CVE-2018-3639

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.

References

https://www.us-cert.gov/ncas/alerts/TA18-141A

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html

https://www.synology.com/support/security/Synology_SA_18_23

https://www.kb.cert.org/vuls/id/180049

https://usn.ubuntu.com/3655-2/

https://usn.ubuntu.com/3654-2/

https://usn.ubuntu.com/3654-1/

https://usn.ubuntu.com/3653-2/

https://usn.ubuntu.com/3653-1/

https://usn.ubuntu.com/3652-1/

https://usn.ubuntu.com/3651-1/

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel

https://support.citrix.com/article/CTX235225

https://security.netapp.com/advisory/ntap-20180521-0001/

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012

https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability

https://bugs.chromium.org/p/project-zero/issues/detail?id=1528

https://access.redhat.com/errata/RHSA-2018:1660

https://access.redhat.com/errata/RHSA-2018:1655

https://access.redhat.com/errata/RHSA-2018:1647

https://access.redhat.com/errata/RHSA-2018:1630

http://xenbits.xen.org/xsa/advisory-263.html

http://www.securitytracker.com/id/1040949

http://support.lenovo.com/us/en/solutions/LEN-22133

https://access.redhat.com/errata/RHSA-2018:1690

https://access.redhat.com/errata/RHSA-2018:1689

https://access.redhat.com/errata/RHSA-2018:1688

https://access.redhat.com/errata/RHSA-2018:1686

https://access.redhat.com/errata/RHSA-2018:1676

https://access.redhat.com/errata/RHSA-2018:1675

https://access.redhat.com/errata/RHSA-2018:1674

https://access.redhat.com/errata/RHSA-2018:1669

https://access.redhat.com/errata/RHSA-2018:1668

https://access.redhat.com/errata/RHSA-2018:1667

https://access.redhat.com/errata/RHSA-2018:1666

https://access.redhat.com/errata/RHSA-2018:1665

https://access.redhat.com/errata/RHSA-2018:1664

https://access.redhat.com/errata/RHSA-2018:1663

https://access.redhat.com/errata/RHSA-2018:1662

https://access.redhat.com/errata/RHSA-2018:1661

https://access.redhat.com/errata/RHSA-2018:1659

https://access.redhat.com/errata/RHSA-2018:1658

https://access.redhat.com/errata/RHSA-2018:1657

https://access.redhat.com/errata/RHSA-2018:1656

https://access.redhat.com/errata/RHSA-2018:1654

https://access.redhat.com/errata/RHSA-2018:1653

https://access.redhat.com/errata/RHSA-2018:1652

https://access.redhat.com/errata/RHSA-2018:1651

https://access.redhat.com/errata/RHSA-2018:1650

https://access.redhat.com/errata/RHSA-2018:1649

https://access.redhat.com/errata/RHSA-2018:1648

https://access.redhat.com/errata/RHSA-2018:1646

https://access.redhat.com/errata/RHSA-2018:1645

https://access.redhat.com/errata/RHSA-2018:1644

https://access.redhat.com/errata/RHSA-2018:1643

https://access.redhat.com/errata/RHSA-2018:1642

https://access.redhat.com/errata/RHSA-2018:1636

https://access.redhat.com/errata/RHSA-2018:1635

https://access.redhat.com/errata/RHSA-2018:1633

https://access.redhat.com/errata/RHSA-2018:1632

https://access.redhat.com/errata/RHSA-2018:1629

http://www.securityfocus.com/bid/104232

https://www.exploit-db.com/exploits/44695/

https://access.redhat.com/errata/RHSA-2018:1711

https://access.redhat.com/errata/RHSA-2018:1710

https://access.redhat.com/errata/RHSA-2018:1696

https://www.debian.org/security/2018/dsa-4210

https://usn.ubuntu.com/3655-1/

https://access.redhat.com/errata/RHSA-2018:1738

https://access.redhat.com/errata/RHSA-2018:1737

https://access.redhat.com/errata/RHSA-2018:1641

https://access.redhat.com/errata/RHSA-2018:1640

https://access.redhat.com/errata/RHSA-2018:1639

https://access.redhat.com/errata/RHSA-2018:1638

https://access.redhat.com/errata/RHSA-2018:1637

http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html

https://usn.ubuntu.com/3680-1/

https://usn.ubuntu.com/3679-1/

https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03850en_us

https://access.redhat.com/errata/RHSA-2018:1826

https://access.redhat.com/errata/RHSA-2018:1854

https://access.redhat.com/errata/RHSA-2018:2006

https://access.redhat.com/errata/RHSA-2018:2003

https://access.redhat.com/errata/RHSA-2018:2001

https://access.redhat.com/errata/RHSA-2018:1997

https://access.redhat.com/errata/RHSA-2018:1967

https://access.redhat.com/errata/RHSA-2018:1965

https://access.redhat.com/errata/RHSA-2018:2060

https://access.redhat.com/errata/RHSA-2018:2164

https://access.redhat.com/errata/RHSA-2018:2162

https://access.redhat.com/errata/RHSA-2018:2161

https://access.redhat.com/errata/RHSA-2018:2172

https://access.redhat.com/errata/RHSA-2018:2171

https://access.redhat.com/errata/RHSA-2018:2216

https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html

https://access.redhat.com/errata/RHSA-2018:2228

https://access.redhat.com/errata/RHSA-2018:2250

https://access.redhat.com/errata/RHSA-2018:2246

https://access.redhat.com/errata/RHSA-2018:2258

https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html

https://access.redhat.com/errata/RHSA-2018:2289

https://access.redhat.com/errata/RHSA-2018:2328

https://access.redhat.com/errata/RHSA-2018:2309

https://access.redhat.com/errata/RHSA-2018:2364

https://access.redhat.com/errata/RHSA-2018:2363

https://access.redhat.com/errata/RHSA-2018:2396

https://access.redhat.com/errata/RHSA-2018:2394

https://access.redhat.com/errata/RHSA-2018:2387

https://www.debian.org/security/2018/dsa-4273

https://usn.ubuntu.com/3756-1/

https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf

https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004

https://usn.ubuntu.com/3777-3/

https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006

https://access.redhat.com/errata/RHSA-2018:3425

https://access.redhat.com/errata/RHSA-2018:3424

https://access.redhat.com/errata/RHSA-2018:3423

https://access.redhat.com/errata/RHSA-2018:3407

https://access.redhat.com/errata/RHSA-2018:3402

https://access.redhat.com/errata/RHSA-2018:3401

https://access.redhat.com/errata/RHSA-2018:3400

https://access.redhat.com/errata/RHSA-2018:3399

https://access.redhat.com/errata/RHSA-2018:3398

https://access.redhat.com/errata/RHSA-2018:3397

https://access.redhat.com/errata/RHSA-2018:3396

https://access.redhat.com/errata/RHSA-2018:2948

http://www.securitytracker.com/id/1042004

https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0

https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html

https://access.redhat.com/errata/RHSA-2019:0148

https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf

https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html

https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html

https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html

https://nvidia.custhelp.com/app/answers/detail/a_id/4787

https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html

https://access.redhat.com/errata/RHSA-2019:1046

http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html

http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html

https://seclists.org/bugtraq/2019/Jun/36

https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf

http://www.openwall.com/lists/oss-security/2020/06/10/1

http://www.openwall.com/lists/oss-security/2020/06/10/2

http://www.openwall.com/lists/oss-security/2020/06/10/5

https://www.oracle.com/security-alerts/cpujul2020.html

http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html

Details

Source: MITRE

Published: 2018-05-22

Updated: 2021-08-13

Type: CWE-203

Risk Information

CVSS v2

Base Score: 2.1

Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Impact Score: 2.9

Exploitability Score: 3.9

Severity: LOW

CVSS v3

Base Score: 5.5

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Impact Score: 3.6

Exploitability Score: 1.8

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:pentium_j:j4205:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:*

cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3795:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3785:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3775d:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3775:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3770d:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:*

cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_m:32nm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_m:45nm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:45nm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i7:32nm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:32nm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i5:45nm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:45nm:*:*:*:*:*:*:*

cpe:2.3:h:intel:core_i3:32nm:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:125c_:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1220_:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1275_:*:*:*:*:*:*:*

cpe:2.3:h:intel:pentium_silver:n5000:*:*:*:*:*:*:*

cpe:2.3:h:intel:pentium_silver:j5005:*:*:*:*:*:*:*

cpe:2.3:h:intel:pentium:n4100:*:*:*:*:*:*:*

cpe:2.3:h:intel:pentium:n4200:*:*:*:*:*:*:*

cpe:2.3:h:intel:pentium:n4000:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e-1105c:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1535m_v6:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1505m_v6:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1585_v5:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1585l_v5:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1578l_v5:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1575m_v5:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1565l_v5:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1558l_v5:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1545m_v5:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1535m_v5:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:1515m_v5:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:l3403:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:l3406:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:l3426:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:x3430:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:x3440:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:x3450:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:x3460:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:x3470:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:x3480:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:3600:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:l5506:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:l5508_:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:l5518_:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:l5520:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:l5530:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:e5502:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:e5503:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:e5504:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:e5506:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:e5507:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:e5520:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:e5530:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:e5540:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:x5550:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:x5560:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:x5570:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:w5580:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:w5590:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:5600:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:e6510:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:e6540:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:e6550:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3:7500:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1105c_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1125c_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1220_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1220_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_12201:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_12201_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1220l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1225:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1225_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1225_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1226_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1230:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1230_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1230_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1230l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1231_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1235:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1240:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1240_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1240_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1240l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1241_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1245:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1245_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1245_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1246_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1258l_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1260l:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1265l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1265l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1265l_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4669_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4667_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4660_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4655_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4650_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4640_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4628l_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4627_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4620_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4610_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2699a_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2699r_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2699_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2698_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2697_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2697a_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2695_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2690_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2687w_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2683_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2680_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2667_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2660_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2658_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2650l_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2699_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4669_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4667_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4660_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2698_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4655_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2697_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4650_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4648_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2695_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4640_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2690_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4627_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2687w_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4620_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4610_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2683_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2680_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2670_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2667_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2660_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2658a_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2658_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4603_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4607_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4610_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4620_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4624l_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4627_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4640_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4650_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4657l_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2658_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2660_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2667_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2670_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2680_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2687w_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2690_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2695_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2697_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4603:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4607:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4610:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4617:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4620:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4640:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4650:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:4650l:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2658:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2660:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2665:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2667:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2670:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2680:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2687w:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5:2690:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1268l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1270:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1270_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1270_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1271_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1275_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1275_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1275l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1276_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1278l_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1280:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1280_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1280_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1281_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1285_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1285_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1285l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1285l_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1286_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1286l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1290:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1290_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1501l_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1501m_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1505l_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1505l_v6:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e3_1505m_v5:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1428l:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1428l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1428l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1620:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1620_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1620_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1620_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1630_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1630_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1650:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1650_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1650_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1650_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1660:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1660_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1660_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1660_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1680_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_1680_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2403:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2403_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2407:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2407_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2408l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2418l:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2418l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2418l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2420:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2420_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2428l:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2428l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2428l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2430:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2430_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2430l:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2430l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2438l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2440:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2440_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2448l:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2448l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2450:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2450_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2450l:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2450l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2470:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2470_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2603:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2603_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2603_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2603_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2608l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2608l_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2609:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2609_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2609_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2609_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2618l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2618l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8870:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8867l:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8860:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8850:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8837:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8830:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4870:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4860:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4850:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4830:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4820:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4807:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:2870:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:2860:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:2850:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:2830:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:2820:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:2803:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8894_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8893_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8891_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8890_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8880_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8870_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8867_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8860_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4850_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4830_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4820_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4809_v4:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8893_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8891_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8890_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8880l_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8880_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8870_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8867_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8860_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4850_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4830_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4820_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4809_v3:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8850_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8857_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8870_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8880_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8880l_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8890_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8891_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:8893_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4890_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4880_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4870_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4860_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4850_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4830_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4820_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:4809_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:2890_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:2880_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:2870_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e7:2850_v2:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:85115:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:85118:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:85119t:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:85120:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:85120t:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:85122:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86126:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86126f:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86126t:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86128:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86130:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86130f:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86130t:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86132:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86134:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86134m:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86136:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86138:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86138f:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86138t:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86140:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86140m:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86142:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86142f:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86142m:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86144:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86146:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86148:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86148f:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86150:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86152:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_gold:86154:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2618l_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2620:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2620_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2620_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2620_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2623_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2623_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2628l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2628l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2628l_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2630:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2630_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2630_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2630_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2630l:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2630l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2630l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2630l_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2637:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2637_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2637_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2637_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2640:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2640_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2640_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2640_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2643:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2643_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2643_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2643_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2648l:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2648l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2648l_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2648l_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2650:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2650_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2650_v3:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2650_v4:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2650l:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2650l_v2:-:*:*:*:*:*:*:*

cpe:2.3:h:intel:xeon_e5_2650l_v3:-:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:h:arm:cortex-a:15:*:*:*:*:*:*:*

cpe:2.3:h:arm:cortex-a:57:*:*:*:*:*:*:*

cpe:2.3:h:arm:cortex-a:72:*:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:a:redhat:mrg_realtime:2.0:*:*:*:*:*:*:*

cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*

cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:*

cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:*

cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*

cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*

cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*

cpe:2.3:a:redhat:virtualization_manager:4.2:*:*:*:*:*:*:*

cpe:2.3:a:redhat:virtualization_manager:4.3:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*

Configuration 4

OR

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 5

OR

cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:*:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*

Configuration 6

AND

OR

cpe:2.3:o:siemens:itc1500_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:itc1500:3:*:*:*:*:*:*:*

Configuration 7

AND

OR

cpe:2.3:o:siemens:itc1500_pro_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:itc1500_pro:3:*:*:*:*:*:*:*

Configuration 8

AND

OR

cpe:2.3:o:siemens:itc1900_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:itc1900:3:*:*:*:*:*:*:*

Configuration 9

AND

OR

cpe:2.3:o:siemens:itc1900_pro_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:itc1900_pro:3:*:*:*:*:*:*:*

Configuration 10

AND

OR

cpe:2.3:o:siemens:itc2200_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:itc2200:3:*:*:*:*:*:*:*

Configuration 11

AND

OR

cpe:2.3:o:siemens:itc2200_pro_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:itc2200_pro:3:*:*:*:*:*:*:*

Configuration 12

OR

cpe:2.3:a:oracle:local_service_management_system:*:*:*:*:*:*:*:* versions from 13.0 to 13.3 (inclusive)

cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*

Configuration 13

AND

OR

cpe:2.3:o:siemens:ruggedcom_ape_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:ruggedcom_ape:-:*:*:*:*:*:*:*

Configuration 14

AND

OR

cpe:2.3:o:siemens:simatic_et_200_sp_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_et_200_sp:-:*:*:*:*:*:*:*

Configuration 15

AND

OR

cpe:2.3:o:siemens:simatic_field_pg_m4_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_field_pg_m4:-:*:*:*:*:*:*:*

Configuration 16

AND

OR

cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*

Configuration 17

AND

OR

cpe:2.3:o:siemens:simatic_ipc3000_smart_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_ipc3000_smart:2:*:*:*:*:*:*:*

Configuration 18

AND

OR

cpe:2.3:o:siemens:simatic_ipc347e_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_ipc347e:-:*:*:*:*:*:*:*

Configuration 19

AND

OR

cpe:2.3:o:siemens:simatic_ipc427c_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_ipc427c:-:*:*:*:*:*:*:*

Configuration 20

AND

OR

cpe:2.3:o:siemens:simatic_ipc427d_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_ipc427d:-:*:*:*:*:*:*:*

Configuration 21

AND

OR

cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*

Configuration 22

AND

OR

cpe:2.3:o:siemens:simatic_ipc477c_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_ipc477c:-:*:*:*:*:*:*:*

Configuration 23

AND

OR

cpe:2.3:o:siemens:simatic_ipc477d_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_ipc477d:-:*:*:*:*:*:*:*

Configuration 24

AND

OR

cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*

Configuration 25

AND

OR

cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*

Configuration 26

AND

OR

cpe:2.3:o:siemens:simatic_ipc547e_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_ipc547e:-:*:*:*:*:*:*:*

Configuration 27

AND

OR

cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*

Configuration 28

AND

OR

cpe:2.3:o:siemens:simatic_ipc627c_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_ipc627c:-:*:*:*:*:*:*:*

Configuration 29

AND

OR

cpe:2.3:o:siemens:simatic_ipc627d_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_ipc627d:-:*:*:*:*:*:*:*

Configuration 30

AND

OR

cpe:2.3:o:siemens:simatic_ipc647c_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_ipc647c:-:*:*:*:*:*:*:*

Configuration 31

AND

OR

cpe:2.3:o:siemens:simatic_ipc647d_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_ipc647d:-:*:*:*:*:*:*:*

Configuration 32

AND

OR

cpe:2.3:o:siemens:simatic_ipc677d_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_ipc677d:-:*:*:*:*:*:*:*

Configuration 33

AND

OR

cpe:2.3:o:siemens:simatic_ipc677c_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_ipc677c:-:*:*:*:*:*:*:*

Configuration 34

AND

OR

cpe:2.3:o:siemens:simatic_ipc827c_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_ipc827c:-:*:*:*:*:*:*:*

Configuration 35

AND

OR

cpe:2.3:o:siemens:simatic_ipc827d_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_ipc827d:-:*:*:*:*:*:*:*

Configuration 36

AND

OR

cpe:2.3:o:siemens:simatic_ipc847c_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_ipc847c:-:*:*:*:*:*:*:*

Configuration 37

AND

OR

cpe:2.3:o:siemens:simatic_ipc847d_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_ipc847d:-:*:*:*:*:*:*:*

Configuration 38

AND

OR

cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*

Configuration 39

AND

OR

cpe:2.3:o:siemens:simatic_s7-1500_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simatic_s7-1500:-:*:*:*:*:*:*:*

Configuration 40

AND

OR

cpe:2.3:o:siemens:simotion_p320-4e_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:simotion_p320-4e:-:*:*:*:*:*:*:*

Configuration 41

AND

OR

cpe:2.3:o:siemens:sinumerik_840_d_sl_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:sinumerik_840_d_sl:-:*:*:*:*:*:*:*

Configuration 42

AND

OR

cpe:2.3:o:siemens:sinumerik_pcu_50.5_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:sinumerik_pcu_50.5:-:*:*:*:*:*:*:*

Configuration 43

AND

OR

cpe:2.3:o:siemens:sinumerik_tcu_30.3_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:sinumerik_tcu_30.3:-:*:*:*:*:*:*:*

Configuration 44

AND

OR

cpe:2.3:o:siemens:sinema_remote_connect_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:siemens:sinema_remote_connect:-:*:*:*:*:*:*:*

Configuration 45

OR

cpe:2.3:a:mitel:micollab:-:*:*:*:*:*:*:*

cpe:2.3:a:mitel:open_integration_gateway:-:*:*:*:*:*:*:*

cpe:2.3:a:mitel:mivoice_border_gateway:-:*:*:*:*:*:*:*

cpe:2.3:a:mitel:mivoice_business:-:*:*:*:*:*:*:*

cpe:2.3:a:mitel:mivoice_connect:-:*:*:*:*:*:*:*

cpe:2.3:a:mitel:mivoic_mx-one:-:*:*:*:*:*:*:*

cpe:2.3:a:mitel:mivoice_5000:-:*:*:*:*:*:*:*

cpe:2.3:a:mitel:micloud_management_portal:*:*:*:*:*:*:*:*

Configuration 46

OR

cpe:2.3:o:sonicwall:sonicosv:-:*:*:*:*:*:*:*

cpe:2.3:a:sonicwall:web_application_firewall:-:*:*:*:*:*:*:*

cpe:2.3:a:sonicwall:cloud_global_management_system:-:*:*:*:*:*:*:*

cpe:2.3:a:sonicwall:email_security:-:*:*:*:*:*:*:*

cpe:2.3:a:sonicwall:secure_mobile_access:-:*:*:*:*:*:*:*

cpe:2.3:a:sonicwall:global_management_system:-:*:*:*:*:*:*:*

Configuration 47

OR

cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*

Configuration 48

AND

OR

cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*

OR

cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

Configuration 49

OR

cpe:2.3:a:nvidia:jetson_tx1:*:*:*:*:*:*:*:*

cpe:2.3:a:nvidia:jetson_tx2:*:*:*:*:*:*:*:*

Configuration 50

OR

cpe:2.3:h:microsoft:surface:-:*:*:*:*:*:*:*

cpe:2.3:h:microsoft:surface_book:-:*:*:*:*:*:*:*

cpe:2.3:h:microsoft:surface_book:2:*:*:*:*:*:*:*

cpe:2.3:h:microsoft:surface_pro:3:*:*:*:*:*:*:*

cpe:2.3:h:microsoft:surface_pro:4:*:*:*:*:*:*:*

cpe:2.3:h:microsoft:surface_pro:1796:*:*:*:*:*:*:*

cpe:2.3:h:microsoft:surface_pro_with_lte_advanced:1807:*:*:*:*:*:*:*

cpe:2.3:h:microsoft:surface_studio:-:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*

cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_server_2008:sp2:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*

cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*

Tenable Plugins

View all (315 total)

IDNameProductFamilySeverity
153190SUSE SLES12 Security Update : java-1_7_0-openjdk (SUSE-SU-2021:3007-1)NessusSuSE Local Security Checks
medium
140385SUSE SLES12 Security Update : kernel (SUSE-SU-2020:2540-1) (Spectre)NessusSuSE Local Security Checks
high
140365openSUSE Security Update : the Linux Kernel (openSUSE-2020-1325) (Spectre)NessusSuSE Local Security Checks
high
140019OracleVM 3.4 : xen (OVMSA-2020-0039) (Bunker Buster) (Foreshadow) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout) (Meltdown) (POODLE) (Spectre)NessusOracleVM Local Security Checks
critical
134877VMware ESXi 5.5 / 6.0 / 6.5 / 6.7 Information Disclosure (VMSA-2018-0012) (Spectre) (remote check)NessusMisc.
medium
132253RancherOS < 1.4.1 Multiple Information Disclosure VulnerabilitiesNessusMisc.
medium
132101Windows Speculative Execution Configuration CheckNessusWindows
medium
131621EulerOS 2.0 SP2 : libvirt (EulerOS-SA-2019-2468)NessusHuawei Local Security Checks
medium
500248Intel Atom Exposure of Sensitive Information to an Unauthorized ActorTenable.otSCADA
medium
130234Amazon Linux 2 : java-11-openjdk (ALAS-2019-1338) (Spectre)NessusAmazon Linux Local Security Checks
medium
127758SUSE SLED12 / SLES12 Security Update : java-1_7_0-openjdk (SUSE-SU-2019:2028-1) (Spectre)NessusSuSE Local Security Checks
medium
127408NewStart CGSL MAIN 4.05 : kernel Multiple Vulnerabilities (NS-SA-2019-0143)NessusNewStart CGSL Local Security Checks
critical
127397NewStart CGSL MAIN 4.05 : java-1.8.0-openjdk Multiple Vulnerabilities (NS-SA-2019-0137)NessusNewStart CGSL Local Security Checks
high
127389NewStart CGSL MAIN 4.05 : qemu-kvm Multiple Vulnerabilities (NS-SA-2019-0133)NessusNewStart CGSL Local Security Checks
medium
127387NewStart CGSL MAIN 4.05 : libvirt Multiple Vulnerabilities (NS-SA-2019-0132)NessusNewStart CGSL Local Security Checks
medium
127385NewStart CGSL MAIN 4.05 : java-1.7.0-openjdk Multiple Vulnerabilities (NS-SA-2019-0131)NessusNewStart CGSL Local Security Checks
high
127233NewStart CGSL CORE 5.04 / MAIN 5.04 : kernel-rt Multiple Vulnerabilities (NS-SA-2019-0049)NessusNewStart CGSL Local Security Checks
high
127222NewStart CGSL CORE 5.04 / MAIN 5.04 : kernel Multiple Vulnerabilities (NS-SA-2019-0044)NessusNewStart CGSL Local Security Checks
high
127199NewStart CGSL CORE 5.04 / MAIN 5.04 : java-1.7.0-openjdk Multiple Vulnerabilities (NS-SA-2019-0032)NessusNewStart CGSL Local Security Checks
high
127190NewStart CGSL CORE 5.04 / MAIN 5.04 : java-1.8.0-openjdk Multiple Vulnerabilities (NS-SA-2019-0027)NessusNewStart CGSL Local Security Checks
high
126440SUSE SLED15 / SLES15 Security Update : java-1_8_0-openjdk (SUSE-SU-2019:1211-2) (Spectre)NessusSuSE Local Security Checks
high
125451openSUSE Security Update : java-1_8_0-openjdk (openSUSE-2019-1439) (Spectre)NessusSuSE Local Security Checks
high
125450openSUSE Security Update : java-1_8_0-openjdk (openSUSE-2019-1438) (Spectre)NessusSuSE Local Security Checks
high
125023SUSE SLED12 / SLES12 Security Update : java-1_8_0-openjdk (SUSE-SU-2019:1219-1) (Spectre)NessusSuSE Local Security Checks
high
124991EulerOS Virtualization for ARM 64 3.0.1.0 : kernel (EulerOS-SA-2019-1538)NessusHuawei Local Security Checks
critical
124953EulerOS Virtualization 3.0.1.0 : kvm (EulerOS-SA-2019-1450)NessusHuawei Local Security Checks
high
124857SUSE SLED15 / SLES15 Security Update : java-1_8_0-openjdk (SUSE-SU-2019:1211-1) (Spectre)NessusSuSE Local Security Checks
high
124839RHEL 7 : Virtualization Manager (RHSA-2019:1046) (Spectre)NessusRed Hat Local Security Checks
medium
124836EulerOS Virtualization 3.0.1.0 : kernel (EulerOS-SA-2019-1515)NessusHuawei Local Security Checks
critical
700518macOS < 10.14 Multiple VulnerabilitiesNessus Network MonitorOperating System Detection
critical
123443openSUSE Security Update : ucode-intel (openSUSE-2019-622) (Foreshadow) (Spectre)NessusSuSE Local Security Checks
medium
123420Debian DLA-1731-2 : linux regression update (Spectre)NessusDebian Local Security Checks
medium
123271openSUSE Security Update : qemu (openSUSE-2019-620) (Spectre)NessusSuSE Local Security Checks
high
123215openSUSE Security Update : ucode-intel (openSUSE-2019-510) (Spectre)NessusSuSE Local Security Checks
medium
123186openSUSE Security Update : qemu (openSUSE-2019-426) (Spectre)NessusSuSE Local Security Checks
medium
123185openSUSE Security Update : libvirt (openSUSE-2019-424) (Spectre)NessusSuSE Local Security Checks
medium
123180openSUSE Security Update : xen (openSUSE-2019-418) (Meltdown) (Spectre)NessusSuSE Local Security Checks
medium
123175openSUSE Security Update : the Linux Kernel (openSUSE-2019-398) (Spectre)NessusSuSE Local Security Checks
medium
122975Security Updates for Windows 10 / Windows Server 2016 / Windows Server 2019 (March 2019) (Spectre) (Meltdown) (Foreshadow)NessusWindows : Microsoft Bulletins
medium
122974Security Updates for Windows 10 / Windows Server 2019 (February 2019) (Spectre) (Meltdown) (Foreshadow)NessusWindows : Microsoft Bulletins
medium
122879Debian DLA-1715-1 : linux-4.9 security update (Spectre)NessusDebian Local Security Checks
high
122087OracleVM 3.4 : Unbreakable / etc (OVMSA-2019-0007) (Spectre)NessusOracleVM Local Security Checks
medium
121947Photon OS 2.0: Linux PHSA-2018-2.0-0049NessusPhotonOS Local Security Checks
high
121851Photon OS 1.0: Linux PHSA-2018-1.0-0151NessusPhotonOS Local Security Checks
medium
121344SUSE SLES12 Security Update : kernel (SUSE-SU-2019:0148-1) (Spectre)NessusSuSE Local Security Checks
high
121223Oracle Solaris Critical Patch Update : jan2019_SRU11_4_3_5_0 (Foreshadow) (Spectre)NessusSolaris Local Security Checks
medium
121151openSUSE Security Update : java-1_7_0-openjdk (openSUSE-2019-42) (Spectre)NessusSuSE Local Security Checks
medium
121067Juniper Junos Space < 18.3R1 Multiple Vulnerabilities (JSA10917)NessusJunos Local Security Checks
high
121059SUSE SLED12 / SLES12 Security Update : java-1_7_0-openjdk (SUSE-SU-2019:0049-1) (Spectre)NessusSuSE Local Security Checks
medium
121017KB4480960: Windows 7 and Windows Server 2008 R2 January 2019 Security UpdateNessusWindows : Microsoft Bulletins
high
121014KB4480964: Windows 8.1 and Windows Server 2012 R2 January 2019 Security UpdateNessusWindows : Microsoft Bulletins
high
120842Fedora 28 : kernel (2018-db0d3e157e) (Spectre)NessusFedora Local Security Checks
medium
120435Fedora 28 : xen (2018-5521156807) (Spectre)NessusFedora Local Security Checks
medium
120426Fedora 28 : libvirt (2018-527698a904) (Spectre)NessusFedora Local Security Checks
medium
120385Fedora 28 : 2:qemu (2018-44f8a7454d) (Spectre)NessusFedora Local Security Checks
medium
120081SUSE SLED15 / SLES15 Security Update : qemu (SUSE-SU-2018:2340-1) (Spectre)NessusSuSE Local Security Checks
high
120080SUSE SLED15 / SLES15 Security Update : Security update to ucode-intel (SUSE-SU-2018:2338-1) (Foreshadow) (Spectre)NessusSuSE Local Security Checks
medium
120067SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2018:2092-1) (Spectre)NessusSuSE Local Security Checks
high
120040SUSE SLED15 / SLES15 Security Update : ucode-intel (SUSE-SU-2018:1926-1) (Spectre)NessusSuSE Local Security Checks
medium
119277OracleVM 3.4 : xen (OVMSA-2018-0282) (Foreshadow) (Spectre)NessusOracleVM Local Security Checks
medium
118963OracleVM 3.2 : xen (OVMSA-2018-0272) (Foreshadow) (Spectre)NessusOracleVM Local Security Checks
high
118962OracleVM 3.3 : xen (OVMSA-2018-0271) (Foreshadow) (Spectre)NessusOracleVM Local Security Checks
high
118870openSUSE Security Update : qemu (openSUSE-2018-1364) (Spectre)NessusSuSE Local Security Checks
high
118575macOS 10.13.6 Multiple Vulnerabilities (Security Update 2018-002)NessusMacOS X Local Security Checks
critical
118560RHEL 6 : qemu-kvm (RHSA-2018:3425) (Spectre)NessusRed Hat Local Security Checks
medium
118559RHEL 6 : qemu-kvm (RHSA-2018:3424) (Spectre)NessusRed Hat Local Security Checks
medium
118558RHEL 7 : qemu-kvm (RHSA-2018:3423) (Spectre)NessusRed Hat Local Security Checks
medium
118554RHEL 7 : libvirt (RHSA-2018:3407) (Spectre)NessusRed Hat Local Security Checks
medium
118551RHEL 6 : libvirt (RHSA-2018:3402) (Spectre)NessusRed Hat Local Security Checks
medium
118550RHEL 6 : qemu-kvm (RHSA-2018:3401) (Spectre)NessusRed Hat Local Security Checks
medium
118549RHEL 6 : libvirt (RHSA-2018:3400) (Spectre)NessusRed Hat Local Security Checks
medium
118548RHEL 6 : libvirt (RHSA-2018:3399) (Spectre)NessusRed Hat Local Security Checks
medium
118547RHEL 7 : libvirt (RHSA-2018:3398) (Spectre)NessusRed Hat Local Security Checks
medium
118546RHEL 6 : qemu-kvm (RHSA-2018:3397) (Spectre)NessusRed Hat Local Security Checks
medium
118545RHEL 6 : libvirt (RHSA-2018:3396) (Spectre)NessusRed Hat Local Security Checks
medium
118513RHEL 7 : kernel-alt (RHSA-2018:2948) (Spectre)NessusRed Hat Local Security Checks
high
118502SUSE SLED12 / SLES12 Security Update : qemu (SUSE-SU-2018:3555-1) (Spectre)NessusSuSE Local Security Checks
high
118322Ubuntu 16.04 LTS / 18.04 LTS : Linux kernel (Azure) vulnerabilities (USN-3777-3) (Spectre)NessusUbuntu Local Security Checks
high
118300SUSE SLES12 Security Update : java-1_8_0-openjdk (SUSE-SU-2018:3064-2) (Spectre)NessusSuSE Local Security Checks
critical
118297SUSE SLES12 Security Update : qemu (SUSE-SU-2018:2973-2) (Spectre)NessusSuSE Local Security Checks
high
118281SUSE SLES12 Security Update : Security update to ucode-intel (SUSE-SU-2018:2331-2) (Foreshadow) (Spectre)NessusSuSE Local Security Checks
medium
118274SUSE SLES12 Security Update : Recommended update for ucode-intel (SUSE-SU-2018:1935-2) (Spectre)NessusSuSE Local Security Checks
medium
118266SUSE SLES12 Security Update : xen (SUSE-SU-2018:1699-2) (Meltdown) (Spectre)NessusSuSE Local Security Checks
medium
118261SUSE SLES12 Security Update : libvirt (SUSE-SU-2018:1614-2) (Spectre)NessusSuSE Local Security Checks
medium
118256SUSE SLES12 Security Update : kernel (SUSE-SU-2018:1377-2) (Spectre)NessusSuSE Local Security Checks
medium
118255SUSE SLES12 Security Update : qemu (SUSE-SU-2018:1362-2) (Spectre)NessusSuSE Local Security Checks
medium
118178macOS < 10.14 Multiple VulnerabilitiesNessusMacOS X Local Security Checks
critical
118109openSUSE Security Update : java-1_8_0-openjdk (openSUSE-2018-1143) (Spectre)NessusSuSE Local Security Checks
critical
117992SUSE SLED12 / SLES12 Security Update : java-1_8_0-openjdk (SUSE-SU-2018:3064-1) (Spectre)NessusSuSE Local Security Checks
critical
117900SUSE SLES12 Security Update : qemu (SUSE-SU-2018:2973-1) (Spectre)NessusSuSE Local Security Checks
high
117580EulerOS Virtualization 2.5.0 : kvm (EulerOS-SA-2018-1271)NessusHuawei Local Security Checks
medium
117579EulerOS Virtualization 2.5.0 : kernel (EulerOS-SA-2018-1270)NessusHuawei Local Security Checks
high
117576EulerOS Virtualization 2.5.1 : kernel (EulerOS-SA-2018-1267)NessusHuawei Local Security Checks
medium
117574EulerOS Virtualization 2.5.1 : kvm (EulerOS-SA-2018-1265)NessusHuawei Local Security Checks
high
117502Debian DLA-1506-1 : intel-microcode security update (Foreshadow) (Spectre)NessusDebian Local Security Checks
medium
117386SUSE SLES11 Security Update : kvm (SUSE-SU-2018:2650-1) (Spectre)NessusSuSE Local Security Checks
high
112287SUSE SLES11 Security Update : kvm (SUSE-SU-2018:2615-1) (Spectre)NessusSuSE Local Security Checks
high
112204SUSE SLES12 Security Update : qemu (SUSE-SU-2018:2565-1) (Spectre)NessusSuSE Local Security Checks
high
112201SUSE SLES12 Security Update : qemu (SUSE-SU-2018:2556-1) (Spectre)NessusSuSE Local Security Checks
high
112151Ubuntu 14.04 LTS / 16.04 LTS / 18.04 LTS : Intel Microcode vulnerabilities (USN-3756-1) (Foreshadow) (Spectre)NessusUbuntu Local Security Checks
medium
112147SUSE SLES11 Security Update : xen (SUSE-SU-2018:2528-1) (Foreshadow) (Meltdown) (Spectre)NessusSuSE Local Security Checks
high
112116Security Updates for Windows 10 / Windows Server 2016 (August 2018) (Spectre) (Meltdown) (Foreshadow)NessusWindows : Microsoft Bulletins
medium
112031openSUSE Security Update : ucode-intel (openSUSE-2018-887) (Foreshadow) (Spectre)NessusSuSE Local Security Checks
medium
112003openSUSE Security Update : qemu (openSUSE-2018-894) (Spectre)NessusSuSE Local Security Checks
high
111992OracleVM 3.4 : xen (OVMSA-2018-0248) (Bunker Buster) (Foreshadow) (Meltdown) (POODLE) (Spectre)NessusOracleVM Local Security Checks
critical
111796Debian DSA-4273-1 : intel-microcode - security update (Spectre)NessusDebian Local Security Checks
medium
111783SUSE SLES11 Security Update : Security update to ucode-intel (SUSE-SU-2018:2335-1) (Foreshadow) (Spectre)NessusSuSE Local Security Checks
medium
111781SUSE SLED12 / SLES12 Security Update : Security update to ucode-intel (SUSE-SU-2018:2331-1) (Foreshadow) (Spectre)NessusSuSE Local Security Checks
medium
111775RHEL 6 : MRG (RHSA-2018:2396) (Foreshadow) (Spectre)NessusRed Hat Local Security Checks
medium
111735RHEL 6 : kernel (RHSA-2018:2394) (Foreshadow) (Spectre)NessusRed Hat Local Security Checks
high
111728RHEL 7 : kernel (RHSA-2018:2387) (Foreshadow) (Spectre)NessusRed Hat Local Security Checks
medium
111664SUSE SLED12 / SLES12 Security Update : libvirt (SUSE-SU-2018:2304-1) (Spectre)NessusSuSE Local Security Checks
medium
111661openSUSE Security Update : libvirt (openSUSE-2018-860) (Spectre)NessusSuSE Local Security Checks
medium
111516RHEL 7 : Virtualization Manager (RHSA-2018:2328) (Spectre)NessusRed Hat Local Security Checks
medium
111503SUSE SLES12 Security Update : libvirt (SUSE-SU-2018:2141-1) (Spectre)NessusSuSE Local Security Checks
critical
111493RHEL 6 : kernel (RHSA-2018:2309) (Spectre)NessusRed Hat Local Security Checks
medium
111434SUSE SLES12 Security Update : libvirt (SUSE-SU-2018:2082-1) (Spectre)NessusSuSE Local Security Checks
high
111413Slackware 14.2 : Slackware 14.2 kernel (SSA:2018-208-01) (Spectre)NessusSlackware Local Security Checks
medium
111373SUSE SLES11 Security Update : microcode_ctl (SUSE-SU-2018:2076-1) (Spectre)NessusSuSE Local Security Checks
medium
111359Debian DLA-1446-1 : intel-microcode security update (Spectre)NessusDebian Local Security Checks
medium
111342RHEL 6 / 7 : Virtualization (RHSA-2018:2246) (Spectre)NessusRed Hat Local Security Checks
medium
111336Amazon Linux 2 : libvirt (ALAS-2018-1049) (Spectre)NessusAmazon Linux Local Security Checks
high
111321RHEL 6 : kernel (RHSA-2018:2250) (Spectre)NessusRed Hat Local Security Checks
medium
111304Photon OS 2.0 : linux-esx / linux / patch / linux-aws / linux-secure (PhotonOS-PHSA-2018-2.0-0049) (deprecated)NessusPhotonOS Local Security Checks
high
111277Photon OS 1.0 : linux / linux-esx (PhotonOS-PHSA-2018-1.0-0151) (Spectre) (deprecated)NessusPhotonOS Local Security Checks
medium
111165Debian DLA-1423-1 : linux-4.9 new package (Spectre)NessusDebian Local Security Checks
high
111151Virtuozzo 6 : parallels-server-bm-release / vzkernel / etc (VZA-2018-048)NessusVirtuozzo Local Security Checks
medium
111148RHEL 7 : kernel (RHSA-2018:2216) (Spectre)NessusRed Hat Local Security Checks
medium
111077CentOS 6 : kernel (CESA-2018:2164) (Spectre)NessusCentOS Local Security Checks
high
111076CentOS 6 : qemu-kvm (CESA-2018:2162) (Spectre)NessusCentOS Local Security Checks
medium
111051SUSE SLED12 / SLES12 Security Update : Recommended update for ucode-intel (SUSE-SU-2018:1935-1) (Spectre)NessusSuSE Local Security Checks
medium
111023OracleVM 3.4 : qemu-kvm (OVMSA-2018-0238) (Spectre)NessusOracleVM Local Security Checks
critical
111003Scientific Linux Security Update : qemu-kvm on SL6.x i386/x86_64 (20180710) (Spectre)NessusScientific Linux Local Security Checks
medium
111002Scientific Linux Security Update : kernel on SL6.x i386/x86_64 (20180710) (Spectre)NessusScientific Linux Local Security Checks
high
111001RHEL 6 : kernel (RHSA-2018:2164) (Spectre)NessusRed Hat Local Security Checks
high
111000RHEL 6 : qemu-kvm (RHSA-2018:2162) (Spectre)NessusRed Hat Local Security Checks
medium
110999RHEL 7 : kernel (RHSA-2018:2161) (Spectre)NessusRed Hat Local Security Checks
medium
110996Oracle Linux 6 : kernel (ELSA-2018-2164)NessusOracle Linux Local Security Checks
high
110995Oracle Linux 6 : qemu-kvm (ELSA-2018-2162) (Spectre)NessusOracle Linux Local Security Checks
medium
110958openSUSE Security Update : ucode-intel (openSUSE-2018-700) (Spectre)NessusSuSE Local Security Checks
medium
110951Fedora 27 : 2:qemu (2018-9f02e5ed7b) (Spectre)NessusFedora Local Security Checks
medium
110908CentOS 7 : qemu-kvm (CESA-2018:2001) (Spectre)NessusCentOS Local Security Checks
medium
110907CentOS 7 : libvirt (CESA-2018:1997) (Spectre)NessusCentOS Local Security Checks
medium
110905CentOS 7 : kernel (CESA-2018:1965) (Spectre)NessusCentOS Local Security Checks
high
110901VMSA-2018-0012 : VMware vSphere, Workstation and Fusion updates enable Hypervisor-Assisted Guest Mitigations for Speculative Store Bypass issue (Spectre)NessusVMware ESX Local Security Checks
medium
110887Scientific Linux Security Update : kernel on SL6.x i386/x86_64 (20180619) (Spectre)NessusScientific Linux Local Security Checks
high
110865EulerOS 2.0 SP3 : qemu-kvm (EulerOS-SA-2018-1201)NessusHuawei Local Security Checks
high
110864EulerOS 2.0 SP2 : qemu-kvm (EulerOS-SA-2018-1200)NessusHuawei Local Security Checks
medium
110861EulerOS 2.0 SP3 : libvirt (EulerOS-SA-2018-1197)NessusHuawei Local Security Checks
high
110860EulerOS 2.0 SP3 : kernel (EulerOS-SA-2018-1196)NessusHuawei Local Security Checks
high
110859EulerOS 2.0 SP3 : java-1.8.0-openjdk (EulerOS-SA-2018-1195)NessusHuawei Local Security Checks
high
110858EulerOS 2.0 SP2 : java-1.8.0-openjdk (EulerOS-SA-2018-1194)NessusHuawei Local Security Checks
medium
110857EulerOS 2.0 SP3 : java-1.7.0-openjdk (EulerOS-SA-2018-1193)NessusHuawei Local Security Checks
high
110856EulerOS 2.0 SP2 : java-1.7.0-openjdk (EulerOS-SA-2018-1192)NessusHuawei Local Security Checks
medium
110795RHEL 7 : qemu-kvm-rhev (RHSA-2018:2060) (Spectre)NessusRed Hat Local Security Checks
medium
110792OracleVM 3.4 : xen (OVMSA-2018-0233) (Spectre)NessusOracleVM Local Security Checks
medium
110791OracleVM 3.4 : xen (OVMSA-2018-0232) (Spectre)NessusOracleVM Local Security Checks
medium
110752Oracle Linux 7 : qemu-kvm (ELSA-2018-2001) (Spectre)NessusOracle Linux Local Security Checks
medium
110751Oracle Linux 7 : libvirt (ELSA-2018-1997) (Spectre)NessusOracle Linux Local Security Checks
medium
110749Oracle Linux 7 : kernel (ELSA-2018-1965)NessusOracle Linux Local Security Checks
high
110720Scientific Linux Security Update : qemu-kvm on SL7.x x86_64 (20180626) (Spectre)NessusScientific Linux Local Security Checks
medium
110718Scientific Linux Security Update : libvirt on SL7.x x86_64 (20180626) (Spectre)NessusScientific Linux Local Security Checks
medium
110717Scientific Linux Security Update : kernel on SL7.x x86_64 (20180626) (Spectre)NessusScientific Linux Local Security Checks
high
110714RHEL 7 : libvirt (RHSA-2018:2006) (Spectre)NessusRed Hat Local Security Checks
medium
110713RHEL 7 : kernel-rt (RHSA-2018:2003) (Spectre)NessusRed Hat Local Security Checks
high
110712RHEL 7 : qemu-kvm (RHSA-2018:2001) (Spectre)NessusRed Hat Local Security Checks
medium
110711RHEL 7 : libvirt (RHSA-2018:1997) (Spectre)NessusRed Hat Local Security Checks
medium
110709RHEL 7 : kernel-alt (RHSA-2018:1967) (Spectre)NessusRed Hat Local Security Checks
medium
110708RHEL 7 : kernel (RHSA-2018:1965) (Spectre)NessusRed Hat Local Security Checks
high
110701Oracle Linux 6 : kernel (ELSA-2018-1854)NessusOracle Linux Local Security Checks
high
110658openSUSE Security Update : the Linux Kernel (openSUSE-2018-656) (Spectre)NessusSuSE Local Security Checks
high
110645CentOS 6 : kernel (CESA-2018:1854) (Spectre)NessusCentOS Local Security Checks
critical
110617EulerOS 2.0 SP2 : kernel (EulerOS-SA-2018-1153)NessusHuawei Local Security Checks
medium
110600RHEL 6 : kernel (RHSA-2018:1854) (Spectre)NessusRed Hat Local Security Checks
high
110596SUSE SLES12 Security Update : xen (SUSE-SU-2018:1699-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
medium
110526OracleVM 3.4 : Unbreakable / etc (OVMSA-2018-0228) (Spectre)NessusOracleVM Local Security Checks
high
110515Ubuntu 14.04 LTS / 16.04 LTS / 17.10 / 18.04 LTS : libvirt vulnerability and update (USN-3680-1) (Spectre)NessusUbuntu Local Security Checks
high
110514Ubuntu 14.04 LTS / 16.04 LTS / 17.10 / 18.04 LTS : QEMU update (USN-3679-1) (Spectre)NessusUbuntu Local Security Checks
medium
110509SUSE SLES12 Security Update : xen (SUSE-SU-2018:1658-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
medium
110506RHEL 6 : kernel (RHSA-2018:1826) (Spectre)NessusRed Hat Local Security Checks
medium
110462Amazon Linux AMI : java-1.8.0-openjdk (ALAS-2018-1039) (Spectre)NessusAmazon Linux Local Security Checks
medium
110461Amazon Linux AMI : kernel (ALAS-2018-1038) (Spectre)NessusAmazon Linux Local Security Checks
medium
110460Amazon Linux AMI : java-1.7.0-openjdk (ALAS-2018-1037) (Spectre)NessusAmazon Linux Local Security Checks
medium
110457Amazon Linux AMI : qemu-kvm (ALAS-2018-1034) (Spectre)NessusAmazon Linux Local Security Checks
high
110456Amazon Linux 2 : java-1.8.0-openjdk (ALAS-2018-1039) (Spectre)NessusAmazon Linux Local Security Checks
medium
110455Amazon Linux 2 : kernel (ALAS-2018-1038) (Spectre)NessusAmazon Linux Local Security Checks
medium
110454Amazon Linux 2 : java-1.7.0-openjdk (ALAS-2018-1037) (Spectre)NessusAmazon Linux Local Security Checks
medium
110451Amazon Linux 2 : qemu-kvm (ALAS-2018-1034) (Spectre)NessusAmazon Linux Local Security Checks
high
110450Amazon Linux 2 : libvirt (ALAS-2018-1033) (Spectre)NessusAmazon Linux Local Security Checks
medium
110445SUSE SLES12 Security Update : libvirt (SUSE-SU-2018:1614-1) (Spectre)NessusSuSE Local Security Checks
medium
110444SUSE SLES11 Security Update : xen (SUSE-SU-2018:1603-1) (Meltdown) (Spectre)NessusSuSE Local Security Checks
medium
110442openSUSE Security Update : qemu (openSUSE-2018-603) (Spectre)NessusSuSE Local Security Checks
medium
110441openSUSE Security Update : libvirt (openSUSE-2018-602) (Spectre)NessusSuSE Local Security Checks
medium
110438openSUSE Security Update : xen (openSUSE-2018-599) (Meltdown) (Spectre)NessusSuSE Local Security Checks
medium
110412SUSE SLES12 Security Update : xen (SUSE-SU-2018:1582-1) (Spectre)NessusSuSE Local Security Checks
medium
110404Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2018-4126)NessusOracle Linux Local Security Checks
medium
110402Fedora 27 : xen (2018-aec846c0ef) (Spectre)NessusFedora Local Security Checks
medium
110309openSUSE Security Update : xen (openSUSE-2018-547) (Spectre)NessusSuSE Local Security Checks
high
110265Citrix XenServer Local Memory Disclosure Vulnerability (CTX235225)NessusMisc.
medium
110261SUSE SLES11 Security Update : kvm (SUSE-SU-2018:1479-1) (Spectre)NessusSuSE Local Security Checks
medium
110259SUSE SLES11 Security Update : libvirt (SUSE-SU-2018:1475-1) (Spectre)NessusSuSE Local Security Checks
medium
110234Virtuozzo 7 : anaconda / anaconda-core / anaconda-dracut / etc (VZA-2018-037)NessusVirtuozzo Local Security Checks
high
110222SUSE SLED12 / SLES12 Security Update : xen (SUSE-SU-2018:1456-1) (Spectre)NessusSuSE Local Security Checks
high
110221RHEL 7 : kernel (RHSA-2018:1738) (Spectre)NessusRed Hat Local Security Checks
medium
110220RHEL 7 : kernel (RHSA-2018:1737) (Spectre)NessusRed Hat Local Security Checks
critical
110219RHEL 6 : kernel (RHSA-2018:1641) (Spectre)NessusRed Hat Local Security Checks
medium
110218RHEL 6 : kernel (RHSA-2018:1640) (Spectre)NessusRed Hat Local Security Checks
medium
110217RHEL 6 : kernel (RHSA-2018:1639) (Spectre)NessusRed Hat Local Security Checks
medium
110216RHEL 6 : kernel (RHSA-2018:1638) (Spectre)NessusRed Hat Local Security Checks
medium
110215RHEL 7 : kernel (RHSA-2018:1637) (Spectre)NessusRed Hat Local Security Checks
medium
110209Fedora 26 : kernel (2018-6367a17aa3) (Spectre)NessusFedora Local Security Checks
medium
110203CentOS 6 : libvirt (CESA-2018:1669) (Spectre)NessusCentOS Local Security Checks
medium
110189SUSE SLES11 Security Update : libvirt (SUSE-SU-2018:1452-1) (Spectre)NessusSuSE Local Security Checks
medium
110170Fedora 27 : kernel (2018-93c2e74446) (Spectre)NessusFedora Local Security Checks
medium
110157Virtuozzo 6 : cpupools / cpupools-features / etc (VZA-2018-034)NessusVirtuozzo Local Security Checks
high
110113RHEL 6 / 7 : Virtualization (RHSA-2018:1711) (Spectre)NessusRed Hat Local Security Checks
high
110112RHEL 7 : Virtualization (RHSA-2018:1710) (Spectre)NessusRed Hat Local Security Checks
high
110111RHEL 7 : Virtualization (RHSA-2018:1696) (Spectre)NessusRed Hat Local Security Checks
medium
110105openSUSE Security Update : the Linux Kernel (openSUSE-2018-515) (Spectre)NessusSuSE Local Security Checks
medium
110104openSUSE Security Update : the Linux Kernel (openSUSE-2018-514) (Spectre)NessusSuSE Local Security Checks
high
110102Debian DSA-4210-1 : xen - security update (Spectre)NessusDebian Local Security Checks
medium
110100Virtuozzo 6 : parallels-server-bm-release / vzkernel / etc (VZA-2018-033)NessusVirtuozzo Local Security Checks
medium
110091SUSE SLES11 Security Update : kvm (SUSE-SU-2018:1389-1) (Spectre)NessusSuSE Local Security Checks
medium
110090SUSE SLES12 Security Update : qemu (SUSE-SU-2018:1386-1) (Spectre)NessusSuSE Local Security Checks
medium
110081RHEL 7 : Virtualization (RHSA-2018:1690) (Spectre)NessusRed Hat Local Security Checks
medium
110080RHEL 6 : Virtualization (RHSA-2018:1689) (Spectre)NessusRed Hat Local Security Checks
medium
110079RHEL 6 : Virtualization (RHSA-2018:1688) (Spectre)NessusRed Hat Local Security Checks
medium
110078RHEL 7 : Virtualization Manager (RHSA-2018:1676) (Spectre)NessusRed Hat Local Security Checks
medium
110077RHEL 7 : Virtualization (RHSA-2018:1675) (Spectre)NessusRed Hat Local Security Checks
medium
110076RHEL 7 : Virtualization Manager (RHSA-2018:1674) (Spectre)NessusRed Hat Local Security Checks
medium
110075RHEL 7 : Virtualization (RHSA-2018:1655) (Spectre)NessusRed Hat Local Security Checks
medium
110074RHEL 7 : Virtualization (RHSA-2018:1654) (Spectre)NessusRed Hat Local Security Checks
medium
110073RHEL 6 : MRG (RHSA-2018:1642) (Spectre)NessusRed Hat Local Security Checks
medium
110072OracleVM 3.4 : Unbreakable / etc (OVMSA-2018-0223) (Spectre)NessusOracleVM Local Security Checks
high
110071Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2018-4114)NessusOracle Linux Local Security Checks
high
110063openSUSE Security Update : qemu (openSUSE-2018-489) (Spectre)NessusSuSE Local Security Checks
medium
110050Ubuntu 14.04 LTS : Linux kernel vulnerabilities (USN-3655-1) (Spectre)NessusUbuntu Local Security Checks
high
110049Ubuntu 14.04 LTS : Linux kernel (Xenial HWE) vulnerabilities (USN-3654-2) (Spectre)NessusUbuntu Local Security Checks
high
110048Ubuntu 16.04 LTS : Linux kernel vulnerabilities (USN-3654-1) (Spectre)NessusUbuntu Local Security Checks
high
110047Ubuntu 16.04 LTS : Linux kernel (HWE) vulnerabilities (USN-3653-2) (Spectre)NessusUbuntu Local Security Checks
high
110046Ubuntu 17.10 : Linux kernel vulnerabilities (USN-3653-1) (Spectre)NessusUbuntu Local Security Checks
high
110045Ubuntu 18.04 LTS : Linux kernel vulnerability (USN-3652-1) (Spectre)NessusUbuntu Local Security Checks
medium
110043SUSE SLED12 / SLES12 Security Update : qemu (SUSE-SU-2018:1378-1) (Spectre)NessusSuSE Local Security Checks
medium
110042SUSE SLES12 Security Update : kernel (SUSE-SU-2018:1377-1) (Spectre)NessusSuSE Local Security Checks
medium
110041SUSE SLES11 Security Update : kernel (SUSE-SU-2018:1376-1) (Spectre)NessusSuSE Local Security Checks
high
110040SUSE SLES12 Security Update : kernel (SUSE-SU-2018:1375-1) (Spectre)NessusSuSE Local Security Checks
high
110039SUSE SLES12 Security Update : kernel (SUSE-SU-2018:1374-1) (Spectre)NessusSuSE Local Security Checks
high
110035SUSE SLES11 Security Update : kernel (SUSE-SU-2018:1368-1) (Spectre)NessusSuSE Local Security Checks
high
110033SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2018:1366-1) (Spectre)NessusSuSE Local Security Checks
high
110030SUSE SLES12 Security Update : qemu (SUSE-SU-2018:1363-1) (Spectre)NessusSuSE Local Security Checks
medium
110029SUSE SLES12 Security Update : qemu (SUSE-SU-2018:1362-1) (Spectre)NessusSuSE Local Security Checks
medium
110028Scientific Linux Security Update : qemu-kvm on SL7.x x86_64 (20180522) (Spectre)NessusScientific Linux Local Security Checks
medium
110027Scientific Linux Security Update : libvirt on SL7.x x86_64 (20180522) (Spectre)NessusScientific Linux Local Security Checks
medium
110026Scientific Linux Security Update : libvirt on SL6.x i386/x86_64 (20180522) (Spectre)NessusScientific Linux Local Security Checks
medium
110025Scientific Linux Security Update : kernel on SL7.x x86_64 (20180522) (Spectre)NessusScientific Linux Local Security Checks
medium
110024Scientific Linux Security Update : kernel on SL6.x i386/x86_64 (20180522) (Spectre)NessusScientific Linux Local Security Checks
medium
110023Scientific Linux Security Update : java-1.8.0-openjdk on SL7.x x86_64 (20180522) (Spectre)NessusScientific Linux Local Security Checks
medium
110022Scientific Linux Security Update : java-1.8.0-openjdk on SL6.x i386/x86_64 (20180522) (Spectre)NessusScientific Linux Local Security Checks
medium
110021Scientific Linux Security Update : java-1.7.0-openjdk on SL7.x x86_64 (20180522) (Spectre)NessusScientific Linux Local Security Checks
medium
110020Scientific Linux Security Update : qemu-kvm on SL6.x i386/x86_64 (20180521) (Spectre)NessusScientific Linux Local Security Checks
medium
110019Scientific Linux Security Update : java-1.7.0-openjdk on SL6.x i386/x86_64 (20180521) (Spectre)NessusScientific Linux Local Security Checks
medium
110018RHEL 6 : libvirt (RHSA-2018:1669) (Spectre)NessusRed Hat Local Security Checks
medium
110017RHEL 7 : libvirt (RHSA-2018:1668) (Spectre)NessusRed Hat Local Security Checks
medium
110016RHEL 6 : libvirt (RHSA-2018:1667) (Spectre)NessusRed Hat Local Security Checks
medium
110015RHEL 6 : libvirt (RHSA-2018:1666) (Spectre)NessusRed Hat Local Security Checks
medium
110014RHEL 6 : libvirt (RHSA-2018:1665) (Spectre)NessusRed Hat Local Security Checks
medium
110013RHEL 6 : libvirt (RHSA-2018:1664) (Spectre)NessusRed Hat Local Security Checks
medium
110012RHEL 7 : qemu-kvm (RHSA-2018:1663) (Spectre)NessusRed Hat Local Security Checks
medium
110011RHEL 7 : qemu-kvm (RHSA-2018:1662) (Spectre)NessusRed Hat Local Security Checks
medium
110010RHEL 7 : qemu-kvm (RHSA-2018:1661) (Spectre)NessusRed Hat Local Security Checks
medium
110009RHEL 6 : qemu-kvm (RHSA-2018:1660) (Spectre)NessusRed Hat Local Security Checks
medium
110008RHEL 6 : qemu-kvm (RHSA-2018:1659) (Spectre)NessusRed Hat Local Security Checks
medium
110007RHEL 6 : qemu-kvm (RHSA-2018:1658) (Spectre)NessusRed Hat Local Security Checks
medium
110006RHEL 6 : qemu-kvm (RHSA-2018:1657) (Spectre)NessusRed Hat Local Security Checks
medium
110005RHEL 6 : qemu-kvm (RHSA-2018:1656) (Spectre)NessusRed Hat Local Security Checks
medium
110004RHEL 7 : libvirt (RHSA-2018:1653) (Spectre)NessusRed Hat Local Security Checks
medium
110003RHEL 7 : libvirt (RHSA-2018:1652) (Spectre)NessusRed Hat Local Security Checks
medium
110002RHEL 6 : kernel (RHSA-2018:1651) (Spectre)NessusRed Hat Local Security Checks
medium
110001RHEL 6 : java-1.8.0-openjdk (RHSA-2018:1650) (Spectre)NessusRed Hat Local Security Checks
medium
110000RHEL 7 : java-1.8.0-openjdk (RHSA-2018:1649) (Spectre)NessusRed Hat Local Security Checks
medium
109999RHEL 7 : java-1.7.0-openjdk (RHSA-2018:1648) (Spectre)NessusRed Hat Local Security Checks
medium
109998RHEL 6 : java-1.7.0-openjdk (RHSA-2018:1647) (Spectre)NessusRed Hat Local Security Checks
medium
109997RHEL 7 : kernel (RHSA-2018:1636) (Spectre)NessusRed Hat Local Security Checks
medium
109996RHEL 7 : kernel (RHSA-2018:1635) (Spectre)NessusRed Hat Local Security Checks
medium
109995RHEL 7 : qemu-kvm (RHSA-2018:1633) (Spectre)NessusRed Hat Local Security Checks
medium
109994RHEL 7 : libvirt (RHSA-2018:1632) (Spectre)NessusRed Hat Local Security Checks
medium
109993RHEL 7 : kernel-rt (RHSA-2018:1630) (Spectre)NessusRed Hat Local Security Checks
medium
109992RHEL 7 : kernel (RHSA-2018:1629) (Spectre)NessusRed Hat Local Security Checks
medium
109988OracleVM 3.4 : qemu-kvm (OVMSA-2018-0219) (Spectre)NessusOracleVM Local Security Checks
medium
109986Oracle Linux 6 : libvirt (ELSA-2018-1669) (Spectre)NessusOracle Linux Local Security Checks
medium
109985Oracle Linux 6 : qemu-kvm (ELSA-2018-1660) (Spectre)NessusOracle Linux Local Security Checks
medium
109984Oracle Linux 6 : kernel (ELSA-2018-1651)NessusOracle Linux Local Security Checks
medium
109983Oracle Linux 6 : java-1.8.0-openjdk (ELSA-2018-1650) (Spectre)NessusOracle Linux Local Security Checks
medium
109982Oracle Linux 7 : java-1.8.0-openjdk (ELSA-2018-1649) (Spectre)NessusOracle Linux Local Security Checks
medium
109981Oracle Linux 7 : java-1.7.0-openjdk (ELSA-2018-1648) (Spectre)NessusOracle Linux Local Security Checks
medium
109980Oracle Linux 6 : java-1.7.0-openjdk (ELSA-2018-1647) (Spectre)NessusOracle Linux Local Security Checks
medium
109979Oracle Linux 7 : qemu-kvm (ELSA-2018-1633) (Spectre)NessusOracle Linux Local Security Checks
medium
109978Oracle Linux 7 : libvirt (ELSA-2018-1632) (Spectre)NessusOracle Linux Local Security Checks
medium
109977Oracle Linux 7 : kernel (ELSA-2018-1629)NessusOracle Linux Local Security Checks
medium
109966CentOS 6 : qemu-kvm (CESA-2018:1660) (Spectre)NessusCentOS Local Security Checks
medium
109965CentOS 6 : kernel (CESA-2018:1651) (Spectre)NessusCentOS Local Security Checks
medium
109964CentOS 6 : java-1.8.0-openjdk (CESA-2018:1650) (Spectre)NessusCentOS Local Security Checks
medium
109963CentOS 7 : java-1.8.0-openjdk (CESA-2018:1649) (Spectre)NessusCentOS Local Security Checks
medium
109962CentOS 7 : java-1.7.0-openjdk (CESA-2018:1648) (Spectre)NessusCentOS Local Security Checks
medium
109961CentOS 6 : java-1.7.0-openjdk (CESA-2018:1647) (Spectre)NessusCentOS Local Security Checks
medium
109960CentOS 7 : qemu-kvm (CESA-2018:1633) (Spectre)NessusCentOS Local Security Checks
medium
109959CentOS 7 : libvirt (CESA-2018:1632) (Spectre)NessusCentOS Local Security Checks
medium
109958CentOS 7 : kernel (CESA-2018:1629) (Spectre)NessusCentOS Local Security Checks
medium
109957AIX 5.3 TL 12 : variant4 (IJ05826) (Spectre)NessusAIX Local Security Checks
medium
109956AIX 6.1 TL 9 : variant4 (IJ05824) (Spectre)NessusAIX Local Security Checks
medium
109955AIX 7.1 TL 4 : variant4 (IJ05823) (Spectre)NessusAIX Local Security Checks
medium
109954AIX 7.1 TL 5 : variant4 (IJ05822) (Spectre)NessusAIX Local Security Checks
medium
109953AIX 7.2 TL 0 : variant4 (IJ05821) (Spectre)NessusAIX Local Security Checks
medium
109952AIX 7.2 TL 1 : variant4 (IJ05820) (Spectre)NessusAIX Local Security Checks
medium
109951AIX 7.2 TL 2 : variant4 (IJ05818) (Spectre)NessusAIX Local Security Checks
medium