5.6
MEDIUM
CVE-2017-5754
Intel Speculative Execution Cache Side Channel Vulnerability
Description

Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.

INFO

Published Date :

Jan. 4, 2018, 1:29 p.m.

Last Modified :

Nov. 19, 2021, 6:15 p.m.

Remotely Exploitable :

No

Impact Score :

4.0

Exploitability Score :

1.1
Public PoC/Exploit Available at Github

CVE-2017-5754 has a 96 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

Affected Products

The following products are affected by CVE-2017-5754 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Intel core_i3
2 Intel core_i5
3 Intel core_i7
4 Intel xeon_e3
5 Intel xeon_e3_1220_v5
6 Intel xeon_e3_1225_v5
7 Intel xeon_e3_1230_v5
8 Intel xeon_e3_1235l_v5
9 Intel xeon_e3_1240_v5
10 Intel xeon_e3_1240l_v5
11 Intel xeon_e3_1245_v5
12 Intel xeon_e3_1260l_v5
13 Intel xeon_e3_1268l_v5
14 Intel xeon_e3_1270_v5
15 Intel xeon_e3_1275_v5
16 Intel xeon_e3_1280_v5
17 Intel xeon_e3_1505l_v5
18 Intel xeon_e3_1505m_v5
19 Intel xeon_e3_1220_v6
20 Intel xeon_e3_1225_v6
21 Intel xeon_e3_1230_v6
22 Intel xeon_e3_1240_v6
23 Intel xeon_e3_1245_v6
24 Intel xeon_e3_1270_v6
25 Intel xeon_e3_1275_v6
26 Intel xeon_e3_1280_v6
27 Intel xeon_e3_1285_v6
28 Intel xeon_e3_1501l_v6
29 Intel xeon_e3_1501m_v6
30 Intel xeon_e3_1505l_v6
31 Intel core_m
32 Intel core_m3
33 Intel core_m5
34 Intel core_m7
35 Intel xeon
36 Intel xeon_bronze_3104
37 Intel xeon_bronze_3106
38 Intel xeon_gold
39 Intel xeon_platinum
40 Intel xeon_silver
41 Intel atom_c
42 Intel atom_e
43 Intel atom_x3
44 Intel atom_z
45 Intel celeron_j
46 Intel celeron_n
47 Intel pentium_j
48 Intel pentium_n
49 Intel xeon_e-1105c
50 Intel xeon_e3_1105c_v2
51 Intel xeon_e3_1125c
52 Intel xeon_e3_1125c_v2
53 Intel xeon_e3_1220
54 Intel xeon_e3_1220_v2
55 Intel xeon_e3_1220_v3
56 Intel xeon_e3_12201
57 Intel xeon_e3_12201_v2
58 Intel xeon_e3_1220l_v3
59 Intel xeon_e3_1225
60 Intel xeon_e3_1225_v2
61 Intel xeon_e3_1225_v3
62 Intel xeon_e3_1226_v3
63 Intel xeon_e3_1230
64 Intel xeon_e3_1230_v2
65 Intel xeon_e3_1230_v3
66 Intel xeon_e3_1230l_v3
67 Intel xeon_e3_1231_v3
68 Intel xeon_e3_1235
69 Intel xeon_e3_1240
70 Intel xeon_e3_1240_v2
71 Intel xeon_e3_1240_v3
72 Intel xeon_e3_1240l_v3
73 Intel xeon_e3_1241_v3
74 Intel xeon_e3_1245
75 Intel xeon_e3_1245_v2
76 Intel xeon_e3_1245_v3
77 Intel xeon_e3_1246_v3
78 Intel xeon_e3_1258l_v4
79 Intel xeon_e3_1260l
80 Intel xeon_e3_1265l_v2
81 Intel xeon_e3_1265l_v3
82 Intel xeon_e3_1265l_v4
83 Intel xeon_e3_1268l_v3
84 Intel xeon_e3_1270
85 Intel xeon_e3_1270_v2
86 Intel xeon_e3_1270_v3
87 Intel xeon_e3_1271_v3
88 Intel xeon_e3_1275
89 Intel xeon_e3_1275_v2
90 Intel xeon_e3_1275_v3
91 Intel xeon_e3_1275l_v3
92 Intel xeon_e3_1276_v3
93 Intel xeon_e3_1278l_v4
94 Intel xeon_e3_1280
95 Intel xeon_e3_1280_v2
96 Intel xeon_e3_1280_v3
97 Intel xeon_e3_1281_v3
98 Intel xeon_e3_1285_v3
99 Intel xeon_e3_1285_v4
100 Intel xeon_e3_1285l_v3
101 Intel xeon_e3_1285l_v4
102 Intel xeon_e3_1286_v3
103 Intel xeon_e3_1286l_v3
104 Intel xeon_e3_1290
105 Intel xeon_e3_1290_v2
106 Intel xeon_e5
107 Intel xeon_e5_1428l
108 Intel xeon_e5_1428l_v2
109 Intel xeon_e5_1428l_v3
110 Intel xeon_e5_1620
111 Intel xeon_e5_1620_v2
112 Intel xeon_e5_1620_v3
113 Intel xeon_e5_1620_v4
114 Intel xeon_e5_1630_v3
115 Intel xeon_e5_1630_v4
116 Intel xeon_e5_1650
117 Intel xeon_e5_1650_v2
118 Intel xeon_e5_1650_v3
119 Intel xeon_e5_1650_v4
120 Intel xeon_e5_1660
121 Intel xeon_e5_1660_v2
122 Intel xeon_e5_1660_v3
123 Intel xeon_e5_1660_v4
124 Intel xeon_e5_1680_v3
125 Intel xeon_e5_1680_v4
126 Intel xeon_e5_2403
127 Intel xeon_e5_2403_v2
128 Intel xeon_e5_2407
129 Intel xeon_e5_2407_v2
130 Intel xeon_e5_2408l_v3
131 Intel xeon_e5_2418l
132 Intel xeon_e5_2418l_v2
133 Intel xeon_e5_2418l_v3
134 Intel xeon_e5_2420
135 Intel xeon_e5_2420_v2
136 Intel xeon_e5_2428l
137 Intel xeon_e5_2428l_v2
138 Intel xeon_e5_2428l_v3
139 Intel xeon_e5_2430
140 Intel xeon_e5_2430_v2
141 Intel xeon_e5_2430l
142 Intel xeon_e5_2430l_v2
143 Intel xeon_e5_2438l_v3
144 Intel xeon_e5_2440
145 Intel xeon_e5_2440_v2
146 Intel xeon_e5_2448l
147 Intel xeon_e5_2448l_v2
148 Intel xeon_e5_2450
149 Intel xeon_e5_2450_v2
150 Intel xeon_e5_2450l
151 Intel xeon_e5_2450l_v2
152 Intel xeon_e5_2470
153 Intel xeon_e5_2470_v2
154 Intel xeon_e5_2603
155 Intel xeon_e5_2603_v2
156 Intel xeon_e5_2603_v3
157 Intel xeon_e5_2603_v4
158 Intel xeon_e5_2608l_v3
159 Intel xeon_e5_2608l_v4
160 Intel xeon_e5_2609
161 Intel xeon_e5_2609_v2
162 Intel xeon_e5_2609_v3
163 Intel xeon_e5_2609_v4
164 Intel xeon_e5_2618l_v2
165 Intel xeon_e5_2618l_v3
166 Intel xeon_e5_2618l_v4
167 Intel xeon_e5_2620
168 Intel xeon_e5_2620_v2
169 Intel xeon_e5_2620_v3
170 Intel xeon_e5_2620_v4
171 Intel xeon_e5_2623_v3
172 Intel xeon_e5_2623_v4
173 Intel xeon_e5_2628l_v2
174 Intel xeon_e5_2628l_v3
175 Intel xeon_e5_2628l_v4
176 Intel xeon_e5_2630
177 Intel xeon_e5_2630_v2
178 Intel xeon_e5_2630_v3
179 Intel xeon_e5_2630_v4
180 Intel xeon_e5_2630l
181 Intel xeon_e5_2630l_v2
182 Intel xeon_e5_2630l_v3
183 Intel xeon_e5_2630l_v4
184 Intel xeon_e5_2637
185 Intel xeon_e5_2637_v2
186 Intel xeon_e5_2637_v3
187 Intel xeon_e5_2637_v4
188 Intel xeon_e5_2640
189 Intel xeon_e5_2640_v2
190 Intel xeon_e5_2640_v3
191 Intel xeon_e5_2640_v4
192 Intel xeon_e5_2643
193 Intel xeon_e5_2643_v2
194 Intel xeon_e5_2643_v3
195 Intel xeon_e5_2643_v4
196 Intel xeon_e5_2648l
197 Intel xeon_e5_2648l_v2
198 Intel xeon_e5_2648l_v3
199 Intel xeon_e5_2648l_v4
200 Intel xeon_e5_2650
201 Intel xeon_e5_2650_v2
202 Intel xeon_e5_2650_v3
203 Intel xeon_e5_2650_v4
204 Intel xeon_e5_2650l
205 Intel xeon_e5_2650l_v2
206 Intel xeon_e5_2650l_v3
207 Intel xeon_e7
208 Intel xeon_phi
1 Arm cortex-a
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2017-5754.

URL Resource
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html
http://nvidia.custhelp.com/app/answers/detail/a_id/4609 Third Party Advisory
http://nvidia.custhelp.com/app/answers/detail/a_id/4611
http://nvidia.custhelp.com/app/answers/detail/a_id/4613
http://nvidia.custhelp.com/app/answers/detail/a_id/4614
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
http://www.kb.cert.org/vuls/id/584653 Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/102378
http://www.securityfocus.com/bid/106128
http://www.securitytracker.com/id/1040071 Third Party Advisory VDB Entry
http://xenbits.xen.org/xsa/advisory-254.html Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0292
https://access.redhat.com/security/vulnerabilities/speculativeexecution Third Party Advisory
https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/ Third Party Advisory
https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/ Third Party Advisory
https://cdrdv2.intel.com/v1/dl/getContent/685358
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
https://cert.vde.com/en-us/advisories/vde-2018-002
https://cert.vde.com/en-us/advisories/vde-2018-003
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html Third Party Advisory
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html
https://meltdownattack.com/ Technical Description Third Party Advisory
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002 Patch Third Party Advisory Vendor Advisory
https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc
https://security.gentoo.org/glsa/201810-06
https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html Third Party Advisory
https://security.netapp.com/advisory/ntap-20180104-0001/
https://source.android.com/security/bulletin/2018-04-01
https://support.citrix.com/article/CTX231399
https://support.citrix.com/article/CTX234679
https://support.f5.com/csp/article/K91229003 Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
https://support.lenovo.com/us/en/solutions/LEN-18282 Third Party Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel
https://usn.ubuntu.com/3522-3/
https://usn.ubuntu.com/3522-4/
https://usn.ubuntu.com/3523-1/
https://usn.ubuntu.com/3540-2/
https://usn.ubuntu.com/3541-2/
https://usn.ubuntu.com/3583-1/
https://usn.ubuntu.com/3597-1/
https://usn.ubuntu.com/3597-2/
https://usn.ubuntu.com/usn/usn-3516-1/
https://usn.ubuntu.com/usn/usn-3522-2/
https://usn.ubuntu.com/usn/usn-3523-2/
https://usn.ubuntu.com/usn/usn-3524-2/
https://usn.ubuntu.com/usn/usn-3525-1/
https://www.codeaurora.org/security-bulletin/2018/07/02/july-2018-code-aurora-security-bulletin
https://www.debian.org/security/2018/dsa-4078
https://www.debian.org/security/2018/dsa-4082
https://www.debian.org/security/2018/dsa-4120
https://www.kb.cert.org/vuls/id/180049
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/ Third Party Advisory
https://www.synology.com/support/security/Synology_SA_18_01 Third Party Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Week4

Updated: 3 days, 7 hours ago
0 stars 0 fork 0 watcher
Born at : Nov. 18, 2024, 6:11 p.m. This repo has been linked 2 different CVEs too.

Informe final de Organización del Computador - 2C 2023 | Vulnerabilidades 👾⚠️

fiuba

Updated: 2 months, 2 weeks ago
0 stars 0 fork 0 watcher
Born at : Aug. 28, 2024, 6:20 a.m. This repo has been linked 5 different CVEs too.

Security analysis for the RISC-V ISA

bof cybersecurity embedded-systems risc-v riscv rop

Python C Assembly Shell Jupyter Notebook Makefile Perl Ruby HTML Roff

Updated: 3 months, 2 weeks ago
1 stars 0 fork 0 watcher
Born at : March 17, 2024, 3:54 p.m. This repo has been linked 3 different CVEs too.

A simple GUI for spectre-meltdown-checker

Python

Updated: 4 months, 2 weeks ago
0 stars 0 fork 0 watcher
Born at : Feb. 12, 2024, 4:39 p.m. This repo has been linked 16 different CVEs too.

HEVD Exploit: ArbitraryWrite on Windows 10 22H2 - Bypassing KVA Shadow and SMEP via PML4 Entry Manipulation

exploit hevd kernel windows smep kpti kvas

C Assembly Python

Updated: 4 months ago
13 stars 4 fork 4 watcher
Born at : Jan. 20, 2024, 6:46 p.m. This repo has been linked 1 different CVEs too.

This repo aggregates all files about Prisma Cloud Workshop for BanRep

Shell HCL

Updated: 11 months, 1 week ago
0 stars 2 fork 2 watcher
Born at : Dec. 14, 2023, 2:38 p.m. This repo has been linked 3 different CVEs too.

None

Updated: 11 months ago
0 stars 0 fork 0 watcher
Born at : Dec. 5, 2023, 12:29 p.m. This repo has been linked 6 different CVEs too.

Update win10debloatandgamingtweaks.ps1

PowerShell

Updated: 7 months, 2 weeks ago
1 stars 0 fork 0 watcher
Born at : Aug. 23, 2023, 4:35 p.m. This repo has been linked 1 different CVEs too.

None

Dockerfile Shell

Updated: 1 year, 4 months ago
0 stars 0 fork 0 watcher
Born at : July 19, 2023, 5:42 p.m. This repo has been linked 15 different CVEs too.

A curated list of GitHub projects

Updated: 4 months ago
5 stars 0 fork 0 watcher
Born at : July 12, 2023, 12:22 p.m. This repo has been linked 2 different CVEs too.

None

C

Updated: 1 year, 4 months ago
0 stars 0 fork 0 watcher
Born at : July 9, 2023, 6:29 p.m. This repo has been linked 3 different CVEs too.

None

Dockerfile Python Shell

Updated: 1 year, 4 months ago
0 stars 0 fork 0 watcher
Born at : June 22, 2023, 2:40 p.m. This repo has been linked 15 different CVEs too.

None

Makefile C Shell

Updated: 2 months, 3 weeks ago
13 stars 0 fork 0 watcher
Born at : May 29, 2023, 3:50 p.m. This repo has been linked 15 different CVEs too.

None

C Python PowerShell Lua

Updated: 1 year, 7 months ago
0 stars 0 fork 0 watcher
Born at : April 11, 2023, 2:15 p.m. This repo has been linked 16 different CVEs too.

None

C JavaScript Python Makefile Shell Batchfile C++ WebAssembly Assembly CMake

Updated: 1 year, 6 months ago
0 stars 0 fork 0 watcher
Born at : March 28, 2023, 6:31 a.m. This repo has been linked 9 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2017-5754 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2017-5754 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CVE Modified by [email protected]

    Nov. 19, 2021

    Action Type Old Value New Value
    Removed Reference https://01.org/security/advisories/intel-oss-10003 [Vendor Advisory]
    Added Reference https://cdrdv2.intel.com/v1/dl/getContent/685358 [No Types Assigned]
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2650l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2650l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2650l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2650l_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2650l:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2650l:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2650_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2650_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2650_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2650_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2650_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2650_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2650:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2650:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2648l_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2648l_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2648l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2648l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2648l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2648l_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2648l:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2648l:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2643_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2643_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2643_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2643_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2643_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2643_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2643:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2643:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2640_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2640_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2640_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2640_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2640_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2640_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2640:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2640:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2637_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2637_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2637_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2637_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2637_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2637_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2637:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2637:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2630l_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2630l_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2630l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2630l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2630l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2630l_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2630l:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2630l:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2630_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2630_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2630_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2630_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2630_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2630_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2630:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2630:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2628l_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2628l_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2628l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2628l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2628l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2628l_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2623_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2623_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2623_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2623_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2620_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2620_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2620_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2620_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2620_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2620_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2620:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2620:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2618l_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2618l_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2618l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2618l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2618l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2618l_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2609_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2609_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2609_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2609_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2609_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2609_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2609:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2609:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2608l_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2608l_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2608l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2608l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2603_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2603_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2603_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2603_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2603_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2603_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2603:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2603:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2470_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2470_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2470:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2470:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2450l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2450l_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2450l:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2450l:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2450_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2450_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2450:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2450:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2448l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2448l_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2448l:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2448l:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2440_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2440_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2440:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2440:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2438l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2438l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2430l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2430l_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2430l:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2430l:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2430_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2430_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2430:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2430:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2428l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2428l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2428l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2428l_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2428l:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2428l:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2420_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2420_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2420:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2420:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2418l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2418l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2418l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2418l_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2418l:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2418l:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2408l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2408l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2407_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2407_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2407:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2407:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2403_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2403_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2403:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2403:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1680_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1680_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1680_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1680_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1660_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1660_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1660_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1660_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1660_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1660_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1660:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1660:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1650_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1650_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1650_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1650_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1650_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1650_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1650:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1650:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1630_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1630_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1630_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1630_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1620_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1620_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1620_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1620_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1620_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1620_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1620:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1620:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1428l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1428l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1428l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1428l_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1428l:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1428l:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1505m_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1505m_v5:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1505l_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1505l_v6:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1505l_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1505l_v5:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1501m_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1501m_v6:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1501l_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1501l_v6:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1290_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1290_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1290:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1290:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1286l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1286l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1286_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1286_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1285l_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1285l_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1285l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1285l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1285_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1285_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1285_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1285_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1285_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1281_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1281_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1280_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1280_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1280_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1280_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1280_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1280_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1280:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1280:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1278l_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1278l_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1276_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1276_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1275l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1275l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1275_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1275_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1275_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1275_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1275_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1275_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1275:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1275:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1271_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1271_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1270_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1270_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1270_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1270_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1270_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1270_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1270:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1270:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1268l_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1268l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1268l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1265l_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1265l_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1265l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1265l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1265l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1265l_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1260l_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1260l:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1260l:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1258l_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1258l_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1246_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1246_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1245_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1245_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1245_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1245_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1245_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1245_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1245:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1245:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1241_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1241_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1240l_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1240l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1240l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1240_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1240_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1240_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1240_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1240_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1240_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1240:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1240:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1235l_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1235:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1235:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1231_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1231_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1230l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1230l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1230_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1230_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1230_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1230_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1230_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1230_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1230:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1230:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1226_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1226_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1225_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1225_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1225_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1225_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1225_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1225_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1225:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1225:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1220l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1220l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1220l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_12201_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1220l:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_12201:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1220_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1220_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1220_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1220_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1220_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1220_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1220:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1220:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1125c_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1125c_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1125c:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1125c:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1105c_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1105c_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1105c:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e-1105c:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_bronze:3106:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_bronze:3104:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*
  • CVE Modified by [email protected]

    Apr. 15, 2020

    Action Type Old Value New Value
    Added Reference https://www.oracle.com/security-alerts/cpuapr2020.html [No Types Assigned]
  • CVE Modified by [email protected]

    Oct. 08, 2019

    Action Type Old Value New Value
    Added Reference https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf [No Types Assigned]
  • CVE Modified by [email protected]

    Jun. 26, 2019

    Action Type Old Value New Value
    Added Reference http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt [No Types Assigned]
  • CVE Modified by [email protected]

    Apr. 23, 2019

    Action Type Old Value New Value
    Added Reference https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html [No Types Assigned]
  • CVE Modified by [email protected]

    Dec. 07, 2018

    Action Type Old Value New Value
    Added Reference http://www.securityfocus.com/bid/106128 [No Types Assigned]
  • CVE Modified by [email protected]

    Nov. 30, 2018

    Action Type Old Value New Value
    Added Reference https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes [No Types Assigned]
    Added Reference https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 [No Types Assigned]
  • CVE Modified by [email protected]

    Oct. 31, 2018

    Action Type Old Value New Value
    Added Reference https://security.gentoo.org/glsa/201810-06 [No Types Assigned]
  • CVE Modified by [email protected]

    Oct. 23, 2018

    Action Type Old Value New Value
    Added Reference https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001 [No Types Assigned]
  • CVE Modified by [email protected]

    Aug. 23, 2018

    Action Type Old Value New Value
    Added Reference https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us [No Types Assigned]
  • CVE Modified by [email protected]

    Jul. 10, 2018

    Action Type Old Value New Value
    Added Reference https://www.codeaurora.org/security-bulletin/2018/07/02/july-2018-code-aurora-security-bulletin [No Types Assigned]
  • CVE Modified by [email protected]

    May. 23, 2018

    Action Type Old Value New Value
    Removed Reference https://developer.arm.com/support/security-update [Vendor Advisory]
    Added Reference https://www.kb.cert.org/vuls/id/180049 [No Types Assigned]
    Added Reference https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability [No Types Assigned]
  • CVE Modified by [email protected]

    May. 17, 2018

    Action Type Old Value New Value
    Added Reference https://cert.vde.com/en-us/advisories/vde-2018-003 [No Types Assigned]
    Added Reference https://cert.vde.com/en-us/advisories/vde-2018-002 [No Types Assigned]
  • CVE Modified by [email protected]

    May. 10, 2018

    Action Type Old Value New Value
    Added Reference https://support.citrix.com/article/CTX234679 [No Types Assigned]
  • CVE Modified by [email protected]

    Apr. 04, 2018

    Action Type Old Value New Value
    Added Reference https://source.android.com/security/bulletin/2018-04-01 [No Types Assigned]
  • CVE Modified by [email protected]

    Mar. 24, 2018

    Action Type Old Value New Value
    Added Reference https://usn.ubuntu.com/3541-2/ [No Types Assigned]
    Added Reference https://usn.ubuntu.com/3540-2/ [No Types Assigned]
  • CVE Modified by [email protected]

    Mar. 16, 2018

    Action Type Old Value New Value
    Added Reference https://usn.ubuntu.com/3597-2/ [No Types Assigned]
    Added Reference https://usn.ubuntu.com/3597-1/ [No Types Assigned]
    Added Reference https://usn.ubuntu.com/3583-1/ [No Types Assigned]
    Added Reference https://usn.ubuntu.com/3523-1/ [No Types Assigned]
    Added Reference https://usn.ubuntu.com/3522-4/ [No Types Assigned]
    Added Reference https://usn.ubuntu.com/3522-3/ [No Types Assigned]
  • CVE Modified by [email protected]

    Mar. 15, 2018

    Action Type Old Value New Value
    Added Reference https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc [No Types Assigned]
  • CVE Modified by [email protected]

    Mar. 04, 2018

    Action Type Old Value New Value
    Added Reference http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt [No Types Assigned]
  • CVE Modified by [email protected]

    Feb. 24, 2018

    Action Type Old Value New Value
    Added Reference https://www.debian.org/security/2018/dsa-4120 [No Types Assigned]
  • CVE Modified by [email protected]

    Feb. 11, 2018

    Action Type Old Value New Value
    Added Reference https://access.redhat.com/errata/RHSA-2018:0292 [No Types Assigned]
  • CVE Modified by [email protected]

    Feb. 04, 2018

    Action Type Old Value New Value
    Added Reference https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html [No Types Assigned]
  • CVE Modified by [email protected]

    Jan. 13, 2018

    Action Type Old Value New Value
    Added Reference https://usn.ubuntu.com/usn/usn-3525-1/ [No Types Assigned]
    Added Reference https://usn.ubuntu.com/usn/usn-3524-2/ [No Types Assigned]
    Added Reference https://usn.ubuntu.com/usn/usn-3523-2/ [No Types Assigned]
    Added Reference https://usn.ubuntu.com/usn/usn-3522-2/ [No Types Assigned]
    Added Reference https://usn.ubuntu.com/usn/usn-3516-1/ [No Types Assigned]
  • CVE Modified by [email protected]

    Jan. 12, 2018

    Action Type Old Value New Value
    Added Reference https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us [No Types Assigned]
  • CVE Modified by [email protected]

    Jan. 11, 2018

    Action Type Old Value New Value
    Added Reference https://www.debian.org/security/2018/dsa-4082 [No Types Assigned]
  • CVE Modified by [email protected]

    Jan. 06, 2018

    Action Type Old Value New Value
    Added Reference https://www.debian.org/security/2018/dsa-4078 [No Types Assigned]
    Added Reference https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel [No Types Assigned]
    Added Reference https://support.citrix.com/article/CTX231399 [No Types Assigned]
    Added Reference https://security.netapp.com/advisory/ntap-20180104-0001/ [No Types Assigned]
    Added Reference http://www.securityfocus.com/bid/102378 [No Types Assigned]
    Added Reference http://nvidia.custhelp.com/app/answers/detail/a_id/4614 [No Types Assigned]
    Added Reference http://nvidia.custhelp.com/app/answers/detail/a_id/4613 [No Types Assigned]
    Added Reference http://nvidia.custhelp.com/app/answers/detail/a_id/4611 [No Types Assigned]
    Added Reference http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html [No Types Assigned]
    Added Reference http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html [No Types Assigned]
    Added Reference http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html [No Types Assigned]
    Added Reference http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html [No Types Assigned]
    Added Reference http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html [No Types Assigned]
  • Initial Analysis by [email protected]

    Jan. 05, 2018

    Action Type Old Value New Value
    Added CVSS V2 (AV:L/AC:M/Au:N/C:C/I:N/A:N)
    Added CVSS V3 AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
    Changed Reference Type http://xenbits.xen.org/xsa/advisory-254.html No Types Assigned http://xenbits.xen.org/xsa/advisory-254.html Third Party Advisory
    Changed Reference Type https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/ No Types Assigned https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/ Third Party Advisory
    Changed Reference Type https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/ No Types Assigned https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/ Third Party Advisory
    Changed Reference Type https://meltdownattack.com/ No Types Assigned https://meltdownattack.com/ Technical Description, Third Party Advisory
    Changed Reference Type http://www.securitytracker.com/id/1040071 No Types Assigned http://www.securitytracker.com/id/1040071 Third Party Advisory, VDB Entry
    Changed Reference Type https://www.synology.com/support/security/Synology_SA_18_01 No Types Assigned https://www.synology.com/support/security/Synology_SA_18_01 Third Party Advisory
    Changed Reference Type http://www.kb.cert.org/vuls/id/584653 No Types Assigned http://www.kb.cert.org/vuls/id/584653 Third Party Advisory, US Government Resource
    Changed Reference Type https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002 No Types Assigned https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002 Patch, Third Party Advisory, Vendor Advisory
    Changed Reference Type https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html No Types Assigned https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html Third Party Advisory
    Changed Reference Type http://nvidia.custhelp.com/app/answers/detail/a_id/4609 No Types Assigned http://nvidia.custhelp.com/app/answers/detail/a_id/4609 Third Party Advisory
    Changed Reference Type https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/ No Types Assigned https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/ Third Party Advisory
    Changed Reference Type https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html No Types Assigned https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html Third Party Advisory
    Changed Reference Type https://support.lenovo.com/us/en/solutions/LEN-18282 No Types Assigned https://support.lenovo.com/us/en/solutions/LEN-18282 Third Party Advisory
    Changed Reference Type https://access.redhat.com/security/vulnerabilities/speculativeexecution No Types Assigned https://access.redhat.com/security/vulnerabilities/speculativeexecution Third Party Advisory
    Changed Reference Type https://01.org/security/advisories/intel-oss-10003 No Types Assigned https://01.org/security/advisories/intel-oss-10003 Vendor Advisory
    Changed Reference Type https://developer.arm.com/support/security-update No Types Assigned https://developer.arm.com/support/security-update Vendor Advisory
    Changed Reference Type https://support.f5.com/csp/article/K91229003 No Types Assigned https://support.f5.com/csp/article/K91229003 Third Party Advisory
    Added CWE CWE-200
    Added CPE Configuration OR *cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2316:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2338:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2350:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2358:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2508:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2516:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2518:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2530:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2538:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2550:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2558:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2718:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2730:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2738:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2750:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c2758:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_x3:c3130:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_x3:c3200rk:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_x3:c3205rk:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_x3:c3230rk:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_x3:c3235rk:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_x3:c3265rk:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_x3:c3295rk:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_x3:c3405:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_x3:c3445:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3770d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3775:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3775d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3785:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3795:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j1750:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j1800:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j1850:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j1900:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j3060:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j3160:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j3355:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2805:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2806:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2807:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2808:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2810:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2815:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2820:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2830:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2840:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2910:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2920:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2930:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n2940:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n3000:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n3010:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n3050:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n3060:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n3150:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n3160:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n3350:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n4000:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n4100:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3450:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m:5y10:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m:5y10a:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m:5y10c:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m:5y31:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m:5y51:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m:5y70:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m:5y71:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m3:6y30:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m3:7y30:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m3:7y32:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m5:6y54:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m5:6y57:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m7:6y75:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_j:j2850:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_j:j2900:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_j:j3710:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_j:j4205:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_n:n3510:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_n:n3520:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_n:n3530:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_n:n3540:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_n:n3700:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_n:n3710:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_n:n4200:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5502:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5503:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5504:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5506:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5507:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5520:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5530:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5540:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5603:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5606:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5607:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5620:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5630:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5640:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5645:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e5649:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e6510:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e6540:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e7520:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e7530:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:e7540:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:ec5509:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:ec5539:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:ec5549:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l3406:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l3426:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l5506:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l5508:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l5518:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l5520:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l5530:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l5609:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l5618:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l5630:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l5638:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l5640:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l7545:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:l7555:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:lc5518:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:lc5528:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:w3670:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:w3680:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:w3690:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:w5580:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:w5590:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x3430:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x3440:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x3450:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x3460:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x3470:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x3480:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x5550:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x5560:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x5570:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x5647:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x5650:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x5660:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x5667:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x5670:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x5672:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon:x5675:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:h:arm:cortex-a:75:*:*:*:*:*:*:*
  • CVE Modified by [email protected]

    Jan. 05, 2018

    Action Type Old Value New Value
    Added Reference https://www.synology.com/support/security/Synology_SA_18_01 [No Types Assigned]
    Added Reference https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/ [No Types Assigned]
    Added Reference https://support.lenovo.com/us/en/solutions/LEN-18282 [No Types Assigned]
    Added Reference https://support.f5.com/csp/article/K91229003 [No Types Assigned]
    Added Reference https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html [No Types Assigned]
    Added Reference https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002 [No Types Assigned]
    Added Reference https://meltdownattack.com/ [No Types Assigned]
    Added Reference https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html [No Types Assigned]
    Added Reference https://developer.arm.com/support/security-update [No Types Assigned]
    Added Reference https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/ [No Types Assigned]
    Added Reference https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/ [No Types Assigned]
    Added Reference https://access.redhat.com/security/vulnerabilities/speculativeexecution [No Types Assigned]
    Added Reference http://xenbits.xen.org/xsa/advisory-254.html [No Types Assigned]
    Added Reference http://www.securitytracker.com/id/1040071 [No Types Assigned]
    Added Reference http://www.kb.cert.org/vuls/id/584653 [No Types Assigned]
    Added Reference http://nvidia.custhelp.com/app/answers/detail/a_id/4609 [No Types Assigned]
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2017-5754 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2017-5754 weaknesses.

CAPEC-13: Subverting Environment Variable Values Subverting Environment Variable Values CAPEC-22: Exploiting Trust in Client Exploiting Trust in Client CAPEC-59: Session Credential Falsification through Prediction Session Credential Falsification through Prediction CAPEC-60: Reusing Session IDs (aka Session Replay) Reusing Session IDs (aka Session Replay) CAPEC-79: Using Slashes in Alternate Encoding Using Slashes in Alternate Encoding CAPEC-116: Excavation Excavation CAPEC-169: Footprinting Footprinting CAPEC-224: Fingerprinting Fingerprinting CAPEC-285: ICMP Echo Request Ping ICMP Echo Request Ping CAPEC-287: TCP SYN Scan TCP SYN Scan CAPEC-290: Enumerate Mail Exchange (MX) Records Enumerate Mail Exchange (MX) Records CAPEC-291: DNS Zone Transfers DNS Zone Transfers CAPEC-292: Host Discovery Host Discovery CAPEC-293: Traceroute Route Enumeration Traceroute Route Enumeration CAPEC-294: ICMP Address Mask Request ICMP Address Mask Request CAPEC-295: Timestamp Request Timestamp Request CAPEC-296: ICMP Information Request ICMP Information Request CAPEC-297: TCP ACK Ping TCP ACK Ping CAPEC-298: UDP Ping UDP Ping CAPEC-299: TCP SYN Ping TCP SYN Ping CAPEC-300: Port Scanning Port Scanning CAPEC-301: TCP Connect Scan TCP Connect Scan CAPEC-302: TCP FIN Scan TCP FIN Scan CAPEC-303: TCP Xmas Scan TCP Xmas Scan CAPEC-304: TCP Null Scan TCP Null Scan CAPEC-305: TCP ACK Scan TCP ACK Scan CAPEC-306: TCP Window Scan TCP Window Scan CAPEC-307: TCP RPC Scan TCP RPC Scan CAPEC-308: UDP Scan UDP Scan CAPEC-309: Network Topology Mapping Network Topology Mapping CAPEC-310: Scanning for Vulnerable Software Scanning for Vulnerable Software CAPEC-312: Active OS Fingerprinting Active OS Fingerprinting CAPEC-313: Passive OS Fingerprinting Passive OS Fingerprinting CAPEC-317: IP ID Sequencing Probe IP ID Sequencing Probe CAPEC-318: IP 'ID' Echoed Byte-Order Probe IP 'ID' Echoed Byte-Order Probe CAPEC-319: IP (DF) 'Don't Fragment Bit' Echoing Probe IP (DF) 'Don't Fragment Bit' Echoing Probe CAPEC-320: TCP Timestamp Probe TCP Timestamp Probe CAPEC-321: TCP Sequence Number Probe TCP Sequence Number Probe CAPEC-322: TCP (ISN) Greatest Common Divisor Probe TCP (ISN) Greatest Common Divisor Probe CAPEC-323: TCP (ISN) Counter Rate Probe TCP (ISN) Counter Rate Probe CAPEC-324: TCP (ISN) Sequence Predictability Probe TCP (ISN) Sequence Predictability Probe CAPEC-325: TCP Congestion Control Flag (ECN) Probe TCP Congestion Control Flag (ECN) Probe CAPEC-326: TCP Initial Window Size Probe TCP Initial Window Size Probe CAPEC-327: TCP Options Probe TCP Options Probe CAPEC-328: TCP 'RST' Flag Checksum Probe TCP 'RST' Flag Checksum Probe CAPEC-329: ICMP Error Message Quoting Probe ICMP Error Message Quoting Probe CAPEC-330: ICMP Error Message Echoing Integrity Probe ICMP Error Message Echoing Integrity Probe CAPEC-472: Browser Fingerprinting Browser Fingerprinting CAPEC-497: File Discovery File Discovery CAPEC-508: Shoulder Surfing Shoulder Surfing CAPEC-573: Process Footprinting Process Footprinting CAPEC-574: Services Footprinting Services Footprinting CAPEC-575: Account Footprinting Account Footprinting CAPEC-576: Group Permission Footprinting Group Permission Footprinting CAPEC-577: Owner Footprinting Owner Footprinting CAPEC-616: Establish Rogue Location Establish Rogue Location CAPEC-643: Identify Shared Files/Directories on System Identify Shared Files/Directories on System CAPEC-646: Peripheral Footprinting Peripheral Footprinting CAPEC-651: Eavesdropping Eavesdropping
Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

97.38 }} 4.70%

score

0.99929

percentile

CVSS30 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability