CVE-2017-5753

Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html Mailing List Third Party Advisory
http://nvidia.custhelp.com/app/answers/detail/a_id/4609 Third Party Advisory
http://nvidia.custhelp.com/app/answers/detail/a_id/4611 Third Party Advisory
http://nvidia.custhelp.com/app/answers/detail/a_id/4613 Third Party Advisory
http://nvidia.custhelp.com/app/answers/detail/a_id/4614 Third Party Advisory
http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html Exploit Third Party Advisory VDB Entry
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt Third Party Advisory
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt Third Party Advisory
http://www.kb.cert.org/vuls/id/584653 Third Party Advisory US Government Resource
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html Patch Third Party Advisory
http://www.securityfocus.com/bid/102371 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1040071 Third Party Advisory VDB Entry
http://xenbits.xen.org/xsa/advisory-254.html Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0292 Third Party Advisory
https://access.redhat.com/security/vulnerabilities/speculativeexecution Third Party Advisory
https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/ Third Party Advisory
https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/ Third Party Advisory
https://cdrdv2.intel.com/v1/dl/getContent/685359 Vendor Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf Third Party Advisory
https://cert.vde.com/en-us/advisories/vde-2018-002 Third Party Advisory
https://cert.vde.com/en-us/advisories/vde-2018-003 Third Party Advisory
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability Third Party Advisory
https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html Third Party Advisory
https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html Mailing List Third Party Advisory
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002 Patch Third Party Advisory Vendor Advisory
https://seclists.org/bugtraq/2019/Jun/36 Issue Tracking Mailing List Third Party Advisory
https://security.gentoo.org/glsa/201810-06 Third Party Advisory
https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html Third Party Advisory
https://security.netapp.com/advisory/ntap-20180104-0001/ Third Party Advisory
https://spectreattack.com/ Technical Description Third Party Advisory
https://support.citrix.com/article/CTX231399 Third Party Advisory
https://support.f5.com/csp/article/K91229003 Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us Third Party Advisory
https://support.lenovo.com/us/en/solutions/LEN-18282 Third Party Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel Third Party Advisory
https://usn.ubuntu.com/3540-1/ Third Party Advisory
https://usn.ubuntu.com/3540-2/ Third Party Advisory
https://usn.ubuntu.com/3541-1/ Third Party Advisory
https://usn.ubuntu.com/3541-2/ Third Party Advisory
https://usn.ubuntu.com/3542-1/ Third Party Advisory
https://usn.ubuntu.com/3542-2/ Third Party Advisory
https://usn.ubuntu.com/3549-1/ Third Party Advisory
https://usn.ubuntu.com/3580-1/ Third Party Advisory
https://usn.ubuntu.com/3597-1/ Third Party Advisory
https://usn.ubuntu.com/3597-2/ Third Party Advisory
https://usn.ubuntu.com/usn/usn-3516-1/ Third Party Advisory
https://www.debian.org/security/2018/dsa-4187 Third Party Advisory
https://www.debian.org/security/2018/dsa-4188 Third Party Advisory
https://www.exploit-db.com/exploits/43427/ Exploit Third Party Advisory VDB Entry
https://www.kb.cert.org/vuls/id/180049 Third Party Advisory US Government Resource
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001 Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html Patch Third Party Advisory
https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/ Third Party Advisory
https://www.synology.com/support/security/Synology_SA_18_01 Third Party Advisory
https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html Mailing List Third Party Advisory
http://nvidia.custhelp.com/app/answers/detail/a_id/4609 Third Party Advisory
http://nvidia.custhelp.com/app/answers/detail/a_id/4611 Third Party Advisory
http://nvidia.custhelp.com/app/answers/detail/a_id/4613 Third Party Advisory
http://nvidia.custhelp.com/app/answers/detail/a_id/4614 Third Party Advisory
http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html Exploit Third Party Advisory VDB Entry
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt Third Party Advisory
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt Third Party Advisory
http://www.kb.cert.org/vuls/id/584653 Third Party Advisory US Government Resource
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html Patch Third Party Advisory
http://www.securityfocus.com/bid/102371 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1040071 Third Party Advisory VDB Entry
http://xenbits.xen.org/xsa/advisory-254.html Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0292 Third Party Advisory
https://access.redhat.com/security/vulnerabilities/speculativeexecution Third Party Advisory
https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/ Third Party Advisory
https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/ Third Party Advisory
https://cdrdv2.intel.com/v1/dl/getContent/685359 Vendor Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf Third Party Advisory
https://cert.vde.com/en-us/advisories/vde-2018-002 Third Party Advisory
https://cert.vde.com/en-us/advisories/vde-2018-003 Third Party Advisory
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability Third Party Advisory
https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html Third Party Advisory
https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html Mailing List Third Party Advisory
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002 Patch Third Party Advisory Vendor Advisory
https://seclists.org/bugtraq/2019/Jun/36 Issue Tracking Mailing List Third Party Advisory
https://security.gentoo.org/glsa/201810-06 Third Party Advisory
https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html Third Party Advisory
https://security.netapp.com/advisory/ntap-20180104-0001/ Third Party Advisory
https://spectreattack.com/ Technical Description Third Party Advisory
https://support.citrix.com/article/CTX231399 Third Party Advisory
https://support.f5.com/csp/article/K91229003 Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us Third Party Advisory
https://support.lenovo.com/us/en/solutions/LEN-18282 Third Party Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel Third Party Advisory
https://usn.ubuntu.com/3540-1/ Third Party Advisory
https://usn.ubuntu.com/3540-2/ Third Party Advisory
https://usn.ubuntu.com/3541-1/ Third Party Advisory
https://usn.ubuntu.com/3541-2/ Third Party Advisory
https://usn.ubuntu.com/3542-1/ Third Party Advisory
https://usn.ubuntu.com/3542-2/ Third Party Advisory
https://usn.ubuntu.com/3549-1/ Third Party Advisory
https://usn.ubuntu.com/3580-1/ Third Party Advisory
https://usn.ubuntu.com/3597-1/ Third Party Advisory
https://usn.ubuntu.com/3597-2/ Third Party Advisory
https://usn.ubuntu.com/usn/usn-3516-1/ Third Party Advisory
https://www.debian.org/security/2018/dsa-4187 Third Party Advisory
https://www.debian.org/security/2018/dsa-4188 Third Party Advisory
https://www.exploit-db.com/exploits/43427/ Exploit Third Party Advisory VDB Entry
https://www.kb.cert.org/vuls/id/180049 Third Party Advisory US Government Resource
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001 Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html Patch Third Party Advisory
https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/ Third Party Advisory
https://www.synology.com/support/security/Synology_SA_18_01 Third Party Advisory
https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2316:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2338:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2350:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2358:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2508:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2516:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2518:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2530:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2538:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2550:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2558:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2718:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2730:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2738:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2750:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c2758:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x3:c3130:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x3:c3200rk:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x3:c3205rk:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x3:c3230rk:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x3:c3235rk:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x3:c3265rk:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x3:c3295rk:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x3:c3405:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x3:c3445:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3770d:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3775:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3775d:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3785:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3795:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j1750:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j1800:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j1850:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j1900:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j3060:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j3160:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j3355:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2805:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2806:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2807:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2808:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2810:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2815:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2820:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2830:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2840:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2910:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2920:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2930:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n2940:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n3000:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n3010:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n3050:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n3060:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n3150:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n3160:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n3350:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n4000:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n4100:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3450:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_m:5y10:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_m:5y10a:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_m:5y10c:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_m:5y31:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_m:5y51:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_m:5y70:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_m:5y71:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_m3:6y30:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_m3:7y30:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_m3:7y32:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_m5:6y54:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_m5:6y57:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_m7:6y75:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_j:j2850:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_j:j2900:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_j:j3710:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_j:j4205:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n:n3510:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n:n3520:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n:n3530:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n:n3540:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n:n3700:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n:n3710:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n:n4200:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5502:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5503:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5504:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5506:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5507:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5520:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5530:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5540:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5603:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5606:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5607:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5620:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5630:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5640:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5645:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e5649:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e6510:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e6540:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e7520:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e7530:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:e7540:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:ec5509:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:ec5539:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:ec5549:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:l3406:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:l3426:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:l5506:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:l5508:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:l5518:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:l5520:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:l5530:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:l5609:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:l5618:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:l5630:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:l5638:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:l5640:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:l7545:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:l7555:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:lc5518:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:lc5528:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:w3670:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:w3680:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:w3690:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:w5580:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:w5590:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x3430:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x3440:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x3450:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x3460:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x3470:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x3480:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x5550:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x5560:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x5570:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x5647:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x5650:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x5660:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x5667:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x5670:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x5672:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x5675:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x5677:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x5680:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x5687:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x5690:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x6550:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x7542:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x7550:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon:x7560:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e-1105c:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1505m_v6:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1515m_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1535m_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1535m_v6:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1545m_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1558l_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1565l_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1575m_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1578l_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1585_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1585l_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1105c_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1125c:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1125c_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1220:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1220_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1220_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_12201:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_12201_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1220l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1225:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1225_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1225_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1226_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1230:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1230_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1230_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1230l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1231_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1235:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1240:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1240_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1240_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1240l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1241_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1245:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1245_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1245_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1246_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1258l_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1260l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1265l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1265l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1265l_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1268l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1270:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1270_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1270_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1271_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1275:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1275_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1275_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1275l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1276_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1278l_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1280:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1280_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1280_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1281_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1285_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1285_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1285l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1285l_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1286_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1286l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1290:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1290_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1501l_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1501m_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1505l_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1505l_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1505m_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2650l_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2658:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2658_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2658_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2658_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2658a_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2660:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2660_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2660_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2660_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2665:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2667:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2667_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2667_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2667_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2670:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2670_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2670_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2680:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2680_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2680_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2680_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2683_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2683_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2687w:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2687w_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2687w_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2687w_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2690:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2690_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2690_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2690_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2695_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2695_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2695_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2697_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2697_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2697_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2697a_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2698_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2698_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2699_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2699_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2699a_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2699r_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4603:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4603_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4607:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4607_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4610:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4610_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4610_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4610_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4617:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4620:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4620_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4620_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4620_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4624l_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4627_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4627_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4627_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4628l_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4640:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4640_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4640_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4640_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4648_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4650:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4650_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4650_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4650_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4650l:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4655_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4655_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4657l_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4660_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4660_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4667_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4667_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4669_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4669_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1428l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1428l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1428l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1620:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1620_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1620_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1620_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1630_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1630_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1650:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1650_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1650_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1650_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1660:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1660_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1660_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1660_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1680_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1680_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2403:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2403_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2407:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2407_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2408l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2418l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2418l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2418l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2420:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2420_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2428l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2428l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2428l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2430:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2430_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2430l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2430l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2438l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2440:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2440_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2448l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2448l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2450:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2450_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2450l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2450l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2470:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2470_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2603:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2603_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2603_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2603_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2608l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2608l_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2609:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2609_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2609_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2609_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2618l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2618l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2618l_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2620:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2620_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2620_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2620_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2623_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2623_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2628l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2628l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2628l_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2630:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2630_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2630_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2630_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2630l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2630l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2630l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2630l_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2637:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2637_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2637_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2637_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2640:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2640_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2640_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2640_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2643:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2643_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2643_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2643_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2648l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2648l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2648l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2648l_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2650:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2650_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2650_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2650_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2650l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2650l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2650l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2803:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2820:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2830:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2850:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2850_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2860:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2870:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2870_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2880_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2890_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4807:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4809_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4809_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4809_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4820:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4820_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4820_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4820_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4830:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4830_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4830_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4830_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4850:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4850_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4850_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4850_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4860:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4860_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4870:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4870_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4880_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4890_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8830:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8837:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8850:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8850_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8857_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8860:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8860_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8860_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8867_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8867_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8867l:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8870:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8870_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8870_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8870_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8880_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8880_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8880_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8880l_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8880l_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8890_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8890_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8890_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8891_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8891_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8891_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8893_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8893_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8893_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8894_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:5118:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:5119t:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:5120:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:5120t:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:5122:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6126:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6126f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6126t:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6128:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6130:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6130f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6130t:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6132:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6134:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6134m:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6136:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6138:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6138f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6138t:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6140:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6140m:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6142:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6142f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6142m:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6144:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6146:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6148:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6148f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6150:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6152:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:6154:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_phi:7210:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_phi:7210f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_phi:7230:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_phi:7230f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_phi:7235:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_phi:7250:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_phi:7250f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_phi:7285:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_phi:7290:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_phi:7290f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_phi:7295:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:oracle:local_service_management_system:13.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:local_service_management_system:13.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:local_service_management_system:13.3:*:*:*:*:*:*:*
cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*
cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:a:synology:diskstation_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:synology:router_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*
cpe:2.3:a:synology:virtual_machine_manager:*:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:synology:vs960hd_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:synology:vs360hd_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:synology:vs360hd:-:*:*:*:*:*:*:*

Configuration 8 (hide)

OR cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux_enterprise_desktop:12:sp2:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux_enterprise_desktop:12:sp3:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp4:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp2:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp2:*:*:*:*:raspberry_pi:*
cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp3:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux_enterprise_software_development_kit:12:sp2:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux_enterprise_software_development_kit:12:sp3:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:arm:cortex-r7_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-r7:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:arm:cortex-r8_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-r8:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:arm:cortex-a8_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a8:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:arm:cortex-a9_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a9:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:arm:cortex-a12_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a12:-:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
cpe:2.3:o:arm:cortex-a15_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a15:-:*:*:*:*:*:*:*

Configuration 15 (hide)

AND
cpe:2.3:o:arm:cortex-a17_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a17:-:*:*:*:*:*:*:*

Configuration 16 (hide)

AND
cpe:2.3:o:arm:cortex-a57_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a57:-:*:*:*:*:*:*:*

Configuration 17 (hide)

AND
cpe:2.3:o:arm:cortex-a72_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a72:-:*:*:*:*:*:*:*

Configuration 18 (hide)

AND
cpe:2.3:o:arm:cortex-a73_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a73:-:*:*:*:*:*:*:*

Configuration 19 (hide)

AND
cpe:2.3:o:arm:cortex-a75_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a75:-:*:*:*:*:*:*:*

Configuration 20 (hide)

AND
cpe:2.3:o:arm:cortex-a76_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a76:-:*:*:*:*:*:*:*

Configuration 21 (hide)

cpe:2.3:a:pepperl-fuchs:visunet_rm_shell:-:*:*:*:*:*:*:*

Configuration 22 (hide)

AND
cpe:2.3:o:pepperl-fuchs:btc12_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:pepperl-fuchs:btc12:-:*:*:*:*:*:*:*

Configuration 23 (hide)

AND
cpe:2.3:o:pepperl-fuchs:btc14_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:pepperl-fuchs:btc14:-:*:*:*:*:*:*:*

Configuration 24 (hide)

OR cpe:2.3:a:netapp:hci:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*

Configuration 25 (hide)

AND
cpe:2.3:o:phoenixcontact:bl_ppc_1000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:bl_ppc_1000:-:*:*:*:*:*:*:*

Configuration 26 (hide)

AND
cpe:2.3:o:phoenixcontact:bl_ppc12_1000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:bl_ppc12_1000:-:*:*:*:*:*:*:*

Configuration 27 (hide)

AND
cpe:2.3:o:phoenixcontact:bl_ppc15_1000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:bl_ppc15_1000:-:*:*:*:*:*:*:*

Configuration 28 (hide)

AND
cpe:2.3:o:phoenixcontact:bl_ppc17_1000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:bl_ppc17_1000:-:*:*:*:*:*:*:*

Configuration 29 (hide)

AND
cpe:2.3:o:phoenixcontact:bl_bpc_2000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:bl_bpc_2000:-:*:*:*:*:*:*:*

Configuration 30 (hide)

AND
cpe:2.3:o:phoenixcontact:bl_bpc_2001_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:bl_bpc_2001:-:*:*:*:*:*:*:*

Configuration 31 (hide)

AND
cpe:2.3:o:phoenixcontact:bl_bpc_3000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:bl_bpc_3000:-:*:*:*:*:*:*:*

Configuration 32 (hide)

AND
cpe:2.3:o:phoenixcontact:bl_bpc_3001_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:bl_bpc_3001:-:*:*:*:*:*:*:*

Configuration 33 (hide)

AND
cpe:2.3:o:phoenixcontact:bl_ppc15_3000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:bl_ppc15_3000:-:*:*:*:*:*:*:*

Configuration 34 (hide)

AND
cpe:2.3:o:phoenixcontact:bl_ppc17_3000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:bl_ppc17_3000:-:*:*:*:*:*:*:*

Configuration 35 (hide)

AND
cpe:2.3:o:phoenixcontact:bl_bpc_7000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:bl_bpc_7000:-:*:*:*:*:*:*:*

Configuration 36 (hide)

AND
cpe:2.3:o:phoenixcontact:bl_bpc_7001_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:bl_bpc_7001:-:*:*:*:*:*:*:*

Configuration 37 (hide)

AND
cpe:2.3:o:phoenixcontact:bl_ppc_7000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:bl_ppc_7000:-:*:*:*:*:*:*:*

Configuration 38 (hide)

AND
cpe:2.3:o:phoenixcontact:bl_ppc15_7000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:bl_ppc15_7000:-:*:*:*:*:*:*:*

Configuration 39 (hide)

AND
cpe:2.3:o:phoenixcontact:bl_ppc17_7000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:bl_ppc17_7000:-:*:*:*:*:*:*:*

Configuration 40 (hide)

AND
cpe:2.3:o:phoenixcontact:bl_rackmount_2u_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:bl_rackmount_2u:-:*:*:*:*:*:*:*

Configuration 41 (hide)

AND
cpe:2.3:o:phoenixcontact:bl_rackmount_4u_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:bl_rackmount_4u:-:*:*:*:*:*:*:*

Configuration 42 (hide)

AND
cpe:2.3:o:phoenixcontact:bl2_bpc_1000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:bl2_bpc_1000:-:*:*:*:*:*:*:*

Configuration 43 (hide)

AND
cpe:2.3:o:phoenixcontact:bl2_ppc_1000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:bl2_ppc_1000:-:*:*:*:*:*:*:*

Configuration 44 (hide)

AND
cpe:2.3:o:phoenixcontact:bl2_bpc_2000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:bl2_bpc_2000:-:*:*:*:*:*:*:*

Configuration 45 (hide)

AND
cpe:2.3:o:phoenixcontact:bl2_ppc_2000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:bl2_ppc_2000:-:*:*:*:*:*:*:*

Configuration 46 (hide)

AND
cpe:2.3:o:phoenixcontact:bl2_bpc_7000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:bl2_bpc_7000:-:*:*:*:*:*:*:*

Configuration 47 (hide)

AND
cpe:2.3:o:phoenixcontact:bl2_ppc_7000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:bl2_ppc_7000:-:*:*:*:*:*:*:*

Configuration 48 (hide)

AND
cpe:2.3:o:phoenixcontact:dl_ppc15_1000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:dl_ppc15_1000:-:*:*:*:*:*:*:*

Configuration 49 (hide)

AND
cpe:2.3:o:phoenixcontact:dl_ppc15m_7000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:dl_ppc15m_7000:-:*:*:*:*:*:*:*

Configuration 50 (hide)

AND
cpe:2.3:o:phoenixcontact:dl_ppc18.5m_7000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:dl_ppc18.5m_7000:-:*:*:*:*:*:*:*

Configuration 51 (hide)

AND
cpe:2.3:o:phoenixcontact:dl_ppc21.5m_7000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:dl_ppc21.5m_7000:-:*:*:*:*:*:*:*

Configuration 52 (hide)

AND
cpe:2.3:o:phoenixcontact:el_ppc_1000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:el_ppc_1000:-:*:*:*:*:*:*:*

Configuration 53 (hide)

AND
cpe:2.3:o:phoenixcontact:el_ppc_1000\/wt_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:el_ppc_1000\/wt:-:*:*:*:*:*:*:*

Configuration 54 (hide)

AND
cpe:2.3:o:phoenixcontact:el_ppc_1000\/m_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:el_ppc_1000\/m:-:*:*:*:*:*:*:*

Configuration 55 (hide)

AND
cpe:2.3:o:phoenixcontact:valueline_ipc_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:valueline_ipc:-:*:*:*:*:*:*:*

Configuration 56 (hide)

AND
cpe:2.3:o:phoenixcontact:vl_bpc_1000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:vl_bpc_1000:-:*:*:*:*:*:*:*

Configuration 57 (hide)

AND
cpe:2.3:o:phoenixcontact:vl_bpc_2000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:vl_bpc_2000:-:*:*:*:*:*:*:*

Configuration 58 (hide)

AND
cpe:2.3:o:phoenixcontact:vl_ppc_2000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:vl_ppc_2000:-:*:*:*:*:*:*:*

Configuration 59 (hide)

AND
cpe:2.3:o:phoenixcontact:vl_bpc_3000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:vl_bpc_3000:-:*:*:*:*:*:*:*

Configuration 60 (hide)

AND
cpe:2.3:o:phoenixcontact:vl_ppc_3000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:vl_ppc_3000:-:*:*:*:*:*:*:*

Configuration 61 (hide)

AND
cpe:2.3:o:phoenixcontact:vl_ipc_p7000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:vl_ipc_p7000:-:*:*:*:*:*:*:*

Configuration 62 (hide)

AND
cpe:2.3:o:phoenixcontact:vl2_bpc_1000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:vl2_bpc_1000:-:*:*:*:*:*:*:*

Configuration 63 (hide)

AND
cpe:2.3:o:phoenixcontact:vl2_ppc_1000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:vl2_ppc_1000:-:*:*:*:*:*:*:*

Configuration 64 (hide)

AND
cpe:2.3:o:phoenixcontact:vl2_bpc_2000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:vl2_bpc_2000:-:*:*:*:*:*:*:*

Configuration 65 (hide)

AND
cpe:2.3:o:phoenixcontact:vl2_ppc_2000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:vl2_ppc_2000:-:*:*:*:*:*:*:*

Configuration 66 (hide)

AND
cpe:2.3:o:phoenixcontact:vl2_bpc_3000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:vl2_bpc_3000:-:*:*:*:*:*:*:*

Configuration 67 (hide)

AND
cpe:2.3:o:phoenixcontact:vl2_ppc_3000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:vl2_ppc_3000:-:*:*:*:*:*:*:*

Configuration 68 (hide)

AND
cpe:2.3:o:phoenixcontact:vl2_bpc_7000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:vl2_bpc_7000:-:*:*:*:*:*:*:*

Configuration 69 (hide)

AND
cpe:2.3:o:phoenixcontact:vl2_ppc_7000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:vl2_ppc_7000:-:*:*:*:*:*:*:*

Configuration 70 (hide)

AND
cpe:2.3:o:phoenixcontact:vl2_bpc_9000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:vl2_bpc_9000:-:*:*:*:*:*:*:*

Configuration 71 (hide)

AND
cpe:2.3:o:phoenixcontact:vl2_ppc_9000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:vl2_ppc_9000:-:*:*:*:*:*:*:*

Configuration 72 (hide)

AND
cpe:2.3:o:phoenixcontact:vl2_ppc7_1000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:vl2_ppc7_1000:-:*:*:*:*:*:*:*

Configuration 73 (hide)

AND
cpe:2.3:o:phoenixcontact:vl2_ppc9_1000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:vl2_ppc9_1000:-:*:*:*:*:*:*:*

Configuration 74 (hide)

AND
cpe:2.3:o:phoenixcontact:vl2_ppc12_1000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:vl2_ppc12_1000:-:*:*:*:*:*:*:*

Configuration 75 (hide)

AND
cpe:2.3:o:siemens:simatic_itc1500_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_itc1500:v3:*:*:*:*:*:*:*

Configuration 76 (hide)

AND
cpe:2.3:o:siemens:simatic_itc1500_pro_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_itc1500_pro:v3:*:*:*:*:*:*:*

Configuration 77 (hide)

AND
cpe:2.3:o:siemens:simatic_itc1900_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_itc1900:v3:*:*:*:*:*:*:*

Configuration 78 (hide)

AND
cpe:2.3:o:siemens:simatic_itc1900_pro_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_itc1900_pro:v3:*:*:*:*:*:*:*

Configuration 79 (hide)

AND
cpe:2.3:o:siemens:simatic_itc2200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_itc2200:v3:*:*:*:*:*:*:*

Configuration 80 (hide)

AND
cpe:2.3:o:siemens:simatic_itc2200_pro_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_itc2200_pro:v3:*:*:*:*:*:*:*

Configuration 81 (hide)

AND
OR cpe:2.3:o:siemens:simatic_winac_rtx_\(f\)_2010_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:siemens:simatic_winac_rtx_\(f\)_2010_firmware:2010:-:*:*:*:*:*:*
cpe:2.3:o:siemens:simatic_winac_rtx_\(f\)_2010_firmware:2010:sp1:*:*:*:*:*:*
cpe:2.3:o:siemens:simatic_winac_rtx_\(f\)_2010_firmware:2010:sp2:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_winac_rtx_\(f\)_2010:-:*:*:*:*:*:*:*

Configuration 82 (hide)

OR cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:-:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201312101:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201312102:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201312401:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201312402:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201403101:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201403102:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201403201:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201403202:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201403203:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201403204:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201403205:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201403206:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201403207:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201403208:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201403209:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201403210:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201403211:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201404401:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201404402:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201404403:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201404420:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201406401:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201407101:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201407102:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201407401:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201407402:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201407403:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201407404:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201407405:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201409101:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201409201:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201409202:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201409203:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201409204:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201409205:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201409206:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201409207:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201410101:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201410401:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201410402:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201410403:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201410404:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201410405:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201410406:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201501101:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201501401:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201501402:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201501403:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201501404:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201501405:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201502401:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201504201:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201505101:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201505401:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201505402:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201505403:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201505404:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201509101:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201509102:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201509201:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201509202:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201509203:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201509204:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201509205:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201509206:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201509207:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201509208:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201509209:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201509210:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201509211:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201509212:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201509213:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201510401:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201512101:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201512102:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201512401:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201512402:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201512403:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201512404:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201601401:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201602401:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201608101:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201608102:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201608401:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201608402:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201608403:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201608404:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201608405:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201609101:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201609102:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201609401:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201609402:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201609403:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201612101:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201612102:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201612401:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201612402:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201703401:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201709101:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201709102:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201709103:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201709401:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201709402:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:5.5.0:550-201709403:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:-:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201504401:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201505401:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201507101:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201507102:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201507401:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201507402:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201507403:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201507404:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201507405:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201507406:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201507407:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201509101:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201509102:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201509201:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201509202:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201509203:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201509204:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201509205:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201509206:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201509207:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201509208:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201509209:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201509210:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201510401:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201511401:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201601101:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201601102:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201601401:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201601402:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201601403:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201601404:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201601405:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201602401:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201603101:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201603102:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201603201:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201603202:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201603203:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201603204:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201603205:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201603206:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201603207:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201603208:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201605401:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201608101:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201608401:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201608402:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201608403:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201608404:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201608405:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201610410:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201611401:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201611402:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201611403:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201702101:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201702102:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201702201:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201702202:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201702203:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201702204:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201702205:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201702206:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201702207:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201702208:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201702209:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201702210:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201702211:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201702212:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201703401:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201706101:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201706102:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201706103:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201706401:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201706402:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201706403:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.0:600-201710301:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*

Configuration 83 (hide)

AND
cpe:2.3:o:arm:cortex-a77_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a77:-:*:*:*:*:*:*:*

Configuration 84 (hide)

AND
cpe:2.3:o:arm:cortex-a78_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a78:-:*:*:*:*:*:*:*

Configuration 85 (hide)

AND
cpe:2.3:o:arm:cortex-a78ae_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a78ae:-:*:*:*:*:*:*:*

Configuration 86 (hide)

AND
cpe:2.3:o:arm:neoverse_n1_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:neoverse_n1:-:*:*:*:*:*:*:*

Configuration 87 (hide)

AND
cpe:2.3:o:arm:neoverse_n2_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:neoverse_n2:-:*:*:*:*:*:*:*

Configuration 88 (hide)

AND
cpe:2.3:o:arm:cortex-x1_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-x1:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:28

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html - Mailing List, Third Party Advisory
References () http://nvidia.custhelp.com/app/answers/detail/a_id/4609 - Third Party Advisory () http://nvidia.custhelp.com/app/answers/detail/a_id/4609 - Third Party Advisory
References () http://nvidia.custhelp.com/app/answers/detail/a_id/4611 - Third Party Advisory () http://nvidia.custhelp.com/app/answers/detail/a_id/4611 - Third Party Advisory
References () http://nvidia.custhelp.com/app/answers/detail/a_id/4613 - Third Party Advisory () http://nvidia.custhelp.com/app/answers/detail/a_id/4613 - Third Party Advisory
References () http://nvidia.custhelp.com/app/answers/detail/a_id/4614 - Third Party Advisory () http://nvidia.custhelp.com/app/answers/detail/a_id/4614 - Third Party Advisory
References () http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html - Exploit, Third Party Advisory, VDB Entry
References () http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt - Third Party Advisory () http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt - Third Party Advisory
References () http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt - Third Party Advisory () http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt - Third Party Advisory
References () http://www.kb.cert.org/vuls/id/584653 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/584653 - Third Party Advisory, US Government Resource
References () http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html - Third Party Advisory, Patch () http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html - Patch, Third Party Advisory
References () http://www.securityfocus.com/bid/102371 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/102371 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1040071 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1040071 - Third Party Advisory, VDB Entry
References () http://xenbits.xen.org/xsa/advisory-254.html - Third Party Advisory () http://xenbits.xen.org/xsa/advisory-254.html - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:0292 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:0292 - Third Party Advisory
References () https://access.redhat.com/security/vulnerabilities/speculativeexecution - Third Party Advisory () https://access.redhat.com/security/vulnerabilities/speculativeexecution - Third Party Advisory
References () https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/ - Third Party Advisory () https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/ - Third Party Advisory
References () https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/ - Third Party Advisory () https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/ - Third Party Advisory
References () https://cdrdv2.intel.com/v1/dl/getContent/685359 - Vendor Advisory () https://cdrdv2.intel.com/v1/dl/getContent/685359 - Vendor Advisory
References () https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf - Third Party Advisory () https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf - Third Party Advisory
References () https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf - Third Party Advisory () https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf - Third Party Advisory
References () https://cert.vde.com/en-us/advisories/vde-2018-002 - Third Party Advisory () https://cert.vde.com/en-us/advisories/vde-2018-002 - Third Party Advisory
References () https://cert.vde.com/en-us/advisories/vde-2018-003 - Third Party Advisory () https://cert.vde.com/en-us/advisories/vde-2018-003 - Third Party Advisory
References () https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability - Third Party Advisory () https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability - Third Party Advisory
References () https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html - Third Party Advisory () https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html - Third Party Advisory
References () https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes - Third Party Advisory () https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html - Mailing List, Third Party Advisory
References () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002 - Patch, Third Party Advisory, Vendor Advisory () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002 - Patch, Third Party Advisory, Vendor Advisory
References () https://seclists.org/bugtraq/2019/Jun/36 - Issue Tracking, Mailing List, Third Party Advisory () https://seclists.org/bugtraq/2019/Jun/36 - Issue Tracking, Mailing List, Third Party Advisory
References () https://security.gentoo.org/glsa/201810-06 - Third Party Advisory () https://security.gentoo.org/glsa/201810-06 - Third Party Advisory
References () https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html - Third Party Advisory () https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20180104-0001/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20180104-0001/ - Third Party Advisory
References () https://spectreattack.com/ - Technical Description, Third Party Advisory () https://spectreattack.com/ - Technical Description, Third Party Advisory
References () https://support.citrix.com/article/CTX231399 - Third Party Advisory () https://support.citrix.com/article/CTX231399 - Third Party Advisory
References () https://support.f5.com/csp/article/K91229003 - Third Party Advisory () https://support.f5.com/csp/article/K91229003 - Third Party Advisory
References () https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us - Third Party Advisory () https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us - Third Party Advisory
References () https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us - Third Party Advisory () https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us - Third Party Advisory
References () https://support.lenovo.com/us/en/solutions/LEN-18282 - Third Party Advisory () https://support.lenovo.com/us/en/solutions/LEN-18282 - Third Party Advisory
References () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel - Third Party Advisory () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel - Third Party Advisory
References () https://usn.ubuntu.com/3540-1/ - Third Party Advisory () https://usn.ubuntu.com/3540-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3540-2/ - Third Party Advisory () https://usn.ubuntu.com/3540-2/ - Third Party Advisory
References () https://usn.ubuntu.com/3541-1/ - Third Party Advisory () https://usn.ubuntu.com/3541-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3541-2/ - Third Party Advisory () https://usn.ubuntu.com/3541-2/ - Third Party Advisory
References () https://usn.ubuntu.com/3542-1/ - Third Party Advisory () https://usn.ubuntu.com/3542-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3542-2/ - Third Party Advisory () https://usn.ubuntu.com/3542-2/ - Third Party Advisory
References () https://usn.ubuntu.com/3549-1/ - Third Party Advisory () https://usn.ubuntu.com/3549-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3580-1/ - Third Party Advisory () https://usn.ubuntu.com/3580-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3597-1/ - Third Party Advisory () https://usn.ubuntu.com/3597-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3597-2/ - Third Party Advisory () https://usn.ubuntu.com/3597-2/ - Third Party Advisory
References () https://usn.ubuntu.com/usn/usn-3516-1/ - Third Party Advisory () https://usn.ubuntu.com/usn/usn-3516-1/ - Third Party Advisory
References () https://www.debian.org/security/2018/dsa-4187 - Third Party Advisory () https://www.debian.org/security/2018/dsa-4187 - Third Party Advisory
References () https://www.debian.org/security/2018/dsa-4188 - Third Party Advisory () https://www.debian.org/security/2018/dsa-4188 - Third Party Advisory
References () https://www.exploit-db.com/exploits/43427/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/43427/ - Exploit, Third Party Advisory, VDB Entry
References () https://www.kb.cert.org/vuls/id/180049 - Third Party Advisory, US Government Resource () https://www.kb.cert.org/vuls/id/180049 - Third Party Advisory, US Government Resource
References () https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001 - Third Party Advisory () https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001 - Third Party Advisory
References () https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html - Third Party Advisory, Patch () https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html - Patch, Third Party Advisory
References () https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/ - Third Party Advisory () https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/ - Third Party Advisory
References () https://www.synology.com/support/security/Synology_SA_18_01 - Third Party Advisory () https://www.synology.com/support/security/Synology_SA_18_01 - Third Party Advisory
References () https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html - Third Party Advisory () https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html - Third Party Advisory

23 Nov 2021, 22:14

Type Values Removed Values Added
References (CONFIRM) https://cdrdv2.intel.com/v1/dl/getContent/685359 - (CONFIRM) https://cdrdv2.intel.com/v1/dl/getContent/685359 - Vendor Advisory

19 Nov 2021, 18:15

Type Values Removed Values Added
References
  • {'url': 'https://01.org/security/advisories/intel-oss-10002', 'name': 'https://01.org/security/advisories/intel-oss-10002', 'tags': ['Vendor Advisory'], 'refsource': 'CONFIRM'}
  • (CONFIRM) https://cdrdv2.intel.com/v1/dl/getContent/685359 -

24 Jun 2021, 17:43

Type Values Removed Values Added
CPE cpe:2.3:o:arm:cortex-a_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:arm:cortex-r_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-r:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a9:-:*:*:*:*:*:*:*
cpe:2.3:o:arm:cortex-r8_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a77:-:*:*:*:*:*:*:*
cpe:2.3:o:arm:cortex-a76_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a15:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a12:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a8:-:*:*:*:*:*:*:*
cpe:2.3:o:arm:cortex-a8_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a75:-:*:*:*:*:*:*:*
cpe:2.3:o:arm:neoverse_n1_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:arm:cortex-a57_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:arm:cortex-a78ae_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-r7:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a57:-:*:*:*:*:*:*:*
cpe:2.3:o:arm:cortex-a77_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a73:-:*:*:*:*:*:*:*
cpe:2.3:o:arm:cortex-a75_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:arm:cortex-a73_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:arm:cortex-a17_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:arm:cortex-a78_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:arm:cortex-a72_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a17:-:*:*:*:*:*:*:*
cpe:2.3:o:arm:neoverse_n2_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-x1:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a76:-:*:*:*:*:*:*:*
cpe:2.3:o:arm:cortex-a9_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:neoverse_n2:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a78ae:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a78:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:neoverse_n1:-:*:*:*:*:*:*:*
cpe:2.3:o:arm:cortex-r7_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a72:-:*:*:*:*:*:*:*
cpe:2.3:o:arm:cortex-x1_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:arm:cortex-a15_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:arm:cortex-a12_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-r8:-:*:*:*:*:*:*:*
References (CONFIRM) http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html - Third Party Advisory (CONFIRM) http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html - Third Party Advisory, Patch
References (MISC) https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html - Third Party Advisory (MISC) https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html - Third Party Advisory, Patch

Information

Published : 2018-01-04 13:29

Updated : 2024-11-21 03:28


NVD link : CVE-2017-5753

Mitre link : CVE-2017-5753

CVE.ORG link : CVE-2017-5753


JSON object : View

Products Affected

intel

  • xeon_e5_2643
  • xeon_e3_1285_v6
  • xeon_e7
  • xeon_e5_2428l_v3
  • xeon_e5_1620_v3
  • xeon_e5_2648l_v2
  • xeon_e3_1505m_v5
  • xeon_e5_1680_v3
  • xeon_e3_1226_v3
  • pentium_j
  • xeon_e3_1501m_v6
  • xeon_e5_2403
  • xeon_e5_2428l_v2
  • xeon_e5_2650_v3
  • xeon_e3_1275_v6
  • core_m
  • xeon_platinum
  • core_i7
  • xeon_e5_2628l_v3
  • xeon_e5_2650l_v3
  • xeon_e5_2420
  • xeon_e3_1505l_v5
  • xeon_e5_2630_v4
  • xeon_e3_1265l_v3
  • xeon_e5_1620_v4
  • xeon_e3_1285_v4
  • xeon_e5_2630
  • xeon_e5_1680_v4
  • xeon_e3_1240l_v5
  • xeon_e5_2418l_v2
  • xeon_e3_1235
  • xeon_e3_1285l_v4
  • xeon_e5_2650l
  • xeon_e5_2628l_v2
  • xeon_e5_2430_v2
  • pentium_n
  • xeon_e5_1650_v2
  • xeon_e5_2440_v2
  • xeon_e5_2643_v4
  • xeon_e5_2430l
  • core_i5
  • xeon_e3_1270_v2
  • atom_x3
  • xeon_e5_2637_v4
  • xeon_phi
  • xeon_e5_2650l_v2
  • xeon_e5_1630_v4
  • xeon_e5_2438l_v3
  • xeon_e3_1225
  • xeon_e5_2650_v2
  • xeon_e3_1276_v3
  • xeon_e5_2643_v3
  • xeon_e5_2609_v4
  • xeon_e5_2470
  • xeon_e5_1428l
  • xeon_e3_1225_v3
  • xeon_e5_2440
  • xeon_e5_2608l_v3
  • xeon_e3_1275_v2
  • xeon_e5_2640_v3
  • xeon_e5_2620_v4
  • celeron_n
  • xeon_e5_2603_v3
  • xeon_e5_2430l_v2
  • xeon_e5_1630_v3
  • xeon_gold
  • xeon_e3_1271_v3
  • xeon_e3_1220_v5
  • xeon_e5_2650
  • xeon_e3_1278l_v4
  • xeon
  • xeon_e5_1428l_v3
  • atom_c
  • xeon_e5_1620
  • xeon_e3_1240_v6
  • xeon_e5_2628l_v4
  • xeon_e3_1105c_v2
  • xeon_e5_2618l_v2
  • xeon_e5_2618l_v4
  • core_m7
  • xeon_e5_2637_v3
  • xeon_e3_1125c
  • xeon_e5_2648l
  • xeon_e3_1245
  • xeon_e5_2603
  • xeon_e3_1286_v3
  • celeron_j
  • xeon_e3_1270_v3
  • xeon_e3_1125c_v2
  • xeon_e5_1660
  • xeon_e5_1620_v2
  • xeon_e5
  • xeon_e3_1230_v6
  • xeon_e5_2418l
  • xeon_e3_1235l_v5
  • xeon_e5_2630l
  • xeon_e3_1258l_v4
  • xeon_e3_1268l_v3
  • xeon_e3_1220_v6
  • xeon_e3_1245_v5
  • xeon_bronze_3104
  • xeon_e5_2640
  • xeon_e3_1280_v5
  • xeon_e3_1240_v2
  • xeon_e3_1285_v3
  • xeon_e3_1260l
  • xeon_e3_1505l_v6
  • xeon_e3_1230_v5
  • xeon_e3_1231_v3
  • xeon_e3_1280_v2
  • atom_e
  • xeon_e5_2470_v2
  • atom_x5-e3930
  • xeon_e3_1270
  • xeon_e5_2637
  • xeon_e5_2650_v4
  • xeon_e5_2428l
  • xeon_e3_1225_v2
  • xeon_e3_1245_v6
  • xeon_e5_1650_v3
  • xeon_e3_1225_v6
  • xeon_e3_1220l_v3
  • xeon_e5_2630_v2
  • xeon_e3_1281_v3
  • xeon_e5_2620
  • atom_x5-e3940
  • xeon_e3_1265l_v4
  • core_m5
  • xeon_e5_2620_v3
  • xeon_e3_1240_v5
  • xeon_e3_12201
  • xeon_e3_1240_v3
  • xeon_e3_1265l_v2
  • xeon_e3_1230l_v3
  • xeon_e3_1246_v3
  • xeon_e5_2450l
  • xeon_e5_2648l_v4
  • xeon_e5_2408l_v3
  • xeon_e3_1290_v2
  • xeon_e5_2618l_v3
  • xeon_e5_2630l_v2
  • xeon_e3_1286l_v3
  • xeon_e5_2609
  • xeon_e5_2430
  • xeon_e3_1245_v3
  • core_i3
  • xeon_e3_1245_v2
  • xeon_e5_2623_v3
  • xeon_e5_2643_v2
  • xeon_e5_2623_v4
  • xeon_e3_1275_v5
  • xeon_e5_2630l_v4
  • xeon_e3_1285l_v3
  • xeon_e3_1270_v6
  • xeon_e-1105c
  • xeon_bronze_3106
  • xeon_e5_2420_v2
  • xeon_silver
  • xeon_e5_2407
  • xeon_e5_2403_v2
  • xeon_e3_1220_v3
  • xeon_e5_2450l_v2
  • xeon_e3
  • xeon_e5_2407_v2
  • xeon_e3_1230_v3
  • xeon_e5_2608l_v4
  • xeon_e5_1660_v2
  • xeon_e5_2648l_v3
  • xeon_e3_1268l_v5
  • xeon_e3_1240l_v3
  • xeon_e5_1660_v3
  • xeon_e3_1275_v3
  • xeon_e5_1650
  • xeon_e5_1650_v4
  • xeon_e3_1290
  • xeon_e3_1220_v2
  • xeon_e5_2637_v2
  • xeon_e5_1428l_v2
  • xeon_e5_2450_v2
  • xeon_e5_2603_v4
  • xeon_e3_1230
  • xeon_e5_2630_v3
  • xeon_e5_2609_v3
  • xeon_e3_1240
  • xeon_e3_1501l_v6
  • core_m3
  • xeon_e3_1280_v3
  • xeon_e5_2640_v4
  • xeon_e3_1275l_v3
  • xeon_e3_1241_v3
  • xeon_e5_2448l_v2
  • xeon_e3_1270_v5
  • xeon_e5_2418l_v3
  • xeon_e3_1280
  • xeon_e5_2640_v2
  • atom_x7-e3950
  • xeon_e5_2603_v2
  • xeon_e5_2630l_v3
  • atom_z
  • xeon_e5_2620_v2
  • xeon_e3_1280_v6
  • xeon_e5_2450
  • xeon_e3_1220
  • xeon_e5_1660_v4
  • xeon_e3_1275
  • xeon_e3_1230_v2
  • xeon_e5_2609_v2
  • xeon_e3_1260l_v5
  • xeon_e3_12201_v2
  • xeon_e3_1225_v5
  • xeon_e5_2448l

siemens

  • simatic_itc1500
  • simatic_itc1900_pro_firmware
  • simatic_itc1500_pro
  • simatic_itc1900_firmware
  • simatic_itc1900_pro
  • simatic_itc2200
  • simatic_itc2200_pro
  • simatic_itc2200_firmware
  • simatic_winac_rtx_\(f\)_2010_firmware
  • simatic_winac_rtx_\(f\)_2010
  • simatic_itc2200_pro_firmware
  • simatic_itc1500_pro_firmware
  • simatic_itc1900
  • simatic_itc1500_firmware

arm

  • cortex-r8_firmware
  • cortex-a8_firmware
  • cortex-a72_firmware
  • cortex-a75
  • cortex-a9
  • cortex-a76_firmware
  • cortex-r7
  • cortex-a12
  • cortex-a73_firmware
  • cortex-a78ae_firmware
  • cortex-a72
  • neoverse_n2
  • cortex-a15_firmware
  • cortex-a73
  • cortex-a17_firmware
  • cortex-a12_firmware
  • cortex-a77
  • cortex-a78ae
  • neoverse_n2_firmware
  • cortex-a17
  • cortex-a76
  • cortex-a15
  • neoverse_n1
  • cortex-a75_firmware
  • cortex-a77_firmware
  • cortex-r8
  • cortex-a57
  • cortex-a8
  • cortex-r7_firmware
  • cortex-x1
  • neoverse_n1_firmware
  • cortex-a78_firmware
  • cortex-x1_firmware
  • cortex-a78
  • cortex-a9_firmware
  • cortex-a57_firmware

phoenixcontact

  • vl_bpc_2000_firmware
  • vl2_bpc_7000_firmware
  • bl_bpc_2000
  • el_ppc_1000\/m_firmware
  • vl2_ppc9_1000
  • vl2_ppc_2000_firmware
  • bl2_bpc_1000_firmware
  • bl2_bpc_1000
  • bl_ppc17_7000
  • valueline_ipc_firmware
  • vl_ipc_p7000
  • bl_ppc12_1000
  • vl2_ppc_3000_firmware
  • bl2_bpc_2000
  • bl_ppc_1000
  • bl_ppc17_1000
  • vl2_ppc_7000
  • vl2_ppc7_1000
  • dl_ppc21.5m_7000_firmware
  • bl2_ppc_1000_firmware
  • vl_bpc_1000_firmware
  • bl2_bpc_7000_firmware
  • dl_ppc18.5m_7000_firmware
  • bl_rackmount_2u_firmware
  • bl_ppc12_1000_firmware
  • el_ppc_1000\/wt_firmware
  • dl_ppc15_1000
  • bl_ppc15_7000
  • dl_ppc15m_7000_firmware
  • vl_ppc_2000
  • dl_ppc18.5m_7000
  • bl_ppc15_1000
  • vl2_ppc_9000
  • bl_ppc15_1000_firmware
  • el_ppc_1000\/m
  • bl_bpc_7000_firmware
  • bl_ppc_1000_firmware
  • bl2_bpc_7000
  • bl_ppc17_1000_firmware
  • bl2_ppc_2000_firmware
  • el_ppc_1000\/wt
  • el_ppc_1000_firmware
  • bl_bpc_3001_firmware
  • bl2_ppc_7000
  • vl2_ppc_1000
  • vl_bpc_3000_firmware
  • dl_ppc15_1000_firmware
  • bl_rackmount_4u
  • bl2_ppc_1000
  • el_ppc_1000
  • vl2_bpc_1000
  • bl_bpc_7001
  • vl2_ppc_9000_firmware
  • vl_ppc_3000
  • vl_ppc_2000_firmware
  • dl_ppc21.5m_7000
  • vl2_ppc_2000
  • vl2_ppc9_1000_firmware
  • vl2_bpc_2000
  • bl_ppc15_7000_firmware
  • vl2_ppc12_1000
  • bl_ppc15_3000
  • vl2_ppc_3000
  • vl_bpc_1000
  • bl_ppc17_7000_firmware
  • vl2_bpc_2000_firmware
  • bl_bpc_3000
  • bl2_ppc_7000_firmware
  • dl_ppc15m_7000
  • bl_ppc_7000
  • vl_bpc_3000
  • vl2_bpc_7000
  • vl2_bpc_3000
  • bl_ppc_7000_firmware
  • bl_rackmount_4u_firmware
  • vl2_ppc_7000_firmware
  • vl_ppc_3000_firmware
  • vl_ipc_p7000_firmware
  • bl_ppc17_3000
  • bl_bpc_3000_firmware
  • valueline_ipc
  • bl_bpc_7001_firmware
  • bl_bpc_2000_firmware
  • bl_bpc_7000
  • vl2_ppc_1000_firmware
  • bl_ppc15_3000_firmware
  • vl2_bpc_9000_firmware
  • vl2_ppc12_1000_firmware
  • vl2_bpc_9000
  • bl_rackmount_2u
  • vl_bpc_2000
  • vl2_bpc_3000_firmware
  • bl_bpc_2001_firmware
  • bl_bpc_2001
  • bl2_bpc_2000_firmware
  • bl_bpc_3001
  • bl2_ppc_2000
  • vl2_ppc7_1000_firmware
  • bl_ppc17_3000_firmware
  • vl2_bpc_1000_firmware

pepperl-fuchs

  • visunet_rm_shell
  • btc14_firmware
  • btc12
  • btc12_firmware
  • btc14

netapp

  • hci
  • solidfire

synology

  • virtual_machine_manager
  • vs360hd
  • vs960hd
  • diskstation_manager
  • vs360hd_firmware
  • vs960hd_firmware
  • skynas
  • router_manager

vmware

  • esxi
  • fusion
  • workstation

opensuse

  • leap

suse

  • suse_linux_enterprise_software_development_kit
  • suse_linux_enterprise_server
  • suse_linux_enterprise_desktop

oracle

  • solaris
  • local_service_management_system

debian

  • debian_linux

canonical

  • ubuntu_linux
CWE
CWE-203

Observable Discrepancy