5.5
MEDIUM
CVE-2018-3639
"Intel Speculative Store Bypass (SSB) Information Disclosure"
Description

Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.

INFO

Published Date :

May 22, 2018, 12:29 p.m.

Last Modified :

Nov. 21, 2024, 4:05 a.m.

Remotely Exploitable :

No

Impact Score :

3.6

Exploitability Score :

1.8
Public PoC/Exploit Available at Github

CVE-2018-3639 has a 50 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

Affected Products

The following products are affected by CVE-2018-3639 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Intel core_i3
2 Intel core_i5
3 Intel core_i7
4 Intel xeon_e3
5 Intel xeon_e3_1220_v5
6 Intel xeon_e3_1225_v5
7 Intel xeon_e3_1230_v5
8 Intel xeon_e3_1235l_v5
9 Intel xeon_e3_1240_v5
10 Intel xeon_e3_1240l_v5
11 Intel xeon_e3_1245_v5
12 Intel xeon_e3_1260l_v5
13 Intel xeon_e3_1268l_v5
14 Intel xeon_e3_1270_v5
15 Intel xeon_e3_1275_v5
16 Intel xeon_e3_1280_v5
17 Intel xeon_e3_1505l_v5
18 Intel xeon_e3_1505m_v5
19 Intel xeon_e3_1220_v6
20 Intel xeon_e3_1225_v6
21 Intel xeon_e3_1230_v6
22 Intel xeon_e3_1240_v6
23 Intel xeon_e3_1245_v6
24 Intel xeon_e3_1270_v6
25 Intel xeon_e3_1275_v6
26 Intel xeon_e3_1280_v6
27 Intel xeon_e3_1285_v6
28 Intel xeon_e3_1501l_v6
29 Intel xeon_e3_1501m_v6
30 Intel xeon_e3_1505l_v6
31 Intel core_m
32 Intel xeon_gold
33 Intel xeon_platinum
34 Intel xeon_silver
35 Intel atom_c
36 Intel atom_e
37 Intel atom_z
38 Intel celeron_j
39 Intel celeron_n
40 Intel pentium_j
41 Intel xeon_e-1105c
42 Intel xeon_e3_1105c_v2
43 Intel xeon_e3_1125c_v2
44 Intel xeon_e3_1220_v2
45 Intel xeon_e3_1220_v3
46 Intel xeon_e3_12201
47 Intel xeon_e3_12201_v2
48 Intel xeon_e3_1220l_v3
49 Intel xeon_e3_1225
50 Intel xeon_e3_1225_v2
51 Intel xeon_e3_1225_v3
52 Intel xeon_e3_1226_v3
53 Intel xeon_e3_1230
54 Intel xeon_e3_1230_v2
55 Intel xeon_e3_1230_v3
56 Intel xeon_e3_1230l_v3
57 Intel xeon_e3_1231_v3
58 Intel xeon_e3_1235
59 Intel xeon_e3_1240
60 Intel xeon_e3_1240_v2
61 Intel xeon_e3_1240_v3
62 Intel xeon_e3_1240l_v3
63 Intel xeon_e3_1241_v3
64 Intel xeon_e3_1245
65 Intel xeon_e3_1245_v2
66 Intel xeon_e3_1245_v3
67 Intel xeon_e3_1246_v3
68 Intel xeon_e3_1258l_v4
69 Intel xeon_e3_1260l
70 Intel xeon_e3_1265l_v2
71 Intel xeon_e3_1265l_v3
72 Intel xeon_e3_1265l_v4
73 Intel xeon_e3_1268l_v3
74 Intel xeon_e3_1270
75 Intel xeon_e3_1270_v2
76 Intel xeon_e3_1270_v3
77 Intel xeon_e3_1271_v3
78 Intel xeon_e3_1275_v2
79 Intel xeon_e3_1275_v3
80 Intel xeon_e3_1275l_v3
81 Intel xeon_e3_1276_v3
82 Intel xeon_e3_1278l_v4
83 Intel xeon_e3_1280
84 Intel xeon_e3_1280_v2
85 Intel xeon_e3_1280_v3
86 Intel xeon_e3_1281_v3
87 Intel xeon_e3_1285_v3
88 Intel xeon_e3_1285_v4
89 Intel xeon_e3_1285l_v3
90 Intel xeon_e3_1285l_v4
91 Intel xeon_e3_1286_v3
92 Intel xeon_e3_1286l_v3
93 Intel xeon_e3_1290
94 Intel xeon_e3_1290_v2
95 Intel xeon_e5
96 Intel xeon_e5_1428l
97 Intel xeon_e5_1428l_v2
98 Intel xeon_e5_1428l_v3
99 Intel xeon_e5_1620
100 Intel xeon_e5_1620_v2
101 Intel xeon_e5_1620_v3
102 Intel xeon_e5_1620_v4
103 Intel xeon_e5_1630_v3
104 Intel xeon_e5_1630_v4
105 Intel xeon_e5_1650
106 Intel xeon_e5_1650_v2
107 Intel xeon_e5_1650_v3
108 Intel xeon_e5_1650_v4
109 Intel xeon_e5_1660
110 Intel xeon_e5_1660_v2
111 Intel xeon_e5_1660_v3
112 Intel xeon_e5_1660_v4
113 Intel xeon_e5_1680_v3
114 Intel xeon_e5_1680_v4
115 Intel xeon_e5_2403
116 Intel xeon_e5_2403_v2
117 Intel xeon_e5_2407
118 Intel xeon_e5_2407_v2
119 Intel xeon_e5_2408l_v3
120 Intel xeon_e5_2418l
121 Intel xeon_e5_2418l_v2
122 Intel xeon_e5_2418l_v3
123 Intel xeon_e5_2420
124 Intel xeon_e5_2420_v2
125 Intel xeon_e5_2428l
126 Intel xeon_e5_2428l_v2
127 Intel xeon_e5_2428l_v3
128 Intel xeon_e5_2430
129 Intel xeon_e5_2430_v2
130 Intel xeon_e5_2430l
131 Intel xeon_e5_2430l_v2
132 Intel xeon_e5_2438l_v3
133 Intel xeon_e5_2440
134 Intel xeon_e5_2440_v2
135 Intel xeon_e5_2448l
136 Intel xeon_e5_2448l_v2
137 Intel xeon_e5_2450
138 Intel xeon_e5_2450_v2
139 Intel xeon_e5_2450l
140 Intel xeon_e5_2450l_v2
141 Intel xeon_e5_2470
142 Intel xeon_e5_2470_v2
143 Intel xeon_e5_2603
144 Intel xeon_e5_2603_v2
145 Intel xeon_e5_2603_v3
146 Intel xeon_e5_2603_v4
147 Intel xeon_e5_2608l_v3
148 Intel xeon_e5_2608l_v4
149 Intel xeon_e5_2609
150 Intel xeon_e5_2609_v2
151 Intel xeon_e5_2609_v3
152 Intel xeon_e5_2609_v4
153 Intel xeon_e5_2618l_v2
154 Intel xeon_e5_2618l_v3
155 Intel xeon_e5_2618l_v4
156 Intel xeon_e5_2620
157 Intel xeon_e5_2620_v2
158 Intel xeon_e5_2620_v3
159 Intel xeon_e5_2620_v4
160 Intel xeon_e5_2623_v3
161 Intel xeon_e5_2623_v4
162 Intel xeon_e5_2628l_v2
163 Intel xeon_e5_2628l_v3
164 Intel xeon_e5_2628l_v4
165 Intel xeon_e5_2630
166 Intel xeon_e5_2630_v2
167 Intel xeon_e5_2630_v3
168 Intel xeon_e5_2630_v4
169 Intel xeon_e5_2630l
170 Intel xeon_e5_2630l_v2
171 Intel xeon_e5_2630l_v3
172 Intel xeon_e5_2630l_v4
173 Intel xeon_e5_2637
174 Intel xeon_e5_2637_v2
175 Intel xeon_e5_2637_v3
176 Intel xeon_e5_2637_v4
177 Intel xeon_e5_2640
178 Intel xeon_e5_2640_v2
179 Intel xeon_e5_2640_v3
180 Intel xeon_e5_2640_v4
181 Intel xeon_e5_2643
182 Intel xeon_e5_2643_v2
183 Intel xeon_e5_2643_v3
184 Intel xeon_e5_2643_v4
185 Intel xeon_e5_2648l
186 Intel xeon_e5_2648l_v2
187 Intel xeon_e5_2648l_v3
188 Intel xeon_e5_2648l_v4
189 Intel xeon_e5_2650
190 Intel xeon_e5_2650_v2
191 Intel xeon_e5_2650_v3
192 Intel xeon_e5_2650_v4
193 Intel xeon_e5_2650l
194 Intel xeon_e5_2650l_v2
195 Intel xeon_e5_2650l_v3
196 Intel xeon_e7
197 Intel atom_x5-e3930
198 Intel atom_x5-e3940
199 Intel atom_x7-e3950
200 Intel pentium
201 Intel pentium_silver
1 Siemens simatic_field_pg_m5_firmware
2 Siemens simatic_ipc427e_firmware
3 Siemens simatic_ipc477e_firmware
4 Siemens simatic_ipc547e_firmware
5 Siemens simatic_ipc627d_firmware
6 Siemens simatic_ipc647d_firmware
7 Siemens simatic_ipc677d_firmware
8 Siemens simatic_ipc827d_firmware
9 Siemens simatic_ipc847d_firmware
10 Siemens simatic_itp1000_firmware
11 Siemens simatic_field_pg_m4_firmware
12 Siemens simatic_ipc677c_firmware
13 Siemens simatic_ipc427d_firmware
14 Siemens simatic_ipc477d_firmware
15 Siemens simatic_ipc627c_firmware
16 Siemens simatic_ipc647c_firmware
17 Siemens simatic_ipc827c_firmware
18 Siemens simatic_ipc847c_firmware
19 Siemens simatic_s7-1500_firmware
20 Siemens simatic_ipc477e_pro_firmware
21 Siemens simatic_ipc547g_firmware
22 Siemens itc1500_firmware
23 Siemens itc1500_pro_firmware
24 Siemens itc1900_firmware
25 Siemens itc1900_pro_firmware
26 Siemens itc2200_firmware
27 Siemens itc2200_pro_firmware
28 Siemens ruggedcom_ape_firmware
29 Siemens simatic_et_200_sp_firmware
30 Siemens simatic_ipc3000_smart_firmware
31 Siemens simatic_ipc347e_firmware
32 Siemens simatic_ipc427c_firmware
33 Siemens simatic_ipc477c_firmware
34 Siemens simotion_p320-4e_firmware
35 Siemens sinumerik_840_d_sl_firmware
36 Siemens sinumerik_pcu_50.5_firmware
37 Siemens sinumerik_tcu_30.3_firmware
38 Siemens sinema_remote_connect_firmware
39 Siemens simatic_s7-1500
40 Siemens simatic_field_pg_m5
41 Siemens simatic_ipc427e
42 Siemens simatic_ipc477e
43 Siemens simatic_itp1000
44 Siemens simatic_field_pg_m4
45 Siemens simatic_ipc677c
46 Siemens simatic_ipc427d
47 Siemens simatic_ipc477d
48 Siemens simatic_ipc547e
49 Siemens simatic_ipc627c
50 Siemens simatic_ipc627d
51 Siemens simatic_ipc647c
52 Siemens simatic_ipc647d
53 Siemens simatic_ipc677d
54 Siemens simatic_ipc827c
55 Siemens simatic_ipc827d
56 Siemens simatic_ipc847c
57 Siemens simatic_ipc847d
58 Siemens itc1500
59 Siemens itc1500_pro
60 Siemens itc1900
61 Siemens itc1900_pro
62 Siemens itc2200
63 Siemens itc2200_pro
64 Siemens ruggedcom_ape
65 Siemens simatic_et_200_sp
66 Siemens simatic_ipc3000_smart
67 Siemens simatic_ipc347e
68 Siemens simatic_ipc427c
69 Siemens simatic_ipc477c
70 Siemens simatic_ipc477e_pro
71 Siemens simatic_ipc547g
72 Siemens simotion_p320-4e
73 Siemens sinumerik_840_d_sl
74 Siemens sinumerik_pcu_50.5
75 Siemens sinumerik_tcu_30.3
76 Siemens sinema_remote_connect
1 Microsoft windows_10
2 Microsoft windows_7
3 Microsoft windows_8.1
4 Microsoft windows_server_2008
5 Microsoft windows_server_2012
6 Microsoft windows_server_2016
7 Microsoft surface
8 Microsoft surface_book
9 Microsoft surface_pro
10 Microsoft surface_pro_with_lte_advanced
11 Microsoft surface_studio
1 Redhat enterprise_linux
2 Redhat enterprise_linux_desktop
3 Redhat enterprise_linux_server
4 Redhat enterprise_linux_workstation
5 Redhat enterprise_linux_server_aus
6 Redhat enterprise_linux_server_tus
7 Redhat openstack
8 Redhat enterprise_linux_eus
9 Redhat virtualization
10 Redhat virtualization_manager
11 Redhat mrg_realtime
1 Mitel micollab
2 Mitel mivoice_connect
3 Mitel mivoice_business
4 Mitel micloud_management_portal
5 Mitel mivoic_mx-one
6 Mitel mivoice_5000
7 Mitel mivoice_border_gateway
8 Mitel open_integration_gateway
1 Sonicwall global_management_system
2 Sonicwall sonicosv
3 Sonicwall email_security
4 Sonicwall cloud_global_management_system
5 Sonicwall secure_mobile_access
6 Sonicwall web_application_firewall
1 Oracle solaris
2 Oracle local_service_management_system
1 Nvidia jetson_tx1
2 Nvidia jetson_tx2
1 Canonical ubuntu_linux
1 Debian debian_linux
1 Arm cortex-a
1 Schneider-electric struxureware_data_center_expert
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2018-3639.

URL Resource
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html Broken Link
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html Broken Link
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html Broken Link
http://support.lenovo.com/us/en/solutions/LEN-22133 Third Party Advisory
http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html Third Party Advisory
http://www.openwall.com/lists/oss-security/2020/06/10/1 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2020/06/10/2 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2020/06/10/5 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/104232 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1040949 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1042004 Third Party Advisory VDB Entry
http://xenbits.xen.org/xsa/advisory-263.html Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1629 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1630 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1632 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1633 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1635 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1636 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1637 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1638 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1639 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1640 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1641 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1642 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1643 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1644 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1645 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1646 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1647 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1648 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1649 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1650 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1651 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1652 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1653 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1654 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1655 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1656 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1657 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1658 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1659 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1660 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1661 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1662 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1663 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1664 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1665 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1666 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1667 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1668 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1669 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1674 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1675 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1676 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1686 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1688 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1689 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1690 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1696 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1710 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1711 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1737 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1738 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1826 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1854 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1965 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1967 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1997 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2001 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2003 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2006 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2060 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2161 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2162 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2164 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2171 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2172 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2216 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2228 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2246 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2250 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2258 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2289 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2309 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2328 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2363 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2364 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2387 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2394 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2396 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2948 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3396 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3397 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3398 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3399 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3400 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3401 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3402 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3407 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3423 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3424 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3425 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0148 Broken Link
https://access.redhat.com/errata/RHSA-2019:1046 Third Party Advisory
https://bugs.chromium.org/p/project-zero/issues/detail?id=1528 Exploit Issue Tracking Patch Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf Third Party Advisory
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability Third Party Advisory
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html Mailing List Third Party Advisory
https://nvidia.custhelp.com/app/answers/detail/a_id/4787 Third Party Advisory
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012 Patch Third Party Advisory Vendor Advisory
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004 Third Party Advisory
https://seclists.org/bugtraq/2019/Jun/36 Issue Tracking Mailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20180521-0001/ Third Party Advisory
https://support.citrix.com/article/CTX235225 Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03850en_us Third Party Advisory
https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html Third Party Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel Third Party Advisory
https://usn.ubuntu.com/3651-1/ Third Party Advisory
https://usn.ubuntu.com/3652-1/ Third Party Advisory
https://usn.ubuntu.com/3653-1/ Third Party Advisory
https://usn.ubuntu.com/3653-2/ Third Party Advisory
https://usn.ubuntu.com/3654-1/ Third Party Advisory
https://usn.ubuntu.com/3654-2/ Third Party Advisory
https://usn.ubuntu.com/3655-1/ Third Party Advisory
https://usn.ubuntu.com/3655-2/ Third Party Advisory
https://usn.ubuntu.com/3679-1/ Third Party Advisory
https://usn.ubuntu.com/3680-1/ Third Party Advisory
https://usn.ubuntu.com/3756-1/ Third Party Advisory
https://usn.ubuntu.com/3777-3/ Third Party Advisory
https://www.debian.org/security/2018/dsa-4210 Third Party Advisory
https://www.debian.org/security/2018/dsa-4273 Third Party Advisory
https://www.exploit-db.com/exploits/44695/ Exploit Third Party Advisory VDB Entry
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html Third Party Advisory
https://www.kb.cert.org/vuls/id/180049 Third Party Advisory US Government Resource
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006 Third Party Advisory
https://www.oracle.com/security-alerts/cpujul2020.html Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html Third Party Advisory
https://www.synology.com/support/security/Synology_SA_18_23 Third Party Advisory
https://www.us-cert.gov/ncas/alerts/TA18-141A Third Party Advisory US Government Resource
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html Broken Link
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html Broken Link
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html Broken Link
http://support.lenovo.com/us/en/solutions/LEN-22133 Third Party Advisory
http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html Third Party Advisory
http://www.openwall.com/lists/oss-security/2020/06/10/1 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2020/06/10/2 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2020/06/10/5 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/104232 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1040949 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1042004 Third Party Advisory VDB Entry
http://xenbits.xen.org/xsa/advisory-263.html Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1629 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1630 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1632 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1633 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1635 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1636 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1637 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1638 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1639 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1640 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1641 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1642 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1643 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1644 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1645 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1646 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1647 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1648 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1649 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1650 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1651 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1652 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1653 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1654 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1655 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1656 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1657 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1658 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1659 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1660 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1661 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1662 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1663 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1664 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1665 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1666 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1667 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1668 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1669 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1674 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1675 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1676 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1686 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1688 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1689 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1690 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1696 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1710 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1711 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1737 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1738 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1826 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1854 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1965 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1967 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1997 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2001 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2003 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2006 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2060 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2161 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2162 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2164 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2171 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2172 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2216 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2228 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2246 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2250 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2258 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2289 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2309 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2328 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2363 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2364 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2387 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2394 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2396 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2948 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3396 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3397 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3398 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3399 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3400 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3401 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3402 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3407 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3423 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3424 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3425 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0148 Broken Link
https://access.redhat.com/errata/RHSA-2019:1046 Third Party Advisory
https://bugs.chromium.org/p/project-zero/issues/detail?id=1528 Exploit Issue Tracking Patch Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf Third Party Advisory
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability Third Party Advisory
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html Mailing List Third Party Advisory
https://nvidia.custhelp.com/app/answers/detail/a_id/4787 Third Party Advisory
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012 Patch Third Party Advisory Vendor Advisory
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004 Third Party Advisory
https://seclists.org/bugtraq/2019/Jun/36 Issue Tracking Mailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20180521-0001/ Third Party Advisory
https://support.citrix.com/article/CTX235225 Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03850en_us Third Party Advisory
https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html Third Party Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel Third Party Advisory
https://usn.ubuntu.com/3651-1/ Third Party Advisory
https://usn.ubuntu.com/3652-1/ Third Party Advisory
https://usn.ubuntu.com/3653-1/ Third Party Advisory
https://usn.ubuntu.com/3653-2/ Third Party Advisory
https://usn.ubuntu.com/3654-1/ Third Party Advisory
https://usn.ubuntu.com/3654-2/ Third Party Advisory
https://usn.ubuntu.com/3655-1/ Third Party Advisory
https://usn.ubuntu.com/3655-2/ Third Party Advisory
https://usn.ubuntu.com/3679-1/ Third Party Advisory
https://usn.ubuntu.com/3680-1/ Third Party Advisory
https://usn.ubuntu.com/3756-1/ Third Party Advisory
https://usn.ubuntu.com/3777-3/ Third Party Advisory
https://www.debian.org/security/2018/dsa-4210 Third Party Advisory
https://www.debian.org/security/2018/dsa-4273 Third Party Advisory
https://www.exploit-db.com/exploits/44695/ Exploit Third Party Advisory VDB Entry
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html Third Party Advisory
https://www.kb.cert.org/vuls/id/180049 Third Party Advisory US Government Resource
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006 Third Party Advisory
https://www.oracle.com/security-alerts/cpujul2020.html Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html Third Party Advisory
https://www.synology.com/support/security/Synology_SA_18_23 Third Party Advisory
https://www.us-cert.gov/ncas/alerts/TA18-141A Third Party Advisory US Government Resource

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

None

Dockerfile Nix Dune Coq Makefile OCaml eC C Shell Python

Updated: 2 months ago
0 stars 0 fork 0 watcher
Born at : Oct. 18, 2024, 6:57 p.m. This repo has been linked 1 different CVEs too.

None

Dockerfile Nix Coq Makefile OCaml eC C Shell Python Standard ML

Updated: 6 months, 2 weeks ago
0 stars 0 fork 0 watcher
Born at : June 7, 2024, 11:01 a.m. This repo has been linked 1 different CVEs too.

A simple GUI for spectre-meltdown-checker

Python

Updated: 5 months, 2 weeks ago
0 stars 0 fork 0 watcher
Born at : Feb. 12, 2024, 4:39 p.m. This repo has been linked 16 different CVEs too.

None

Dockerfile Shell

Updated: 1 year, 5 months ago
0 stars 0 fork 0 watcher
Born at : July 19, 2023, 5:42 p.m. This repo has been linked 15 different CVEs too.

None

Dockerfile Python Shell

Updated: 1 year, 6 months ago
0 stars 0 fork 0 watcher
Born at : June 22, 2023, 2:40 p.m. This repo has been linked 15 different CVEs too.

None

Makefile C Shell

Updated: 3 months, 3 weeks ago
13 stars 1 fork 1 watcher
Born at : May 29, 2023, 3:50 p.m. This repo has been linked 15 different CVEs too.

None

Updated: 3 weeks, 4 days ago
7 stars 0 fork 0 watcher
Born at : Feb. 25, 2023, 10:40 a.m. This repo has been linked 178 different CVEs too.

Windows hardening script

Updated: 1 month, 4 weeks ago
0 stars 1 fork 1 watcher
Born at : Jan. 12, 2023, 5:56 p.m. This repo has been linked 3 different CVEs too.

None

Dockerfile Shell

Updated: 2 years, 4 months ago
1 stars 0 fork 0 watcher
Born at : July 25, 2022, 11:08 a.m. This repo has been linked 15 different CVEs too.

None

Dockerfile Shell

Updated: 4 months, 1 week ago
0 stars 0 fork 0 watcher
Born at : July 25, 2022, 11:08 a.m. This repo has been linked 15 different CVEs too.

None

Updated: 2 years, 9 months ago
1 stars 0 fork 0 watcher
Born at : Feb. 15, 2022, 12:40 p.m. This repo has been linked 19 different CVEs too.

None

C

Updated: 1 year, 8 months ago
0 stars 0 fork 0 watcher
Born at : Feb. 14, 2022, 8:10 p.m. This repo has been linked 1 different CVEs too.

In this repo you will find a curated list of awesome C frameworks, libraries and software.

Updated: 8 months, 1 week ago
0 stars 3 fork 3 watcher
Born at : Feb. 8, 2022, 3:39 p.m. This repo has been linked 7 different CVEs too.

Linux内核利用资料精选

Updated: 1 year, 5 months ago
1 stars 11 fork 11 watcher
Born at : Feb. 4, 2022, 5:30 a.m. This repo has been linked 3 different CVEs too.

None

Dockerfile Shell

Updated: 3 years, 5 months ago
0 stars 0 fork 0 watcher
Born at : July 13, 2021, 9:19 p.m. This repo has been linked 15 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2018-3639 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2018-3639 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html
    Added Reference http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html
    Added Reference http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html
    Added Reference http://support.lenovo.com/us/en/solutions/LEN-22133
    Added Reference http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html
    Added Reference http://www.openwall.com/lists/oss-security/2020/06/10/1
    Added Reference http://www.openwall.com/lists/oss-security/2020/06/10/2
    Added Reference http://www.openwall.com/lists/oss-security/2020/06/10/5
    Added Reference http://www.securityfocus.com/bid/104232
    Added Reference http://www.securitytracker.com/id/1040949
    Added Reference http://www.securitytracker.com/id/1042004
    Added Reference http://xenbits.xen.org/xsa/advisory-263.html
    Added Reference https://access.redhat.com/errata/RHSA-2018:1629
    Added Reference https://access.redhat.com/errata/RHSA-2018:1630
    Added Reference https://access.redhat.com/errata/RHSA-2018:1632
    Added Reference https://access.redhat.com/errata/RHSA-2018:1633
    Added Reference https://access.redhat.com/errata/RHSA-2018:1635
    Added Reference https://access.redhat.com/errata/RHSA-2018:1636
    Added Reference https://access.redhat.com/errata/RHSA-2018:1637
    Added Reference https://access.redhat.com/errata/RHSA-2018:1638
    Added Reference https://access.redhat.com/errata/RHSA-2018:1639
    Added Reference https://access.redhat.com/errata/RHSA-2018:1640
    Added Reference https://access.redhat.com/errata/RHSA-2018:1641
    Added Reference https://access.redhat.com/errata/RHSA-2018:1642
    Added Reference https://access.redhat.com/errata/RHSA-2018:1643
    Added Reference https://access.redhat.com/errata/RHSA-2018:1644
    Added Reference https://access.redhat.com/errata/RHSA-2018:1645
    Added Reference https://access.redhat.com/errata/RHSA-2018:1646
    Added Reference https://access.redhat.com/errata/RHSA-2018:1647
    Added Reference https://access.redhat.com/errata/RHSA-2018:1648
    Added Reference https://access.redhat.com/errata/RHSA-2018:1649
    Added Reference https://access.redhat.com/errata/RHSA-2018:1650
    Added Reference https://access.redhat.com/errata/RHSA-2018:1651
    Added Reference https://access.redhat.com/errata/RHSA-2018:1652
    Added Reference https://access.redhat.com/errata/RHSA-2018:1653
    Added Reference https://access.redhat.com/errata/RHSA-2018:1654
    Added Reference https://access.redhat.com/errata/RHSA-2018:1655
    Added Reference https://access.redhat.com/errata/RHSA-2018:1656
    Added Reference https://access.redhat.com/errata/RHSA-2018:1657
    Added Reference https://access.redhat.com/errata/RHSA-2018:1658
    Added Reference https://access.redhat.com/errata/RHSA-2018:1659
    Added Reference https://access.redhat.com/errata/RHSA-2018:1660
    Added Reference https://access.redhat.com/errata/RHSA-2018:1661
    Added Reference https://access.redhat.com/errata/RHSA-2018:1662
    Added Reference https://access.redhat.com/errata/RHSA-2018:1663
    Added Reference https://access.redhat.com/errata/RHSA-2018:1664
    Added Reference https://access.redhat.com/errata/RHSA-2018:1665
    Added Reference https://access.redhat.com/errata/RHSA-2018:1666
    Added Reference https://access.redhat.com/errata/RHSA-2018:1667
    Added Reference https://access.redhat.com/errata/RHSA-2018:1668
    Added Reference https://access.redhat.com/errata/RHSA-2018:1669
    Added Reference https://access.redhat.com/errata/RHSA-2018:1674
    Added Reference https://access.redhat.com/errata/RHSA-2018:1675
    Added Reference https://access.redhat.com/errata/RHSA-2018:1676
    Added Reference https://access.redhat.com/errata/RHSA-2018:1686
    Added Reference https://access.redhat.com/errata/RHSA-2018:1688
    Added Reference https://access.redhat.com/errata/RHSA-2018:1689
    Added Reference https://access.redhat.com/errata/RHSA-2018:1690
    Added Reference https://access.redhat.com/errata/RHSA-2018:1696
    Added Reference https://access.redhat.com/errata/RHSA-2018:1710
    Added Reference https://access.redhat.com/errata/RHSA-2018:1711
    Added Reference https://access.redhat.com/errata/RHSA-2018:1737
    Added Reference https://access.redhat.com/errata/RHSA-2018:1738
    Added Reference https://access.redhat.com/errata/RHSA-2018:1826
    Added Reference https://access.redhat.com/errata/RHSA-2018:1854
    Added Reference https://access.redhat.com/errata/RHSA-2018:1965
    Added Reference https://access.redhat.com/errata/RHSA-2018:1967
    Added Reference https://access.redhat.com/errata/RHSA-2018:1997
    Added Reference https://access.redhat.com/errata/RHSA-2018:2001
    Added Reference https://access.redhat.com/errata/RHSA-2018:2003
    Added Reference https://access.redhat.com/errata/RHSA-2018:2006
    Added Reference https://access.redhat.com/errata/RHSA-2018:2060
    Added Reference https://access.redhat.com/errata/RHSA-2018:2161
    Added Reference https://access.redhat.com/errata/RHSA-2018:2162
    Added Reference https://access.redhat.com/errata/RHSA-2018:2164
    Added Reference https://access.redhat.com/errata/RHSA-2018:2171
    Added Reference https://access.redhat.com/errata/RHSA-2018:2172
    Added Reference https://access.redhat.com/errata/RHSA-2018:2216
    Added Reference https://access.redhat.com/errata/RHSA-2018:2228
    Added Reference https://access.redhat.com/errata/RHSA-2018:2246
    Added Reference https://access.redhat.com/errata/RHSA-2018:2250
    Added Reference https://access.redhat.com/errata/RHSA-2018:2258
    Added Reference https://access.redhat.com/errata/RHSA-2018:2289
    Added Reference https://access.redhat.com/errata/RHSA-2018:2309
    Added Reference https://access.redhat.com/errata/RHSA-2018:2328
    Added Reference https://access.redhat.com/errata/RHSA-2018:2363
    Added Reference https://access.redhat.com/errata/RHSA-2018:2364
    Added Reference https://access.redhat.com/errata/RHSA-2018:2387
    Added Reference https://access.redhat.com/errata/RHSA-2018:2394
    Added Reference https://access.redhat.com/errata/RHSA-2018:2396
    Added Reference https://access.redhat.com/errata/RHSA-2018:2948
    Added Reference https://access.redhat.com/errata/RHSA-2018:3396
    Added Reference https://access.redhat.com/errata/RHSA-2018:3397
    Added Reference https://access.redhat.com/errata/RHSA-2018:3398
    Added Reference https://access.redhat.com/errata/RHSA-2018:3399
    Added Reference https://access.redhat.com/errata/RHSA-2018:3400
    Added Reference https://access.redhat.com/errata/RHSA-2018:3401
    Added Reference https://access.redhat.com/errata/RHSA-2018:3402
    Added Reference https://access.redhat.com/errata/RHSA-2018:3407
    Added Reference https://access.redhat.com/errata/RHSA-2018:3423
    Added Reference https://access.redhat.com/errata/RHSA-2018:3424
    Added Reference https://access.redhat.com/errata/RHSA-2018:3425
    Added Reference https://access.redhat.com/errata/RHSA-2019:0148
    Added Reference https://access.redhat.com/errata/RHSA-2019:1046
    Added Reference https://bugs.chromium.org/p/project-zero/issues/detail?id=1528
    Added Reference https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf
    Added Reference https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf
    Added Reference https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
    Added Reference https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
    Added Reference https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
    Added Reference https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
    Added Reference https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html
    Added Reference https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
    Added Reference https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
    Added Reference https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html
    Added Reference https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html
    Added Reference https://nvidia.custhelp.com/app/answers/detail/a_id/4787
    Added Reference https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012
    Added Reference https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004
    Added Reference https://seclists.org/bugtraq/2019/Jun/36
    Added Reference https://security.netapp.com/advisory/ntap-20180521-0001/
    Added Reference https://support.citrix.com/article/CTX235225
    Added Reference https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03850en_us
    Added Reference https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html
    Added Reference https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel
    Added Reference https://usn.ubuntu.com/3651-1/
    Added Reference https://usn.ubuntu.com/3652-1/
    Added Reference https://usn.ubuntu.com/3653-1/
    Added Reference https://usn.ubuntu.com/3653-2/
    Added Reference https://usn.ubuntu.com/3654-1/
    Added Reference https://usn.ubuntu.com/3654-2/
    Added Reference https://usn.ubuntu.com/3655-1/
    Added Reference https://usn.ubuntu.com/3655-2/
    Added Reference https://usn.ubuntu.com/3679-1/
    Added Reference https://usn.ubuntu.com/3680-1/
    Added Reference https://usn.ubuntu.com/3756-1/
    Added Reference https://usn.ubuntu.com/3777-3/
    Added Reference https://www.debian.org/security/2018/dsa-4210
    Added Reference https://www.debian.org/security/2018/dsa-4273
    Added Reference https://www.exploit-db.com/exploits/44695/
    Added Reference https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html
    Added Reference https://www.kb.cert.org/vuls/id/180049
    Added Reference https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006
    Added Reference https://www.oracle.com/security-alerts/cpujul2020.html
    Added Reference https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
    Added Reference https://www.synology.com/support/security/Synology_SA_18_23
    Added Reference https://www.us-cert.gov/ncas/alerts/TA18-141A
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CPE Deprecation Remap by [email protected]

    Aug. 13, 2021

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:a:sonicwall:sonicosv:-:*:*:*:*:*:*:* OR *cpe:2.3:o:sonicwall:sonicosv:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Aug. 04, 2021

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:a:redhat:openstack:13.0:*:*:*:*:*:*:* OR *cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*
  • Modified Analysis by [email protected]

    Apr. 14, 2021

    Action Type Old Value New Value
    Removed CVSS V2 NIST (AV:L/AC:L/Au:N/C:C/I:N/A:N)
    Added CVSS V2 NIST (AV:L/AC:L/Au:N/C:P/I:N/A:N)
    Removed CVSS V3 NIST AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
    Added CVSS V3.1 NIST AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
    Changed Reference Type http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html No Types Assigned http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html Broken Link
    Changed Reference Type http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html No Types Assigned http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html Broken Link
    Changed Reference Type http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html No Types Assigned http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html Broken Link
    Changed Reference Type http://www.openwall.com/lists/oss-security/2020/06/10/1 No Types Assigned http://www.openwall.com/lists/oss-security/2020/06/10/1 Mailing List, Third Party Advisory
    Changed Reference Type http://www.openwall.com/lists/oss-security/2020/06/10/2 No Types Assigned http://www.openwall.com/lists/oss-security/2020/06/10/2 Mailing List, Third Party Advisory
    Changed Reference Type http://www.openwall.com/lists/oss-security/2020/06/10/5 No Types Assigned http://www.openwall.com/lists/oss-security/2020/06/10/5 Mailing List, Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2019:1046 No Types Assigned https://access.redhat.com/errata/RHSA-2019:1046 Third Party Advisory
    Changed Reference Type https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf Patch, Third Party Advisory https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf Third Party Advisory
    Changed Reference Type https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf Patch, Third Party Advisory https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf Third Party Advisory
    Changed Reference Type https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf No Types Assigned https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf Third Party Advisory
    Changed Reference Type https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html Third Party Advisory https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html Mailing List, Third Party Advisory
    Changed Reference Type https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html Third Party Advisory https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html Mailing List, Third Party Advisory
    Changed Reference Type https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html No Types Assigned https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html Mailing List, Third Party Advisory
    Changed Reference Type https://nvidia.custhelp.com/app/answers/detail/a_id/4787 No Types Assigned https://nvidia.custhelp.com/app/answers/detail/a_id/4787 Third Party Advisory
    Changed Reference Type https://seclists.org/bugtraq/2019/Jun/36 No Types Assigned https://seclists.org/bugtraq/2019/Jun/36 Issue Tracking, Mailing List, Third Party Advisory
    Changed Reference Type https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03850en_us Mitigation, Third Party Advisory https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03850en_us Third Party Advisory
    Changed Reference Type https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html No Types Assigned https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html Third Party Advisory
    Changed Reference Type https://www.oracle.com/security-alerts/cpujul2020.html No Types Assigned https://www.oracle.com/security-alerts/cpujul2020.html Third Party Advisory
    Changed Reference Type https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html Patch, Third Party Advisory https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html Third Party Advisory
    Changed CPE Configuration OR *cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3770d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3775:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3775d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3785:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3795:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:32nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:45nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:32nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:45nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:32nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:45nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m:32nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m:45nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium:n4000:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium:n4100:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium:n4200:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_j:j4205:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_silver:j5005:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_silver:n5000:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e-1105c:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:125c_:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1220_:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1275_:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1505m_v6:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1515m_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1535m_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1535m_v6:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1545m_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1558l_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1565l_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1575m_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1578l_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1585_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1585l_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:3600:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:5600:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:7500:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5502:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5503:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5504:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5506:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5507:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5520:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5530:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5540:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e6510:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e6540:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e6550:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l3403:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l3406:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l3426:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l5506:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l5508_:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l5518_:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l5520:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l5530:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:w5580:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:w5590:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x3430:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x3440:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x3450:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x3460:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x3470:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x3480:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x5550:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x5560:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x5570:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1105c_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1125c_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_12201:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_12201_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1220_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1220_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1220l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1225:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1225_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1225_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1226_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1230:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1230_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1230_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1230l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1231_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1235:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1240:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1240_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1240_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1240l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1241_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1245:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1245_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1245_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1246_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1258l_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1260l:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1265l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1265l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1265l_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1268l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1270:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1270_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1270_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1271_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1275_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1275_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1275l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1276_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1278l_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1280:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1280_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1280_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1281_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1285_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1285_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1285l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1285l_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1286_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1286l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1290:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1290_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1501l_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1501m_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1505l_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1505l_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1505m_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2650l_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2658:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2658_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2658_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2658_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2658a_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2660:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2660_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2660_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2660_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2665:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2667:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2667_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2667_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2667_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2670:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2670_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2670_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2680:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2680_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2680_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2680_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2683_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2683_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2687w:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2687w_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2687w_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2687w_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2690:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2690_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2690_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2690_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2695_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2695_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2695_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2697_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2697_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2697_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2697a_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2698_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2698_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2699_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2699_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2699a_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2699r_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4603:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4603_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4607:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4607_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4610:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4610_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4610_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4610_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4617:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4620:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4620_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4620_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4620_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4624l_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4627_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4627_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4627_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4628l_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4640:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4640_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4640_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4640_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4648_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4650:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4650_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4650_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4650_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4650l:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4655_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4655_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4657l_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4660_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4660_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4667_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4667_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4669_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4669_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1428l:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1428l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1428l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1620:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1620_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1620_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1620_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1630_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1630_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1650:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1650_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1650_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1650_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1660:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1660_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1660_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1660_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1680_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1680_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2403:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2403_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2407:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2407_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2408l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2418l:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2418l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2418l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2420:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2420_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2428l:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2428l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2428l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2430:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2430_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2430l:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2430l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2438l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2440:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2440_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2448l:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2448l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2450:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2450_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2450l:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2450l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2470:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2470_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2603:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2603_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2603_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2603_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2608l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2608l_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2609:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2609_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2609_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2609_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2618l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2618l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2618l_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2620:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2620_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2620_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2620_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2623_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2623_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2628l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2628l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2628l_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2630:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2630_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2630_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2630_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2630l:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2630l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2630l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2630l_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2637:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2637_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2637_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2637_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2640:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2640_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2640_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2640_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2643:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2643_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2643_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2643_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2648l:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2648l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2648l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2648l_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2650:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2650_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2650_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2650_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2650l:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2650l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2650l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2803:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2820:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2830:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2850:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2850_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2860:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2870:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2870_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2880_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2890_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4807:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4809_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4809_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4809_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4820:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4820_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4820_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4820_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4830:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4830_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4830_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4830_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4850:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4850_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4850_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4850_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4860:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4860_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4870:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4870_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4880_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4890_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8830:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8837:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8850:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8850_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8857_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8860:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8860_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8860_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8867_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8867_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8867l:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8870:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8870_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8870_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8870_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8880_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8880_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8880_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8880l_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8880l_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8890_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8890_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8890_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8891_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8891_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8891_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8893_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8893_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8893_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8894_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:85115:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:85118:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:85119t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:85120:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:85120t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:85122:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86126:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86126f:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86126t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86128:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86130:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86130f:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86130t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86132:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86134:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86134m:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86136:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86138:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86138f:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86138t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86140:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86140m:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86142:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86142f:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86142m:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86144:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86146:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86148:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86148f:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86150:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86152:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86154:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3770d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3775:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3775d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3785:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3795:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:32nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:45nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:32nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:45nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:32nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:45nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m:32nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m:45nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium:n4000:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium:n4100:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium:n4200:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_j:j4205:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_silver:j5005:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_silver:n5000:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e-1105c:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:125c_:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1220_:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1275_:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1505m_v6:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1515m_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1535m_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1535m_v6:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1545m_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1558l_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1565l_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1575m_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1578l_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1585_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1585l_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:3600:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:5600:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:7500:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5502:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5503:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5504:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5506:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5507:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5520:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5530:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5540:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e6510:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e6540:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e6550:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l3403:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l3406:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l3426:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l5506:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l5508_:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l5518_:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l5520:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l5530:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:w5580:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:w5590:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x3430:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x3440:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x3450:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x3460:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x3470:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x3480:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x5550:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x5560:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x5570:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1105c_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1125c_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_12201:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_12201_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1220_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1220_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1220l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1225:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1225_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1225_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1226_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1230:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1230_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1230_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1230l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1231_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1235:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1240:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1240_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1240_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1240l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1241_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1245:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1245_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1245_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1246_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1258l_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1260l:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1265l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1265l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1265l_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1268l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1270:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1270_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1270_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1271_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1275_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1275_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1275l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1276_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1278l_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1280:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1280_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1280_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1281_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1285_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1285_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1285l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1285l_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1286_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1286l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1290:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1290_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1501l_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1501m_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1505l_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1505l_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1505m_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2650l_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2658:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2658_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2658_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2658_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2658a_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2660:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2660_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2660_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2660_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2665:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2667:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2667_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2667_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2667_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2670:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2670_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2670_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2680:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2680_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2680_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2680_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2683_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2683_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2687w:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2687w_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2687w_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2687w_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2690:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2690_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2690_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2690_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2695_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2695_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2695_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2697_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2697_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2697_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2697a_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2698_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2698_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2699_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2699_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2699a_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2699r_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4603:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4603_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4607:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4607_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4610:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4610_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4610_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4610_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4617:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4620:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4620_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4620_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4620_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4624l_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4627_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4627_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4627_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4628l_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4640:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4640_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4640_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4640_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4648_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4650:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4650_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4650_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4650_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4650l:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4655_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4655_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4657l_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4660_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4660_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4667_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4667_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4669_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4669_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1428l:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1428l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1428l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1620:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1620_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1620_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1620_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1630_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1630_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1650:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1650_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1650_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1650_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1660:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1660_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1660_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1660_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1680_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1680_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2403:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2403_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2407:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2407_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2408l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2418l:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2418l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2418l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2420:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2420_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2428l:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2428l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2428l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2430:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2430_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2430l:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2430l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2438l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2440:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2440_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2448l:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2448l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2450:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2450_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2450l:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2450l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2470:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2470_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2603:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2603_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2603_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2603_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2608l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2608l_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2609:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2609_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2609_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2609_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2618l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2618l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2618l_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2620:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2620_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2620_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2620_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2623_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2623_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2628l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2628l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2628l_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2630:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2630_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2630_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2630_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2630l:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2630l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2630l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2630l_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2637:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2637_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2637_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2637_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2640:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2640_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2640_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2640_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2643:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2643_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2643_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2643_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2648l:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2648l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2648l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2648l_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2650:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2650_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2650_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2650_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2650l:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2650l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2650l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2803:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2820:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2830:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2850:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2850_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2860:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2870:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2870_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2880_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2890_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4807:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4809_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4809_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4809_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4820:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4820_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4820_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4820_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4830:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4830_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4830_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4830_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4850:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4850_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4850_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4850_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4860:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4860_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4870:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4870_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4880_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4890_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8830:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8837:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8850:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8850_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8857_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8860:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8860_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8860_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8867_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8867_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8867l:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8870:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8870_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8870_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8870_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8880_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8880_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8880_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8880l_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8880l_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8890_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8890_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8890_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8891_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8891_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8891_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8893_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8893_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8893_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8894_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:85115:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:85118:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:85119t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:85120:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:85120t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:85122:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86126:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86126f:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86126t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86128:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86130:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86130f:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86130t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86132:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86134:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86134m:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86136:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86138:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86138f:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86138t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86140:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86140m:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86142:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86142f:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86142m:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86144:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86146:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86148:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86148f:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86150:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86152:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86154:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*
    Changed CPE Configuration OR *cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:* *cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:* *cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:* *cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:* *cpe:2.3:a:redhat:openstack:13.0:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* *cpe:2.3:o:redhat:virtualization:4.2:*:*:*:*:*:*:* OR *cpe:2.3:a:redhat:mrg_realtime:2.0:*:*:*:*:*:*:* *cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:* *cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:* *cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:* *cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:* *cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:* *cpe:2.3:a:redhat:openstack:13.0:*:*:*:*:*:*:* *cpe:2.3:a:redhat:virtualization_manager:4.2:*:*:*:*:*:*:* *cpe:2.3:a:redhat:virtualization_manager:4.3:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
    Changed CPE Configuration OR *cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* *cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* *cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* OR *cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:*:*:*:* *cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* *cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* *cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:* *cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
    Changed CPE Configuration OR *cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:* OR *cpe:2.3:a:oracle:local_service_management_system:*:*:*:*:*:*:*:* versions from (including) 13.0 up to (including) 13.3 *cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:* OR cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:a:nvidia:jetson_tx1:*:*:*:*:*:*:*:* versions up to (excluding) r28.3 *cpe:2.3:a:nvidia:jetson_tx2:*:*:*:*:*:*:*:* versions up to (excluding) r28.3
    Added CPE Configuration OR *cpe:2.3:h:microsoft:surface:-:*:*:*:*:*:*:* *cpe:2.3:h:microsoft:surface_book:-:*:*:*:*:*:*:* *cpe:2.3:h:microsoft:surface_book:2:*:*:*:*:*:*:* *cpe:2.3:h:microsoft:surface_pro:3:*:*:*:*:*:*:* *cpe:2.3:h:microsoft:surface_pro:4:*:*:*:*:*:*:* *cpe:2.3:h:microsoft:surface_pro:1796:*:*:*:*:*:*:* *cpe:2.3:h:microsoft:surface_pro_with_lte_advanced:1807:*:*:*:*:*:*:* *cpe:2.3:h:microsoft:surface_studio:-:*:*:*:*:*:*:* *cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:* *cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:* *cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:* *cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:* *cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:* *cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:* *cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:* *cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:* *cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:* *cpe:2.3:o:microsoft:windows_server_2008:sp2:*:*:*:*:*:*:* *cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:* *cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:* *cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:* *cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:* *cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*
  • CVE Modified by [email protected]

    Sep. 02, 2020

    Action Type Old Value New Value
    Added Reference http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html [No Types Assigned]
  • CWE Remap by [email protected]

    Aug. 24, 2020

    Action Type Old Value New Value
    Changed CWE CWE-200 CWE-203
  • CVE Modified by [email protected]

    Jul. 15, 2020

    Action Type Old Value New Value
    Added Reference https://www.oracle.com/security-alerts/cpujul2020.html [No Types Assigned]
  • CVE Modified by [email protected]

    Jun. 10, 2020

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2020/06/10/5 [No Types Assigned]
  • CVE Modified by [email protected]

    Jun. 10, 2020

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2020/06/10/1 [No Types Assigned]
    Added Reference http://www.openwall.com/lists/oss-security/2020/06/10/2 [No Types Assigned]
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2650l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2650l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2650l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2650l_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2650l:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2650l:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2650_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2650_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2650_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2650_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2650_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2650_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2650:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2650:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2648l_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2648l_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2648l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2648l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2648l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2648l_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2648l:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2648l:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2643_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2643_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2643_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2643_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2643_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2643_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2643:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2643:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2640_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2640_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2640_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2640_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2640_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2640_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2640:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2640:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2637_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2637_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2637_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2637_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2637_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2637_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2637:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2637:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2630l_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2630l_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2630l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2630l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2630l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2630l_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2630l:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2630l:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2630_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2630_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2630_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2630_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2630_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2630_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2630:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2630:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2628l_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2628l_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2628l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2628l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2628l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2628l_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2623_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2623_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2623_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2623_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2620_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2620_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2620_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2620_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2620_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2620_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2620:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2620:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2618l_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2618l_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2618l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2618l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2618l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2618l_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2609_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2609_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2609_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2609_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2609_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2609_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2609:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2609:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2608l_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2608l_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2608l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2608l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2603_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2603_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2603_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2603_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2603_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2603_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2603:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2603:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2470_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2470_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2470:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2470:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2450l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2450l_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2450l:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2450l:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2450_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2450_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2450:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2450:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2448l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2448l_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2448l:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2448l:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2440_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2440_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2440:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2440:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2438l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2438l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2430l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2430l_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2430l:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2430l:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2430_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2430_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2430:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2430:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2428l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2428l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2428l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2428l_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2428l:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2428l:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2420_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2420_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2420:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2420:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2418l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2418l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2418l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2418l_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2418l:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2418l:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2408l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2408l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2407_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2407_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2407:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2407:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2403_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2403_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2403:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2403:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1680_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1680_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1680_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1680_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1660_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1660_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1660_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1660_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1660_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1660_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1660:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1660:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1650_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1650_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1650_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1650_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1650_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1650_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1650:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1650:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1630_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1630_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1630_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1630_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1620_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1620_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1620_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1620_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1620_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1620_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1620:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1620:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1428l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1428l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1428l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1428l_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    May. 05, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1428l:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1428l:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1505m_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1505m_v5:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1505l_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1505l_v6:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1505l_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1505l_v5:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1501m_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1501m_v6:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1501l_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1501l_v6:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1290_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1290_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1290:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1290:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1286l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1286l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1286_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1286_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1285l_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1285l_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1285l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1285l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1285_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1285_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1285_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1285_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1285_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1281_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1281_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1280_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1280_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1280_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1280_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1280_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1280_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1280:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1280:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1278l_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1278l_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1276_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1276_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1275l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1275l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1275_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1275_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1275_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1275_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1275_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1275_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1271_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1271_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1270_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1270_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1270_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1270_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1270_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1270_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1270:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1270:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1268l_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1268l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1268l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1265l_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1265l_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1265l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1265l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1265l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1265l_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1260l_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1260l:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1260l:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1258l_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1258l_v4:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1246_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1246_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1245_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1245_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1245_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1245_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1245_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1245_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1245:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1245:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1241_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1241_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1240l_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1240l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1240l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1240_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1240_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1240_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1240_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1240_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1240_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1240:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1240:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1235l_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1235:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1235:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1231_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1231_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1230l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1230l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1230_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1230_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1230_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1230_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1230_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1230_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1230:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1230:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1226_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1226_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1225_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1225_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1225_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1225_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1225_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1225_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1225:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1225:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1220l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1220l_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1220l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_12201_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1220l:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_12201:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1220_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1220_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1220_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1220_v3:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1220_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1220_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1125c_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1125c_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1105c_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1105c_v2:-:*:*:*:*:*:*:*
  • CPE Deprecation Remap by [email protected]

    Apr. 28, 2020

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1105c:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e-1105c:-:*:*:*:*:*:*:*
  • CVE Modified by [email protected]

    Oct. 08, 2019

    Action Type Old Value New Value
    Added Reference https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf [No Types Assigned]
  • CVE Modified by [email protected]

    Jun. 24, 2019

    Action Type Old Value New Value
    Added Reference https://seclists.org/bugtraq/2019/Jun/36 [No Types Assigned]
  • CVE Modified by [email protected]

    May. 23, 2019

    Action Type Old Value New Value
    Added Reference http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html [No Types Assigned]
    Added Reference http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html [No Types Assigned]
  • CVE Modified by [email protected]

    May. 08, 2019

    Action Type Old Value New Value
    Added Reference https://access.redhat.com/errata/RHSA-2019:1046 [No Types Assigned]
  • CVE Modified by [email protected]

    Apr. 09, 2019

    Action Type Old Value New Value
    Added Reference https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html [No Types Assigned]
  • CVE Modified by [email protected]

    Apr. 02, 2019

    Action Type Old Value New Value
    Added Reference https://nvidia.custhelp.com/app/answers/detail/a_id/4787 [No Types Assigned]
  • CVE Modified by [email protected]

    Apr. 01, 2019

    Action Type Old Value New Value
    Added Reference https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html [No Types Assigned]
  • Modified Analysis by [email protected]

    Mar. 29, 2019

    Action Type Old Value New Value
    Changed Reference Type https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html No Types Assigned https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2216 No Types Assigned https://access.redhat.com/errata/RHSA-2018:2216 Third Party Advisory
    Changed Reference Type https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html No Types Assigned https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html Mailing List, Third Party Advisory
    Changed Reference Type https://usn.ubuntu.com/3777-3/ No Types Assigned https://usn.ubuntu.com/3777-3/ Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:3399 No Types Assigned https://access.redhat.com/errata/RHSA-2018:3399 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:3398 No Types Assigned https://access.redhat.com/errata/RHSA-2018:3398 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:3397 No Types Assigned https://access.redhat.com/errata/RHSA-2018:3397 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:3396 No Types Assigned https://access.redhat.com/errata/RHSA-2018:3396 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2328 No Types Assigned https://access.redhat.com/errata/RHSA-2018:2328 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2171 No Types Assigned https://access.redhat.com/errata/RHSA-2018:2171 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2172 No Types Assigned https://access.redhat.com/errata/RHSA-2018:2172 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:3425 No Types Assigned https://access.redhat.com/errata/RHSA-2018:3425 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:3424 No Types Assigned https://access.redhat.com/errata/RHSA-2018:3424 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:3423 No Types Assigned https://access.redhat.com/errata/RHSA-2018:3423 Third Party Advisory
    Changed Reference Type https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html No Types Assigned https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2019:0148 No Types Assigned https://access.redhat.com/errata/RHSA-2019:0148 Broken Link
    Changed Reference Type http://www.securitytracker.com/id/1042004 No Types Assigned http://www.securitytracker.com/id/1042004 Third Party Advisory, VDB Entry
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2246 No Types Assigned https://access.redhat.com/errata/RHSA-2018:2246 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2364 No Types Assigned https://access.redhat.com/errata/RHSA-2018:2364 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2363 No Types Assigned https://access.redhat.com/errata/RHSA-2018:2363 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2228 No Types Assigned https://access.redhat.com/errata/RHSA-2018:2228 Third Party Advisory
    Changed Reference Type https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006 No Types Assigned https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006 Third Party Advisory
    Changed Reference Type https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf No Types Assigned https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf Patch, Third Party Advisory
    Changed Reference Type https://usn.ubuntu.com/3756-1/ No Types Assigned https://usn.ubuntu.com/3756-1/ Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2387 No Types Assigned https://access.redhat.com/errata/RHSA-2018:2387 Third Party Advisory
    Changed Reference Type https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html No Types Assigned https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html Mailing List, Third Party Advisory
    Changed Reference Type https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html No Types Assigned https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html Patch, Third Party Advisory
    Changed Reference Type https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 No Types Assigned https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2250 No Types Assigned https://access.redhat.com/errata/RHSA-2018:2250 Third Party Advisory
    Changed Reference Type https://www.debian.org/security/2018/dsa-4273 No Types Assigned https://www.debian.org/security/2018/dsa-4273 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2258 No Types Assigned https://access.redhat.com/errata/RHSA-2018:2258 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:3407 No Types Assigned https://access.redhat.com/errata/RHSA-2018:3407 Third Party Advisory
    Changed Reference Type https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf No Types Assigned https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf Patch, Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2162 No Types Assigned https://access.redhat.com/errata/RHSA-2018:2162 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2161 No Types Assigned https://access.redhat.com/errata/RHSA-2018:2161 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2289 No Types Assigned https://access.redhat.com/errata/RHSA-2018:2289 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2164 No Types Assigned https://access.redhat.com/errata/RHSA-2018:2164 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2948 No Types Assigned https://access.redhat.com/errata/RHSA-2018:2948 Third Party Advisory
    Changed Reference Type https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004 No Types Assigned https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2309 No Types Assigned https://access.redhat.com/errata/RHSA-2018:2309 Third Party Advisory
    Changed Reference Type https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html No Types Assigned https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html Mailing List, Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2394 No Types Assigned https://access.redhat.com/errata/RHSA-2018:2394 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:3402 No Types Assigned https://access.redhat.com/errata/RHSA-2018:3402 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:3401 No Types Assigned https://access.redhat.com/errata/RHSA-2018:3401 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:3400 No Types Assigned https://access.redhat.com/errata/RHSA-2018:3400 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2396 No Types Assigned https://access.redhat.com/errata/RHSA-2018:2396 Third Party Advisory
    Added CPE Configuration OR *cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:* *cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:* *cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:* *cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:* *cpe:2.3:a:redhat:openstack:13.0:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* *cpe:2.3:o:redhat:virtualization:4.2:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* *cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* *cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* *cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:itc1500_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 3.1 OR cpe:2.3:h:siemens:itc1500:3:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:itc1500_pro_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 3.1 OR cpe:2.3:h:siemens:itc1500_pro:3:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:itc1900_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 3.1 OR cpe:2.3:h:siemens:itc1900:3:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:itc1900_pro_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 3.1 OR cpe:2.3:h:siemens:itc1900_pro:3:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:itc2200_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 3.1 OR cpe:2.3:h:siemens:itc2200:3:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:itc2200_pro_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 3.1 OR cpe:2.3:h:siemens:itc2200_pro:3:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:ruggedcom_ape_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:ruggedcom_ape:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_et_200_sp_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.6 OR cpe:2.3:h:siemens:simatic_et_200_sp:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_field_pg_m4_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 18.01.09 OR cpe:2.3:h:siemens:simatic_field_pg_m4:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 22.01.06 OR cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_ipc3000_smart_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.5 OR cpe:2.3:h:siemens:simatic_ipc3000_smart:2:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_ipc347e_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.5 OR cpe:2.3:h:siemens:simatic_ipc347e:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_ipc427c_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:simatic_ipc427c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_ipc427d_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 17.0x.14 OR cpe:2.3:h:siemens:simatic_ipc427d:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 21.01.09 OR cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_ipc477c_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:simatic_ipc477c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_ipc477d_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 17.0x.14 OR cpe:2.3:h:siemens:simatic_ipc477d:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 21.01.09 OR cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 21.01.09 OR cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_ipc547e_firmware:*:*:*:*:*:*:*:* versions up to (excluding) r1.30.0 OR cpe:2.3:h:siemens:simatic_ipc547e:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:* versions up to (excluding) r1.23.0 OR cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_ipc627c_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 15.02.15 OR cpe:2.3:h:siemens:simatic_ipc627c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_ipc627d_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 19.02.11 OR cpe:2.3:h:siemens:simatic_ipc627d:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_ipc647c_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 15.01.14 OR cpe:2.3:h:siemens:simatic_ipc647c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_ipc647d_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 19.01.14 OR cpe:2.3:h:siemens:simatic_ipc647d:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_ipc677d_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 19.02.11 OR cpe:2.3:h:siemens:simatic_ipc677d:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_ipc677c_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 15.02.15 OR cpe:2.3:h:siemens:simatic_ipc677c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_ipc827c_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 15.02.15 OR cpe:2.3:h:siemens:simatic_ipc827c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_ipc827d_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 19.02.11 OR cpe:2.3:h:siemens:simatic_ipc827d:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_ipc847c_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 15.01.14 OR cpe:2.3:h:siemens:simatic_ipc847c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_ipc847d_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 19.01.14 OR cpe:2.3:h:siemens:simatic_ipc847d:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 23.01.04 OR cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_s7-1500_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.6 OR cpe:2.3:h:siemens:simatic_s7-1500:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:simotion_p320-4e_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 17.0x.14 OR cpe:2.3:h:siemens:simotion_p320-4e:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:sinumerik_840_d_sl_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:sinumerik_840_d_sl:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:sinumerik_pcu_50.5_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 15.02.15 OR cpe:2.3:h:siemens:sinumerik_pcu_50.5:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:sinumerik_tcu_30.3_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:sinumerik_tcu_30.3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:siemens:sinema_remote_connect_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:sinema_remote_connect:-:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:a:mitel:micloud_management_portal:*:*:*:*:*:*:*:* *cpe:2.3:a:mitel:micollab:-:*:*:*:*:*:*:* *cpe:2.3:a:mitel:mivoic_mx-one:-:*:*:*:*:*:*:* *cpe:2.3:a:mitel:mivoice_5000:-:*:*:*:*:*:*:* *cpe:2.3:a:mitel:mivoice_border_gateway:-:*:*:*:*:*:*:* *cpe:2.3:a:mitel:mivoice_business:-:*:*:*:*:*:*:* *cpe:2.3:a:mitel:mivoice_connect:-:*:*:*:*:*:*:* *cpe:2.3:a:mitel:open_integration_gateway:-:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:a:sonicwall:cloud_global_management_system:-:*:*:*:*:*:*:* *cpe:2.3:a:sonicwall:email_security:-:*:*:*:*:*:*:* *cpe:2.3:a:sonicwall:global_management_system:-:*:*:*:*:*:*:* *cpe:2.3:a:sonicwall:secure_mobile_access:-:*:*:*:*:*:*:* *cpe:2.3:a:sonicwall:sonicosv:-:*:*:*:*:*:*:* *cpe:2.3:a:sonicwall:web_application_firewall:-:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:* versions up to (excluding) 7.6.0
  • CVE Modified by [email protected]

    Mar. 27, 2019

    Action Type Old Value New Value
    Added Reference https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html [No Types Assigned]
  • CVE Modified by [email protected]

    Mar. 17, 2019

    Action Type Old Value New Value
    Added Reference https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html [No Types Assigned]
  • CVE Modified by [email protected]

    Feb. 13, 2019

    Action Type Old Value New Value
    Added Reference https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf [No Types Assigned]
  • CVE Modified by [email protected]

    Jan. 24, 2019

    Action Type Old Value New Value
    Added Reference https://access.redhat.com/errata/RHSA-2019:0148 [No Types Assigned]
  • CVE Modified by [email protected]

    Jan. 16, 2019

    Action Type Old Value New Value
    Added Reference https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html [No Types Assigned]
  • CVE Modified by [email protected]

    Nov. 30, 2018

    Action Type Old Value New Value
    Added Reference https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 [No Types Assigned]
  • CVE Modified by [email protected]

    Oct. 31, 2018

    Action Type Old Value New Value
    Added Reference https://access.redhat.com/errata/RHSA-2018:3425 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:3424 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:3423 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:3407 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:3402 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:3401 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:3400 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:3399 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:3398 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:3397 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:3396 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:2948 [No Types Assigned]
    Added Reference http://www.securitytracker.com/id/1042004 [No Types Assigned]
  • CVE Modified by [email protected]

    Oct. 23, 2018

    Action Type Old Value New Value
    Added Reference https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006 [No Types Assigned]
  • CVE Modified by [email protected]

    Oct. 23, 2018

    Action Type Old Value New Value
    Added Reference https://usn.ubuntu.com/3777-3/ [No Types Assigned]
  • CVE Modified by [email protected]

    Oct. 17, 2018

    Action Type Old Value New Value
    Added Reference https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004 [No Types Assigned]
  • CVE Modified by [email protected]

    Sep. 17, 2018

    Action Type Old Value New Value
    Added Reference https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html [No Types Assigned]
  • CVE Modified by [email protected]

    Sep. 12, 2018

    Action Type Old Value New Value
    Added Reference https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf [No Types Assigned]
  • CVE Modified by [email protected]

    Aug. 28, 2018

    Action Type Old Value New Value
    Added Reference https://usn.ubuntu.com/3756-1/ [No Types Assigned]
  • CVE Modified by [email protected]

    Aug. 17, 2018

    Action Type Old Value New Value
    Added Reference https://www.debian.org/security/2018/dsa-4273 [No Types Assigned]
  • CVE Modified by [email protected]

    Aug. 15, 2018

    Action Type Old Value New Value
    Added Reference https://access.redhat.com/errata/RHSA-2018:2396 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:2394 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:2387 [No Types Assigned]
  • CVE Modified by [email protected]

    Aug. 09, 2018

    Action Type Old Value New Value
    Added Reference https://access.redhat.com/errata/RHSA-2018:2364 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:2363 [No Types Assigned]
  • CVE Modified by [email protected]

    Aug. 02, 2018

    Action Type Old Value New Value
    Added Reference https://access.redhat.com/errata/RHSA-2018:2328 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:2309 [No Types Assigned]
  • CVE Modified by [email protected]

    Aug. 01, 2018

    Action Type Old Value New Value
    Added Reference https://access.redhat.com/errata/RHSA-2018:2289 [No Types Assigned]
  • CVE Modified by [email protected]

    Jul. 28, 2018

    Action Type Old Value New Value
    Added Reference https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html [No Types Assigned]
  • CVE Modified by [email protected]

    Jul. 27, 2018

    Action Type Old Value New Value
    Added Reference https://access.redhat.com/errata/RHSA-2018:2258 [No Types Assigned]
  • CVE Modified by [email protected]

    Jul. 26, 2018

    Action Type Old Value New Value
    Added Reference https://access.redhat.com/errata/RHSA-2018:2250 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:2246 [No Types Assigned]
  • CVE Modified by [email protected]

    Jul. 21, 2018

    Action Type Old Value New Value
    Added Reference https://access.redhat.com/errata/RHSA-2018:2228 [No Types Assigned]
  • CVE Modified by [email protected]

    Jul. 20, 2018

    Action Type Old Value New Value
    Added Reference https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html [No Types Assigned]
  • CVE Modified by [email protected]

    Jul. 19, 2018

    Action Type Old Value New Value
    Added Reference https://access.redhat.com/errata/RHSA-2018:2216 [No Types Assigned]
  • CVE Modified by [email protected]

    Jul. 13, 2018

    Action Type Old Value New Value
    Added Reference https://access.redhat.com/errata/RHSA-2018:2172 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:2171 [No Types Assigned]
  • CVE Modified by [email protected]

    Jul. 12, 2018

    Action Type Old Value New Value
    Added Reference https://access.redhat.com/errata/RHSA-2018:2164 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:2162 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:2161 [No Types Assigned]
  • Initial Analysis by [email protected]

    Jun. 29, 2018

    Action Type Old Value New Value
    Added CVSS V2 (AV:L/AC:L/Au:N/C:C/I:N/A:N)
    Added CVSS V3 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
    Changed Reference Type https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability No Types Assigned https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1648 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1648 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1967 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1967 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1649 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1649 Third Party Advisory
    Changed Reference Type http://xenbits.xen.org/xsa/advisory-263.html No Types Assigned http://xenbits.xen.org/xsa/advisory-263.html Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1646 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1646 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1965 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1965 Third Party Advisory
    Changed Reference Type https://www.exploit-db.com/exploits/44695/ No Types Assigned https://www.exploit-db.com/exploits/44695/ Exploit, Third Party Advisory, VDB Entry
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1647 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1647 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1644 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1644 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1688 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1688 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1645 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1645 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1689 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1689 Third Party Advisory
    Changed Reference Type https://www.synology.com/support/security/Synology_SA_18_23 No Types Assigned https://www.synology.com/support/security/Synology_SA_18_23 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1690 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1690 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2060 No Types Assigned https://access.redhat.com/errata/RHSA-2018:2060 Third Party Advisory
    Changed Reference Type https://usn.ubuntu.com/3654-1/ No Types Assigned https://usn.ubuntu.com/3654-1/ Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1653 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1653 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1654 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1654 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1651 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1651 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1652 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1652 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1696 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1696 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1650 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1650 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1639 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1639 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1637 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1637 Third Party Advisory
    Changed Reference Type http://www.securityfocus.com/bid/104232 No Types Assigned http://www.securityfocus.com/bid/104232 Third Party Advisory, VDB Entry
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1638 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1638 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1635 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1635 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1636 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1636 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1633 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1633 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1710 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1710 Third Party Advisory
    Changed Reference Type https://security.netapp.com/advisory/ntap-20180521-0001/ No Types Assigned https://security.netapp.com/advisory/ntap-20180521-0001/ Third Party Advisory
    Changed Reference Type https://www.us-cert.gov/ncas/alerts/TA18-141A No Types Assigned https://www.us-cert.gov/ncas/alerts/TA18-141A Third Party Advisory, US Government Resource
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1711 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1711 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1997 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1997 Third Party Advisory
    Changed Reference Type https://usn.ubuntu.com/3655-2/ No Types Assigned https://usn.ubuntu.com/3655-2/ Third Party Advisory
    Changed Reference Type https://usn.ubuntu.com/3679-1/ No Types Assigned https://usn.ubuntu.com/3679-1/ Third Party Advisory
    Changed Reference Type https://usn.ubuntu.com/3651-1/ No Types Assigned https://usn.ubuntu.com/3651-1/ Third Party Advisory
    Changed Reference Type http://support.lenovo.com/us/en/solutions/LEN-22133 No Types Assigned http://support.lenovo.com/us/en/solutions/LEN-22133 Third Party Advisory
    Changed Reference Type https://usn.ubuntu.com/3655-1/ No Types Assigned https://usn.ubuntu.com/3655-1/ Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1642 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1642 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1686 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1686 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1643 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1643 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1640 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1640 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1641 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1641 Third Party Advisory
    Changed Reference Type https://support.citrix.com/article/CTX235225 No Types Assigned https://support.citrix.com/article/CTX235225 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1826 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1826 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1629 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1629 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1668 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1668 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1669 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1669 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1666 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1666 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1667 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1667 Third Party Advisory
    Changed Reference Type https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel No Types Assigned https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel Third Party Advisory
    Changed Reference Type https://www.kb.cert.org/vuls/id/180049 No Types Assigned https://www.kb.cert.org/vuls/id/180049 Third Party Advisory, US Government Resource
    Changed Reference Type https://usn.ubuntu.com/3652-1/ No Types Assigned https://usn.ubuntu.com/3652-1/ Third Party Advisory
    Changed Reference Type https://usn.ubuntu.com/3653-2/ No Types Assigned https://usn.ubuntu.com/3653-2/ Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1675 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1675 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1632 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1632 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1676 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1676 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2006 No Types Assigned https://access.redhat.com/errata/RHSA-2018:2006 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2003 No Types Assigned https://access.redhat.com/errata/RHSA-2018:2003 Third Party Advisory
    Changed Reference Type http://www.securitytracker.com/id/1040949 No Types Assigned http://www.securitytracker.com/id/1040949 Third Party Advisory, VDB Entry
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1630 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1630 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1674 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1674 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2001 No Types Assigned https://access.redhat.com/errata/RHSA-2018:2001 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1738 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1738 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1659 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1659 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1737 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1737 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1657 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1657 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1658 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1658 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1655 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1655 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1656 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1656 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1854 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1854 Third Party Advisory
    Changed Reference Type https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012 No Types Assigned https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012 Patch, Third Party Advisory, Vendor Advisory
    Changed Reference Type https://bugs.chromium.org/p/project-zero/issues/detail?id=1528 No Types Assigned https://bugs.chromium.org/p/project-zero/issues/detail?id=1528 Exploit, Issue Tracking, Patch, Third Party Advisory
    Changed Reference Type http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html No Types Assigned http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html Third Party Advisory
    Changed Reference Type https://www.debian.org/security/2018/dsa-4210 No Types Assigned https://www.debian.org/security/2018/dsa-4210 Third Party Advisory
    Changed Reference Type https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03850en_us No Types Assigned https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03850en_us Mitigation, Third Party Advisory
    Changed Reference Type https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html No Types Assigned https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html Third Party Advisory
    Changed Reference Type https://usn.ubuntu.com/3653-1/ No Types Assigned https://usn.ubuntu.com/3653-1/ Third Party Advisory
    Changed Reference Type https://usn.ubuntu.com/3654-2/ No Types Assigned https://usn.ubuntu.com/3654-2/ Third Party Advisory
    Changed Reference Type https://usn.ubuntu.com/3680-1/ No Types Assigned https://usn.ubuntu.com/3680-1/ Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1664 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1664 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1665 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1665 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1662 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1662 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1663 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1663 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1660 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1660 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1661 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1661 Third Party Advisory
    Added CWE CWE-200
    Added CPE Configuration OR *cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3770d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3775:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3775d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3785:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3795:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:32nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:45nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:32nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:45nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:32nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:45nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m:32nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m:45nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium:n4000:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium:n4100:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium:n4200:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_j:j4205:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_silver:j5005:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_silver:n5000:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:125c_:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1105c:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1105c_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1125c_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1220_:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1220_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1220_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1220_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1220_v6:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1220l:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1220l_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1220l_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1225:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1225_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1225_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1225_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1225_v6:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1226_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1230:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1230_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1230_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1230_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1230_v6:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1230l_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1231_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1235:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1235l_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1240:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1240_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1240_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1240_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1240_v6:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1240l_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1240l_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1241_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1245:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1245_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1245_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1245_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1245_v6:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1246_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1258l_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1260l:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1260l_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1265l_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1265l_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1265l_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1268l_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1268l_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1270:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1270_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1270_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1270_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1270_v6:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1271_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1275_:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1275_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1275_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1275_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1275_v6:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1275l_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1276_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1278l_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1280:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1280_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1280_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1280_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1280_v6:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1281_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1285_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1285_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1285_v6:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1285l_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1285l_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1286_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1286l_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1290:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1290_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1501l_v6:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1501m_v6:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1505l_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1505l_v6:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1505m_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1505m_v6:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1515m_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1535m_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1535m_v6:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1545m_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1558l_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1565l_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1575m_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1578l_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1585_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1585l_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:3600:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:5600:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:7500:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5502:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5503:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5504:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5506:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5507:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5520:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5530:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5540:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e6510:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e6540:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e6550:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l3403:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l3406:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l3426:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l5506:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l5508_:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l5518_:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l5520:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l5530:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:w5580:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:w5590:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x3430:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x3440:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x3450:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x3460:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x3470:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x3480:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x5550:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x5560:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x5570:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:1428l:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:1428l_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:1428l_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:1620:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:1620_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:1620_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:1620_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:1630_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:1630_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:1650:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:1650_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:1650_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:1650_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:1660:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:1660_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:1660_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:1660_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:1680_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:1680_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2403:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2403_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2407:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2407_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2408l_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2418l:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2418l_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2418l_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2420:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2420_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2428l:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2428l_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2428l_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2430:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2430_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2430l:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2430l_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2438l_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2440:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2440_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2448l:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2448l_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2450:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2450_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2450l:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2450l_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2470:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2470_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2603:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2603_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2603_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2603_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2608l_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2608l_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2609:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2609_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2609_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2609_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2618l_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2618l_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2618l_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2620:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2620_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2620_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2620_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2623_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2623_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2628l_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2628l_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2628l_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2630:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2630_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2630_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2630_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2630l:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2630l_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2630l_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2630l_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2637:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2637_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2637_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2637_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2640:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2640_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2640_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2640_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2643:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2643_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2643_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2643_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2648l:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2648l_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2648l_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2648l_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2650:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2650_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2650_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2650_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2650l:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2650l_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2650l_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2650l_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2658:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2658_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2658_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2658_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2658a_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2660:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2660_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2660_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2660_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2665:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2667:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2667_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2667_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2667_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2670:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2670_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2670_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2680:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2680_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2680_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2680_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2683_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2683_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2687w:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2687w_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2687w_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2687w_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2690:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2690_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2690_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2690_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2695_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2695_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2695_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2697_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2697_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2697_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2697a_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2698_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2698_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2699_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2699_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2699a_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2699r_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4603:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4603_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4607:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4607_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4610:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4610_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4610_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4610_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4617:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4620:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4620_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4620_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4620_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4624l_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4627_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4627_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4627_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4628l_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4640:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4640_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4640_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4640_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4648_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4650:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4650_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4650_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4650_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4650l:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4655_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4655_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4657l_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4660_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4660_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4667_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4667_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4669_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4669_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2803:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2820:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2830:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2850:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2850_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2860:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2870:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2870_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2880_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2890_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4807:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4809_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4809_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4809_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4820:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4820_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4820_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4820_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4830:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4830_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4830_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4830_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4850:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4850_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4850_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4850_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4860:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4860_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4870:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4870_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4880_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4890_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8830:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8837:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8850:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8850_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8857_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8860:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8860_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8860_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8867_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8867_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8867l:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8870:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8870_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8870_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8870_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8880_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8880_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8880_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8880l_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8880l_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8890_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8890_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8890_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8891_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8891_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8891_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8893_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8893_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8893_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8894_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:85115:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:85118:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:85119t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:85120:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:85120t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:85122:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86126:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86126f:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86126t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86128:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86130:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86130f:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86130t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86132:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86134:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86134m:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86136:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86138:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86138f:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86138t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86140:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86140m:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86142:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86142f:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86142m:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86144:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86146:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86148:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86148f:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86150:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86152:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86154:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:h:arm:cortex-a:15:*:*:*:*:*:*:* *cpe:2.3:h:arm:cortex-a:57:*:*:*:*:*:*:* *cpe:2.3:h:arm:cortex-a:72:*:*:*:*:*:*:*
  • CVE Modified by [email protected]

    Jun. 29, 2018

    Action Type Old Value New Value
    Added Reference https://access.redhat.com/errata/RHSA-2018:2060 [No Types Assigned]
  • CVE Modified by [email protected]

    Jun. 28, 2018

    Action Type Old Value New Value
    Added Reference https://access.redhat.com/errata/RHSA-2018:2006 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:2003 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:2001 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1997 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1967 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1965 [No Types Assigned]
  • CVE Modified by [email protected]

    Jun. 20, 2018

    Action Type Old Value New Value
    Added Reference https://access.redhat.com/errata/RHSA-2018:1854 [No Types Assigned]
  • CVE Modified by [email protected]

    Jun. 14, 2018

    Action Type Old Value New Value
    Added Reference https://usn.ubuntu.com/3680-1/ [No Types Assigned]
    Added Reference https://usn.ubuntu.com/3679-1/ [No Types Assigned]
    Added Reference https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03850en_us [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1826 [No Types Assigned]
  • CVE Modified by [email protected]

    Jun. 07, 2018

    Action Type Old Value New Value
    Added Reference http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html [No Types Assigned]
  • CVE Modified by [email protected]

    May. 31, 2018

    Action Type Old Value New Value
    Added Reference https://usn.ubuntu.com/3655-1/ [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1738 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1737 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1641 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1640 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1639 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1638 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1637 [No Types Assigned]
  • CVE Modified by [email protected]

    May. 27, 2018

    Action Type Old Value New Value
    Added Reference https://www.debian.org/security/2018/dsa-4210 [No Types Assigned]
  • CVE Modified by [email protected]

    May. 25, 2018

    Action Type Old Value New Value
    Added Reference https://www.exploit-db.com/exploits/44695/ [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1711 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1710 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1696 [No Types Assigned]
  • CVE Modified by [email protected]

    May. 24, 2018

    Action Type Old Value New Value
    Added Reference https://access.redhat.com/errata/RHSA-2018:1690 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1689 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1688 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1686 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1676 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1675 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1674 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1669 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1668 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1667 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1666 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1665 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1664 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1663 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1662 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1661 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1659 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1658 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1657 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1656 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1654 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1653 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1652 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1651 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1650 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1649 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1648 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1646 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1645 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1644 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1643 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1642 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1636 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1635 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1633 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1632 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1629 [No Types Assigned]
    Added Reference http://www.securityfocus.com/bid/104232 [No Types Assigned]
  • CVE Modified by [email protected]

    May. 23, 2018

    Action Type Old Value New Value
    Changed Description On Intel-based platforms, systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4. Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.
    Added Reference https://www.synology.com/support/security/Synology_SA_18_23 [No Types Assigned]
    Added Reference https://www.kb.cert.org/vuls/id/180049 [No Types Assigned]
    Added Reference https://usn.ubuntu.com/3655-2/ [No Types Assigned]
    Added Reference https://usn.ubuntu.com/3654-2/ [No Types Assigned]
    Added Reference https://usn.ubuntu.com/3654-1/ [No Types Assigned]
    Added Reference https://usn.ubuntu.com/3653-2/ [No Types Assigned]
    Added Reference https://usn.ubuntu.com/3653-1/ [No Types Assigned]
    Added Reference https://usn.ubuntu.com/3652-1/ [No Types Assigned]
    Added Reference https://usn.ubuntu.com/3651-1/ [No Types Assigned]
    Added Reference https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel [No Types Assigned]
    Added Reference https://support.citrix.com/article/CTX235225 [No Types Assigned]
    Added Reference https://security.netapp.com/advisory/ntap-20180521-0001/ [No Types Assigned]
    Added Reference https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012 [No Types Assigned]
    Added Reference https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability [No Types Assigned]
    Added Reference https://bugs.chromium.org/p/project-zero/issues/detail?id=1528 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1660 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1655 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1647 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:1630 [No Types Assigned]
    Added Reference http://xenbits.xen.org/xsa/advisory-263.html [No Types Assigned]
    Added Reference http://www.securitytracker.com/id/1040949 [No Types Assigned]
    Added Reference http://support.lenovo.com/us/en/solutions/LEN-22133 [No Types Assigned]
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2018-3639 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2018-3639 weaknesses.

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.77 }} 0.42%

score

0.81071

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability