5.6
MEDIUM
CVE-2017-5753
AMD Microprocessor Speculative Execution Branch Prediction Vulnerability (Side-Channel Extraction)
Description

Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

INFO

Published Date :

Jan. 4, 2018, 1:29 p.m.

Last Modified :

Nov. 21, 2024, 3:28 a.m.

Remotely Exploitable :

No

Impact Score :

4.0

Exploitability Score :

1.1
Public PoC/Exploit Available at Github

CVE-2017-5753 has a 94 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

Affected Products

The following products are affected by CVE-2017-5753 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Intel core_i3
2 Intel core_i5
3 Intel core_i7
4 Intel xeon_e3
5 Intel xeon_e3_1220_v5
6 Intel xeon_e3_1225_v5
7 Intel xeon_e3_1230_v5
8 Intel xeon_e3_1235l_v5
9 Intel xeon_e3_1240_v5
10 Intel xeon_e3_1240l_v5
11 Intel xeon_e3_1245_v5
12 Intel xeon_e3_1260l_v5
13 Intel xeon_e3_1268l_v5
14 Intel xeon_e3_1270_v5
15 Intel xeon_e3_1275_v5
16 Intel xeon_e3_1280_v5
17 Intel xeon_e3_1505l_v5
18 Intel xeon_e3_1505m_v5
19 Intel xeon_e3_1220_v6
20 Intel xeon_e3_1225_v6
21 Intel xeon_e3_1230_v6
22 Intel xeon_e3_1240_v6
23 Intel xeon_e3_1245_v6
24 Intel xeon_e3_1270_v6
25 Intel xeon_e3_1275_v6
26 Intel xeon_e3_1280_v6
27 Intel xeon_e3_1285_v6
28 Intel xeon_e3_1501l_v6
29 Intel xeon_e3_1501m_v6
30 Intel xeon_e3_1505l_v6
31 Intel core_m
32 Intel core_m3
33 Intel core_m5
34 Intel core_m7
35 Intel xeon
36 Intel xeon_bronze_3104
37 Intel xeon_bronze_3106
38 Intel xeon_gold
39 Intel xeon_platinum
40 Intel xeon_silver
41 Intel atom_c
42 Intel atom_e
43 Intel atom_x3
44 Intel atom_z
45 Intel celeron_j
46 Intel celeron_n
47 Intel pentium_j
48 Intel pentium_n
49 Intel xeon_e-1105c
50 Intel xeon_e3_1105c_v2
51 Intel xeon_e3_1125c
52 Intel xeon_e3_1125c_v2
53 Intel xeon_e3_1220
54 Intel xeon_e3_1220_v2
55 Intel xeon_e3_1220_v3
56 Intel xeon_e3_12201
57 Intel xeon_e3_12201_v2
58 Intel xeon_e3_1220l_v3
59 Intel xeon_e3_1225
60 Intel xeon_e3_1225_v2
61 Intel xeon_e3_1225_v3
62 Intel xeon_e3_1226_v3
63 Intel xeon_e3_1230
64 Intel xeon_e3_1230_v2
65 Intel xeon_e3_1230_v3
66 Intel xeon_e3_1230l_v3
67 Intel xeon_e3_1231_v3
68 Intel xeon_e3_1235
69 Intel xeon_e3_1240
70 Intel xeon_e3_1240_v2
71 Intel xeon_e3_1240_v3
72 Intel xeon_e3_1240l_v3
73 Intel xeon_e3_1241_v3
74 Intel xeon_e3_1245
75 Intel xeon_e3_1245_v2
76 Intel xeon_e3_1245_v3
77 Intel xeon_e3_1246_v3
78 Intel xeon_e3_1258l_v4
79 Intel xeon_e3_1260l
80 Intel xeon_e3_1265l_v2
81 Intel xeon_e3_1265l_v3
82 Intel xeon_e3_1265l_v4
83 Intel xeon_e3_1268l_v3
84 Intel xeon_e3_1270
85 Intel xeon_e3_1270_v2
86 Intel xeon_e3_1270_v3
87 Intel xeon_e3_1271_v3
88 Intel xeon_e3_1275
89 Intel xeon_e3_1275_v2
90 Intel xeon_e3_1275_v3
91 Intel xeon_e3_1275l_v3
92 Intel xeon_e3_1276_v3
93 Intel xeon_e3_1278l_v4
94 Intel xeon_e3_1280
95 Intel xeon_e3_1280_v2
96 Intel xeon_e3_1280_v3
97 Intel xeon_e3_1281_v3
98 Intel xeon_e3_1285_v3
99 Intel xeon_e3_1285_v4
100 Intel xeon_e3_1285l_v3
101 Intel xeon_e3_1285l_v4
102 Intel xeon_e3_1286_v3
103 Intel xeon_e3_1286l_v3
104 Intel xeon_e3_1290
105 Intel xeon_e3_1290_v2
106 Intel xeon_e5
107 Intel xeon_e5_1428l
108 Intel xeon_e5_1428l_v2
109 Intel xeon_e5_1428l_v3
110 Intel xeon_e5_1620
111 Intel xeon_e5_1620_v2
112 Intel xeon_e5_1620_v3
113 Intel xeon_e5_1620_v4
114 Intel xeon_e5_1630_v3
115 Intel xeon_e5_1630_v4
116 Intel xeon_e5_1650
117 Intel xeon_e5_1650_v2
118 Intel xeon_e5_1650_v3
119 Intel xeon_e5_1650_v4
120 Intel xeon_e5_1660
121 Intel xeon_e5_1660_v2
122 Intel xeon_e5_1660_v3
123 Intel xeon_e5_1660_v4
124 Intel xeon_e5_1680_v3
125 Intel xeon_e5_1680_v4
126 Intel xeon_e5_2403
127 Intel xeon_e5_2403_v2
128 Intel xeon_e5_2407
129 Intel xeon_e5_2407_v2
130 Intel xeon_e5_2408l_v3
131 Intel xeon_e5_2418l
132 Intel xeon_e5_2418l_v2
133 Intel xeon_e5_2418l_v3
134 Intel xeon_e5_2420
135 Intel xeon_e5_2420_v2
136 Intel xeon_e5_2428l
137 Intel xeon_e5_2428l_v2
138 Intel xeon_e5_2428l_v3
139 Intel xeon_e5_2430
140 Intel xeon_e5_2430_v2
141 Intel xeon_e5_2430l
142 Intel xeon_e5_2430l_v2
143 Intel xeon_e5_2438l_v3
144 Intel xeon_e5_2440
145 Intel xeon_e5_2440_v2
146 Intel xeon_e5_2448l
147 Intel xeon_e5_2448l_v2
148 Intel xeon_e5_2450
149 Intel xeon_e5_2450_v2
150 Intel xeon_e5_2450l
151 Intel xeon_e5_2450l_v2
152 Intel xeon_e5_2470
153 Intel xeon_e5_2470_v2
154 Intel xeon_e5_2603
155 Intel xeon_e5_2603_v2
156 Intel xeon_e5_2603_v3
157 Intel xeon_e5_2603_v4
158 Intel xeon_e5_2608l_v3
159 Intel xeon_e5_2608l_v4
160 Intel xeon_e5_2609
161 Intel xeon_e5_2609_v2
162 Intel xeon_e5_2609_v3
163 Intel xeon_e5_2609_v4
164 Intel xeon_e5_2618l_v2
165 Intel xeon_e5_2618l_v3
166 Intel xeon_e5_2618l_v4
167 Intel xeon_e5_2620
168 Intel xeon_e5_2620_v2
169 Intel xeon_e5_2620_v3
170 Intel xeon_e5_2620_v4
171 Intel xeon_e5_2623_v3
172 Intel xeon_e5_2623_v4
173 Intel xeon_e5_2628l_v2
174 Intel xeon_e5_2628l_v3
175 Intel xeon_e5_2628l_v4
176 Intel xeon_e5_2630
177 Intel xeon_e5_2630_v2
178 Intel xeon_e5_2630_v3
179 Intel xeon_e5_2630_v4
180 Intel xeon_e5_2630l
181 Intel xeon_e5_2630l_v2
182 Intel xeon_e5_2630l_v3
183 Intel xeon_e5_2630l_v4
184 Intel xeon_e5_2637
185 Intel xeon_e5_2637_v2
186 Intel xeon_e5_2637_v3
187 Intel xeon_e5_2637_v4
188 Intel xeon_e5_2640
189 Intel xeon_e5_2640_v2
190 Intel xeon_e5_2640_v3
191 Intel xeon_e5_2640_v4
192 Intel xeon_e5_2643
193 Intel xeon_e5_2643_v2
194 Intel xeon_e5_2643_v3
195 Intel xeon_e5_2643_v4
196 Intel xeon_e5_2648l
197 Intel xeon_e5_2648l_v2
198 Intel xeon_e5_2648l_v3
199 Intel xeon_e5_2648l_v4
200 Intel xeon_e5_2650
201 Intel xeon_e5_2650_v2
202 Intel xeon_e5_2650_v3
203 Intel xeon_e5_2650_v4
204 Intel xeon_e5_2650l
205 Intel xeon_e5_2650l_v2
206 Intel xeon_e5_2650l_v3
207 Intel xeon_e7
208 Intel xeon_phi
209 Intel atom_x5-e3930
210 Intel atom_x5-e3940
211 Intel atom_x7-e3950
1 Phoenixcontact bl_ppc_1000_firmware
2 Phoenixcontact bl_ppc12_1000_firmware
3 Phoenixcontact bl_ppc15_1000_firmware
4 Phoenixcontact bl_ppc17_1000_firmware
5 Phoenixcontact bl_bpc_2000_firmware
6 Phoenixcontact bl_bpc_2001_firmware
7 Phoenixcontact bl_bpc_3000_firmware
8 Phoenixcontact bl_bpc_3001_firmware
9 Phoenixcontact bl_ppc15_3000_firmware
10 Phoenixcontact bl_ppc17_3000_firmware
11 Phoenixcontact bl_bpc_7000_firmware
12 Phoenixcontact bl_bpc_7001_firmware
13 Phoenixcontact bl_ppc_7000_firmware
14 Phoenixcontact bl_ppc15_7000_firmware
15 Phoenixcontact bl_ppc17_7000_firmware
16 Phoenixcontact bl_rackmount_2u_firmware
17 Phoenixcontact bl_rackmount_4u_firmware
18 Phoenixcontact bl2_bpc_1000_firmware
19 Phoenixcontact bl2_ppc_1000_firmware
20 Phoenixcontact bl2_bpc_2000_firmware
21 Phoenixcontact bl2_ppc_2000_firmware
22 Phoenixcontact bl2_bpc_7000_firmware
23 Phoenixcontact bl2_ppc_7000_firmware
24 Phoenixcontact dl_ppc15_1000_firmware
25 Phoenixcontact dl_ppc15m_7000_firmware
26 Phoenixcontact dl_ppc18.5m_7000_firmware
27 Phoenixcontact dl_ppc21.5m_7000_firmware
28 Phoenixcontact el_ppc_1000_firmware
29 Phoenixcontact el_ppc_1000\/wt_firmware
30 Phoenixcontact el_ppc_1000\/m_firmware
31 Phoenixcontact valueline_ipc_firmware
32 Phoenixcontact vl_bpc_1000_firmware
33 Phoenixcontact vl_bpc_2000_firmware
34 Phoenixcontact vl_ppc_2000_firmware
35 Phoenixcontact vl_bpc_3000_firmware
36 Phoenixcontact vl_ppc_3000_firmware
37 Phoenixcontact vl_ipc_p7000_firmware
38 Phoenixcontact vl2_bpc_1000_firmware
39 Phoenixcontact vl2_ppc_1000_firmware
40 Phoenixcontact vl2_bpc_2000_firmware
41 Phoenixcontact vl2_ppc_2000_firmware
42 Phoenixcontact vl2_bpc_3000_firmware
43 Phoenixcontact vl2_ppc_3000_firmware
44 Phoenixcontact vl2_bpc_7000_firmware
45 Phoenixcontact vl2_ppc_7000_firmware
46 Phoenixcontact vl2_bpc_9000_firmware
47 Phoenixcontact vl2_ppc_9000_firmware
48 Phoenixcontact vl2_ppc7_1000_firmware
49 Phoenixcontact vl2_ppc9_1000_firmware
50 Phoenixcontact vl2_ppc12_1000_firmware
51 Phoenixcontact bl_ppc_1000
52 Phoenixcontact bl_ppc12_1000
53 Phoenixcontact bl_ppc15_1000
54 Phoenixcontact bl_ppc17_1000
55 Phoenixcontact bl_bpc_2000
56 Phoenixcontact bl_bpc_2001
57 Phoenixcontact bl_bpc_3000
58 Phoenixcontact bl_bpc_3001
59 Phoenixcontact bl_ppc15_3000
60 Phoenixcontact bl_ppc17_3000
61 Phoenixcontact bl_bpc_7000
62 Phoenixcontact bl_bpc_7001
63 Phoenixcontact bl_ppc_7000
64 Phoenixcontact bl_ppc15_7000
65 Phoenixcontact bl_ppc17_7000
66 Phoenixcontact bl_rackmount_2u
67 Phoenixcontact bl_rackmount_4u
68 Phoenixcontact bl2_bpc_1000
69 Phoenixcontact bl2_ppc_1000
70 Phoenixcontact bl2_bpc_2000
71 Phoenixcontact bl2_ppc_2000
72 Phoenixcontact bl2_bpc_7000
73 Phoenixcontact bl2_ppc_7000
74 Phoenixcontact dl_ppc15_1000
75 Phoenixcontact dl_ppc15m_7000
76 Phoenixcontact dl_ppc18.5m_7000
77 Phoenixcontact dl_ppc21.5m_7000
78 Phoenixcontact el_ppc_1000
79 Phoenixcontact el_ppc_1000\/wt
80 Phoenixcontact el_ppc_1000\/m
81 Phoenixcontact valueline_ipc
82 Phoenixcontact vl_bpc_1000
83 Phoenixcontact vl_bpc_2000
84 Phoenixcontact vl_ppc_2000
85 Phoenixcontact vl_bpc_3000
86 Phoenixcontact vl_ppc_3000
87 Phoenixcontact vl_ipc_p7000
88 Phoenixcontact vl2_bpc_1000
89 Phoenixcontact vl2_ppc_1000
90 Phoenixcontact vl2_bpc_2000
91 Phoenixcontact vl2_ppc_2000
92 Phoenixcontact vl2_bpc_3000
93 Phoenixcontact vl2_ppc_3000
94 Phoenixcontact vl2_bpc_7000
95 Phoenixcontact vl2_ppc_7000
96 Phoenixcontact vl2_bpc_9000
97 Phoenixcontact vl2_ppc_9000
98 Phoenixcontact vl2_ppc7_1000
99 Phoenixcontact vl2_ppc9_1000
100 Phoenixcontact vl2_ppc12_1000
1 Arm cortex-a57_firmware
2 Arm cortex-a72_firmware
3 Arm cortex-a73_firmware
4 Arm cortex-a75_firmware
5 Arm cortex-a76_firmware
6 Arm cortex-a77_firmware
7 Arm cortex-a78_firmware
8 Arm cortex-a72
9 Arm cortex-r7_firmware
10 Arm cortex-r8_firmware
11 Arm cortex-a8_firmware
12 Arm cortex-a9_firmware
13 Arm cortex-a12_firmware
14 Arm cortex-a15_firmware
15 Arm cortex-a17_firmware
16 Arm cortex-a78ae_firmware
17 Arm neoverse_n1_firmware
18 Arm neoverse_n2_firmware
19 Arm cortex-x1_firmware
20 Arm cortex-a57
21 Arm cortex-a73
22 Arm cortex-a75
23 Arm cortex-a76
24 Arm cortex-a77
25 Arm cortex-a78
26 Arm cortex-r7
27 Arm cortex-r8
28 Arm cortex-a8
29 Arm cortex-a9
30 Arm cortex-a12
31 Arm cortex-a15
32 Arm cortex-a17
33 Arm cortex-a78ae
34 Arm neoverse_n1
35 Arm neoverse_n2
36 Arm cortex-x1
1 Siemens simatic_itc1500_firmware
2 Siemens simatic_itc1500_pro_firmware
3 Siemens simatic_itc1900_firmware
4 Siemens simatic_itc1900_pro_firmware
5 Siemens simatic_itc2200_firmware
6 Siemens simatic_itc2200_pro_firmware
7 Siemens simatic_winac_rtx_\(f\)_2010_firmware
8 Siemens simatic_winac_rtx_\(f\)_2010
9 Siemens simatic_itc1500
10 Siemens simatic_itc1500_pro
11 Siemens simatic_itc1900
12 Siemens simatic_itc1900_pro
13 Siemens simatic_itc2200
14 Siemens simatic_itc2200_pro
1 Synology router_manager
2 Synology diskstation_manager
3 Synology vs960hd_firmware
4 Synology skynas
5 Synology virtual_machine_manager
6 Synology vs360hd_firmware
7 Synology vs960hd
8 Synology vs360hd
1 Pepperl-fuchs visunet_rm_shell
2 Pepperl-fuchs btc12_firmware
3 Pepperl-fuchs btc14_firmware
4 Pepperl-fuchs btc12
5 Pepperl-fuchs btc14
1 Vmware workstation
2 Vmware esxi
3 Vmware fusion
1 Suse suse_linux_enterprise_desktop
2 Suse suse_linux_enterprise_server
3 Suse suse_linux_enterprise_software_development_kit
1 Netapp solidfire
2 Netapp hci
1 Oracle solaris
2 Oracle local_service_management_system
1 Canonical ubuntu_linux
1 Debian debian_linux
1 Opensuse leap
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2017-5753.

URL Resource
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html Mailing List Third Party Advisory
http://nvidia.custhelp.com/app/answers/detail/a_id/4609 Third Party Advisory
http://nvidia.custhelp.com/app/answers/detail/a_id/4611 Third Party Advisory
http://nvidia.custhelp.com/app/answers/detail/a_id/4613 Third Party Advisory
http://nvidia.custhelp.com/app/answers/detail/a_id/4614 Third Party Advisory
http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html Exploit Third Party Advisory VDB Entry
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt Third Party Advisory
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt Third Party Advisory
http://www.kb.cert.org/vuls/id/584653 Third Party Advisory US Government Resource
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html Patch Third Party Advisory
http://www.securityfocus.com/bid/102371 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1040071 Third Party Advisory VDB Entry
http://xenbits.xen.org/xsa/advisory-254.html Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0292 Third Party Advisory
https://access.redhat.com/security/vulnerabilities/speculativeexecution Third Party Advisory
https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/ Third Party Advisory
https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/ Third Party Advisory
https://cdrdv2.intel.com/v1/dl/getContent/685359 Vendor Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf Third Party Advisory
https://cert.vde.com/en-us/advisories/vde-2018-002 Third Party Advisory
https://cert.vde.com/en-us/advisories/vde-2018-003 Third Party Advisory
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability Third Party Advisory
https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html Third Party Advisory
https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html Mailing List Third Party Advisory
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002 Patch Third Party Advisory Vendor Advisory
https://seclists.org/bugtraq/2019/Jun/36 Issue Tracking Mailing List Third Party Advisory
https://security.gentoo.org/glsa/201810-06 Third Party Advisory
https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html Third Party Advisory
https://security.netapp.com/advisory/ntap-20180104-0001/ Third Party Advisory
https://spectreattack.com/ Technical Description Third Party Advisory
https://support.citrix.com/article/CTX231399 Third Party Advisory
https://support.f5.com/csp/article/K91229003 Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us Third Party Advisory
https://support.lenovo.com/us/en/solutions/LEN-18282 Third Party Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel Third Party Advisory
https://usn.ubuntu.com/3540-1/ Third Party Advisory
https://usn.ubuntu.com/3540-2/ Third Party Advisory
https://usn.ubuntu.com/3541-1/ Third Party Advisory
https://usn.ubuntu.com/3541-2/ Third Party Advisory
https://usn.ubuntu.com/3542-1/ Third Party Advisory
https://usn.ubuntu.com/3542-2/ Third Party Advisory
https://usn.ubuntu.com/3549-1/ Third Party Advisory
https://usn.ubuntu.com/3580-1/ Third Party Advisory
https://usn.ubuntu.com/3597-1/ Third Party Advisory
https://usn.ubuntu.com/3597-2/ Third Party Advisory
https://usn.ubuntu.com/usn/usn-3516-1/ Third Party Advisory
https://www.debian.org/security/2018/dsa-4187 Third Party Advisory
https://www.debian.org/security/2018/dsa-4188 Third Party Advisory
https://www.exploit-db.com/exploits/43427/ Exploit Third Party Advisory VDB Entry
https://www.kb.cert.org/vuls/id/180049 Third Party Advisory US Government Resource
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001 Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html Patch Third Party Advisory
https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/ Third Party Advisory
https://www.synology.com/support/security/Synology_SA_18_01 Third Party Advisory
https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html Mailing List Third Party Advisory
http://nvidia.custhelp.com/app/answers/detail/a_id/4609 Third Party Advisory
http://nvidia.custhelp.com/app/answers/detail/a_id/4611 Third Party Advisory
http://nvidia.custhelp.com/app/answers/detail/a_id/4613 Third Party Advisory
http://nvidia.custhelp.com/app/answers/detail/a_id/4614 Third Party Advisory
http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html Exploit Third Party Advisory VDB Entry
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt Third Party Advisory
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt Third Party Advisory
http://www.kb.cert.org/vuls/id/584653 Third Party Advisory US Government Resource
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html Patch Third Party Advisory
http://www.securityfocus.com/bid/102371 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1040071 Third Party Advisory VDB Entry
http://xenbits.xen.org/xsa/advisory-254.html Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0292 Third Party Advisory
https://access.redhat.com/security/vulnerabilities/speculativeexecution Third Party Advisory
https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/ Third Party Advisory
https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/ Third Party Advisory
https://cdrdv2.intel.com/v1/dl/getContent/685359 Vendor Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf Third Party Advisory
https://cert.vde.com/en-us/advisories/vde-2018-002 Third Party Advisory
https://cert.vde.com/en-us/advisories/vde-2018-003 Third Party Advisory
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability Third Party Advisory
https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html Third Party Advisory
https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html Mailing List Third Party Advisory
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002 Patch Third Party Advisory Vendor Advisory
https://seclists.org/bugtraq/2019/Jun/36 Issue Tracking Mailing List Third Party Advisory
https://security.gentoo.org/glsa/201810-06 Third Party Advisory
https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html Third Party Advisory
https://security.netapp.com/advisory/ntap-20180104-0001/ Third Party Advisory
https://spectreattack.com/ Technical Description Third Party Advisory
https://support.citrix.com/article/CTX231399 Third Party Advisory
https://support.f5.com/csp/article/K91229003 Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us Third Party Advisory
https://support.lenovo.com/us/en/solutions/LEN-18282 Third Party Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel Third Party Advisory
https://usn.ubuntu.com/3540-1/ Third Party Advisory
https://usn.ubuntu.com/3540-2/ Third Party Advisory
https://usn.ubuntu.com/3541-1/ Third Party Advisory
https://usn.ubuntu.com/3541-2/ Third Party Advisory
https://usn.ubuntu.com/3542-1/ Third Party Advisory
https://usn.ubuntu.com/3542-2/ Third Party Advisory
https://usn.ubuntu.com/3549-1/ Third Party Advisory
https://usn.ubuntu.com/3580-1/ Third Party Advisory
https://usn.ubuntu.com/3597-1/ Third Party Advisory
https://usn.ubuntu.com/3597-2/ Third Party Advisory
https://usn.ubuntu.com/usn/usn-3516-1/ Third Party Advisory
https://www.debian.org/security/2018/dsa-4187 Third Party Advisory
https://www.debian.org/security/2018/dsa-4188 Third Party Advisory
https://www.exploit-db.com/exploits/43427/ Exploit Third Party Advisory VDB Entry
https://www.kb.cert.org/vuls/id/180049 Third Party Advisory US Government Resource
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001 Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html Patch Third Party Advisory
https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/ Third Party Advisory
https://www.synology.com/support/security/Synology_SA_18_01 Third Party Advisory
https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html Third Party Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Informe final de Organización del Computador - 2C 2023 | Vulnerabilidades 👾⚠️

fiuba

Updated: 3 months, 2 weeks ago
0 stars 0 fork 0 watcher
Born at : Aug. 28, 2024, 6:20 a.m. This repo has been linked 5 different CVEs too.

Security analysis for the RISC-V ISA

bof cybersecurity embedded-systems risc-v riscv rop

Python C Assembly Shell Jupyter Notebook Makefile Perl Ruby HTML Roff

Updated: 4 months, 2 weeks ago
1 stars 0 fork 0 watcher
Born at : March 17, 2024, 3:54 p.m. This repo has been linked 3 different CVEs too.

spectre attack v1.2

Makefile C

Updated: 10 months ago
0 stars 0 fork 0 watcher
Born at : Feb. 19, 2024, 5:12 a.m. This repo has been linked 2 different CVEs too.

spectre attack v1.1

Makefile C

Updated: 10 months ago
0 stars 0 fork 0 watcher
Born at : Feb. 19, 2024, 5:09 a.m. This repo has been linked 2 different CVEs too.

A simple GUI for spectre-meltdown-checker

Python

Updated: 5 months, 2 weeks ago
0 stars 0 fork 0 watcher
Born at : Feb. 12, 2024, 4:39 p.m. This repo has been linked 16 different CVEs too.

None

Makefile C

Updated: 10 months, 2 weeks ago
0 stars 0 fork 0 watcher
Born at : Feb. 7, 2024, 12:38 a.m. This repo has been linked 2 different CVEs too.

This repo aggregates all files about Prisma Cloud Workshop for BanRep

Shell HCL

Updated: 1 year ago
0 stars 2 fork 2 watcher
Born at : Dec. 14, 2023, 2:38 p.m. This repo has been linked 3 different CVEs too.

None

Updated: 1 year ago
0 stars 0 fork 0 watcher
Born at : Dec. 5, 2023, 12:29 p.m. This repo has been linked 6 different CVEs too.

None

Dockerfile Shell

Updated: 1 year, 5 months ago
0 stars 0 fork 0 watcher
Born at : July 19, 2023, 5:42 p.m. This repo has been linked 15 different CVEs too.

None

C

Updated: 1 year, 5 months ago
0 stars 0 fork 0 watcher
Born at : July 9, 2023, 6:29 p.m. This repo has been linked 3 different CVEs too.

None

Dockerfile Python Shell

Updated: 1 year, 6 months ago
0 stars 0 fork 0 watcher
Born at : June 22, 2023, 2:40 p.m. This repo has been linked 15 different CVEs too.

None

Makefile C Shell

Updated: 3 months, 3 weeks ago
13 stars 1 fork 1 watcher
Born at : May 29, 2023, 3:50 p.m. This repo has been linked 15 different CVEs too.

None

C JavaScript Python Makefile Shell Batchfile C++ WebAssembly Assembly CMake

Updated: 1 year, 7 months ago
0 stars 0 fork 0 watcher
Born at : March 28, 2023, 6:31 a.m. This repo has been linked 9 different CVEs too.

None

Shell

Updated: 2 weeks, 2 days ago
3 stars 2 fork 2 watcher
Born at : March 23, 2023, 4:32 a.m. This repo has been linked 267 different CVEs too.

None

Shell

Updated: 2 weeks, 2 days ago
1 stars 0 fork 0 watcher
Born at : March 19, 2023, 1:53 a.m. This repo has been linked 267 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2017-5753 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2017-5753 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html
    Added Reference http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
    Added Reference http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html
    Added Reference http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html
    Added Reference http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html
    Added Reference http://nvidia.custhelp.com/app/answers/detail/a_id/4609
    Added Reference http://nvidia.custhelp.com/app/answers/detail/a_id/4611
    Added Reference http://nvidia.custhelp.com/app/answers/detail/a_id/4613
    Added Reference http://nvidia.custhelp.com/app/answers/detail/a_id/4614
    Added Reference http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html
    Added Reference http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
    Added Reference http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
    Added Reference http://www.kb.cert.org/vuls/id/584653
    Added Reference http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
    Added Reference http://www.securityfocus.com/bid/102371
    Added Reference http://www.securitytracker.com/id/1040071
    Added Reference http://xenbits.xen.org/xsa/advisory-254.html
    Added Reference https://access.redhat.com/errata/RHSA-2018:0292
    Added Reference https://access.redhat.com/security/vulnerabilities/speculativeexecution
    Added Reference https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
    Added Reference https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
    Added Reference https://cdrdv2.intel.com/v1/dl/getContent/685359
    Added Reference https://cert.vde.com/en-us/advisories/vde-2018-002
    Added Reference https://cert.vde.com/en-us/advisories/vde-2018-003
    Added Reference https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf
    Added Reference https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
    Added Reference https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
    Added Reference https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
    Added Reference https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
    Added Reference https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
    Added Reference https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
    Added Reference https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
    Added Reference https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html
    Added Reference https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html
    Added Reference https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
    Added Reference https://seclists.org/bugtraq/2019/Jun/36
    Added Reference https://security.gentoo.org/glsa/201810-06
    Added Reference https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
    Added Reference https://security.netapp.com/advisory/ntap-20180104-0001/
    Added Reference https://spectreattack.com/
    Added Reference https://support.citrix.com/article/CTX231399
    Added Reference https://support.f5.com/csp/article/K91229003
    Added Reference https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
    Added Reference https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
    Added Reference https://support.lenovo.com/us/en/solutions/LEN-18282
    Added Reference https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel
    Added Reference https://usn.ubuntu.com/3540-1/
    Added Reference https://usn.ubuntu.com/3540-2/
    Added Reference https://usn.ubuntu.com/3541-1/
    Added Reference https://usn.ubuntu.com/3541-2/
    Added Reference https://usn.ubuntu.com/3542-1/
    Added Reference https://usn.ubuntu.com/3542-2/
    Added Reference https://usn.ubuntu.com/3549-1/
    Added Reference https://usn.ubuntu.com/3580-1/
    Added Reference https://usn.ubuntu.com/3597-1/
    Added Reference https://usn.ubuntu.com/3597-2/
    Added Reference https://usn.ubuntu.com/usn/usn-3516-1/
    Added Reference https://www.debian.org/security/2018/dsa-4187
    Added Reference https://www.debian.org/security/2018/dsa-4188
    Added Reference https://www.exploit-db.com/exploits/43427/
    Added Reference https://www.kb.cert.org/vuls/id/180049
    Added Reference https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
    Added Reference https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
    Added Reference https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
    Added Reference https://www.synology.com/support/security/Synology_SA_18_01
    Added Reference https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • Modified Analysis by [email protected]

    Nov. 23, 2021

    Action Type Old Value New Value
    Changed Reference Type https://cdrdv2.intel.com/v1/dl/getContent/685359 No Types Assigned https://cdrdv2.intel.com/v1/dl/getContent/685359 Vendor Advisory
  • CVE Modified by [email protected]

    Nov. 19, 2021

    Action Type Old Value New Value
    Removed Reference https://01.org/security/advisories/intel-oss-10002 [Vendor Advisory]
    Added Reference https://cdrdv2.intel.com/v1/dl/getContent/685359 [No Types Assigned]
  • Reanalysis by [email protected]

    Jun. 24, 2021

    Action Type Old Value New Value
    Changed Reference Type http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html Third Party Advisory http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html Patch, Third Party Advisory
    Changed Reference Type https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html Third Party Advisory https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html Patch, Third Party Advisory
    Changed CPE Configuration AND OR *cpe:2.3:o:arm:cortex-a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:arm:cortex-a:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:arm:cortex-r7_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:arm:cortex-r7:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:arm:cortex-a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:arm:cortex-a:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:arm:cortex-r8_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:arm:cortex-r8:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:arm:cortex-a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:arm:cortex-a:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:arm:cortex-a8_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:arm:cortex-a8:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:arm:cortex-a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:arm:cortex-a:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:arm:cortex-a9_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:arm:cortex-a9:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:arm:cortex-a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:arm:cortex-a:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:arm:cortex-a12_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:arm:cortex-a12:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:arm:cortex-a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:arm:cortex-a:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:arm:cortex-a15_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:arm:cortex-a15:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:arm:cortex-a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:arm:cortex-a:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:arm:cortex-a17_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:arm:cortex-a17:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:arm:cortex-a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:arm:cortex-a:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:arm:cortex-a57_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:arm:cortex-a57:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:arm:cortex-a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:arm:cortex-a:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:arm:cortex-a72_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:arm:cortex-a72:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:arm:cortex-a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:arm:cortex-a:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:arm:cortex-a73_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:arm:cortex-a73:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:arm:cortex-r_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:arm:cortex-r:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:arm:cortex-a75_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:arm:cortex-a75:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:arm:cortex-r_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:arm:cortex-r:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:arm:cortex-a76_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:arm:cortex-a76:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:arm:cortex-a77_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:arm:cortex-a77:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:arm:cortex-a78_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:arm:cortex-a78:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:arm:cortex-a78ae_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:arm:cortex-a78ae:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:arm:neoverse_n1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:arm:neoverse_n1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:arm:neoverse_n2_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:arm:neoverse_n2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:arm:cortex-x1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:arm:cortex-x1:-:*:*:*:*:*:*:*
  • Reanalysis by [email protected]

    Apr. 14, 2021

    Action Type Old Value New Value
    Changed Reference Type http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html Patch, Third Party Advisory http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html Third Party Advisory
    Changed Reference Type https://seclists.org/bugtraq/2019/Jun/36 Mailing List, Third Party Advisory https://seclists.org/bugtraq/2019/Jun/36 Issue Tracking, Mailing List, Third Party Advisory
    Changed Reference Type https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html Patch, Third Party Advisory https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html Third Party Advisory
    Removed CWE NIST CWE-200
    Added CWE NIST CWE-203
    Changed CPE Configuration OR *cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2316:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2338:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2350:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2358:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2508:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2516:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2518:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2530:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2538:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2550:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2558:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2718:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2730:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2738:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2750:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2758:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_x3:c3130:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_x3:c3200rk:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_x3:c3205rk:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_x3:c3230rk:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_x3:c3235rk:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_x3:c3265rk:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_x3:c3295rk:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_x3:c3405:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_x3:c3445:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3770d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3775:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3775d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3785:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3795:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j1750:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j1800:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j1850:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j1900:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j3060:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j3160:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j3355:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2805:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2806:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2807:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2808:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2810:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2815:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2820:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2830:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2840:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2910:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2920:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2930:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2940:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n3000:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n3010:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n3050:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n3060:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n3150:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n3160:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n3350:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n4000:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n4100:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3450:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m:5y10:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m:5y10a:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m:5y10c:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m:5y31:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m:5y51:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m:5y70:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m:5y71:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m3:6y30:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m3:7y30:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m3:7y32:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m5:6y54:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m5:6y57:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m7:6y75:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_j:j2850:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_j:j2900:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_j:j3710:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_j:j4205:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_n:n3510:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_n:n3520:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_n:n3530:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_n:n3540:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_n:n3700:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_n:n3710:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_n:n4200:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5502:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5503:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5504:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5506:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5507:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5520:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5530:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5540:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5603:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5606:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5607:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5620:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5630:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5640:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5645:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5649:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e6510:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e6540:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e7520:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e7530:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e7540:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:ec5509:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:ec5539:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:ec5549:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l3406:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l3426:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l5506:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l5508:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l5518:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l5520:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l5530:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l5609:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l5618:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l5630:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l5638:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l5640:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l7545:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l7555:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:lc5518:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:lc5528:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:w3670:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:w3680:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:w3690:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:w5580:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:w5590:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x3430:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x3440:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x3450:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x3460:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x3470:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x3480:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x5550:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x5560:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x5570:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x5647:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x5650:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x5660:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x5667:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x5670:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x5672:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x5675:*:*:*:*:* OR *cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2316:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2338:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2350:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2358:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2508:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2516:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2518:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2530:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2538:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2550:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2558:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2718:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2730:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2738:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2750:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2758:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_x3:c3130:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_x3:c3200rk:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_x3:c3205rk:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_x3:c3230rk:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_x3:c3235rk:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_x3:c3265rk:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_x3:c3295rk:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_x3:c3405:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_x3:c3445:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3770d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3775:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3775d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3785:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3795:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j1750:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j1800:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j1850:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j1900:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j3060:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j3160:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j3355:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2805:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2806:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2807:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2808:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2810:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2815:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2820:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2830:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2840:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2910:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2920:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2930:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2940:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n3000:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n3010:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n3050:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n3060:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n3150:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n3160:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n3350:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n4000:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n4100:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3450:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m:5y10:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m:5y10a:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m:5y10c:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m:5y31:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m:5y51:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m:5y70:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m:5y71:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m3:6y30:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m3:7y30:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m3:7y32:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m5:6y54:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m5:6y57:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m7:6y75:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_j:j2850:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_j:j2900:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_j:j3710:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_j:j4205:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_n:n3510:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_n:n3520:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_n:n3530:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_n:n3540:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_n:n3700:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_n:n3710:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_n:n4200:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5502:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5503:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5504:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5506:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5507:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5520:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5530:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5540:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5603:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5606:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5607:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5620:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5630:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5640:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5645:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5649:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e6510:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e6540:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e7520:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e7530:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e7540:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:ec5509:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:ec5539:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:ec5549:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l3406:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l3426:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l5506:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l5508:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l5518:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l5520:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l5530:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l5609:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l5618:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l5630:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l5638:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l5640:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l7545:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l7555:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:lc5518:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:lc5528:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:w3670:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:w3680:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:w3690:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:w5580:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:w5590:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x3430:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x3440:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x3450:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x3460:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x3470:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x3480:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x5550:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x5560:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x5570:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x5647:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x5650:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x5660:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:
    Changed CPE Configuration OR *cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:* *cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* *cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* *cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:* *cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:* OR *cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:* *cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* *cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* *cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:* *cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
  • Reanalysis by [email protected]

    Mar. 02, 2021

    Action Type Old Value New Value
    Changed Reference Type http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html Third Party Advisory http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html Patch, Third Party Advisory
    Changed Reference Type https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002 Third Party Advisory https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002 Patch, Third Party Advisory, Vendor Advisory
    Changed Reference Type https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html Third Party Advisory https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html Patch, Third Party Advisory
    Changed CPE Configuration OR *cpe:2.3:a:oracle:communications_local_service_management_system:13.1:*:*:*:*:*:*:* *cpe:2.3:a:oracle:communications_local_service_management_system:13.2:*:*:*:*:*:*:* *cpe:2.3:a:oracle:communications_local_service_management_system:13.3:*:*:*:*:*:*:* *cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:* *cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:* OR *cpe:2.3:a:oracle:local_service_management_system:13.1:*:*:*:*:*:*:* *cpe:2.3:a:oracle:local_service_management_system:13.2:*:*:*:*:*:*:* *cpe:2.3:a:oracle:local_service_management_system:13.3:*:*:*:*:*:*:* *cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:* *cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
  • Modified Analysis by [email protected]

    Jun. 05, 2020

    Action Type Old Value New Value
    Removed CVSS V3 NIST AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
    Added CVSS V3.1 NIST AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
    Changed Reference Type http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html Third Party Advisory http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html Mailing List, Third Party Advisory
    Changed Reference Type http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html Third Party Advisory http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html Mailing List, Third Party Advisory
    Changed Reference Type http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html Third Party Advisory http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html Mailing List, Third Party Advisory
    Changed Reference Type http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html Third Party Advisory http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html Mailing List, Third Party Advisory
    Changed Reference Type http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html Third Party Advisory http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html Mailing List, Third Party Advisory
    Changed Reference Type http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt No Types Assigned http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt Third Party Advisory
    Changed Reference Type http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html Patch, Third Party Advisory http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html Third Party Advisory
    Changed Reference Type https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf No Types Assigned https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf Third Party Advisory
    Changed Reference Type https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf No Types Assigned https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf Third Party Advisory
    Changed Reference Type https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability Vendor Advisory https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability Third Party Advisory
    Changed Reference Type https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes No Types Assigned https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes Third Party Advisory
    Changed Reference Type https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html No Types Assigned https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html Mailing List, Third Party Advisory
    Changed Reference Type https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html No Types Assigned https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html Mailing List, Third Party Advisory
    Changed Reference Type https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html No Types Assigned https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html Mailing List, Third Party Advisory
    Changed Reference Type https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html No Types Assigned https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html Mailing List, Third Party Advisory
    Changed Reference Type https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html No Types Assigned https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html Mailing List, Third Party Advisory
    Changed Reference Type https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002 Patch, Third Party Advisory, Vendor Advisory https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002 Third Party Advisory
    Changed Reference Type https://seclists.org/bugtraq/2019/Jun/36 No Types Assigned https://seclists.org/bugtraq/2019/Jun/36 Mailing List, Third Party Advisory
    Changed Reference Type https://security.gentoo.org/glsa/201810-06 No Types Assigned https://security.gentoo.org/glsa/201810-06 Third Party Advisory
    Changed Reference Type https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us No Types Assigned https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us Third Party Advisory
    Changed Reference Type https://www.exploit-db.com/exploits/43427/ Third Party Advisory, VDB Entry https://www.exploit-db.com/exploits/43427/ Exploit, Third Party Advisory, VDB Entry
    Changed Reference Type https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001 No Types Assigned https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001 Third Party Advisory
    Changed Reference Type https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html No Types Assigned https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html Third Party Advisory
    Removed CPE Configuration OR *cpe:2.3:h:arm:cortex-a:8:*:*:*:*:*:*:* *cpe:2.3:h:arm:cortex-a:9:*:*:*:*:*:*:* *cpe:2.3:h:arm:cortex-a:12:*:*:*:*:*:*:* *cpe:2.3:h:arm:cortex-a:15:*:*:*:*:*:*:* *cpe:2.3:h:arm:cortex-a:17:*:*:*:*:*:*:* *cpe:2.3:h:arm:cortex-a:57:*:*:*:*:*:*:* *cpe:2.3:h:arm:cortex-a:72:*:*:*:*:*:*:* *cpe:2.3:h:arm:cortex-a:73:*:*:*:*:*:*:* *cpe:2.3:h:arm:cortex-a:75:*:*:*:*:*:*:* *cpe:2.3:h:arm:cortex-a:76:*:*:*:*:*:*:* *cpe:2.3:h:arm:cortex-r:7:*:*:*:*:*:*:* *cpe:2.3:h:arm:cortex-r:8:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:* *cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* *cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* *cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:* *cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* *cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:a:oracle:communications_local_service_management_system:13.1:*:*:*:*:*:*:* *cpe:2.3:a:oracle:communications_local_service_management_system:13.2:*:*:*:*:*:*:* *cpe:2.3:a:oracle:communications_local_service_management_system:13.3:*:*:*:*:*:*:* *cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:* *cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:a:synology:diskstation_manager:*:*:*:*:*:*:*:* versions from (including) 5.2 up to (excluding) 6.2.2-24922 *cpe:2.3:a:synology:router_manager:*:*:*:*:*:*:*:* versions from (including) 1.1 up to (excluding) 1.1.7-6941-1 *cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:* *cpe:2.3:a:synology:virtual_machine_manager:*:*:*:*:*:*:*:* versions up to (excluding) 6.2-23739
    Added CPE Configuration AND OR *cpe:2.3:o:synology:vs960hd_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:synology:vs360hd_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:synology:vs360hd:-:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:* *cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:* *cpe:2.3:o:suse:suse_linux_enterprise_desktop:12:sp2:*:*:*:*:*:* *cpe:2.3:o:suse:suse_linux_enterprise_desktop:12:sp3:*:*:*:*:*:* *cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp4:*:*:*:*:*:* *cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp2:*:*:*:*:*:* *cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp2:*:*:*:*:raspberry_pi:* *cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp3:*:*:*:*:*:* *cpe:2.3:o:suse:suse_linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:* *cpe:2.3:o:suse:suse_linux_enterprise_software_development_kit:12:sp2:*:*:*:*:*:* *cpe:2.3:o:suse:suse_linux_enterprise_software_development_kit:12:sp3:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:arm:cortex-a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:arm:cortex-a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:arm:cortex-a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:arm:cortex-a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:arm:cortex-a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:arm:cortex-a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:arm:cortex-a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:arm:cortex-a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:arm:cortex-a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:arm:cortex-a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:arm:cortex-a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:arm:cortex-a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:arm:cortex-a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:arm:cortex-a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:arm:cortex-a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:arm:cortex-a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:arm:cortex-a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:arm:cortex-a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:arm:cortex-a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:arm:cortex-a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:arm:cortex-r_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:arm:cortex-r:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:arm:cortex-r_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:arm:cortex-r:-:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:a:pepperl-fuchs:visunet_rm_shell:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:pepperl-fuchs:btc12_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:pepperl-fuchs:btc12:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:pepperl-fuchs:btc14_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:pepperl-fuchs:btc14:-:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:a:netapp:hci:-:*:*:*:*:*:*:* *cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:bl_ppc_1000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:bl_ppc_1000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:bl_ppc12_1000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:bl_ppc12_1000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:bl_ppc15_1000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:bl_ppc15_1000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:bl_ppc17_1000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:bl_ppc17_1000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:bl_bpc_2000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:bl_bpc_2000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:bl_bpc_2001_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:bl_bpc_2001:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:bl_bpc_3000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:bl_bpc_3000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:bl_bpc_3001_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:bl_bpc_3001:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:bl_ppc15_3000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:bl_ppc15_3000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:bl_ppc17_3000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:bl_ppc17_3000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:bl_bpc_7000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:bl_bpc_7000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:bl_bpc_7001_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:bl_bpc_7001:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:bl_ppc_7000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:bl_ppc_7000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:bl_ppc15_7000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:bl_ppc15_7000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:bl_ppc17_7000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:bl_ppc17_7000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:bl_rackmount_2u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:bl_rackmount_2u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:bl_rackmount_4u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:bl_rackmount_4u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:bl2_bpc_1000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:bl2_bpc_1000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:bl2_ppc_1000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:bl2_ppc_1000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:bl2_bpc_2000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:bl2_bpc_2000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:bl2_ppc_2000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:bl2_ppc_2000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:bl2_bpc_7000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:bl2_bpc_7000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:bl2_ppc_7000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:bl2_ppc_7000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:dl_ppc15_1000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:dl_ppc15_1000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:dl_ppc15m_7000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:dl_ppc15m_7000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:dl_ppc18.5m_7000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:dl_ppc18.5m_7000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:dl_ppc21.5m_7000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:dl_ppc21.5m_7000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:el_ppc_1000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:el_ppc_1000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:el_ppc_1000\/wt_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:el_ppc_1000\/wt:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:el_ppc_1000\/m_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:el_ppc_1000\/m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:valueline_ipc_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:valueline_ipc:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:vl_bpc_1000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:vl_bpc_1000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:vl_bpc_2000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:vl_bpc_2000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:vl_ppc_2000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:vl_ppc_2000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:vl_bpc_3000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:vl_bpc_3000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:vl_ppc_3000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:vl_ppc_3000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:vl_ipc_p7000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:vl_ipc_p7000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:vl2_bpc_1000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:vl2_bpc_1000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:vl2_ppc_1000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:vl2_ppc_1000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:vl2_bpc_2000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:vl2_bpc_2000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:vl2_ppc_2000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:vl2_ppc_2000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:vl2_bpc_3000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:vl2_bpc_3000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:vl2_ppc_3000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:vl2_ppc_3000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:vl2_bpc_7000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:vl2_bpc_7000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:vl2_ppc_7000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:vl2_ppc_7000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:vl2_bpc_9000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:vl2_bpc_9000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:vl2_ppc_9000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:vl2_ppc_9000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:vl2_ppc7_1000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:vl2_ppc7_1000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:vl2_ppc9_1000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:vl2_ppc9_1000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:phoenixcontact:vl2_ppc12_1000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:phoenixcontact:vl2_ppc12_1000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_itc1500_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 3.1 OR cpe:2.3:h:siemens:simatic_itc1500:v3:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_itc1500_pro_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 3.1 OR cpe:2.3:h:siemens:simatic_itc1500_pro:v3:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_itc1900_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 3.1 OR cpe:2.3:h:siemens:simatic_itc1900:v3:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_itc1900_pro_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 3.1 OR cpe:2.3:h:siemens:simatic_itc1900_pro:v3:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_itc2200_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 3.1 OR cpe:2.3:h:siemens:simatic_itc2200:v3:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_itc2200_pro_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 3.1 OR cpe:2.3:h:siemens:simatic_itc2200_pro:v3:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_winac_rtx_\(f\)_2010_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2010 *cpe:2.3:o:siemens:simatic_winac_rtx_\(f\)_2010_firmware:2010:-:*:*:*:*:*:* *cpe:2.3:o:siemens:simatic_winac_rtx_\(f\)_2010_firmware:2010:sp1:*:*:*:*:*:* *cpe:2.3:o:siemens:simatic_winac_rtx_\(f\)_2010_firmware:2010:sp2:*:*:*:*:*:* OR cpe:2.3:h:siemens:simatic_winac_rtx_\(f\)_2010:-:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:* versions from (including) 8.0.0 up to (excluding) 8.5.9 *cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:* versions from (including) 12.0.0 up to (excluding) 12.5.8 *cpe:2.3:o:vmware:esxi:5.5.0:-:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201312101:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201312102:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201312401:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201312402:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201403101:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201403102:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201403201:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201403202:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201403203:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201403204:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201403205:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201403206:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201403207:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201403208:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201403209:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201403210:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201403211:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201404401:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201404402:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201404403:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201404420:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201406401:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201407101:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201407102:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201407401:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201407402:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201407403:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201407404:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201407405:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201409101:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201409201:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201409202:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201409203:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201409204:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201409205:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201409206:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201409207:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201410101:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201410401:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201410402:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201410403:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201410404:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201410405:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201410406:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201501101:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201501401:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201501402:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201501403:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201501404:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201501405:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201502401:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201504201:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201505101:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201505401:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201505402:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201505403:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201505404:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201509101:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201509102:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201509201:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201509202:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201509203:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201509204:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201509205:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201509206:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201509207:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201509208:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201509209:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201509210:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201509211:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201509212:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201509213:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201510401:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201512101:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201512102:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201512401:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201512402:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201512403:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201512404:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201601401:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201602401:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201608101:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201608102:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201608401:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201608402:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201608403:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201608404:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201608405:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201609101:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201609102:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201609401:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201609402:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201609403:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201612101:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201612102:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201612401:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201612402:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201703401:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201709101:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201709102:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201709103:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201709401:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201709402:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:5.5.0:550-201709403:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:-:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201504401:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201505401:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201507101:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201507102:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201507401:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201507402:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201507403:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201507404:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201507405:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201507406:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201507407:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201509101:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201509102:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201509201:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201509202:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201509203:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201509204:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201509205:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201509206:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201509207:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201509208:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201509209:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201509210:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201510401:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201511401:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201601101:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201601102:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201601401:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201601402:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201601403:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201601404:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201601405:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201602401:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201603101:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201603102:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201603201:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201603202:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201603203:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201603204:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201603205:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201603206:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201603207:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201603208:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201605401:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201608101:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201608401:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201608402:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201608403:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201608404:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201608405:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201610410:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201611401:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201611402:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201611403:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201702101:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201702102:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201702201:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201702202:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201702203:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201702204:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201702205:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201702206:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201702207:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201702208:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201702209:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201702210:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201702211:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201702212:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201703401:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201706101:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201706102:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201706103:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201706401:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201706402:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201706403:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.0:600-201710301:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2650l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2650l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2650l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2650l_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2650l:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2650l:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2650_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2650_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2650_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2650_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2650_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2650_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2650:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2650:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2648l_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2648l_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2648l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2648l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2648l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2648l_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2648l:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2648l:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2643_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2643_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2643_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2643_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2643_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2643_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2643:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2643:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2640_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2640_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2640_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2640_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2640_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2640_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2640:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2640:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2637_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2637_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2637_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2637_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2637_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2637_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2637:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2637:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2630l_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2630l_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2630l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2630l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2630l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2630l_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2630l:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2630l:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2630_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2630_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2630_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2630_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2630_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2630_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2630:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2630:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2628l_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2628l_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2628l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2628l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2628l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2628l_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2623_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2623_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2623_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2623_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2620_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2620_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2620_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2620_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2620_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2620_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2620:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2620:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2618l_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2618l_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2618l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2618l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2618l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2618l_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2609_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2609_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2609_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2609_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2609_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2609_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2609:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2609:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2608l_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2608l_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2608l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2608l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2603_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2603_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2603_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2603_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2603_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2603_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2603:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2603:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2470_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2470_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2470:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2470:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2450l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2450l_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2450l:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2450l:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2450_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2450_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2450:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2450:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2448l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2448l_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2448l:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2448l:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2440_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2440_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2440:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2440:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2438l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2438l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2430l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2430l_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2430l:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2430l:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2430_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2430_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2430:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2430:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2428l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2428l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2428l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2428l_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2428l:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2428l:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2420_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2420_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2420:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2420:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2418l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2418l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2418l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2418l_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2418l:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2418l:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2408l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2408l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2407_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2407_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2407:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2407:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2403_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2403_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2403:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2403:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1680_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1680_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1680_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1680_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1660_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1660_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1660_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1660_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1660_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1660_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1660:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1660:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1650_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1650_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1650_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1650_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1650_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1650_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1650:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1650:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1630_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1630_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1630_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1630_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1620_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1620_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1620_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1620_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1620_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1620_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1620:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1620:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1428l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1428l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1428l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1428l_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1428l:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1428l:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1505m_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1505m_v5:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1505l_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1505l_v6:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1505l_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1505l_v5:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1501m_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1501m_v6:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1501l_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1501l_v6:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1290_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1290_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1290:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1290:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1286l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1286l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1286_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1286_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1285l_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1285l_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1285l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1285l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1285_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1285_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1285_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1285_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1285_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1281_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1281_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1280_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1280_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1280_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1280_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1280_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1280_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1280:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1280:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1278l_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1278l_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1276_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1276_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1275l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1275l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1275_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1275_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1275_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1275_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1275_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1275_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1275:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1275:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1271_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1271_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1270_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1270_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1270_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1270_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1270_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1270_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1270:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1270:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1268l_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1268l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1268l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1265l_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1265l_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1265l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1265l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1265l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1265l_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1260l_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1260l:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1260l:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1258l_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1258l_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1246_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1246_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1245_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1245_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1245_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1245_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1245_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1245_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1245:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1245:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1241_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1241_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1240l_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1240l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1240l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1240_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1240_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1240_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1240_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1240_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1240_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1240:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1240:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1235l_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1235:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1235:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1231_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1231_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1230l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1230l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1230_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1230_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1230_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1230_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1230_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1230_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1230:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1230:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1226_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1226_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1225_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1225_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1225_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1225_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1225_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1225_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1225:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1225:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1220l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1220l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1220l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_12201_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1220l:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_12201:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1220_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1220_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1220_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1220_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1220_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1220_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1220:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1220:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1125c_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1125c_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1125c:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1125c:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1105c_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1105c_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1105c:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e-1105c:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_bronze:3106:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_bronze:3104:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*
  • CVE Modified by [email protected]

    Oct. 08, 2019

    Action Type Old Value New Value
    Added Reference https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf [No Types Assigned]
  • CVE Modified by [email protected]

    Jun. 26, 2019

    Action Type Old Value New Value
    Added Reference http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt [No Types Assigned]
  • CVE Modified by [email protected]

    Jun. 24, 2019

    Action Type Old Value New Value
    Added Reference https://seclists.org/bugtraq/2019/Jun/36 [No Types Assigned]
  • CVE Modified by [email protected]

    Apr. 23, 2019

    Action Type Old Value New Value
    Added Reference https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html [No Types Assigned]
  • CVE Modified by [email protected]

    Apr. 01, 2019

    Action Type Old Value New Value
    Added Reference https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html [No Types Assigned]
  • CVE Modified by [email protected]

    Mar. 27, 2019

    Action Type Old Value New Value
    Added Reference https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html [No Types Assigned]
  • CVE Modified by [email protected]

    Feb. 13, 2019

    Action Type Old Value New Value
    Added Reference https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf [No Types Assigned]
  • CVE Modified by [email protected]

    Nov. 30, 2018

    Action Type Old Value New Value
    Added Reference https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes [No Types Assigned]
  • CVE Modified by [email protected]

    Oct. 31, 2018

    Action Type Old Value New Value
    Added Reference https://security.gentoo.org/glsa/201810-06 [No Types Assigned]
  • CVE Modified by [email protected]

    Oct. 23, 2018

    Action Type Old Value New Value
    Added Reference https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001 [No Types Assigned]
  • CVE Modified by [email protected]

    Aug. 23, 2018

    Action Type Old Value New Value
    Added Reference https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us [No Types Assigned]
  • CVE Modified by [email protected]

    Jul. 20, 2018

    Action Type Old Value New Value
    Added Reference https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html [No Types Assigned]
  • CVE Modified by [email protected]

    Jul. 17, 2018

    Action Type Old Value New Value
    Added Reference https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html [No Types Assigned]
    Added Reference https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html [No Types Assigned]
  • Modified Analysis by [email protected]

    Jul. 11, 2018

    Action Type Old Value New Value
    Changed Reference Type https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability No Types Assigned https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability Vendor Advisory
    Changed Reference Type https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002 Patch, Third Party Advisory https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002 Patch, Third Party Advisory, Vendor Advisory
    Changed Reference Type https://usn.ubuntu.com/3542-2/ No Types Assigned https://usn.ubuntu.com/3542-2/ Third Party Advisory
    Changed Reference Type http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html Third Party Advisory http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html Exploit, Third Party Advisory, VDB Entry
    Changed Reference Type https://usn.ubuntu.com/3541-1/ No Types Assigned https://usn.ubuntu.com/3541-1/ Third Party Advisory
    Changed Reference Type http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html No Types Assigned http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html Patch, Third Party Advisory
    Changed Reference Type https://usn.ubuntu.com/usn/usn-3516-1/ No Types Assigned https://usn.ubuntu.com/usn/usn-3516-1/ Third Party Advisory
    Changed Reference Type https://usn.ubuntu.com/3597-1/ No Types Assigned https://usn.ubuntu.com/3597-1/ Third Party Advisory
    Changed Reference Type https://usn.ubuntu.com/3580-1/ No Types Assigned https://usn.ubuntu.com/3580-1/ Third Party Advisory
    Changed Reference Type https://usn.ubuntu.com/3549-1/ No Types Assigned https://usn.ubuntu.com/3549-1/ Third Party Advisory
    Changed Reference Type https://usn.ubuntu.com/3542-1/ No Types Assigned https://usn.ubuntu.com/3542-1/ Third Party Advisory
    Changed Reference Type https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us No Types Assigned https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us Third Party Advisory
    Changed Reference Type https://www.debian.org/security/2018/dsa-4187 No Types Assigned https://www.debian.org/security/2018/dsa-4187 Third Party Advisory
    Changed Reference Type https://www.debian.org/security/2018/dsa-4188 No Types Assigned https://www.debian.org/security/2018/dsa-4188 Third Party Advisory
    Changed Reference Type https://www.kb.cert.org/vuls/id/180049 No Types Assigned https://www.kb.cert.org/vuls/id/180049 Third Party Advisory, US Government Resource
    Changed Reference Type https://usn.ubuntu.com/3540-2/ No Types Assigned https://usn.ubuntu.com/3540-2/ Third Party Advisory
    Changed Reference Type http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt No Types Assigned http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt Third Party Advisory
    Changed Reference Type https://cert.vde.com/en-us/advisories/vde-2018-003 No Types Assigned https://cert.vde.com/en-us/advisories/vde-2018-003 Third Party Advisory
    Changed Reference Type https://cert.vde.com/en-us/advisories/vde-2018-002 No Types Assigned https://cert.vde.com/en-us/advisories/vde-2018-002 Third Party Advisory
    Changed Reference Type https://usn.ubuntu.com/3541-2/ No Types Assigned https://usn.ubuntu.com/3541-2/ Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:0292 No Types Assigned https://access.redhat.com/errata/RHSA-2018:0292 Third Party Advisory
    Changed Reference Type https://usn.ubuntu.com/3540-1/ No Types Assigned https://usn.ubuntu.com/3540-1/ Third Party Advisory
    Changed Reference Type https://usn.ubuntu.com/3597-2/ No Types Assigned https://usn.ubuntu.com/3597-2/ Third Party Advisory
    Changed CPE Configuration OR *cpe:2.3:h:arm:cortex-a:9:*:*:*:*:*:*:* *cpe:2.3:h:arm:cortex-a:15:*:*:*:*:*:*:* *cpe:2.3:h:arm:cortex-a:17:*:*:*:*:*:*:* *cpe:2.3:h:arm:cortex-a:57:*:*:*:*:*:*:* *cpe:2.3:h:arm:cortex-a:72:*:*:*:*:*:*:* *cpe:2.3:h:arm:cortex-a:73:*:*:*:*:*:*:* *cpe:2.3:h:arm:cortex-a:75:*:*:*:*:*:*:* OR *cpe:2.3:h:arm:cortex-a:8:*:*:*:*:*:*:* *cpe:2.3:h:arm:cortex-a:9:*:*:*:*:*:*:* *cpe:2.3:h:arm:cortex-a:12:*:*:*:*:*:*:* *cpe:2.3:h:arm:cortex-a:15:*:*:*:*:*:*:* *cpe:2.3:h:arm:cortex-a:17:*:*:*:*:*:*:* *cpe:2.3:h:arm:cortex-a:57:*:*:*:*:*:*:* *cpe:2.3:h:arm:cortex-a:72:*:*:*:*:*:*:* *cpe:2.3:h:arm:cortex-a:73:*:*:*:*:*:*:* *cpe:2.3:h:arm:cortex-a:75:*:*:*:*:*:*:* *cpe:2.3:h:arm:cortex-a:76:*:*:*:*:*:*:* *cpe:2.3:h:arm:cortex-r:7:*:*:*:*:*:*:* *cpe:2.3:h:arm:cortex-r:8:*:*:*:*:*:*:*
  • CVE Modified by [email protected]

    May. 23, 2018

    Action Type Old Value New Value
    Removed Reference https://developer.arm.com/support/security-update [Third Party Advisory]
    Added Reference https://www.kb.cert.org/vuls/id/180049 [No Types Assigned]
    Added Reference https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability [No Types Assigned]
  • CVE Modified by [email protected]

    May. 17, 2018

    Action Type Old Value New Value
    Added Reference https://cert.vde.com/en-us/advisories/vde-2018-003 [No Types Assigned]
    Added Reference https://cert.vde.com/en-us/advisories/vde-2018-002 [No Types Assigned]
  • CVE Modified by [email protected]

    May. 03, 2018

    Action Type Old Value New Value
    Added Reference https://www.debian.org/security/2018/dsa-4188 [No Types Assigned]
    Added Reference https://www.debian.org/security/2018/dsa-4187 [No Types Assigned]
  • CVE Modified by [email protected]

    Apr. 20, 2018

    Action Type Old Value New Value
    Added Reference http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html [No Types Assigned]
  • CVE Modified by [email protected]

    Mar. 24, 2018

    Action Type Old Value New Value
    Added Reference https://usn.ubuntu.com/3541-2/ [No Types Assigned]
    Added Reference https://usn.ubuntu.com/3540-2/ [No Types Assigned]
  • CVE Modified by [email protected]

    Mar. 19, 2018

    Action Type Old Value New Value
    Added Reference https://usn.ubuntu.com/3542-2/ [No Types Assigned]
  • CVE Modified by [email protected]

    Mar. 16, 2018

    Action Type Old Value New Value
    Added Reference https://usn.ubuntu.com/3597-2/ [No Types Assigned]
    Added Reference https://usn.ubuntu.com/3597-1/ [No Types Assigned]
    Added Reference https://usn.ubuntu.com/3580-1/ [No Types Assigned]
    Added Reference https://usn.ubuntu.com/3549-1/ [No Types Assigned]
    Added Reference https://usn.ubuntu.com/3542-1/ [No Types Assigned]
    Added Reference https://usn.ubuntu.com/3541-1/ [No Types Assigned]
    Added Reference https://usn.ubuntu.com/3540-1/ [No Types Assigned]
  • CVE Modified by [email protected]

    Mar. 04, 2018

    Action Type Old Value New Value
    Added Reference http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt [No Types Assigned]
  • CVE Modified by [email protected]

    Feb. 11, 2018

    Action Type Old Value New Value
    Added Reference https://access.redhat.com/errata/RHSA-2018:0292 [No Types Assigned]
  • CVE Modified by [email protected]

    Jan. 13, 2018

    Action Type Old Value New Value
    Added Reference https://usn.ubuntu.com/usn/usn-3516-1/ [No Types Assigned]
  • CVE Modified by [email protected]

    Jan. 12, 2018

    Action Type Old Value New Value
    Added Reference https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us [No Types Assigned]
  • Initial Analysis by [email protected]

    Jan. 08, 2018

    Action Type Old Value New Value
    Added CVSS V2 (AV:L/AC:M/Au:N/C:C/I:N/A:N)
    Added CVSS V3 AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
    Changed Reference Type http://xenbits.xen.org/xsa/advisory-254.html No Types Assigned http://xenbits.xen.org/xsa/advisory-254.html Third Party Advisory
    Changed Reference Type http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html No Types Assigned http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html Third Party Advisory
    Changed Reference Type http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html No Types Assigned http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html Third Party Advisory
    Changed Reference Type https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/ No Types Assigned https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/ Third Party Advisory
    Changed Reference Type http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html No Types Assigned http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html Third Party Advisory
    Changed Reference Type http://www.securitytracker.com/id/1040071 No Types Assigned http://www.securitytracker.com/id/1040071 Third Party Advisory, VDB Entry
    Changed Reference Type https://www.synology.com/support/security/Synology_SA_18_01 No Types Assigned https://www.synology.com/support/security/Synology_SA_18_01 Third Party Advisory
    Changed Reference Type http://www.kb.cert.org/vuls/id/584653 No Types Assigned http://www.kb.cert.org/vuls/id/584653 Third Party Advisory, US Government Resource
    Changed Reference Type https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/ No Types Assigned https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/ Third Party Advisory
    Changed Reference Type http://nvidia.custhelp.com/app/answers/detail/a_id/4613 No Types Assigned http://nvidia.custhelp.com/app/answers/detail/a_id/4613 Third Party Advisory
    Changed Reference Type https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html No Types Assigned https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html Third Party Advisory
    Changed Reference Type https://security.netapp.com/advisory/ntap-20180104-0001/ No Types Assigned https://security.netapp.com/advisory/ntap-20180104-0001/ Third Party Advisory
    Changed Reference Type https://support.lenovo.com/us/en/solutions/LEN-18282 No Types Assigned https://support.lenovo.com/us/en/solutions/LEN-18282 Third Party Advisory
    Changed Reference Type http://nvidia.custhelp.com/app/answers/detail/a_id/4611 No Types Assigned http://nvidia.custhelp.com/app/answers/detail/a_id/4611 Third Party Advisory
    Changed Reference Type http://nvidia.custhelp.com/app/answers/detail/a_id/4614 No Types Assigned http://nvidia.custhelp.com/app/answers/detail/a_id/4614 Third Party Advisory
    Changed Reference Type https://developer.arm.com/support/security-update No Types Assigned https://developer.arm.com/support/security-update Third Party Advisory
    Changed Reference Type http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html No Types Assigned http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html Third Party Advisory
    Changed Reference Type https://www.exploit-db.com/exploits/43427/ No Types Assigned https://www.exploit-db.com/exploits/43427/ Third Party Advisory, VDB Entry
    Changed Reference Type https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/ No Types Assigned https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/ Third Party Advisory
    Changed Reference Type http://www.securityfocus.com/bid/102371 No Types Assigned http://www.securityfocus.com/bid/102371 Third Party Advisory, VDB Entry
    Changed Reference Type http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html No Types Assigned http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html Third Party Advisory
    Changed Reference Type https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002 No Types Assigned https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002 Patch, Third Party Advisory
    Changed Reference Type https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html No Types Assigned https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html Third Party Advisory
    Changed Reference Type https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html No Types Assigned https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html Third Party Advisory
    Changed Reference Type https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel No Types Assigned https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel Third Party Advisory
    Changed Reference Type http://nvidia.custhelp.com/app/answers/detail/a_id/4609 No Types Assigned http://nvidia.custhelp.com/app/answers/detail/a_id/4609 Third Party Advisory
    Changed Reference Type https://access.redhat.com/security/vulnerabilities/speculativeexecution No Types Assigned https://access.redhat.com/security/vulnerabilities/speculativeexecution Third Party Advisory
    Changed Reference Type https://spectreattack.com/ No Types Assigned https://spectreattack.com/ Technical Description, Third Party Advisory
    Changed Reference Type http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html No Types Assigned http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html Third Party Advisory
    Changed Reference Type https://support.f5.com/csp/article/K91229003 No Types Assigned https://support.f5.com/csp/article/K91229003 Third Party Advisory
    Changed Reference Type https://01.org/security/advisories/intel-oss-10002 No Types Assigned https://01.org/security/advisories/intel-oss-10002 Vendor Advisory
    Changed Reference Type https://support.citrix.com/article/CTX231399 No Types Assigned https://support.citrix.com/article/CTX231399 Third Party Advisory
    Added CWE CWE-200
    Added CPE Configuration OR *cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2316:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2338:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2350:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2358:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2508:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2516:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2518:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2530:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2538:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2550:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2558:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2718:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2730:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2738:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2750:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2758:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_x3:c3130:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_x3:c3200rk:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_x3:c3205rk:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_x3:c3230rk:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_x3:c3235rk:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_x3:c3265rk:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_x3:c3295rk:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_x3:c3405:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_x3:c3445:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3770d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3775:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3775d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3785:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3795:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j1750:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j1800:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j1850:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j1900:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j3060:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j3160:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j3355:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2805:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2806:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2807:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2808:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2810:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2815:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2820:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2830:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2840:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2910:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2920:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2930:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2940:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n3000:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n3010:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n3050:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n3060:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n3150:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n3160:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n3350:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n4000:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n4100:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3450:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m:5y10:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m:5y10a:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m:5y10c:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m:5y31:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m:5y51:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m:5y70:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m:5y71:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m3:6y30:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m3:7y30:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m3:7y32:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m5:6y54:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m5:6y57:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m7:6y75:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_j:j2850:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_j:j2900:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_j:j3710:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_j:j4205:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_n:n3510:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_n:n3520:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_n:n3530:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_n:n3540:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_n:n3700:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_n:n3710:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_n:n4200:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5502:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5503:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5504:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5506:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5507:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5520:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5530:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5540:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5603:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5606:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5607:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5620:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5630:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5640:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5645:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5649:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e6510:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e6540:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e7520:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e7530:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e7540:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:ec5509:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:ec5539:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:ec5549:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l3406:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l3426:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l5506:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l5508:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l5518:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l5520:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l5530:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l5609:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l5618:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l5630:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l5638:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l5640:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l7545:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l7555:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:lc5518:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:lc5528:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:w3670:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:w3680:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:w3690:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:w5580:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:w5590:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x3430:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x3440:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x3450:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x3460:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x3470:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x3480:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x5550:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x5560:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x5570:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x5647:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x5650:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x5660:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x5667:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x5670:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x5672:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x5675:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:h:arm:cortex-a:9:*:*:*:*:*:*:* *cpe:2.3:h:arm:cortex-a:15:*:*:*:*:*:*:* *cpe:2.3:h:arm:cortex-a:17:*:*:*:*:*:*:* *cpe:2.3:h:arm:cortex-a:57:*:*:*:*:*:*:* *cpe:2.3:h:arm:cortex-a:72:*:*:*:*:*:*:* *cpe:2.3:h:arm:cortex-a:73:*:*:*:*:*:*:* *cpe:2.3:h:arm:cortex-a:75:*:*:*:*:*:*:*
  • CVE Modified by [email protected]

    Jan. 06, 2018

    Action Type Old Value New Value
    Added Reference https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html [No Types Assigned]
    Added Reference https://www.exploit-db.com/exploits/43427/ [No Types Assigned]
    Added Reference https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel [No Types Assigned]
    Added Reference https://support.citrix.com/article/CTX231399 [No Types Assigned]
    Added Reference https://security.netapp.com/advisory/ntap-20180104-0001/ [No Types Assigned]
    Added Reference http://www.securityfocus.com/bid/102371 [No Types Assigned]
    Added Reference http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html [No Types Assigned]
    Added Reference http://nvidia.custhelp.com/app/answers/detail/a_id/4614 [No Types Assigned]
    Added Reference http://nvidia.custhelp.com/app/answers/detail/a_id/4613 [No Types Assigned]
    Added Reference http://nvidia.custhelp.com/app/answers/detail/a_id/4611 [No Types Assigned]
    Added Reference http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html [No Types Assigned]
    Added Reference http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html [No Types Assigned]
    Added Reference http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html [No Types Assigned]
    Added Reference http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html [No Types Assigned]
    Added Reference http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html [No Types Assigned]
  • CVE Modified by [email protected]

    Jan. 05, 2018

    Action Type Old Value New Value
    Added Reference https://www.synology.com/support/security/Synology_SA_18_01 [No Types Assigned]
    Added Reference https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/ [No Types Assigned]
    Added Reference https://support.lenovo.com/us/en/solutions/LEN-18282 [No Types Assigned]
    Added Reference https://support.f5.com/csp/article/K91229003 [No Types Assigned]
    Added Reference https://spectreattack.com/ [No Types Assigned]
    Added Reference https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html [No Types Assigned]
    Added Reference https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002 [No Types Assigned]
    Added Reference https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html [No Types Assigned]
    Added Reference https://developer.arm.com/support/security-update [No Types Assigned]
    Added Reference https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/ [No Types Assigned]
    Added Reference https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/ [No Types Assigned]
    Added Reference https://access.redhat.com/security/vulnerabilities/speculativeexecution [No Types Assigned]
    Added Reference http://xenbits.xen.org/xsa/advisory-254.html [No Types Assigned]
    Added Reference http://www.securitytracker.com/id/1040071 [No Types Assigned]
    Added Reference http://www.kb.cert.org/vuls/id/584653 [No Types Assigned]
    Added Reference http://nvidia.custhelp.com/app/answers/detail/a_id/4609 [No Types Assigned]
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2017-5753 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2017-5753 weaknesses.

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

97.54 }} -0.01%

score

0.99998

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability