.9

Severity: LOW

CVSS v3.0

Base Score: 5.5

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Impact Score: 3.6

Exploitability Score: 1.8

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3770d:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3775:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3775d:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3785:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3795:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:32nm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:45nm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:32nm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:45nm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:32nm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:45nm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_m:32nm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_m:45nm:*:*:*:*:*:*:*

cpe:2.3:h:intel:pentium:n4000:*:*:*:*:*:*:*

cpe:2.3:h:intel:pentium:n4100:*:*:*:*:*:*:*

cpe:2.3:h:intel:pentium:n4200:*:*:*:*:*:*:*

cpe:2.3:h:intel:pentium_j:j4205:*:*:*:*:*:*:*

cpe:2.3:h:intel:pentium_silver:j5005:*:*:*:*:*:*:*

cpe:2.3:h:intel:pentium_silver:n5000:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e-1105c:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:125c_:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1220_:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1275_:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1505m_v6:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1515m_v5:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1535m_v5:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1535m_v6:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1545m_v5:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1558l_v5:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1565l_v5:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1575m_v5:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1578l_v5:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1585_v5:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1585l_v5:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:3600:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:5600:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:7500:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:e5502:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:e5503:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:e5504:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:e5506:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:e5507:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:e5520:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:e5530:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:e5540:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:e6510:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:e6540:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:e6550:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:l3403:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:l3406:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:l3426:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:l5506:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:l5508_:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:l5518_:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:l5520:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:l5530:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:w5580:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:w5590:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:x3430:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:x3440:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:x3450:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:x3460:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:x3470:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:x3480:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:x5550:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:x5560:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:x5570:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1105c_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1125c_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_12201:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_12201_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1220_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1220_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1220l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1225:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1225_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1225_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1226_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1230:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1230_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1230_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1230l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1231_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1235:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1240:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1240_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1240_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1240l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1241_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1245:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1245_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1245_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1246_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1258l_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1260l:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1265l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1265l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1265l_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1268l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1270:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1270_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1270_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1271_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1275_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1275_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1275l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1276_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1278l_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1280:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1280_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1280_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1281_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1285_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1285_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1285l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1285l_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1286_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1286l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1290:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1290_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1501l_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1501m_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1505l_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1505l_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1505m_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2650l_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2658:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2658_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2658_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2658_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2658a_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2660:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2660_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2660_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2660_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2665:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2667:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2667_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2667_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2667_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2670:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2670_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2670_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2680:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2680_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2680_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2680_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2683_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2683_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2687w:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2687w_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2687w_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2687w_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2690:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2690_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2690_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2690_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2695_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2695_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2695_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2697_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2697_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2697_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2697a_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2698_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2698_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2699_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2699_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2699a_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2699r_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4603:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4603_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4607:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4607_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4610:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4610_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4610_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4610_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4617:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4620:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4620_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4620_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4620_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4624l_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4627_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4627_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4627_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4628l_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4640:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4640_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4640_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4640_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4648_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4650:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4650_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4650_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4650_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4650l:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4655_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4655_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4657l_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4660_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4660_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4667_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4667_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4669_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4669_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1428l:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1428l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1428l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1620:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1620_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1620_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1620_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1630_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1630_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1650:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1650_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1650_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1650_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1660:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1660_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1660_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1660_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1680_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1680_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2403:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2403_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2407:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2407_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2408l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2418l:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2418l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2418l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2420:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2420_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2428l:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2428l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2428l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2430:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2430_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2430l:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2430l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2438l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2440:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2440_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2448l:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2448l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2450:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2450_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2450l:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2450l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2470:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2470_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2603:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2603_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2603_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2603_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2608l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2608l_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2609:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2609_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2609_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2609_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2618l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2618l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2618l_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2620:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2620_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2620_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2620_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2623_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2623_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2628l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2628l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2628l_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2630:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2630_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2630_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2630_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2630l:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2630l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2630l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2630l_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2637:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2637_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2637_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2637_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2640:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2640_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2640_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2640_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2643:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2643_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2643_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2643_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2648l:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2648l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2648l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2648l_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2650:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2650_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2650_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2650_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2650l:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2650l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2650l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:2803:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:2820:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:2830:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:2850:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:2850_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:2860:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:2870:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:2870_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:2880_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:2890_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4807:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4809_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4809_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4809_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4820:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4820_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4820_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4820_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4830:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4830_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4830_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4830_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4850:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4850_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4850_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4850_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4860:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4860_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4870:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4870_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4880_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4890_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8830:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8837:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8850:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8850_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8857_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8860:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8860_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8860_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8867_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8867_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8867l:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8870:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8870_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8870_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8870_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8880_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8880_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8880_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8880l_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8880l_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8890_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8890_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8890_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8891_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8891_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8891_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8893_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8893_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8893_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8894_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:85115:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:85118:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:85119t:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:85120:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:85120t:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:85122:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86126:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86126f:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86126t:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86128:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86130:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86130f:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86130t:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86132:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86134:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86134m:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86136:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86138:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86138f:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86138t:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86140:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86140m:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86142:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86142f:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86142m:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86144:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86146:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86148:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86148f:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86150:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86152:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86154:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:h:arm:cortex-a:15:*:*:*:*:*:*:*

cpe:2.3:h:arm:cortex-a:57:*:*:*:*:*:*:*

cpe:2.3:h:arm:cortex-a:72:*:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:a:redhat:mrg_realtime:2.0:*:*:*:*:*:*:*

cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*

cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:*

cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:*

cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*

cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*

cpe:2.3:a:redhat:openstack:13.0:*:*:*:*:*:*:*

cpe:2.3:a:redhat:virtualization_manager:4.2:*:*:*:*:*:*:*

cpe:2.3:a:redhat:virtualization_manager:4.3:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

Configuration 4

OR

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 5

OR

cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:*:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*

Configuration 6

AND

OR

cpe:2.3:o:siemens:itc1500_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:itc1500:3:*:*:*:*:*:*:*

Configuration 7

AND

OR

cpe:2.3:o:siemens:itc1500_pro_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:itc1500_pro:3:*:*:*:*:*:*:*

Configuration 8

AND

OR

cpe:2.3:o:siemens:itc1900_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:itc1900:3:*:*:*:*:*:*:*

Configuration 9

AND

OR

cpe:2.3:o:siemens:itc1900_pro_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:itc1900_pro:3:*:*:*:*:*:*:*

Configuration 10

AND

OR

cpe:2.3:o:siemens:itc2200_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:itc2200:3:*:*:*:*:*:*:*

Configuration 11

AND

OR

cpe:2.3:o:siemens:itc2200_pro_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:itc2200_pro:3:*:*:*:*:*:*:*

Configuration 12

OR

cpe:2.3:a:oracle:local_service_management_system:*:*:*:*:*:*:*:* versions from 13.0 to 13.3 (inclusive)

cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*

Configuration 13

AND

OR

cpe:2.3:o:siemens:ruggedcom_ape_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:ruggedcom_ape:-:*:*:*:*:*:*:*

Configuration 14

AND

OR

cpe:2.3:o:siemens:simatic_et_200_sp_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_et_200_sp:-:*:*:*:*:*:*:*

Configuration 15

AND

OR

cpe:2.3:o:siemens:simatic_field_pg_m4_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_field_pg_m4:-:*:*:*:*:*:*:*

Configuration 16

AND

OR

cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*

Configuration 17

AND

OR

cpe:2.3:o:siemens:simatic_ipc3000_smart_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_ipc3000_smart:2:*:*:*:*:*:*:*

Configuration 18

AND

OR

cpe:2.3:o:siemens:simatic_ipc347e_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_ipc347e:-:*:*:*:*:*:*:*

Configuration 19

AND

OR

cpe:2.3:o:siemens:simatic_ipc427c_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_ipc427c:-:*:*:*:*:*:*:*

Configuration 20

AND

OR

cpe:2.3:o:siemens:simatic_ipc427d_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_ipc427d:-:*:*:*:*:*:*:*

Configuration 21

AND

OR

cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*

Configuration 22

AND

OR

cpe:2.3:o:siemens:simatic_ipc477c_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_ipc477c:-:*:*:*:*:*:*:*

Configuration 23

AND

OR

cpe:2.3:o:siemens:simatic_ipc477d_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_ipc477d:-:*:*:*:*:*:*:*

Configuration 24

AND

OR

cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*

Configuration 25

AND

OR

cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*

Configuration 26

AND

OR

cpe:2.3:o:siemens:simatic_ipc547e_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_ipc547e:-:*:*:*:*:*:*:*

Configuration 27

AND

OR

cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*

Configuration 28

AND

OR

cpe:2.3:o:siemens:simatic_ipc627c_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_ipc627c:-:*:*:*:*:*:*:*

Configuration 29

AND

OR

cpe:2.3:o:siemens:simatic_ipc627d_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_ipc627d:-:*:*:*:*:*:*:*

Configuration 30

AND

OR

cpe:2.3:o:siemens:simatic_ipc647c_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_ipc647c:-:*:*:*:*:*:*:*

Configuration 31

AND

OR

cpe:2.3:o:siemens:simatic_ipc647d_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_ipc647d:-:*:*:*:*:*:*:*

Configuration 32

AND

OR

cpe:2.3:o:siemens:simatic_ipc677d_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_ipc677d:-:*:*:*:*:*:*:*

Configuration 33

AND

OR

cpe:2.3:o:siemens:simatic_ipc677c_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_ipc677c:-:*:*:*:*:*:*:*

Configuration 34

AND

OR

cpe:2.3:o:siemens:simatic_ipc827c_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_ipc827c:-:*:*:*:*:*:*:*

Configuration 35

AND

OR

cpe:2.3:o:siemens:simatic_ipc827d_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_ipc827d:-:*:*:*:*:*:*:*

Configuration 36

AND

OR

cpe:2.3:o:siemens:simatic_ipc847c_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_ipc847c:-:*:*:*:*:*:*:*

Configuration 37

AND

OR

cpe:2.3:o:siemens:simatic_ipc847d_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_ipc847d:-:*:*:*:*:*:*:*

Configuration 38

AND

OR

cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*

Configuration 39

AND

OR

cpe:2.3:o:siemens:simatic_s7-1500_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_s7-1500:-:*:*:*:*:*:*:*

Configuration 40

AND

OR

cpe:2.3:o:siemens:simotion_p320-4e_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simotion_p320-4e:-:*:*:*:*:*:*:*

Configuration 41

AND

OR

cpe:2.3:o:siemens:sinumerik_840_d_sl_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:sinumerik_840_d_sl:-:*:*:*:*:*:*:*

Configuration 42

AND

OR

cpe:2.3:o:siemens:sinumerik_pcu_50.5_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:sinumerik_pcu_50.5:-:*:*:*:*:*:*:*

Configuration 43

AND

OR

cpe:2.3:o:siemens:sinumerik_tcu_30.3_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:sinumerik_tcu_30.3:-:*:*:*:*:*:*:*

Configuration 44

AND

OR

cpe:2.3:o:siemens:sinema_remote_connect_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:sinema_remote_connect:-:*:*:*:*:*:*:*

Configuration 45

OR

cpe:2.3:a:mitel:micollab:-:*:*:*:*:*:*:*

cpe:2.3:a:mitel:open_integration_gateway:-:*:*:*:*:*:*:*

cpe:2.3:a:mitel:mivoice_border_gateway:-:*:*:*:*:*:*:*

cpe:2.3:a:mitel:mivoice_business:-:*:*:*:*:*:*:*

cpe:2.3:a:mitel:mivoice_connect:-:*:*:*:*:*:*:*

cpe:2.3:a:mitel:mivoic_mx-one:-:*:*:*:*:*:*:*

cpe:2.3:a:mitel:mivoice_5000:-:*:*:*:*:*:*:*

cpe:2.3:a:mitel:micloud_management_portal:*:*:*:*:*:*:*:*

Configuration 46

OR

cpe:2.3:a:sonicwall:sonicosv:-:*:*:*:*:*:*:*

cpe:2.3:a:sonicwall:web_application_firewall:-:*:*:*:*:*:*:*

cpe:2.3:a:sonicwall:cloud_global_management_system:-:*:*:*:*:*:*:*

cpe:2.3:a:sonicwall:email_security:-:*:*:*:*:*:*:*

cpe:2.3:a:sonicwall:secure_mobile_access:-:*:*:*:*:*:*:*

cpe:2.3:a:sonicwall:global_management_system:-:*:*:*:*:*:*:*

Configuration 47

OR

cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*

Configuration 48

AND

OR

cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*

OR

cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

Configuration 49

OR

cpe:2.3:a:nvidia:jetson_tx1:*:*:*:*:*:*:*:*

cpe:2.3:a:nvidia:jetson_tx2:*:*:*:*:*:*:*:*

Configuration 50

OR

cpe:2.3:h:microsoft:surface:-:*:*:*:*:*:*:*

cpe:2.3:h:microsoft:surface_book:-:*:*:*:*:*:*:*

cpe:2.3:h:microsoft:surface_book:2:*:*:*:*:*:*:*

cpe:2.3:h:microsoft:surface_pro:3:*:*:*:*:*:*:*

cpe:2.3:h:microsoft:surface_pro:4:*:*:*:*:*:*:*

cpe:2.3:h:microsoft:surface_pro:1796:*:*:*:*:*:*:*

cpe:2.3:h:microsoft:surface_pro_with_lte_advanced:1807:*:*:*:*:*:*:*

cpe:2.3:h:microsoft:surface_studio:-:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*

cpe:2.3:o:microsoft:windows_server_2008:sp2:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*

Tenable Plugins

View all (314 total)

IDNameProductFamilySeverity
140385SUSE SLES12 Security Update : kernel (SUSE-SU-2020:2540-1) (Spectre)NessusSuSE Local Security Checks
high
140365openSUSE Security Update : the Linux Kernel (openSUSE-2020-1325) (Spectre)NessusSuSE Local Security Checks
high
140019OracleVM 3.4 : xen (OVMSA-2020-0039) (Bunker Buster) (Foreshadow) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout) (Meltdown) (POODLE) (Spectre)NessusOracleVM Local Security Checks
critical
134877VMware ESXi 5.5 / 6.0 / 6.5 / 6.7 Information Disclosure (VMSA-2018-0012) (Spectre) (remote check)NessusMisc.
low
132253RancherOS < 1.4.1 Multiple Information Disclosure VulnerabilitiesNessusMisc.
medium
132101Windows Speculative Execution Configuration CheckNessusWindows
medium
131621EulerOS 2.0 SP2 : libvirt (EulerOS-SA-2019-2468)NessusHuawei Local Security Checks
medium
500248Intel Atom Exposure of Sensitive Information to an Unauthorized ActorNessusSCADA
medium
130234Amazon Linux 2 : java-11-openjdk (ALAS-2019-1338) (Spectre)NessusAmazon Linux Local Security Checks
low
127758SUSE SLED12 / SLES12 Security Update : java-1_7_0-openjdk (SUSE-SU-2019:2028-1) (Spectre)NessusSuSE Local Security Checks
medium
127408NewStart CGSL MAIN 4.05 : kernel Multiple Vulnerabilities (NS-SA-2019-0143)NessusNewStart CGSL Local Security Checks
critical
127397NewStart CGSL MAIN 4.05 : java-1.8.0-openjdk Multiple Vulnerabilities (NS-SA-2019-0137)NessusNewStart CGSL Local Security Checks
medium
127389NewStart CGSL MAIN 4.05 : qemu-kvm Multiple Vulnerabilities (NS-SA-2019-0133)NessusNewStart CGSL Local Security Checks
low
127387NewStart CGSL MAIN 4.05 : libvirt Multiple Vulnerabilities (NS-SA-2019-0132)NessusNewStart CGSL Local Security Checks
low
127385NewStart CGSL MAIN 4.05 : java-1.7.0-openjdk Multiple Vulnerabilities (NS-SA-2019-0131)NessusNewStart CGSL Local Security Checks
medium
127233NewStart CGSL CORE 5.04 / MAIN 5.04 : kernel-rt Multiple Vulnerabilities (NS-SA-2019-0049)NessusNewStart CGSL Local Security Checks
high
127222NewStart CGSL CORE 5.04 / MAIN 5.04 : kernel Multiple Vulnerabilities (NS-SA-2019-0044)NessusNewStart CGSL Local Security Checks
high
127199NewStart CGSL CORE 5.04 / MAIN 5.04 : java-1.7.0-openjdk Multiple Vulnerabilities (NS-SA-2019-0032)NessusNewStart CGSL Local Security Checks
medium
127190NewStart CGSL CORE 5.04 / MAIN 5.04 : java-1.8.0-openjdk Multiple Vulnerabilities (NS-SA-2019-0027)NessusNewStart CGSL Local Security Checks
medium
126440SUSE SLED15 / SLES15 Security Update : java-1_8_0-openjdk (SUSE-SU-2019:1211-2) (Spectre)NessusSuSE Local Security Checks
medium
125451openSUSE Security Update : java-1_8_0-openjdk (openSUSE-2019-1439) (Spectre)NessusSuSE Local Security Checks
medium
125450openSUSE Security Update : java-1_8_0-openjdk (openSUSE-2019-1438) (Spectre)NessusSuSE Local Security Checks
medium
125023SUSE SLED12 / SLES12 Security Update : java-1_8_0-openjdk (SUSE-SU-2019:1219-1) (Spectre)NessusSuSE Local Security Checks
medium
124991EulerOS Virtualization for ARM 64 3.0.1.0 : kernel (EulerOS-SA-2019-1538)NessusHuawei Local Security Checks
high
124953EulerOS Virtualization 3.0.1.0 : kvm (EulerOS-SA-2019-1450)NessusHuawei Local Security Checks
medium
124857SUSE SLED15 / SLES15 Security Update : java-1_8_0-openjdk (SUSE-SU-2019:1211-1) (Spectre)NessusSuSE Local Security Checks
medium
124839RHEL 7 : Virtualization Manager (RHSA-2019:1046) (Spectre)NessusRed Hat Local Security Checks
low
124836EulerOS Virtualization 3.0.1.0 : kernel (EulerOS-SA-2019-1515)NessusHuawei Local Security Checks
critical
700518macOS < 10.14 Multiple VulnerabilitiesNessus Network MonitorOperating System Detection
critical
123443openSUSE Security Update : ucode-intel (openSUSE-2019-622) (Foreshadow) (Spectre)NessusSuSE Local Security Checks
medium
123420Debian DLA-1731-2 : linux regression update (Spectre)NessusDebian Local Security Checks
high
123271openSUSE Security Update : qemu (openSUSE-2019-620) (Spectre)NessusSuSE Local Security Checks
high
123215openSUSE Security Update : ucode-intel (openSUSE-2019-510) (Spectre)NessusSuSE Local Security Checks
medium
123186openSUSE Security Update : qemu (openSUSE-2019-426) (Spectre)NessusSuSE Local Security Checks
medium
123185openSUSE Security Update : libvirt (openSUSE-2019-424) (Spectre)NessusSuSE Local Security Checks
medium
123180openSUSE Security Update : xen (openSUSE-2019-418) (Meltdown) (Spectre)NessusSuSE Local Security Checks
medium
123175openSUSE Security Update : the Linux Kernel (openSUSE-2019-398) (Spectre)NessusSuSE Local Security Checks
medium
122975Security Updates for Windows 10 / Windows Server 2016 / Windows Server 2019 (March 2019) (Spectre) (Meltdown) (Foreshadow)NessusWindows : Microsoft Bulletins
medium
122974Security Updates for Windows 10 / Windows Server 2019 (February 2019) (Spectre) (Meltdown) (Foreshadow)NessusWindows : Microsoft Bulletins
medium
122879Debian DLA-1715-1 : linux-4.9 security update (Spectre)NessusDebian Local Security Checks
high
122087OracleVM 3.4 : Unbreakable / etc (OVMSA-2019-0007) (Spectre)NessusOracleVM Local Security Checks
medium
121947Photon OS 2.0: Linux PHSA-2018-2.0-0049NessusPhotonOS Local Security Checks
medium
121851Photon OS 1.0: Linux PHSA-2018-1.0-0151NessusPhotonOS Local Security Checks
low
121344SUSE SLES12 Security Update : kernel (SUSE-SU-2019:0148-1) (Spectre)NessusSuSE Local Security Checks
high
121223Oracle Solaris Critical Patch Update : jan2019_SRU11_4_3_5_0 (Foreshadow) (Spectre)NessusSolaris Local Security Checks
medium
121151openSUSE Security Update : java-1_7_0-openjdk (openSUSE-2019-42) (Spectre)NessusSuSE Local Security Checks
medium
121067Juniper Junos Space < 18.3R1 Multiple Vulnerabilities (JSA10917)NessusJunos Local Security Checks
high
121059SUSE SLED12 / SLES12 Security Update : java-1_7_0-openjdk (SUSE-SU-2019:0049-1) (Spectre)NessusSuSE Local Security Checks
medium
121017KB4480960: Windows 7 and Windows Server 2008 R2 January 2019 Security UpdateNessusWindows : Microsoft Bulletins
high
121014KB4480964: Windows 8.1 and Windows Server 2012 R2 January 2019 Security UpdateNessusWindows : Microsoft Bulletins
high
120842Fedora 28 : kernel (2018-db0d3e157e) (Spectre)NessusFedora Local Security Checks
medium
120435Fedora 28 : xen (2018-5521156807) (Spectre)NessusFedora Local Security Checks
medium
120426Fedora 28 : libvirt (2018-527698a904) (Spectre)NessusFedora Local Security Checks
medium
120385Fedora 28 : 2:qemu (2018-44f8a7454d) (Spectre)NessusFedora Local Security Checks
medium
120081SUSE SLED15 / SLES15 Security Update : qemu (SUSE-SU-2018:2340-1) (Spectre)NessusSuSE Local Security Checks
high
120080SUSE SLED15 / SLES15 Security Update : Security update to ucode-intel (SUSE-SU-2018:2338-1) (Foreshadow) (Spectre)NessusSuSE Local Security Checks
medium
120067SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2018:2092-1) (Spectre)NessusSuSE Local Security Checks
high
120040SUSE SLED15 / SLES15 Security Update : ucode-intel (SUSE-SU-2018:1926-1) (Spectre)NessusSuSE Local Security Checks
medium
119277OracleVM 3.4 : xen (OVMSA-2018-0282) (Foreshadow) (Spectre)NessusOracleVM Local Security Checks
medium
118963OracleVM 3.2 : xen (OVMSA-2018-0272) (Foreshadow) (Spectre)NessusOracleVM Local Security Checks
high
118962OracleVM 3.3 : xen (OVMSA-2018-0271) (Foreshadow) (Spectre)NessusOracleVM Local Security Checks
high
118870openSUSE Security Update : qemu (openSUSE-2018-1364) (Spectre)NessusSuSE Local Security Checks
high
118575macOS 10.13.6 Multiple Vulnerabilities (Security Update 2018-002)NessusMacOS X Local Security Checks
critical
118560RHEL 6 : qemu-kvm (RHSA-2018:3425) (Spectre)NessusRed Hat Local Security Checks
low
118559RHEL 6 : qemu-kvm (RHSA-2018:3424) (Spectre)NessusRed Hat Local Security Checks
low
118558RHEL 7 : qemu-kvm (RHSA-2018:3423) (Spectre)NessusRed Hat Local Security Checks
low
118554RHEL 7 : libvirt (RHSA-2018:3407) (Spectre)NessusRed Hat Local Security Checks
low
118551RHEL 6 : libvirt (RHSA-2018:3402) (Spectre)NessusRed Hat Local Security Checks
low
118550RHEL 6 : qemu-kvm (RHSA-2018:3401) (Spectre)NessusRed Hat Local Security Checks
low
118549RHEL 6 : libvirt (RHSA-2018:3400) (Spectre)NessusRed Hat Local Security Checks
low
118548RHEL 6 : libvirt (RHSA-2018:3399) (Spectre)NessusRed Hat Local Security Checks
low
118547RHEL 7 : libvirt (RHSA-2018:3398) (Spectre)NessusRed Hat Local Security Checks
low
118546RHEL 6 : qemu-kvm (RHSA-2018:3397) (Spectre)NessusRed Hat Local Security Checks
low
118545RHEL 6 : libvirt (RHSA-2018:3396) (Spectre)NessusRed Hat Local Security Checks
low
118513RHEL 7 : kernel-alt (RHSA-2018:2948) (Spectre)NessusRed Hat Local Security Checks
high
118502SUSE SLED12 / SLES12 Security Update : qemu (SUSE-SU-2018:3555-1) (Spectre)NessusSuSE Local Security Checks
high
118322Ubuntu 16.04 LTS / 18.04 LTS : Linux kernel (Azure) vulnerabilities (USN-3777-3) (Spectre)NessusUbuntu Local Security Checks
high
118300SUSE SLES12 Security Update : java-1_8_0-openjdk (SUSE-SU-2018:3064-2) (Spectre)NessusSuSE Local Security Checks
medium
118297SUSE SLES12 Security Update : qemu (SUSE-SU-2018:2973-2) (Spectre)NessusSuSE Local Security Checks
high
118281SUSE SLES12 Security Update : Security update to ucode-intel (SUSE-SU-2018:2331-2) (Foreshadow) (Spectre)NessusSuSE Local Security Checks
medium
118274SUSE SLES12 Security Update : Recommended update for ucode-intel (SUSE-SU-2018:1935-2) (Spectre)NessusSuSE Local Security Checks
medium
118266SUSE SLES12 Security Update : xen (SUSE-SU-2018:1699-2) (Meltdown) (Spectre)NessusSuSE Local Security Checks
medium
118261SUSE SLES12 Security Update : libvirt (SUSE-SU-2018:1614-2) (Spectre)NessusSuSE Local Security Checks
low
118256SUSE SLES12 Security Update : kernel (SUSE-SU-2018:1377-2) (Spectre)NessusSuSE Local Security Checks
low
118255SUSE SLES12 Security Update : qemu (SUSE-SU-2018:1362-2) (Spectre)NessusSuSE Local Security Checks
low
118178macOS < 10.14 Multiple VulnerabilitiesNessusMacOS X Local Security Checks
critical
118109openSUSE Security Update : java-1_8_0-openjdk (openSUSE-2018-1143) (Spectre)NessusSuSE Local Security Checks
medium
117992SUSE SLED12 / SLES12 Security Update : java-1_8_0-openjdk (SUSE-SU-2018:3064-1) (Spectre)NessusSuSE Local Security Checks
medium
117900SUSE SLES12 Security Update : qemu (SUSE-SU-2018:2973-1) (Spectre)NessusSuSE Local Security Checks
high
117580EulerOS Virtualization 2.5.0 : kvm (EulerOS-SA-2018-1271)NessusHuawei Local Security Checks
low
117579EulerOS Virtualization 2.5.0 : kernel (EulerOS-SA-2018-1270)NessusHuawei Local Security Checks
high
117576EulerOS Virtualization 2.5.1 : kernel (EulerOS-SA-2018-1267)NessusHuawei Local Security Checks
low
117574EulerOS Virtualization 2.5.1 : kvm (EulerOS-SA-2018-1265)NessusHuawei Local Security Checks
medium
117502Debian DLA-1506-1 : intel-microcode security update (Foreshadow) (Spectre)NessusDebian Local Security Checks
medium
117386SUSE SLES11 Security Update : kvm (SUSE-SU-2018:2650-1) (Spectre)NessusSuSE Local Security Checks
high
112287SUSE SLES11 Security Update : kvm (SUSE-SU-2018:2615-1) (Spectre)NessusSuSE Local Security Checks
high
112204SUSE SLES12 Security Update : qemu (SUSE-SU-2018:2565-1) (Spectre)NessusSuSE Local Security Checks
high
112201SUSE SLES12 Security Update : qemu (SUSE-SU-2018:2556-1) (Spectre)NessusSuSE Local Security Checks
high
112151Ubuntu 14.04 LTS / 16.04 LTS / 18.04 LTS : Intel Microcode vulnerabilities (USN-3756-1) (Foreshadow) (Spectre)NessusUbuntu Local Security Checks
medium
112147SUSE SLES11 Security Update : xen (SUSE-SU-2018:2528-1) (Foreshadow) (Meltdown) (Spectre)NessusSuSE Local Security Checks
high
112116Security Updates for Windows 10 / Windows Server 2016 (August 2018) (Spectre) (Meltdown) (Foreshadow)NessusWindows : Microsoft Bulletins
medium
112031openSUSE Security Update : ucode-intel (openSUSE-2018-887) (Foreshadow) (Spectre)NessusSuSE Local Security Checks
medium
112003openSUSE Security Update : qemu (openSUSE-2018-894) (Spectre)NessusSuSE Local Security Checks
high
111992OracleVM 3.4 : xen (OVMSA-2018-0248) (Bunker Buster) (Foreshadow) (Meltdown) (POODLE) (Spectre)NessusOracleVM Local Security Checks
critical
111796Debian DSA-4273-1 : intel-microcode - security update (Spectre)NessusDebian Local Security Checks
medium
111783SUSE SLES11 Security Update : Security update to ucode-intel (SUSE-SU-2018:2335-1) (Foreshadow) (Spectre)NessusSuSE Local Security Checks
medium
111781SUSE SLED12 / SLES12 Security Update : Security update to ucode-intel (SUSE-SU-2018:2331-1) (Foreshadow) (Spectre)NessusSuSE Local Security Checks
medium
111775RHEL 6 : MRG (RHSA-2018:2396) (Foreshadow) (Spectre)NessusRed Hat Local Security Checks
medium
111735RHEL 6 : kernel (RHSA-2018:2394) (Foreshadow) (Spectre)NessusRed Hat Local Security Checks
high
111728RHEL 7 : kernel (RHSA-2018:2387) (Foreshadow) (Spectre)NessusRed Hat Local Security Checks
medium
111664SUSE SLED12 / SLES12 Security Update : libvirt (SUSE-SU-2018:2304-1) (Spectre)NessusSuSE Local Security Checks
low
111661openSUSE Security Update : libvirt (openSUSE-2018-860) (Spectre)NessusSuSE Local Security Checks
medium
111516RHEL 7 : Virtualization Manager (RHSA-2018:2328) (Spectre)NessusRed Hat Local Security Checks
low
111503SUSE SLES12 Security Update : libvirt (SUSE-SU-2018:2141-1) (Spectre)NessusSuSE Local Security Checks
medium
111493RHEL 6 : kernel (RHSA-2018:2309) (Spectre)NessusRed Hat Local Security Checks
low
111434SUSE SLES12 Security Update : libvirt (SUSE-SU-2018:2082-1) (Spectre)NessusSuSE Local Security Checks
medium
111413Slackware 14.2 : Slackware 14.2 kernel (SSA:2018-208-01) (Spectre)NessusSlackware Local Security Checks
low
111373SUSE SLES11 Security Update : microcode_ctl (SUSE-SU-2018:2076-1) (Spectre)NessusSuSE Local Security Checks
medium
111359Debian DLA-1446-1 : intel-microcode security update (Spectre)NessusDebian Local Security Checks
medium
111342RHEL 6 / 7 : Virtualization (RHSA-2018:2246) (Spectre)NessusRed Hat Local Security Checks
low
111336Amazon Linux 2 : libvirt (ALAS-2018-1049) (Spectre)NessusAmazon Linux Local Security Checks
medium
111321RHEL 6 : kernel (RHSA-2018:2250) (Spectre)NessusRed Hat Local Security Checks
low
111304Photon OS 2.0 : linux-esx / linux / patch / linux-aws / linux-secure (PhotonOS-PHSA-2018-2.0-0049) (deprecated)NessusPhotonOS Local Security Checks
medium
111277Photon OS 1.0 : linux / linux-esx (PhotonOS-PHSA-2018-1.0-0151) (Spectre) (deprecated)NessusPhotonOS Local Security Checks
medium
111165Debian DLA-1423-1 : linux-4.9 new package (Spectre)NessusDebian Local Security Checks
high
111151Virtuozzo 6 : parallels-server-bm-release / vzkernel / etc (VZA-2018-048)NessusVirtuozzo Local Security Checks
medium
111148RHEL 7 : kernel (RHSA-2018:2216) (Spectre)NessusRed Hat Local Security Checks
low
111077CentOS 6 : kernel (CESA-2018:2164) (Spectre)NessusCentOS Local Security Checks
high
111076CentOS 6 : qemu-kvm (CESA-2018:2162) (Spectre)NessusCentOS Local Security Checks
low
111051SUSE SLED12 / SLES12 Security Update : Recommended update for ucode-intel (SUSE-SU-2018:1935-1) (Spectre)NessusSuSE Local Security Checks
medium
111023OracleVM 3.4 : qemu-kvm (OVMSA-2018-0238) (Spectre)NessusOracleVM Local Security Checks
high
111003Scientific Linux Security Update : qemu-kvm on SL6.x i386/x86_64 (20180710) (Spectre)NessusScientific Linux Local Security Checks
low
111002Scientific Linux Security Update : kernel on SL6.x i386/x86_64 (20180710) (Spectre)NessusScientific Linux Local Security Checks
high
111001RHEL 6 : kernel (RHSA-2018:2164) (Spectre)NessusRed Hat Local Security Checks
high
111000RHEL 6 : qemu-kvm (RHSA-2018:2162) (Spectre)NessusRed Hat Local Security Checks
low
110999RHEL 7 : kernel (RHSA-2018:2161) (Spectre)NessusRed Hat Local Security Checks
low
110996Oracle Linux 6 : kernel (ELSA-2018-2164) (Spectre)NessusOracle Linux Local Security Checks
high
110995Oracle Linux 6 : qemu-kvm (ELSA-2018-2162) (Spectre)NessusOracle Linux Local Security Checks
low
110958openSUSE Security Update : ucode-intel (openSUSE-2018-700) (Spectre)NessusSuSE Local Security Checks
medium
110951Fedora 27 : 2:qemu (2018-9f02e5ed7b) (Spectre)NessusFedora Local Security Checks
medium
110908CentOS 7 : qemu-kvm (CESA-2018:2001) (Spectre)NessusCentOS Local Security Checks
low
110907CentOS 7 : libvirt (CESA-2018:1997) (Spectre)NessusCentOS Local Security Checks
low
110905CentOS 7 : kernel (CESA-2018:1965) (Spectre)NessusCentOS Local Security Checks
medium
110901VMSA-2018-0012 : VMware vSphere, Workstation and Fusion updates enable Hypervisor-Assisted Guest Mitigations for Speculative Store Bypass issue (Spectre)NessusVMware ESX Local Security Checks
medium
110887Scientific Linux Security Update : kernel on SL6.x i386/x86_64 (20180619) (Spectre)NessusScientific Linux Local Security Checks
high
110865EulerOS 2.0 SP3 : qemu-kvm (EulerOS-SA-2018-1201)NessusHuawei Local Security Checks
high
110864EulerOS 2.0 SP2 : qemu-kvm (EulerOS-SA-2018-1200)NessusHuawei Local Security Checks
low
110861EulerOS 2.0 SP3 : libvirt (EulerOS-SA-2018-1197)NessusHuawei Local Security Checks
medium
110860EulerOS 2.0 SP3 : kernel (EulerOS-SA-2018-1196)NessusHuawei Local Security Checks
high
110859EulerOS 2.0 SP3 : java-1.8.0-openjdk (EulerOS-SA-2018-1195)NessusHuawei Local Security Checks
medium
110858EulerOS 2.0 SP2 : java-1.8.0-openjdk (EulerOS-SA-2018-1194)NessusHuawei Local Security Checks
low
110857EulerOS 2.0 SP3 : java-1.7.0-openjdk (EulerOS-SA-2018-1193)NessusHuawei Local Security Checks
medium
110856EulerOS 2.0 SP2 : java-1.7.0-openjdk (EulerOS-SA-2018-1192)NessusHuawei Local Security Checks
low
110795RHEL 7 : qemu-kvm-rhev (RHSA-2018:2060) (Spectre)NessusRed Hat Local Security Checks
low
110792OracleVM 3.4 : xen (OVMSA-2018-0233) (Spectre)NessusOracleVM Local Security Checks
medium
110791OracleVM 3.4 : xen (OVMSA-2018-0232) (Spectre)NessusOracleVM Local Security Checks
medium
110752Oracle Linux 7 : qemu-kvm (ELSA-2018-2001) (Spectre)NessusOracle Linux Local Security Checks
low
110751Oracle Linux 7 : libvirt (ELSA-2018-1997) (Spectre)NessusOracle Linux Local Security Checks
low
110749Oracle Linux 7 : kernel (ELSA-2018-1965) (Spectre)NessusOracle Linux Local Security Checks
medium
110720Scientific Linux Security Update : qemu-kvm on SL7.x x86_64 (20180626) (Spectre)NessusScientific Linux Local Security Checks
low
110718Scientific Linux Security Update : libvirt on SL7.x x86_64 (20180626) (Spectre)NessusScientific Linux Local Security Checks
low
110717Scientific Linux Security Update : kernel on SL7.x x86_64 (20180626) (Spectre)NessusScientific Linux Local Security Checks
medium
110714RHEL 7 : libvirt (RHSA-2018:2006) (Spectre)NessusRed Hat Local Security Checks
low
110713RHEL 7 : kernel-rt (RHSA-2018:2003) (Spectre)NessusRed Hat Local Security Checks
medium
110712RHEL 7 : qemu-kvm (RHSA-2018:2001) (Spectre)NessusRed Hat Local Security Checks
low
110711RHEL 7 : libvirt (RHSA-2018:1997) (Spectre)NessusRed Hat Local Security Checks
low
110709RHEL 7 : kernel-alt (RHSA-2018:1967) (Spectre)NessusRed Hat Local Security Checks
low
110708RHEL 7 : kernel (RHSA-2018:1965) (Spectre)NessusRed Hat Local Security Checks
medium
110701Oracle Linux 6 : kernel (ELSA-2018-1854) (Spectre)NessusOracle Linux Local Security Checks
high
110658openSUSE Security Update : the Linux Kernel (openSUSE-2018-656) (Spectre)NessusSuSE Local Security Checks
high
110645CentOS 6 : kernel (CESA-2018:1854) (Spectre)NessusCentOS Local Security Checks
critical
110617EulerOS 2.0 SP2 : kernel (EulerOS-SA-2018-1153)NessusHuawei Local Security Checks
low
110600RHEL 6 : kernel (RHSA-2018:1854) (Spectre)NessusRed Hat Local Security Checks
high
110596SUSE SLES12 Security Update : xen (SUSE-SU-2018:1699-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
medium
110526OracleVM 3.4 : Unbreakable / etc (OVMSA-2018-0228) (Spectre)NessusOracleVM Local Security Checks
high
110515Ubuntu 14.04 LTS / 16.04 LTS / 17.10 / 18.04 LTS : libvirt vulnerability and update (USN-3680-1) (Spectre)NessusUbuntu Local Security Checks
medium
110514Ubuntu 14.04 LTS / 16.04 LTS / 17.10 / 18.04 LTS : QEMU update (USN-3679-1) (Spectre)NessusUbuntu Local Security Checks
low
110509SUSE SLES12 Security Update : xen (SUSE-SU-2018:1658-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
medium
110506RHEL 6 : kernel (RHSA-2018:1826) (Spectre)NessusRed Hat Local Security Checks
low
110462Amazon Linux AMI : java-1.8.0-openjdk (ALAS-2018-1039) (Spectre)NessusAmazon Linux Local Security Checks
low
110461Amazon Linux AMI : kernel (ALAS-2018-1038) (Spectre)NessusAmazon Linux Local Security Checks
medium
110460Amazon Linux AMI : java-1.7.0-openjdk (ALAS-2018-1037) (Spectre)NessusAmazon Linux Local Security Checks
low
110457Amazon Linux AMI : qemu-kvm (ALAS-2018-1034) (Spectre)NessusAmazon Linux Local Security Checks
high
110456Amazon Linux 2 : java-1.8.0-openjdk (ALAS-2018-1039) (Spectre)NessusAmazon Linux Local Security Checks
low
110455Amazon Linux 2 : kernel (ALAS-2018-1038) (Spectre)NessusAmazon Linux Local Security Checks
medium
110454Amazon Linux 2 : java-1.7.0-openjdk (ALAS-2018-1037) (Spectre)NessusAmazon Linux Local Security Checks
low
110451Amazon Linux 2 : qemu-kvm (ALAS-2018-1034) (Spectre)NessusAmazon Linux Local Security Checks
high
110450Amazon Linux 2 : libvirt (ALAS-2018-1033) (Spectre)NessusAmazon Linux Local Security Checks
low
110445SUSE SLES12 Security Update : libvirt (SUSE-SU-2018:1614-1) (Spectre)NessusSuSE Local Security Checks
low
110444SUSE SLES11 Security Update : xen (SUSE-SU-2018:1603-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
medium
110442openSUSE Security Update : qemu (openSUSE-2018-603) (Spectre)NessusSuSE Local Security Checks
medium
110441openSUSE Security Update : libvirt (openSUSE-2018-602) (Spectre)NessusSuSE Local Security Checks
medium
110438openSUSE Security Update : xen (openSUSE-2018-599) (Meltdown) (Spectre)NessusSuSE Local Security Checks
medium
110412SUSE SLES12 Security Update : xen (SUSE-SU-2018:1582-1) (Spectre)NessusSuSE Local Security Checks
low
110404Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2018-4126) (Spectre)NessusOracle Linux Local Security Checks
medium
110402Fedora 27 : xen (2018-aec846c0ef) (Spectre)NessusFedora Local Security Checks
medium
110309openSUSE Security Update : xen (openSUSE-2018-547) (Spectre)NessusSuSE Local Security Checks
high
110265Citrix XenServer Local Memory Disclosure Vulnerability (CTX235225)NessusMisc.
medium
110261SUSE SLES11 Security Update : kvm (SUSE-SU-2018:1479-1) (Spectre)NessusSuSE Local Security Checks
medium
110259SUSE SLES11 Security Update : libvirt (SUSE-SU-2018:1475-1) (Spectre)NessusSuSE Local Security Checks
medium
110234Virtuozzo 7 : anaconda / anaconda-core / anaconda-dracut / etc (VZA-2018-037)NessusVirtuozzo Local Security Checks
high
110222SUSE SLED12 / SLES12 Security Update : xen (SUSE-SU-2018:1456-1) (Spectre)NessusSuSE Local Security Checks
high
110221RHEL 7 : kernel (RHSA-2018:1738) (Spectre)NessusRed Hat Local Security Checks
low
110220RHEL 7 : kernel (RHSA-2018:1737) (Spectre)NessusRed Hat Local Security Checks
critical
110219RHEL 6 : kernel (RHSA-2018:1641) (Spectre)NessusRed Hat Local Security Checks
low
110218RHEL 6 : kernel (RHSA-2018:1640) (Spectre)NessusRed Hat Local Security Checks
low
110217RHEL 6 : kernel (RHSA-2018:1639) (Spectre)NessusRed Hat Local Security Checks
low
110216RHEL 6 : kernel (RHSA-2018:1638) (Spectre)NessusRed Hat Local Security Checks
low
110215RHEL 7 : kernel (RHSA-2018:1637) (Spectre)NessusRed Hat Local Security Checks
low
110209Fedora 26 : kernel (2018-6367a17aa3) (Spectre)NessusFedora Local Security Checks
medium
110203CentOS 6 : libvirt (CESA-2018:1669) (Spectre)NessusCentOS Local Security Checks
low
110189SUSE SLES11 Security Update : libvirt (SUSE-SU-2018:1452-1) (Spectre)NessusSuSE Local Security Checks
medium
110170Fedora 27 : kernel (2018-93c2e74446) (Spectre)NessusFedora Local Security Checks
medium
110157Virtuozzo 6 : cpupools / cpupools-features / etc (VZA-2018-034)NessusVirtuozzo Local Security Checks
medium
110113RHEL 6 / 7 : Virtualization (RHSA-2018:1711) (Spectre)NessusRed Hat Local Security Checks
high
110112RHEL 7 : Virtualization (RHSA-2018:1710) (Spectre)NessusRed Hat Local Security Checks
high
110111RHEL 7 : Virtualization (RHSA-2018:1696) (Spectre)NessusRed Hat Local Security Checks
low
110105openSUSE Security Update : the Linux Kernel (openSUSE-2018-515) (Spectre)NessusSuSE Local Security Checks
medium
110104openSUSE Security Update : the Linux Kernel (openSUSE-2018-514) (Spectre)NessusSuSE Local Security Checks
high
110102Debian DSA-4210-1 : xen - security update (Spectre)NessusDebian Local Security Checks
low
110100Virtuozzo 6 : parallels-server-bm-release / vzkernel / etc (VZA-2018-033)NessusVirtuozzo Local Security Checks
low
110091SUSE SLES11 Security Update : kvm (SUSE-SU-2018:1389-1) (Spectre)NessusSuSE Local Security Checks
medium
110090SUSE SLES12 Security Update : qemu (SUSE-SU-2018:1386-1) (Spectre)NessusSuSE Local Security Checks
low
110081RHEL 7 : Virtualization (RHSA-2018:1690) (Spectre)NessusRed Hat Local Security Checks
low
110080RHEL 6 : Virtualization (RHSA-2018:1689) (Spectre)NessusRed Hat Local Security Checks
low
110079RHEL 6 : Virtualization (RHSA-2018:1688) (Spectre)NessusRed Hat Local Security Checks
low
110078RHEL 7 : Virtualization Manager (RHSA-2018:1676) (Spectre)NessusRed Hat Local Security Checks
low
110077RHEL 7 : Virtualization (RHSA-2018:1675) (Spectre)NessusRed Hat Local Security Checks
low
110076RHEL 7 : Virtualization Manager (RHSA-2018:1674) (Spectre)NessusRed Hat Local Security Checks
low
110075RHEL 7 : Virtualization (RHSA-2018:1655) (Spectre)NessusRed Hat Local Security Checks
low
110074RHEL 7 : Virtualization (RHSA-2018:1654) (Spectre)NessusRed Hat Local Security Checks
low
110073RHEL 6 : MRG (RHSA-2018:1642) (Spectre)NessusRed Hat Local Security Checks
low
110072OracleVM 3.4 : Unbreakable / etc (OVMSA-2018-0223) (Spectre)NessusOracleVM Local Security Checks
high
110071Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2018-4114) (Spectre)NessusOracle Linux Local Security Checks
high
110063openSUSE Security Update : qemu (openSUSE-2018-489) (Spectre)NessusSuSE Local Security Checks
medium
110050Ubuntu 14.04 LTS : Linux kernel vulnerabilities (USN-3655-1) (Spectre)NessusUbuntu Local Security Checks
high
110049Ubuntu 14.04 LTS : Linux kernel (Xenial HWE) vulnerabilities (USN-3654-2) (Spectre)NessusUbuntu Local Security Checks
high
110048Ubuntu 16.04 LTS : Linux kernel vulnerabilities (USN-3654-1) (Spectre)NessusUbuntu Local Security Checks
high
110047Ubuntu 16.04 LTS : Linux kernel (HWE) vulnerabilities (USN-3653-2) (Spectre)NessusUbuntu Local Security Checks
high
110046Ubuntu 17.10 : Linux kernel vulnerabilities (USN-3653-1) (Spectre)NessusUbuntu Local Security Checks
high
110045Ubuntu 18.04 LTS : Linux kernel vulnerability (USN-3652-1) (Spectre)NessusUbuntu Local Security Checks
low
110043SUSE SLED12 / SLES12 Security Update : qemu (SUSE-SU-2018:1378-1) (Spectre)NessusSuSE Local Security Checks
low
110042SUSE SLES12 Security Update : kernel (SUSE-SU-2018:1377-1) (Spectre)NessusSuSE Local Security Checks
low
110041SUSE SLES11 Security Update : kernel (SUSE-SU-2018:1376-1) (Spectre)NessusSuSE Local Security Checks
high
110040SUSE SLES12 Security Update : kernel (SUSE-SU-2018:1375-1) (Spectre)NessusSuSE Local Security Checks
high
110039SUSE SLES12 Security Update : kernel (SUSE-SU-2018:1374-1) (Spectre)NessusSuSE Local Security Checks
high
110035SUSE SLES11 Security Update : kernel (SUSE-SU-2018:1368-1) (Spectre)NessusSuSE Local Security Checks
high
110033SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2018:1366-1) (Spectre)NessusSuSE Local Security Checks
high
110030SUSE SLES12 Security Update : qemu (SUSE-SU-2018:1363-1) (Spectre)NessusSuSE Local Security Checks
low
110029SUSE SLES12 Security Update : qemu (SUSE-SU-2018:1362-1) (Spectre)NessusSuSE Local Security Checks
low
110028Scientific Linux Security Update : qemu-kvm on SL7.x x86_64 (20180522) (Spectre)NessusScientific Linux Local Security Checks
low
110027Scientific Linux Security Update : libvirt on SL7.x x86_64 (20180522) (Spectre)NessusScientific Linux Local Security Checks
low
110026Scientific Linux Security Update : libvirt on SL6.x i386/x86_64 (20180522) (Spectre)NessusScientific Linux Local Security Checks
low
110025Scientific Linux Security Update : kernel on SL7.x x86_64 (20180522) (Spectre)NessusScientific Linux Local Security Checks
low
110024Scientific Linux Security Update : kernel on SL6.x i386/x86_64 (20180522) (Spectre)NessusScientific Linux Local Security Checks
low
110023Scientific Linux Security Update : java-1.8.0-openjdk on SL7.x x86_64 (20180522) (Spectre)NessusScientific Linux Local Security Checks
low
110022Scientific Linux Security Update : java-1.8.0-openjdk on SL6.x i386/x86_64 (20180522) (Spectre)NessusScientific Linux Local Security Checks
low
110021Scientific Linux Security Update : java-1.7.0-openjdk on SL7.x x86_64 (20180522) (Spectre)NessusScientific Linux Local Security Checks
low
110020Scientific Linux Security Update : qemu-kvm on SL6.x i386/x86_64 (20180521) (Spectre)NessusScientific Linux Local Security Checks
low
110019Scientific Linux Security Update : java-1.7.0-openjdk on SL6.x i386/x86_64 (20180521) (Spectre)NessusScientific Linux Local Security Checks
low
110018RHEL 6 : libvirt (RHSA-2018:1669) (Spectre)NessusRed Hat Local Security Checks
low
110017RHEL 7 : libvirt (RHSA-2018:1668) (Spectre)NessusRed Hat Local Security Checks
low
110016RHEL 6 : libvirt (RHSA-2018:1667) (Spectre)NessusRed Hat Local Security Checks
low
110015RHEL 6 : libvirt (RHSA-2018:1666) (Spectre)NessusRed Hat Local Security Checks
low
110014RHEL 6 : libvirt (RHSA-2018:1665) (Spectre)NessusRed Hat Local Security Checks
low
110013RHEL 6 : libvirt (RHSA-2018:1664) (Spectre)NessusRed Hat Local Security Checks
low
110012RHEL 7 : qemu-kvm (RHSA-2018:1663) (Spectre)NessusRed Hat Local Security Checks
low
110011RHEL 7 : qemu-kvm (RHSA-2018:1662) (Spectre)NessusRed Hat Local Security Checks
low
110010RHEL 7 : qemu-kvm (RHSA-2018:1661) (Spectre)NessusRed Hat Local Security Checks
low
110009RHEL 6 : qemu-kvm (RHSA-2018:1660) (Spectre)NessusRed Hat Local Security Checks
low
110008RHEL 6 : qemu-kvm (RHSA-2018:1659) (Spectre)NessusRed Hat Local Security Checks
low
110007RHEL 6 : qemu-kvm (RHSA-2018:1658) (Spectre)NessusRed Hat Local Security Checks
low
110006RHEL 6 : qemu-kvm (RHSA-2018:1657) (Spectre)NessusRed Hat Local Security Checks
low
110005RHEL 6 : qemu-kvm (RHSA-2018:1656) (Spectre)NessusRed Hat Local Security Checks
low
110004RHEL 7 : libvirt (RHSA-2018:1653) (Spectre)NessusRed Hat Local Security Checks
low
110003RHEL 7 : libvirt (RHSA-2018:1652) (Spectre)NessusRed Hat Local Security Checks
low
110002RHEL 6 : kernel (RHSA-2018:1651) (Spectre)NessusRed Hat Local Security Checks
low
110001RHEL 6 : java-1.8.0-openjdk (RHSA-2018:1650) (Spectre)NessusRed Hat Local Security Checks
low
110000RHEL 7 : java-1.8.0-openjdk (RHSA-2018:1649) (Spectre)NessusRed Hat Local Security Checks
low
109999RHEL 7 : java-1.7.0-openjdk (RHSA-2018:1648) (Spectre)NessusRed Hat Local Security Checks
low
109998RHEL 6 : java-1.7.0-openjdk (RHSA-2018:1647) (Spectre)NessusRed Hat Local Security Checks
low
109997RHEL 7 : kernel (RHSA-2018:1636) (Spectre)NessusRed Hat Local Security Checks
low
109996RHEL 7 : kernel (RHSA-2018:1635) (Spectre)NessusRed Hat Local Security Checks
low
109995RHEL 7 : qemu-kvm (RHSA-2018:1633) (Spectre)NessusRed Hat Local Security Checks
low
109994RHEL 7 : libvirt (RHSA-2018:1632) (Spectre)NessusRed Hat Local Security Checks
low
109993RHEL 7 : kernel-rt (RHSA-2018:1630) (Spectre)NessusRed Hat Local Security Checks
low
109992RHEL 7 : kernel (RHSA-2018:1629) (Spectre)NessusRed Hat Local Security Checks
low
109988OracleVM 3.4 : qemu-kvm (OVMSA-2018-0219) (Spectre)NessusOracleVM Local Security Checks
low
109986Oracle Linux 6 : libvirt (ELSA-2018-1669) (Spectre)NessusOracle Linux Local Security Checks
low
109985Oracle Linux 6 : qemu-kvm (ELSA-2018-1660) (Spectre)NessusOracle Linux Local Security Checks
low
109984Oracle Linux 6 : kernel (ELSA-2018-1651) (Spectre)NessusOracle Linux Local Security Checks
low
109983Oracle Linux 6 : java-1.8.0-openjdk (ELSA-2018-1650) (Spectre)NessusOracle Linux Local Security Checks
low
109982Oracle Linux 7 : java-1.8.0-openjdk (ELSA-2018-1649) (Spectre)NessusOracle Linux Local Security Checks
low
109981Oracle Linux 7 : java-1.7.0-openjdk (ELSA-2018-1648) (Spectre)NessusOracle Linux Local Security Checks
low
109980Oracle Linux 6 : java-1.7.0-openjdk (ELSA-2018-1647) (Spectre)NessusOracle Linux Local Security Checks
low
109979Oracle Linux 7 : qemu-kvm (ELSA-2018-1633) (Spectre)NessusOracle Linux Local Security Checks
low
109978Oracle Linux 7 : libvirt (ELSA-2018-1632) (Spectre)NessusOracle Linux Local Security Checks
low
109977Oracle Linux 7 : kernel (ELSA-2018-1629) (Spectre)NessusOracle Linux Local Security Checks
low
109966CentOS 6 : qemu-kvm (CESA-2018:1660) (Spectre)NessusCentOS Local Security Checks
low
109965CentOS 6 : kernel (CESA-2018:1651) (Spectre)NessusCentOS Local Security Checks
low
109964CentOS 6 : java-1.8.0-openjdk (CESA-2018:1650) (Spectre)NessusCentOS Local Security Checks
low
109963CentOS 7 : java-1.8.0-openjdk (CESA-2018:1649) (Spectre)NessusCentOS Local Security Checks
low
109962CentOS 7 : java-1.7.0-openjdk (CESA-2018:1648) (Spectre)NessusCentOS Local Security Checks
low
109961CentOS 6 : java-1.7.0-openjdk (CESA-2018:1647) (Spectre)NessusCentOS Local Security Checks
low
109960CentOS 7 : qemu-kvm (CESA-2018:1633) (Spectre)NessusCentOS Local Security Checks
low
109959CentOS 7 : libvirt (CESA-2018:1632) (Spectre)NessusCentOS Local Security Checks
low
109958CentOS 7 : kernel (CESA-2018:1629) (Spectre)NessusCentOS Local Security Checks
low
109957AIX 5.3 TL 12 : variant4 (IJ05826) (Spectre)NessusAIX Local Security Checks
low
109956AIX 6.1 TL 9 : variant4 (IJ05824) (Spectre)NessusAIX Local Security Checks
low
109955AIX 7.1 TL 4 : variant4 (IJ05823) (Spectre)NessusAIX Local Security Checks
low
109954AIX 7.1 TL 5 : variant4 (IJ05822) (Spectre)NessusAIX Local Security Checks
low
109953AIX 7.2 TL 0 : variant4 (IJ05821) (Spectre)NessusAIX Local Security Checks
low
109952AIX 7.2 TL 1 : variant4 (IJ05820) (Spectre)NessusAIX Local Security Checks
low
109951AIX 7.2 TL 2 : variant4 (IJ05818) (Spectre)NessusAIX Local Security Checks
low