CVE-2018-3639
"Intel Speculative Store Bypass (SSB) Information Disclosure"
Description
Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.
INFO
Published Date :
May 22, 2018, 12:29 p.m.
Last Modified :
Nov. 21, 2024, 4:05 a.m.
Source :
[email protected]
Remotely Exploitable :
No
Impact Score :
3.6
Exploitability Score :
1.8
Public PoC/Exploit Available at Github
CVE-2018-3639 has a 50 public PoC/Exploit
available at Github.
Go to the Public Exploits
tab to see the list.
Affected Products
The following products are affected by CVE-2018-3639
vulnerability.
Even if cvefeed.io
is aware of the exact versions of the
products
that
are
affected, the information is not represented in the table below.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2018-3639
.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
None
Dockerfile Nix Dune Coq Makefile OCaml eC C Shell Python
None
Dockerfile Nix Coq Makefile OCaml eC C Shell Python Standard ML
A simple GUI for spectre-meltdown-checker
Python
None
Dockerfile Shell
None
Dockerfile Python Shell
None
Makefile C Shell
None
Windows hardening script
None
Dockerfile Shell
None
Dockerfile Shell
None
None
C
In this repo you will find a curated list of awesome C frameworks, libraries and software.
Linux内核利用资料精选
None
Dockerfile Shell
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2018-3639
vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2018-3639
vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
Nov. 21, 2024
Action Type Old Value New Value Added Reference http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html Added Reference http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html Added Reference http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html Added Reference http://support.lenovo.com/us/en/solutions/LEN-22133 Added Reference http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html Added Reference http://www.openwall.com/lists/oss-security/2020/06/10/1 Added Reference http://www.openwall.com/lists/oss-security/2020/06/10/2 Added Reference http://www.openwall.com/lists/oss-security/2020/06/10/5 Added Reference http://www.securityfocus.com/bid/104232 Added Reference http://www.securitytracker.com/id/1040949 Added Reference http://www.securitytracker.com/id/1042004 Added Reference http://xenbits.xen.org/xsa/advisory-263.html Added Reference https://access.redhat.com/errata/RHSA-2018:1629 Added Reference https://access.redhat.com/errata/RHSA-2018:1630 Added Reference https://access.redhat.com/errata/RHSA-2018:1632 Added Reference https://access.redhat.com/errata/RHSA-2018:1633 Added Reference https://access.redhat.com/errata/RHSA-2018:1635 Added Reference https://access.redhat.com/errata/RHSA-2018:1636 Added Reference https://access.redhat.com/errata/RHSA-2018:1637 Added Reference https://access.redhat.com/errata/RHSA-2018:1638 Added Reference https://access.redhat.com/errata/RHSA-2018:1639 Added Reference https://access.redhat.com/errata/RHSA-2018:1640 Added Reference https://access.redhat.com/errata/RHSA-2018:1641 Added Reference https://access.redhat.com/errata/RHSA-2018:1642 Added Reference https://access.redhat.com/errata/RHSA-2018:1643 Added Reference https://access.redhat.com/errata/RHSA-2018:1644 Added Reference https://access.redhat.com/errata/RHSA-2018:1645 Added Reference https://access.redhat.com/errata/RHSA-2018:1646 Added Reference https://access.redhat.com/errata/RHSA-2018:1647 Added Reference https://access.redhat.com/errata/RHSA-2018:1648 Added Reference https://access.redhat.com/errata/RHSA-2018:1649 Added Reference https://access.redhat.com/errata/RHSA-2018:1650 Added Reference https://access.redhat.com/errata/RHSA-2018:1651 Added Reference https://access.redhat.com/errata/RHSA-2018:1652 Added Reference https://access.redhat.com/errata/RHSA-2018:1653 Added Reference https://access.redhat.com/errata/RHSA-2018:1654 Added Reference https://access.redhat.com/errata/RHSA-2018:1655 Added Reference https://access.redhat.com/errata/RHSA-2018:1656 Added Reference https://access.redhat.com/errata/RHSA-2018:1657 Added Reference https://access.redhat.com/errata/RHSA-2018:1658 Added Reference https://access.redhat.com/errata/RHSA-2018:1659 Added Reference https://access.redhat.com/errata/RHSA-2018:1660 Added Reference https://access.redhat.com/errata/RHSA-2018:1661 Added Reference https://access.redhat.com/errata/RHSA-2018:1662 Added Reference https://access.redhat.com/errata/RHSA-2018:1663 Added Reference https://access.redhat.com/errata/RHSA-2018:1664 Added Reference https://access.redhat.com/errata/RHSA-2018:1665 Added Reference https://access.redhat.com/errata/RHSA-2018:1666 Added Reference https://access.redhat.com/errata/RHSA-2018:1667 Added Reference https://access.redhat.com/errata/RHSA-2018:1668 Added Reference https://access.redhat.com/errata/RHSA-2018:1669 Added Reference https://access.redhat.com/errata/RHSA-2018:1674 Added Reference https://access.redhat.com/errata/RHSA-2018:1675 Added Reference https://access.redhat.com/errata/RHSA-2018:1676 Added Reference https://access.redhat.com/errata/RHSA-2018:1686 Added Reference https://access.redhat.com/errata/RHSA-2018:1688 Added Reference https://access.redhat.com/errata/RHSA-2018:1689 Added Reference https://access.redhat.com/errata/RHSA-2018:1690 Added Reference https://access.redhat.com/errata/RHSA-2018:1696 Added Reference https://access.redhat.com/errata/RHSA-2018:1710 Added Reference https://access.redhat.com/errata/RHSA-2018:1711 Added Reference https://access.redhat.com/errata/RHSA-2018:1737 Added Reference https://access.redhat.com/errata/RHSA-2018:1738 Added Reference https://access.redhat.com/errata/RHSA-2018:1826 Added Reference https://access.redhat.com/errata/RHSA-2018:1854 Added Reference https://access.redhat.com/errata/RHSA-2018:1965 Added Reference https://access.redhat.com/errata/RHSA-2018:1967 Added Reference https://access.redhat.com/errata/RHSA-2018:1997 Added Reference https://access.redhat.com/errata/RHSA-2018:2001 Added Reference https://access.redhat.com/errata/RHSA-2018:2003 Added Reference https://access.redhat.com/errata/RHSA-2018:2006 Added Reference https://access.redhat.com/errata/RHSA-2018:2060 Added Reference https://access.redhat.com/errata/RHSA-2018:2161 Added Reference https://access.redhat.com/errata/RHSA-2018:2162 Added Reference https://access.redhat.com/errata/RHSA-2018:2164 Added Reference https://access.redhat.com/errata/RHSA-2018:2171 Added Reference https://access.redhat.com/errata/RHSA-2018:2172 Added Reference https://access.redhat.com/errata/RHSA-2018:2216 Added Reference https://access.redhat.com/errata/RHSA-2018:2228 Added Reference https://access.redhat.com/errata/RHSA-2018:2246 Added Reference https://access.redhat.com/errata/RHSA-2018:2250 Added Reference https://access.redhat.com/errata/RHSA-2018:2258 Added Reference https://access.redhat.com/errata/RHSA-2018:2289 Added Reference https://access.redhat.com/errata/RHSA-2018:2309 Added Reference https://access.redhat.com/errata/RHSA-2018:2328 Added Reference https://access.redhat.com/errata/RHSA-2018:2363 Added Reference https://access.redhat.com/errata/RHSA-2018:2364 Added Reference https://access.redhat.com/errata/RHSA-2018:2387 Added Reference https://access.redhat.com/errata/RHSA-2018:2394 Added Reference https://access.redhat.com/errata/RHSA-2018:2396 Added Reference https://access.redhat.com/errata/RHSA-2018:2948 Added Reference https://access.redhat.com/errata/RHSA-2018:3396 Added Reference https://access.redhat.com/errata/RHSA-2018:3397 Added Reference https://access.redhat.com/errata/RHSA-2018:3398 Added Reference https://access.redhat.com/errata/RHSA-2018:3399 Added Reference https://access.redhat.com/errata/RHSA-2018:3400 Added Reference https://access.redhat.com/errata/RHSA-2018:3401 Added Reference https://access.redhat.com/errata/RHSA-2018:3402 Added Reference https://access.redhat.com/errata/RHSA-2018:3407 Added Reference https://access.redhat.com/errata/RHSA-2018:3423 Added Reference https://access.redhat.com/errata/RHSA-2018:3424 Added Reference https://access.redhat.com/errata/RHSA-2018:3425 Added Reference https://access.redhat.com/errata/RHSA-2019:0148 Added Reference https://access.redhat.com/errata/RHSA-2019:1046 Added Reference https://bugs.chromium.org/p/project-zero/issues/detail?id=1528 Added Reference https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf Added Reference https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf Added Reference https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf Added Reference https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability Added Reference https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 Added Reference https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html Added Reference https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html Added Reference https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html Added Reference https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html Added Reference https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html Added Reference https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html Added Reference https://nvidia.custhelp.com/app/answers/detail/a_id/4787 Added Reference https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012 Added Reference https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004 Added Reference https://seclists.org/bugtraq/2019/Jun/36 Added Reference https://security.netapp.com/advisory/ntap-20180521-0001/ Added Reference https://support.citrix.com/article/CTX235225 Added Reference https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03850en_us Added Reference https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html Added Reference https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel Added Reference https://usn.ubuntu.com/3651-1/ Added Reference https://usn.ubuntu.com/3652-1/ Added Reference https://usn.ubuntu.com/3653-1/ Added Reference https://usn.ubuntu.com/3653-2/ Added Reference https://usn.ubuntu.com/3654-1/ Added Reference https://usn.ubuntu.com/3654-2/ Added Reference https://usn.ubuntu.com/3655-1/ Added Reference https://usn.ubuntu.com/3655-2/ Added Reference https://usn.ubuntu.com/3679-1/ Added Reference https://usn.ubuntu.com/3680-1/ Added Reference https://usn.ubuntu.com/3756-1/ Added Reference https://usn.ubuntu.com/3777-3/ Added Reference https://www.debian.org/security/2018/dsa-4210 Added Reference https://www.debian.org/security/2018/dsa-4273 Added Reference https://www.exploit-db.com/exploits/44695/ Added Reference https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html Added Reference https://www.kb.cert.org/vuls/id/180049 Added Reference https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006 Added Reference https://www.oracle.com/security-alerts/cpujul2020.html Added Reference https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html Added Reference https://www.synology.com/support/security/Synology_SA_18_23 Added Reference https://www.us-cert.gov/ncas/alerts/TA18-141A -
CVE Modified by [email protected]
May. 14, 2024
Action Type Old Value New Value -
CPE Deprecation Remap by [email protected]
Aug. 13, 2021
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:a:sonicwall:sonicosv:-:*:*:*:*:*:*:* OR *cpe:2.3:o:sonicwall:sonicosv:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Aug. 04, 2021
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:a:redhat:openstack:13.0:*:*:*:*:*:*:* OR *cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:* -
Modified Analysis by [email protected]
Apr. 14, 2021
Action Type Old Value New Value Removed CVSS V2 NIST (AV:L/AC:L/Au:N/C:C/I:N/A:N) Added CVSS V2 NIST (AV:L/AC:L/Au:N/C:P/I:N/A:N) Removed CVSS V3 NIST AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Added CVSS V3.1 NIST AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Changed Reference Type http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html No Types Assigned http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html Broken Link Changed Reference Type http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html No Types Assigned http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html Broken Link Changed Reference Type http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html No Types Assigned http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html Broken Link Changed Reference Type http://www.openwall.com/lists/oss-security/2020/06/10/1 No Types Assigned http://www.openwall.com/lists/oss-security/2020/06/10/1 Mailing List, Third Party Advisory Changed Reference Type http://www.openwall.com/lists/oss-security/2020/06/10/2 No Types Assigned http://www.openwall.com/lists/oss-security/2020/06/10/2 Mailing List, Third Party Advisory Changed Reference Type http://www.openwall.com/lists/oss-security/2020/06/10/5 No Types Assigned http://www.openwall.com/lists/oss-security/2020/06/10/5 Mailing List, Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2019:1046 No Types Assigned https://access.redhat.com/errata/RHSA-2019:1046 Third Party Advisory Changed Reference Type https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf Patch, Third Party Advisory https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf Third Party Advisory Changed Reference Type https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf Patch, Third Party Advisory https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf Third Party Advisory Changed Reference Type https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf No Types Assigned https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf Third Party Advisory Changed Reference Type https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html Third Party Advisory https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html Mailing List, Third Party Advisory Changed Reference Type https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html Third Party Advisory https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html Mailing List, Third Party Advisory Changed Reference Type https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html No Types Assigned https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html Mailing List, Third Party Advisory Changed Reference Type https://nvidia.custhelp.com/app/answers/detail/a_id/4787 No Types Assigned https://nvidia.custhelp.com/app/answers/detail/a_id/4787 Third Party Advisory Changed Reference Type https://seclists.org/bugtraq/2019/Jun/36 No Types Assigned https://seclists.org/bugtraq/2019/Jun/36 Issue Tracking, Mailing List, Third Party Advisory Changed Reference Type https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03850en_us Mitigation, Third Party Advisory https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03850en_us Third Party Advisory Changed Reference Type https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html No Types Assigned https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html Third Party Advisory Changed Reference Type https://www.oracle.com/security-alerts/cpujul2020.html No Types Assigned https://www.oracle.com/security-alerts/cpujul2020.html Third Party Advisory Changed Reference Type https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html Patch, Third Party Advisory https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html Third Party Advisory Changed CPE Configuration OR *cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3770d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3775:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3775d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3785:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3795:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:32nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:45nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:32nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:45nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:32nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:45nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m:32nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m:45nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium:n4000:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium:n4100:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium:n4200:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_j:j4205:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_silver:j5005:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_silver:n5000:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e-1105c:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:125c_:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1220_:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1275_:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1505m_v6:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1515m_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1535m_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1535m_v6:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1545m_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1558l_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1565l_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1575m_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1578l_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1585_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1585l_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:3600:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:5600:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:7500:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5502:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5503:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5504:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5506:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5507:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5520:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5530:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5540:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e6510:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e6540:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e6550:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l3403:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l3406:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l3426:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l5506:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l5508_:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l5518_:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l5520:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l5530:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:w5580:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:w5590:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x3430:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x3440:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x3450:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x3460:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x3470:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x3480:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x5550:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x5560:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x5570:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1105c_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1125c_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_12201:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_12201_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1220_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1220_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1220l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1225:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1225_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1225_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1226_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1230:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1230_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1230_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1230l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1231_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1235:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1240:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1240_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1240_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1240l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1241_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1245:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1245_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1245_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1246_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1258l_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1260l:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1265l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1265l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1265l_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1268l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1270:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1270_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1270_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1271_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1275_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1275_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1275l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1276_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1278l_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1280:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1280_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1280_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1281_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1285_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1285_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1285l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1285l_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1286_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1286l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1290:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1290_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1501l_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1501m_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1505l_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1505l_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1505m_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2650l_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2658:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2658_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2658_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2658_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2658a_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2660:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2660_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2660_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2660_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2665:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2667:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2667_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2667_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2667_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2670:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2670_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2670_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2680:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2680_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2680_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2680_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2683_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2683_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2687w:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2687w_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2687w_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2687w_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2690:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2690_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2690_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2690_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2695_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2695_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2695_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2697_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2697_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2697_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2697a_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2698_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2698_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2699_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2699_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2699a_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2699r_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4603:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4603_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4607:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4607_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4610:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4610_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4610_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4610_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4617:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4620:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4620_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4620_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4620_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4624l_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4627_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4627_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4627_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4628l_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4640:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4640_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4640_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4640_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4648_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4650:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4650_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4650_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4650_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4650l:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4655_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4655_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4657l_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4660_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4660_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4667_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4667_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4669_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4669_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1428l:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1428l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1428l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1620:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1620_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1620_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1620_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1630_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1630_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1650:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1650_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1650_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1650_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1660:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1660_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1660_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1660_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1680_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1680_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2403:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2403_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2407:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2407_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2408l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2418l:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2418l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2418l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2420:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2420_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2428l:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2428l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2428l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2430:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2430_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2430l:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2430l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2438l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2440:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2440_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2448l:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2448l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2450:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2450_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2450l:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2450l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2470:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2470_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2603:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2603_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2603_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2603_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2608l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2608l_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2609:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2609_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2609_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2609_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2618l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2618l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2618l_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2620:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2620_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2620_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2620_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2623_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2623_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2628l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2628l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2628l_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2630:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2630_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2630_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2630_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2630l:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2630l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2630l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2630l_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2637:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2637_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2637_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2637_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2640:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2640_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2640_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2640_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2643:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2643_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2643_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2643_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2648l:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2648l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2648l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2648l_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2650:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2650_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2650_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2650_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2650l:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2650l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2650l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2803:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2820:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2830:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2850:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2850_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2860:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2870:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2870_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2880_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2890_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4807:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4809_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4809_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4809_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4820:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4820_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4820_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4820_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4830:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4830_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4830_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4830_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4850:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4850_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4850_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4850_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4860:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4860_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4870:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4870_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4880_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4890_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8830:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8837:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8850:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8850_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8857_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8860:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8860_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8860_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8867_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8867_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8867l:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8870:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8870_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8870_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8870_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8880_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8880_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8880_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8880l_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8880l_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8890_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8890_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8890_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8891_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8891_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8891_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8893_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8893_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8893_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8894_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:85115:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:85118:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:85119t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:85120:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:85120t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:85122:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86126:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86126f:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86126t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86128:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86130:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86130f:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86130t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86132:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86134:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86134m:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86136:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86138:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86138f:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86138t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86140:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86140m:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86142:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86142f:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86142m:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86144:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86146:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86148:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86148f:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86150:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86152:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86154:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3770d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3775:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3775d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3785:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3795:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:32nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:45nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:32nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:45nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:32nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:45nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m:32nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m:45nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium:n4000:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium:n4100:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium:n4200:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_j:j4205:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_silver:j5005:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_silver:n5000:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e-1105c:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:125c_:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1220_:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1275_:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1505m_v6:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1515m_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1535m_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1535m_v6:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1545m_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1558l_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1565l_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1575m_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1578l_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1585_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1585l_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:3600:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:5600:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:7500:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5502:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5503:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5504:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5506:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5507:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5520:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5530:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5540:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e6510:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e6540:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e6550:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l3403:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l3406:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l3426:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l5506:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l5508_:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l5518_:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l5520:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l5530:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:w5580:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:w5590:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x3430:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x3440:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x3450:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x3460:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x3470:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x3480:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x5550:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x5560:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x5570:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1105c_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1125c_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_12201:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_12201_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1220_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1220_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1220l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1225:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1225_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1225_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1226_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1230:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1230_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1230_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1230l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1231_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1235:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1240:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1240_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1240_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1240l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1241_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1245:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1245_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1245_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1246_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1258l_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1260l:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1265l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1265l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1265l_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1268l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1270:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1270_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1270_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1271_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1275_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1275_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1275l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1276_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1278l_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1280:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1280_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1280_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1281_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1285_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1285_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1285l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1285l_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1286_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1286l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1290:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1290_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1501l_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1501m_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1505l_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1505l_v6:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3_1505m_v5:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2650l_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2658:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2658_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2658_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2658_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2658a_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2660:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2660_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2660_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2660_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2665:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2667:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2667_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2667_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2667_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2670:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2670_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2670_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2680:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2680_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2680_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2680_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2683_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2683_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2687w:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2687w_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2687w_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2687w_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2690:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2690_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2690_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2690_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2695_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2695_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2695_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2697_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2697_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2697_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2697a_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2698_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2698_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2699_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2699_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2699a_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2699r_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4603:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4603_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4607:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4607_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4610:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4610_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4610_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4610_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4617:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4620:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4620_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4620_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4620_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4624l_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4627_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4627_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4627_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4628l_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4640:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4640_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4640_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4640_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4648_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4650:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4650_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4650_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4650_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4650l:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4655_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4655_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4657l_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4660_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4660_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4667_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4667_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4669_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4669_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1428l:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1428l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1428l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1620:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1620_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1620_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1620_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1630_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1630_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1650:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1650_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1650_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1650_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1660:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1660_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1660_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1660_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1680_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_1680_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2403:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2403_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2407:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2407_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2408l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2418l:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2418l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2418l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2420:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2420_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2428l:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2428l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2428l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2430:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2430_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2430l:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2430l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2438l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2440:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2440_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2448l:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2448l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2450:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2450_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2450l:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2450l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2470:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2470_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2603:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2603_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2603_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2603_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2608l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2608l_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2609:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2609_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2609_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2609_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2618l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2618l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2618l_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2620:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2620_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2620_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2620_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2623_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2623_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2628l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2628l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2628l_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2630:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2630_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2630_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2630_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2630l:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2630l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2630l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2630l_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2637:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2637_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2637_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2637_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2640:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2640_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2640_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2640_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2643:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2643_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2643_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2643_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2648l:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2648l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2648l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2648l_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2650:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2650_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2650_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2650_v4:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2650l:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2650l_v2:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5_2650l_v3:-:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2803:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2820:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2830:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2850:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2850_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2860:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2870:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2870_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2880_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2890_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4807:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4809_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4809_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4809_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4820:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4820_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4820_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4820_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4830:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4830_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4830_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4830_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4850:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4850_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4850_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4850_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4860:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4860_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4870:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4870_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4880_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4890_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8830:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8837:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8850:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8850_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8857_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8860:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8860_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8860_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8867_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8867_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8867l:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8870:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8870_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8870_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8870_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8880_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8880_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8880_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8880l_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8880l_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8890_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8890_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8890_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8891_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8891_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8891_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8893_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8893_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8893_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8894_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:85115:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:85118:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:85119t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:85120:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:85120t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:85122:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86126:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86126f:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86126t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86128:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86130:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86130f:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86130t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86132:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86134:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86134m:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86136:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86138:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86138f:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86138t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86140:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86140m:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86142:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86142f:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86142m:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86144:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86146:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86148:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86148f:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86150:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86152:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86154:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:* Changed CPE Configuration OR *cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:* *cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:* *cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:* *cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:* *cpe:2.3:a:redhat:openstack:13.0:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* *cpe:2.3:o:redhat:virtualization:4.2:*:*:*:*:*:*:* OR *cpe:2.3:a:redhat:mrg_realtime:2.0:*:*:*:*:*:*:* *cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:* *cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:* *cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:* *cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:* *cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:* *cpe:2.3:a:redhat:openstack:13.0:*:*:*:*:*:*:* *cpe:2.3:a:redhat:virtualization_manager:4.2:*:*:*:*:*:*:* *cpe:2.3:a:redhat:virtualization_manager:4.3:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* Changed CPE Configuration OR *cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* *cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* *cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* OR *cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:*:*:*:* *cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* *cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* *cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:* *cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* Changed CPE Configuration OR *cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:* OR *cpe:2.3:a:oracle:local_service_management_system:*:*:*:*:*:*:*:* versions from (including) 13.0 up to (including) 13.3 *cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:* Added CPE Configuration AND OR *cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:* OR cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* Added CPE Configuration OR *cpe:2.3:a:nvidia:jetson_tx1:*:*:*:*:*:*:*:* versions up to (excluding) r28.3 *cpe:2.3:a:nvidia:jetson_tx2:*:*:*:*:*:*:*:* versions up to (excluding) r28.3 Added CPE Configuration OR *cpe:2.3:h:microsoft:surface:-:*:*:*:*:*:*:* *cpe:2.3:h:microsoft:surface_book:-:*:*:*:*:*:*:* *cpe:2.3:h:microsoft:surface_book:2:*:*:*:*:*:*:* *cpe:2.3:h:microsoft:surface_pro:3:*:*:*:*:*:*:* *cpe:2.3:h:microsoft:surface_pro:4:*:*:*:*:*:*:* *cpe:2.3:h:microsoft:surface_pro:1796:*:*:*:*:*:*:* *cpe:2.3:h:microsoft:surface_pro_with_lte_advanced:1807:*:*:*:*:*:*:* *cpe:2.3:h:microsoft:surface_studio:-:*:*:*:*:*:*:* *cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:* *cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:* *cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:* *cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:* *cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:* *cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:* *cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:* *cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:* *cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:* *cpe:2.3:o:microsoft:windows_server_2008:sp2:*:*:*:*:*:*:* *cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:* *cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:* *cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:* *cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:* *cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:* -
CVE Modified by [email protected]
Sep. 02, 2020
Action Type Old Value New Value Added Reference http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html [No Types Assigned] -
CWE Remap by [email protected]
Aug. 24, 2020
Action Type Old Value New Value Changed CWE CWE-200 CWE-203 -
CVE Modified by [email protected]
Jul. 15, 2020
Action Type Old Value New Value Added Reference https://www.oracle.com/security-alerts/cpujul2020.html [No Types Assigned] -
CVE Modified by [email protected]
Jun. 10, 2020
Action Type Old Value New Value Added Reference http://www.openwall.com/lists/oss-security/2020/06/10/5 [No Types Assigned] -
CVE Modified by [email protected]
Jun. 10, 2020
Action Type Old Value New Value Added Reference http://www.openwall.com/lists/oss-security/2020/06/10/1 [No Types Assigned] Added Reference http://www.openwall.com/lists/oss-security/2020/06/10/2 [No Types Assigned] -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2650l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2650l_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2650l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2650l_v2:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2650l:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2650l:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2650_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2650_v4:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2650_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2650_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2650_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2650_v2:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2650:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2650:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2648l_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2648l_v4:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2648l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2648l_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2648l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2648l_v2:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2648l:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2648l:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2643_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2643_v4:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2643_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2643_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2643_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2643_v2:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2643:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2643:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2640_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2640_v4:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2640_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2640_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2640_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2640_v2:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2640:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2640:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2637_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2637_v4:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2637_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2637_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2637_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2637_v2:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2637:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2637:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2630l_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2630l_v4:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2630l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2630l_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2630l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2630l_v2:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2630l:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2630l:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2630_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2630_v4:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2630_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2630_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2630_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2630_v2:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2630:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2630:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2628l_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2628l_v4:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2628l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2628l_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2628l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2628l_v2:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2623_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2623_v4:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2623_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2623_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2620_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2620_v4:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2620_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2620_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2620_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2620_v2:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2620:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2620:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2618l_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2618l_v4:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2618l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2618l_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2618l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2618l_v2:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2609_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2609_v4:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2609_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2609_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2609_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2609_v2:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2609:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2609:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2608l_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2608l_v4:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2608l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2608l_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2603_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2603_v4:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2603_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2603_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2603_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2603_v2:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2603:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2603:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2470_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2470_v2:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2470:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2470:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2450l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2450l_v2:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2450l:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2450l:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2450_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2450_v2:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2450:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2450:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2448l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2448l_v2:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2448l:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2448l:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2440_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2440_v2:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2440:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2440:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2438l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2438l_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2430l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2430l_v2:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2430l:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2430l:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2430_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2430_v2:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2430:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2430:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2428l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2428l_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2428l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2428l_v2:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2428l:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2428l:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2420_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2420_v2:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2420:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2420:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2418l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2418l_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2418l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2418l_v2:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2418l:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2418l:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2408l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2408l_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2407_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2407_v2:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2407:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2407:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2403_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2403_v2:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:2403:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_2403:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1680_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1680_v4:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1680_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1680_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1660_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1660_v4:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1660_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1660_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1660_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1660_v2:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1660:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1660:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1650_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1650_v4:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1650_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1650_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1650_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1650_v2:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1650:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1650:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1630_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1630_v4:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1630_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1630_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1620_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1620_v4:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1620_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1620_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1620_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1620_v2:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1620:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1620:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1428l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1428l_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1428l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1428l_v2:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
May. 05, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e5:1428l:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e5_1428l:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1505m_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1505m_v5:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1505l_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1505l_v6:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1505l_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1505l_v5:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1501m_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1501m_v6:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1501l_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1501l_v6:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1290_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1290_v2:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1290:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1290:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1286l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1286l_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1286_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1286_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1285l_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1285l_v4:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1285l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1285l_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1285_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1285_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1285_v4:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1285_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1285_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1281_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1281_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1280_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1280_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1280_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1280_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1280_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1280_v2:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1280:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1280:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1278l_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1278l_v4:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1276_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1276_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1275l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1275l_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1275_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1275_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1275_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1275_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1275_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1275_v2:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1271_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1271_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1270_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1270_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1270_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1270_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1270_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1270_v2:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1270:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1270:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1268l_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1268l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1268l_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1265l_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1265l_v4:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1265l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1265l_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1265l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1265l_v2:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1260l_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1260l:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1260l:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1258l_v4:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1258l_v4:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1246_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1246_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1245_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1245_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1245_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1245_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1245_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1245_v2:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1245:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1245:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1241_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1241_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1240l_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1240l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1240l_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1240_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1240_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1240_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1240_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1240_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1240_v2:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1240:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1240:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1235l_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1235:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1235:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1231_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1231_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1230l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1230l_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1230_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1230_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1230_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1230_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1230_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1230_v2:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1230:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1230:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1226_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1226_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1225_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1225_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1225_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1225_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1225_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1225_v2:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1225:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1225:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1220l_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1220l_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1220l_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_12201_v2:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1220l:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_12201:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1220_v6:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1220_v5:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1220_v3:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1220_v3:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1220_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1220_v2:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1125c_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1125c_v2:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1105c_v2:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e3_1105c_v2:-:*:*:*:*:*:*:* -
CPE Deprecation Remap by [email protected]
Apr. 28, 2020
Action Type Old Value New Value Changed CPE Configuration OR *cpe:2.3:h:intel:xeon_e3:1105c:*:*:*:*:*:*:* OR *cpe:2.3:h:intel:xeon_e-1105c:-:*:*:*:*:*:*:* -
CVE Modified by [email protected]
Oct. 08, 2019
Action Type Old Value New Value Added Reference https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf [No Types Assigned] -
CVE Modified by [email protected]
Jun. 24, 2019
Action Type Old Value New Value Added Reference https://seclists.org/bugtraq/2019/Jun/36 [No Types Assigned] -
CVE Modified by [email protected]
May. 23, 2019
Action Type Old Value New Value Added Reference http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html [No Types Assigned] Added Reference http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html [No Types Assigned] -
CVE Modified by [email protected]
May. 08, 2019
Action Type Old Value New Value Added Reference https://access.redhat.com/errata/RHSA-2019:1046 [No Types Assigned] -
CVE Modified by [email protected]
Apr. 09, 2019
Action Type Old Value New Value Added Reference https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html [No Types Assigned] -
CVE Modified by [email protected]
Apr. 02, 2019
Action Type Old Value New Value Added Reference https://nvidia.custhelp.com/app/answers/detail/a_id/4787 [No Types Assigned] -
CVE Modified by [email protected]
Apr. 01, 2019
Action Type Old Value New Value Added Reference https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html [No Types Assigned] -
Modified Analysis by [email protected]
Mar. 29, 2019
Action Type Old Value New Value Changed Reference Type https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html No Types Assigned https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2216 No Types Assigned https://access.redhat.com/errata/RHSA-2018:2216 Third Party Advisory Changed Reference Type https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html No Types Assigned https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html Mailing List, Third Party Advisory Changed Reference Type https://usn.ubuntu.com/3777-3/ No Types Assigned https://usn.ubuntu.com/3777-3/ Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:3399 No Types Assigned https://access.redhat.com/errata/RHSA-2018:3399 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:3398 No Types Assigned https://access.redhat.com/errata/RHSA-2018:3398 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:3397 No Types Assigned https://access.redhat.com/errata/RHSA-2018:3397 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:3396 No Types Assigned https://access.redhat.com/errata/RHSA-2018:3396 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2328 No Types Assigned https://access.redhat.com/errata/RHSA-2018:2328 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2171 No Types Assigned https://access.redhat.com/errata/RHSA-2018:2171 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2172 No Types Assigned https://access.redhat.com/errata/RHSA-2018:2172 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:3425 No Types Assigned https://access.redhat.com/errata/RHSA-2018:3425 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:3424 No Types Assigned https://access.redhat.com/errata/RHSA-2018:3424 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:3423 No Types Assigned https://access.redhat.com/errata/RHSA-2018:3423 Third Party Advisory Changed Reference Type https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html No Types Assigned https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2019:0148 No Types Assigned https://access.redhat.com/errata/RHSA-2019:0148 Broken Link Changed Reference Type http://www.securitytracker.com/id/1042004 No Types Assigned http://www.securitytracker.com/id/1042004 Third Party Advisory, VDB Entry Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2246 No Types Assigned https://access.redhat.com/errata/RHSA-2018:2246 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2364 No Types Assigned https://access.redhat.com/errata/RHSA-2018:2364 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2363 No Types Assigned https://access.redhat.com/errata/RHSA-2018:2363 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2228 No Types Assigned https://access.redhat.com/errata/RHSA-2018:2228 Third Party Advisory Changed Reference Type https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006 No Types Assigned https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006 Third Party Advisory Changed Reference Type https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf No Types Assigned https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf Patch, Third Party Advisory Changed Reference Type https://usn.ubuntu.com/3756-1/ No Types Assigned https://usn.ubuntu.com/3756-1/ Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2387 No Types Assigned https://access.redhat.com/errata/RHSA-2018:2387 Third Party Advisory Changed Reference Type https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html No Types Assigned https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html Mailing List, Third Party Advisory Changed Reference Type https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html No Types Assigned https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html Patch, Third Party Advisory Changed Reference Type https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 No Types Assigned https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2250 No Types Assigned https://access.redhat.com/errata/RHSA-2018:2250 Third Party Advisory Changed Reference Type https://www.debian.org/security/2018/dsa-4273 No Types Assigned https://www.debian.org/security/2018/dsa-4273 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2258 No Types Assigned https://access.redhat.com/errata/RHSA-2018:2258 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:3407 No Types Assigned https://access.redhat.com/errata/RHSA-2018:3407 Third Party Advisory Changed Reference Type https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf No Types Assigned https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf Patch, Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2162 No Types Assigned https://access.redhat.com/errata/RHSA-2018:2162 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2161 No Types Assigned https://access.redhat.com/errata/RHSA-2018:2161 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2289 No Types Assigned https://access.redhat.com/errata/RHSA-2018:2289 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2164 No Types Assigned https://access.redhat.com/errata/RHSA-2018:2164 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2948 No Types Assigned https://access.redhat.com/errata/RHSA-2018:2948 Third Party Advisory Changed Reference Type https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004 No Types Assigned https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2309 No Types Assigned https://access.redhat.com/errata/RHSA-2018:2309 Third Party Advisory Changed Reference Type https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html No Types Assigned https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html Mailing List, Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2394 No Types Assigned https://access.redhat.com/errata/RHSA-2018:2394 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:3402 No Types Assigned https://access.redhat.com/errata/RHSA-2018:3402 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:3401 No Types Assigned https://access.redhat.com/errata/RHSA-2018:3401 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:3400 No Types Assigned https://access.redhat.com/errata/RHSA-2018:3400 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2396 No Types Assigned https://access.redhat.com/errata/RHSA-2018:2396 Third Party Advisory Added CPE Configuration OR *cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:* *cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:* *cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:* *cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:* *cpe:2.3:a:redhat:openstack:13.0:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* *cpe:2.3:o:redhat:virtualization:4.2:*:*:*:*:*:*:* Added CPE Configuration OR *cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* *cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* Added CPE Configuration OR *cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* *cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* *cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* Added CPE Configuration AND OR *cpe:2.3:o:siemens:itc1500_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 3.1 OR cpe:2.3:h:siemens:itc1500:3:*:*:*:*:*:*:* Added CPE Configuration AND OR *cpe:2.3:o:siemens:itc1500_pro_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 3.1 OR cpe:2.3:h:siemens:itc1500_pro:3:*:*:*:*:*:*:* Added CPE Configuration AND OR *cpe:2.3:o:siemens:itc1900_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 3.1 OR cpe:2.3:h:siemens:itc1900:3:*:*:*:*:*:*:* Added CPE Configuration AND OR *cpe:2.3:o:siemens:itc1900_pro_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 3.1 OR cpe:2.3:h:siemens:itc1900_pro:3:*:*:*:*:*:*:* Added CPE Configuration AND OR *cpe:2.3:o:siemens:itc2200_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 3.1 OR cpe:2.3:h:siemens:itc2200:3:*:*:*:*:*:*:* Added CPE Configuration AND OR *cpe:2.3:o:siemens:itc2200_pro_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 3.1 OR cpe:2.3:h:siemens:itc2200_pro:3:*:*:*:*:*:*:* Added CPE Configuration OR *cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:* Added CPE Configuration AND OR *cpe:2.3:o:siemens:ruggedcom_ape_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:ruggedcom_ape:-:*:*:*:*:*:*:* Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_et_200_sp_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.6 OR cpe:2.3:h:siemens:simatic_et_200_sp:-:*:*:*:*:*:*:* Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_field_pg_m4_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 18.01.09 OR cpe:2.3:h:siemens:simatic_field_pg_m4:-:*:*:*:*:*:*:* Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 22.01.06 OR cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:* Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_ipc3000_smart_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.5 OR cpe:2.3:h:siemens:simatic_ipc3000_smart:2:*:*:*:*:*:*:* Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_ipc347e_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 1.5 OR cpe:2.3:h:siemens:simatic_ipc347e:-:*:*:*:*:*:*:* Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_ipc427c_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:simatic_ipc427c:-:*:*:*:*:*:*:* Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_ipc427d_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 17.0x.14 OR cpe:2.3:h:siemens:simatic_ipc427d:-:*:*:*:*:*:*:* Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 21.01.09 OR cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:* Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_ipc477c_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:simatic_ipc477c:-:*:*:*:*:*:*:* Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_ipc477d_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 17.0x.14 OR cpe:2.3:h:siemens:simatic_ipc477d:-:*:*:*:*:*:*:* Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 21.01.09 OR cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:* Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 21.01.09 OR cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:* Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_ipc547e_firmware:*:*:*:*:*:*:*:* versions up to (excluding) r1.30.0 OR cpe:2.3:h:siemens:simatic_ipc547e:-:*:*:*:*:*:*:* Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:* versions up to (excluding) r1.23.0 OR cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:* Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_ipc627c_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 15.02.15 OR cpe:2.3:h:siemens:simatic_ipc627c:-:*:*:*:*:*:*:* Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_ipc627d_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 19.02.11 OR cpe:2.3:h:siemens:simatic_ipc627d:-:*:*:*:*:*:*:* Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_ipc647c_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 15.01.14 OR cpe:2.3:h:siemens:simatic_ipc647c:-:*:*:*:*:*:*:* Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_ipc647d_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 19.01.14 OR cpe:2.3:h:siemens:simatic_ipc647d:-:*:*:*:*:*:*:* Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_ipc677d_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 19.02.11 OR cpe:2.3:h:siemens:simatic_ipc677d:-:*:*:*:*:*:*:* Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_ipc677c_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 15.02.15 OR cpe:2.3:h:siemens:simatic_ipc677c:-:*:*:*:*:*:*:* Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_ipc827c_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 15.02.15 OR cpe:2.3:h:siemens:simatic_ipc827c:-:*:*:*:*:*:*:* Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_ipc827d_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 19.02.11 OR cpe:2.3:h:siemens:simatic_ipc827d:-:*:*:*:*:*:*:* Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_ipc847c_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 15.01.14 OR cpe:2.3:h:siemens:simatic_ipc847c:-:*:*:*:*:*:*:* Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_ipc847d_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 19.01.14 OR cpe:2.3:h:siemens:simatic_ipc847d:-:*:*:*:*:*:*:* Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 23.01.04 OR cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:* Added CPE Configuration AND OR *cpe:2.3:o:siemens:simatic_s7-1500_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.6 OR cpe:2.3:h:siemens:simatic_s7-1500:-:*:*:*:*:*:*:* Added CPE Configuration AND OR *cpe:2.3:o:siemens:simotion_p320-4e_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 17.0x.14 OR cpe:2.3:h:siemens:simotion_p320-4e:-:*:*:*:*:*:*:* Added CPE Configuration AND OR *cpe:2.3:o:siemens:sinumerik_840_d_sl_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:sinumerik_840_d_sl:-:*:*:*:*:*:*:* Added CPE Configuration AND OR *cpe:2.3:o:siemens:sinumerik_pcu_50.5_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 15.02.15 OR cpe:2.3:h:siemens:sinumerik_pcu_50.5:-:*:*:*:*:*:*:* Added CPE Configuration AND OR *cpe:2.3:o:siemens:sinumerik_tcu_30.3_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:sinumerik_tcu_30.3:-:*:*:*:*:*:*:* Added CPE Configuration AND OR *cpe:2.3:o:siemens:sinema_remote_connect_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:siemens:sinema_remote_connect:-:*:*:*:*:*:*:* Added CPE Configuration OR *cpe:2.3:a:mitel:micloud_management_portal:*:*:*:*:*:*:*:* *cpe:2.3:a:mitel:micollab:-:*:*:*:*:*:*:* *cpe:2.3:a:mitel:mivoic_mx-one:-:*:*:*:*:*:*:* *cpe:2.3:a:mitel:mivoice_5000:-:*:*:*:*:*:*:* *cpe:2.3:a:mitel:mivoice_border_gateway:-:*:*:*:*:*:*:* *cpe:2.3:a:mitel:mivoice_business:-:*:*:*:*:*:*:* *cpe:2.3:a:mitel:mivoice_connect:-:*:*:*:*:*:*:* *cpe:2.3:a:mitel:open_integration_gateway:-:*:*:*:*:*:*:* Added CPE Configuration OR *cpe:2.3:a:sonicwall:cloud_global_management_system:-:*:*:*:*:*:*:* *cpe:2.3:a:sonicwall:email_security:-:*:*:*:*:*:*:* *cpe:2.3:a:sonicwall:global_management_system:-:*:*:*:*:*:*:* *cpe:2.3:a:sonicwall:secure_mobile_access:-:*:*:*:*:*:*:* *cpe:2.3:a:sonicwall:sonicosv:-:*:*:*:*:*:*:* *cpe:2.3:a:sonicwall:web_application_firewall:-:*:*:*:*:*:*:* Added CPE Configuration OR *cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:* versions up to (excluding) 7.6.0 -
CVE Modified by [email protected]
Mar. 27, 2019
Action Type Old Value New Value Added Reference https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html [No Types Assigned] -
CVE Modified by [email protected]
Mar. 17, 2019
Action Type Old Value New Value Added Reference https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html [No Types Assigned] -
CVE Modified by [email protected]
Feb. 13, 2019
Action Type Old Value New Value Added Reference https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf [No Types Assigned] -
CVE Modified by [email protected]
Jan. 24, 2019
Action Type Old Value New Value Added Reference https://access.redhat.com/errata/RHSA-2019:0148 [No Types Assigned] -
CVE Modified by [email protected]
Jan. 16, 2019
Action Type Old Value New Value Added Reference https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html [No Types Assigned] -
CVE Modified by [email protected]
Nov. 30, 2018
Action Type Old Value New Value Added Reference https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 [No Types Assigned] -
CVE Modified by [email protected]
Oct. 31, 2018
Action Type Old Value New Value Added Reference https://access.redhat.com/errata/RHSA-2018:3425 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:3424 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:3423 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:3407 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:3402 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:3401 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:3400 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:3399 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:3398 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:3397 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:3396 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:2948 [No Types Assigned] Added Reference http://www.securitytracker.com/id/1042004 [No Types Assigned] -
CVE Modified by [email protected]
Oct. 23, 2018
Action Type Old Value New Value Added Reference https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006 [No Types Assigned] -
CVE Modified by [email protected]
Oct. 23, 2018
Action Type Old Value New Value Added Reference https://usn.ubuntu.com/3777-3/ [No Types Assigned] -
CVE Modified by [email protected]
Oct. 17, 2018
Action Type Old Value New Value Added Reference https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004 [No Types Assigned] -
CVE Modified by [email protected]
Sep. 17, 2018
Action Type Old Value New Value Added Reference https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html [No Types Assigned] -
CVE Modified by [email protected]
Sep. 12, 2018
Action Type Old Value New Value Added Reference https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf [No Types Assigned] -
CVE Modified by [email protected]
Aug. 28, 2018
Action Type Old Value New Value Added Reference https://usn.ubuntu.com/3756-1/ [No Types Assigned] -
CVE Modified by [email protected]
Aug. 17, 2018
Action Type Old Value New Value Added Reference https://www.debian.org/security/2018/dsa-4273 [No Types Assigned] -
CVE Modified by [email protected]
Aug. 15, 2018
Action Type Old Value New Value Added Reference https://access.redhat.com/errata/RHSA-2018:2396 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:2394 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:2387 [No Types Assigned] -
CVE Modified by [email protected]
Aug. 09, 2018
Action Type Old Value New Value Added Reference https://access.redhat.com/errata/RHSA-2018:2364 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:2363 [No Types Assigned] -
CVE Modified by [email protected]
Aug. 02, 2018
Action Type Old Value New Value Added Reference https://access.redhat.com/errata/RHSA-2018:2328 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:2309 [No Types Assigned] -
CVE Modified by [email protected]
Aug. 01, 2018
Action Type Old Value New Value Added Reference https://access.redhat.com/errata/RHSA-2018:2289 [No Types Assigned] -
CVE Modified by [email protected]
Jul. 28, 2018
Action Type Old Value New Value Added Reference https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html [No Types Assigned] -
CVE Modified by [email protected]
Jul. 27, 2018
Action Type Old Value New Value Added Reference https://access.redhat.com/errata/RHSA-2018:2258 [No Types Assigned] -
CVE Modified by [email protected]
Jul. 26, 2018
Action Type Old Value New Value Added Reference https://access.redhat.com/errata/RHSA-2018:2250 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:2246 [No Types Assigned] -
CVE Modified by [email protected]
Jul. 21, 2018
Action Type Old Value New Value Added Reference https://access.redhat.com/errata/RHSA-2018:2228 [No Types Assigned] -
CVE Modified by [email protected]
Jul. 20, 2018
Action Type Old Value New Value Added Reference https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html [No Types Assigned] -
CVE Modified by [email protected]
Jul. 19, 2018
Action Type Old Value New Value Added Reference https://access.redhat.com/errata/RHSA-2018:2216 [No Types Assigned] -
CVE Modified by [email protected]
Jul. 13, 2018
Action Type Old Value New Value Added Reference https://access.redhat.com/errata/RHSA-2018:2172 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:2171 [No Types Assigned] -
CVE Modified by [email protected]
Jul. 12, 2018
Action Type Old Value New Value Added Reference https://access.redhat.com/errata/RHSA-2018:2164 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:2162 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:2161 [No Types Assigned] -
Initial Analysis by [email protected]
Jun. 29, 2018
Action Type Old Value New Value Added CVSS V2 (AV:L/AC:L/Au:N/C:C/I:N/A:N) Added CVSS V3 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Changed Reference Type https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability No Types Assigned https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1648 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1648 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1967 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1967 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1649 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1649 Third Party Advisory Changed Reference Type http://xenbits.xen.org/xsa/advisory-263.html No Types Assigned http://xenbits.xen.org/xsa/advisory-263.html Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1646 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1646 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1965 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1965 Third Party Advisory Changed Reference Type https://www.exploit-db.com/exploits/44695/ No Types Assigned https://www.exploit-db.com/exploits/44695/ Exploit, Third Party Advisory, VDB Entry Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1647 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1647 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1644 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1644 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1688 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1688 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1645 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1645 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1689 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1689 Third Party Advisory Changed Reference Type https://www.synology.com/support/security/Synology_SA_18_23 No Types Assigned https://www.synology.com/support/security/Synology_SA_18_23 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1690 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1690 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2060 No Types Assigned https://access.redhat.com/errata/RHSA-2018:2060 Third Party Advisory Changed Reference Type https://usn.ubuntu.com/3654-1/ No Types Assigned https://usn.ubuntu.com/3654-1/ Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1653 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1653 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1654 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1654 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1651 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1651 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1652 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1652 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1696 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1696 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1650 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1650 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1639 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1639 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1637 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1637 Third Party Advisory Changed Reference Type http://www.securityfocus.com/bid/104232 No Types Assigned http://www.securityfocus.com/bid/104232 Third Party Advisory, VDB Entry Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1638 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1638 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1635 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1635 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1636 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1636 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1633 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1633 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1710 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1710 Third Party Advisory Changed Reference Type https://security.netapp.com/advisory/ntap-20180521-0001/ No Types Assigned https://security.netapp.com/advisory/ntap-20180521-0001/ Third Party Advisory Changed Reference Type https://www.us-cert.gov/ncas/alerts/TA18-141A No Types Assigned https://www.us-cert.gov/ncas/alerts/TA18-141A Third Party Advisory, US Government Resource Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1711 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1711 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1997 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1997 Third Party Advisory Changed Reference Type https://usn.ubuntu.com/3655-2/ No Types Assigned https://usn.ubuntu.com/3655-2/ Third Party Advisory Changed Reference Type https://usn.ubuntu.com/3679-1/ No Types Assigned https://usn.ubuntu.com/3679-1/ Third Party Advisory Changed Reference Type https://usn.ubuntu.com/3651-1/ No Types Assigned https://usn.ubuntu.com/3651-1/ Third Party Advisory Changed Reference Type http://support.lenovo.com/us/en/solutions/LEN-22133 No Types Assigned http://support.lenovo.com/us/en/solutions/LEN-22133 Third Party Advisory Changed Reference Type https://usn.ubuntu.com/3655-1/ No Types Assigned https://usn.ubuntu.com/3655-1/ Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1642 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1642 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1686 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1686 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1643 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1643 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1640 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1640 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1641 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1641 Third Party Advisory Changed Reference Type https://support.citrix.com/article/CTX235225 No Types Assigned https://support.citrix.com/article/CTX235225 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1826 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1826 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1629 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1629 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1668 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1668 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1669 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1669 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1666 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1666 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1667 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1667 Third Party Advisory Changed Reference Type https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel No Types Assigned https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel Third Party Advisory Changed Reference Type https://www.kb.cert.org/vuls/id/180049 No Types Assigned https://www.kb.cert.org/vuls/id/180049 Third Party Advisory, US Government Resource Changed Reference Type https://usn.ubuntu.com/3652-1/ No Types Assigned https://usn.ubuntu.com/3652-1/ Third Party Advisory Changed Reference Type https://usn.ubuntu.com/3653-2/ No Types Assigned https://usn.ubuntu.com/3653-2/ Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1675 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1675 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1632 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1632 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1676 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1676 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2006 No Types Assigned https://access.redhat.com/errata/RHSA-2018:2006 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2003 No Types Assigned https://access.redhat.com/errata/RHSA-2018:2003 Third Party Advisory Changed Reference Type http://www.securitytracker.com/id/1040949 No Types Assigned http://www.securitytracker.com/id/1040949 Third Party Advisory, VDB Entry Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1630 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1630 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1674 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1674 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:2001 No Types Assigned https://access.redhat.com/errata/RHSA-2018:2001 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1738 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1738 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1659 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1659 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1737 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1737 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1657 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1657 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1658 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1658 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1655 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1655 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1656 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1656 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1854 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1854 Third Party Advisory Changed Reference Type https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012 No Types Assigned https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012 Patch, Third Party Advisory, Vendor Advisory Changed Reference Type https://bugs.chromium.org/p/project-zero/issues/detail?id=1528 No Types Assigned https://bugs.chromium.org/p/project-zero/issues/detail?id=1528 Exploit, Issue Tracking, Patch, Third Party Advisory Changed Reference Type http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html No Types Assigned http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html Third Party Advisory Changed Reference Type https://www.debian.org/security/2018/dsa-4210 No Types Assigned https://www.debian.org/security/2018/dsa-4210 Third Party Advisory Changed Reference Type https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03850en_us No Types Assigned https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03850en_us Mitigation, Third Party Advisory Changed Reference Type https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html No Types Assigned https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html Third Party Advisory Changed Reference Type https://usn.ubuntu.com/3653-1/ No Types Assigned https://usn.ubuntu.com/3653-1/ Third Party Advisory Changed Reference Type https://usn.ubuntu.com/3654-2/ No Types Assigned https://usn.ubuntu.com/3654-2/ Third Party Advisory Changed Reference Type https://usn.ubuntu.com/3680-1/ No Types Assigned https://usn.ubuntu.com/3680-1/ Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1664 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1664 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1665 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1665 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1662 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1662 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1663 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1663 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1660 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1660 Third Party Advisory Changed Reference Type https://access.redhat.com/errata/RHSA-2018:1661 No Types Assigned https://access.redhat.com/errata/RHSA-2018:1661 Third Party Advisory Added CWE CWE-200 Added CPE Configuration OR *cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3770d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3775:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3775d:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3785:*:*:*:*:*:*:* *cpe:2.3:h:intel:atom_z:z3795:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:* *cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:32nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i3:45nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:32nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i5:45nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:32nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_i7:45nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m:32nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:core_m:45nm:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium:n4000:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium:n4100:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium:n4200:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_j:j4205:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_silver:j5005:*:*:*:*:*:*:* *cpe:2.3:h:intel:pentium_silver:n5000:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:125c_:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1105c:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1105c_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1125c_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1220_:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1220_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1220_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1220_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1220_v6:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1220l:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1220l_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1220l_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1225:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1225_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1225_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1225_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1225_v6:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1226_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1230:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1230_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1230_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1230_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1230_v6:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1230l_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1231_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1235:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1235l_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1240:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1240_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1240_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1240_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1240_v6:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1240l_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1240l_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1241_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1245:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1245_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1245_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1245_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1245_v6:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1246_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1258l_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1260l:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1260l_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1265l_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1265l_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1265l_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1268l_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1268l_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1270:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1270_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1270_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1270_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1270_v6:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1271_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1275_:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1275_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1275_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1275_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1275_v6:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1275l_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1276_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1278l_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1280:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1280_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1280_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1280_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1280_v6:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1281_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1285_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1285_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1285_v6:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1285l_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1285l_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1286_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1286l_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1290:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1290_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1501l_v6:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1501m_v6:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1505l_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1505l_v6:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1505m_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1505m_v6:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1515m_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1535m_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1535m_v6:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1545m_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1558l_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1565l_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1575m_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1578l_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1585_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:1585l_v5:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:3600:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:5600:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:7500:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5502:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5503:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5504:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5506:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5507:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5520:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5530:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e5540:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e6510:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e6540:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:e6550:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l3403:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l3406:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l3426:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l5506:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l5508_:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l5518_:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l5520:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:l5530:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:w5580:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:w5590:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x3430:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x3440:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x3450:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x3460:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x3470:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x3480:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x5550:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x5560:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e3:x5570:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:1428l:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:1428l_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:1428l_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:1620:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:1620_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:1620_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:1620_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:1630_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:1630_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:1650:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:1650_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:1650_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:1650_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:1660:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:1660_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:1660_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:1660_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:1680_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:1680_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2403:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2403_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2407:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2407_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2408l_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2418l:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2418l_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2418l_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2420:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2420_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2428l:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2428l_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2428l_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2430:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2430_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2430l:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2430l_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2438l_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2440:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2440_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2448l:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2448l_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2450:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2450_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2450l:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2450l_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2470:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2470_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2603:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2603_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2603_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2603_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2608l_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2608l_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2609:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2609_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2609_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2609_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2618l_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2618l_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2618l_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2620:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2620_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2620_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2620_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2623_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2623_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2628l_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2628l_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2628l_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2630:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2630_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2630_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2630_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2630l:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2630l_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2630l_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2630l_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2637:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2637_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2637_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2637_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2640:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2640_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2640_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2640_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2643:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2643_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2643_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2643_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2648l:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2648l_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2648l_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2648l_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2650:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2650_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2650_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2650_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2650l:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2650l_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2650l_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2650l_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2658:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2658_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2658_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2658_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2658a_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2660:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2660_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2660_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2660_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2665:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2667:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2667_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2667_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2667_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2670:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2670_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2670_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2680:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2680_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2680_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2680_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2683_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2683_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2687w:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2687w_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2687w_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2687w_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2690:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2690_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2690_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2690_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2695_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2695_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2695_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2697_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2697_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2697_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2697a_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2698_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2698_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2699_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2699_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2699a_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:2699r_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4603:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4603_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4607:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4607_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4610:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4610_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4610_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4610_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4617:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4620:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4620_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4620_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4620_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4624l_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4627_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4627_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4627_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4628l_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4640:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4640_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4640_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4640_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4648_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4650:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4650_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4650_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4650_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4650l:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4655_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4655_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4657l_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4660_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4660_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4667_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4667_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4669_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e5:4669_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2803:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2820:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2830:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2850:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2850_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2860:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2870:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2870_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2880_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:2890_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4807:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4809_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4809_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4809_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4820:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4820_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4820_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4820_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4830:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4830_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4830_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4830_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4850:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4850_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4850_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4850_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4860:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4860_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4870:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4870_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4880_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:4890_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8830:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8837:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8850:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8850_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8857_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8860:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8860_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8860_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8867_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8867_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8867l:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8870:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8870_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8870_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8870_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8880_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8880_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8880_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8880l_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8880l_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8890_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8890_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8890_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8891_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8891_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8891_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8893_v2:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8893_v3:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8893_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_e7:8894_v4:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:85115:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:85118:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:85119t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:85120:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:85120t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:85122:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86126:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86126f:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86126t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86128:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86130:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86130f:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86130t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86132:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86134:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86134m:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86136:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86138:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86138f:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86138t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86140:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86140m:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86142:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86142f:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86142m:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86144:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86146:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86148:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86148f:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86150:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86152:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_gold:86154:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:* *cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:* Added CPE Configuration OR *cpe:2.3:h:arm:cortex-a:15:*:*:*:*:*:*:* *cpe:2.3:h:arm:cortex-a:57:*:*:*:*:*:*:* *cpe:2.3:h:arm:cortex-a:72:*:*:*:*:*:*:* -
CVE Modified by [email protected]
Jun. 29, 2018
Action Type Old Value New Value Added Reference https://access.redhat.com/errata/RHSA-2018:2060 [No Types Assigned] -
CVE Modified by [email protected]
Jun. 28, 2018
Action Type Old Value New Value Added Reference https://access.redhat.com/errata/RHSA-2018:2006 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:2003 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:2001 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1997 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1967 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1965 [No Types Assigned] -
CVE Modified by [email protected]
Jun. 20, 2018
Action Type Old Value New Value Added Reference https://access.redhat.com/errata/RHSA-2018:1854 [No Types Assigned] -
CVE Modified by [email protected]
Jun. 14, 2018
Action Type Old Value New Value Added Reference https://usn.ubuntu.com/3680-1/ [No Types Assigned] Added Reference https://usn.ubuntu.com/3679-1/ [No Types Assigned] Added Reference https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03850en_us [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1826 [No Types Assigned] -
CVE Modified by [email protected]
Jun. 07, 2018
Action Type Old Value New Value Added Reference http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html [No Types Assigned] -
CVE Modified by [email protected]
May. 31, 2018
Action Type Old Value New Value Added Reference https://usn.ubuntu.com/3655-1/ [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1738 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1737 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1641 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1640 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1639 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1638 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1637 [No Types Assigned] -
CVE Modified by [email protected]
May. 27, 2018
Action Type Old Value New Value Added Reference https://www.debian.org/security/2018/dsa-4210 [No Types Assigned] -
CVE Modified by [email protected]
May. 25, 2018
Action Type Old Value New Value Added Reference https://www.exploit-db.com/exploits/44695/ [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1711 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1710 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1696 [No Types Assigned] -
CVE Modified by [email protected]
May. 24, 2018
Action Type Old Value New Value Added Reference https://access.redhat.com/errata/RHSA-2018:1690 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1689 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1688 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1686 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1676 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1675 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1674 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1669 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1668 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1667 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1666 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1665 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1664 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1663 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1662 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1661 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1659 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1658 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1657 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1656 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1654 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1653 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1652 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1651 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1650 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1649 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1648 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1646 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1645 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1644 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1643 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1642 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1636 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1635 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1633 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1632 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1629 [No Types Assigned] Added Reference http://www.securityfocus.com/bid/104232 [No Types Assigned] -
CVE Modified by [email protected]
May. 23, 2018
Action Type Old Value New Value Changed Description On Intel-based platforms, systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4. Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4. Added Reference https://www.synology.com/support/security/Synology_SA_18_23 [No Types Assigned] Added Reference https://www.kb.cert.org/vuls/id/180049 [No Types Assigned] Added Reference https://usn.ubuntu.com/3655-2/ [No Types Assigned] Added Reference https://usn.ubuntu.com/3654-2/ [No Types Assigned] Added Reference https://usn.ubuntu.com/3654-1/ [No Types Assigned] Added Reference https://usn.ubuntu.com/3653-2/ [No Types Assigned] Added Reference https://usn.ubuntu.com/3653-1/ [No Types Assigned] Added Reference https://usn.ubuntu.com/3652-1/ [No Types Assigned] Added Reference https://usn.ubuntu.com/3651-1/ [No Types Assigned] Added Reference https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel [No Types Assigned] Added Reference https://support.citrix.com/article/CTX235225 [No Types Assigned] Added Reference https://security.netapp.com/advisory/ntap-20180521-0001/ [No Types Assigned] Added Reference https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012 [No Types Assigned] Added Reference https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability [No Types Assigned] Added Reference https://bugs.chromium.org/p/project-zero/issues/detail?id=1528 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1660 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1655 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1647 [No Types Assigned] Added Reference https://access.redhat.com/errata/RHSA-2018:1630 [No Types Assigned] Added Reference http://xenbits.xen.org/xsa/advisory-263.html [No Types Assigned] Added Reference http://www.securitytracker.com/id/1040949 [No Types Assigned] Added Reference http://support.lenovo.com/us/en/solutions/LEN-22133 [No Types Assigned]
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2018-3639
is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2018-3639
weaknesses.
Exploit Prediction
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.
0.77 }} 0.42%
score
0.81071
percentile