CVE-2018-3639

Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html Broken Link
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html Broken Link
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html Broken Link
http://support.lenovo.com/us/en/solutions/LEN-22133 Third Party Advisory
http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html Third Party Advisory
http://www.openwall.com/lists/oss-security/2020/06/10/1 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2020/06/10/2 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2020/06/10/5 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/104232 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1040949 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1042004 Third Party Advisory VDB Entry
http://xenbits.xen.org/xsa/advisory-263.html Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1629 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1630 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1632 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1633 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1635 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1636 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1637 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1638 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1639 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1640 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1641 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1642 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1643 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1644 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1645 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1646 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1647 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1648 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1649 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1650 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1651 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1652 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1653 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1654 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1655 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1656 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1657 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1658 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1659 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1660 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1661 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1662 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1663 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1664 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1665 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1666 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1667 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1668 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1669 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1674 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1675 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1676 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1686 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1688 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1689 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1690 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1696 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1710 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1711 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1737 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1738 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1826 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1854 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1965 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1967 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1997 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2001 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2003 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2006 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2060 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2161 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2162 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2164 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2171 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2172 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2216 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2228 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2246 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2250 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2258 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2289 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2309 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2328 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2363 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2364 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2387 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2394 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2396 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2948 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3396 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3397 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3398 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3399 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3400 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3401 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3402 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3407 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3423 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3424 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3425 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0148 Broken Link
https://access.redhat.com/errata/RHSA-2019:1046 Third Party Advisory
https://bugs.chromium.org/p/project-zero/issues/detail?id=1528 Exploit Issue Tracking Patch Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf Third Party Advisory
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability Third Party Advisory
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html Mailing List Third Party Advisory
https://nvidia.custhelp.com/app/answers/detail/a_id/4787 Third Party Advisory
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012 Patch Third Party Advisory Vendor Advisory
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004 Third Party Advisory
https://seclists.org/bugtraq/2019/Jun/36 Issue Tracking Mailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20180521-0001/ Third Party Advisory
https://support.citrix.com/article/CTX235225 Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03850en_us Third Party Advisory
https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html Third Party Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel Third Party Advisory
https://usn.ubuntu.com/3651-1/ Third Party Advisory
https://usn.ubuntu.com/3652-1/ Third Party Advisory
https://usn.ubuntu.com/3653-1/ Third Party Advisory
https://usn.ubuntu.com/3653-2/ Third Party Advisory
https://usn.ubuntu.com/3654-1/ Third Party Advisory
https://usn.ubuntu.com/3654-2/ Third Party Advisory
https://usn.ubuntu.com/3655-1/ Third Party Advisory
https://usn.ubuntu.com/3655-2/ Third Party Advisory
https://usn.ubuntu.com/3679-1/ Third Party Advisory
https://usn.ubuntu.com/3680-1/ Third Party Advisory
https://usn.ubuntu.com/3756-1/ Third Party Advisory
https://usn.ubuntu.com/3777-3/ Third Party Advisory
https://www.debian.org/security/2018/dsa-4210 Third Party Advisory
https://www.debian.org/security/2018/dsa-4273 Third Party Advisory
https://www.exploit-db.com/exploits/44695/ Exploit Third Party Advisory VDB Entry
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html Third Party Advisory
https://www.kb.cert.org/vuls/id/180049 Third Party Advisory US Government Resource
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006 Third Party Advisory
https://www.oracle.com/security-alerts/cpujul2020.html Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html Third Party Advisory
https://www.synology.com/support/security/Synology_SA_18_23 Third Party Advisory
https://www.us-cert.gov/ncas/alerts/TA18-141A Third Party Advisory US Government Resource
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html Broken Link
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html Broken Link
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html Broken Link
http://support.lenovo.com/us/en/solutions/LEN-22133 Third Party Advisory
http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html Third Party Advisory
http://www.openwall.com/lists/oss-security/2020/06/10/1 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2020/06/10/2 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2020/06/10/5 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/104232 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1040949 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1042004 Third Party Advisory VDB Entry
http://xenbits.xen.org/xsa/advisory-263.html Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1629 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1630 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1632 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1633 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1635 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1636 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1637 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1638 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1639 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1640 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1641 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1642 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1643 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1644 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1645 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1646 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1647 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1648 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1649 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1650 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1651 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1652 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1653 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1654 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1655 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1656 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1657 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1658 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1659 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1660 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1661 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1662 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1663 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1664 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1665 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1666 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1667 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1668 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1669 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1674 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1675 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1676 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1686 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1688 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1689 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1690 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1696 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1710 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1711 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1737 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1738 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1826 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1854 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1965 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1967 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1997 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2001 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2003 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2006 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2060 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2161 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2162 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2164 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2171 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2172 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2216 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2228 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2246 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2250 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2258 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2289 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2309 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2328 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2363 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2364 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2387 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2394 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2396 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2948 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3396 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3397 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3398 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3399 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3400 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3401 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3402 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3407 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3423 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3424 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3425 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0148 Broken Link
https://access.redhat.com/errata/RHSA-2019:1046 Third Party Advisory
https://bugs.chromium.org/p/project-zero/issues/detail?id=1528 Exploit Issue Tracking Patch Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf Third Party Advisory
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability Third Party Advisory
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html Mailing List Third Party Advisory
https://nvidia.custhelp.com/app/answers/detail/a_id/4787 Third Party Advisory
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012 Patch Third Party Advisory Vendor Advisory
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004 Third Party Advisory
https://seclists.org/bugtraq/2019/Jun/36 Issue Tracking Mailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20180521-0001/ Third Party Advisory
https://support.citrix.com/article/CTX235225 Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03850en_us Third Party Advisory
https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html Third Party Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel Third Party Advisory
https://usn.ubuntu.com/3651-1/ Third Party Advisory
https://usn.ubuntu.com/3652-1/ Third Party Advisory
https://usn.ubuntu.com/3653-1/ Third Party Advisory
https://usn.ubuntu.com/3653-2/ Third Party Advisory
https://usn.ubuntu.com/3654-1/ Third Party Advisory
https://usn.ubuntu.com/3654-2/ Third Party Advisory
https://usn.ubuntu.com/3655-1/ Third Party Advisory
https://usn.ubuntu.com/3655-2/ Third Party Advisory
https://usn.ubuntu.com/3679-1/ Third Party Advisory
https://usn.ubuntu.com/3680-1/ Third Party Advisory
https://usn.ubuntu.com/3756-1/ Third Party Advisory
https://usn.ubuntu.com/3777-3/ Third Party Advisory
https://www.debian.org/security/2018/dsa-4210 Third Party Advisory
https://www.debian.org/security/2018/dsa-4273 Third Party Advisory
https://www.exploit-db.com/exploits/44695/ Exploit Third Party Advisory VDB Entry
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html Third Party Advisory
https://www.kb.cert.org/vuls/id/180049 Third Party Advisory US Government Resource
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006 Third Party Advisory
https://www.oracle.com/security-alerts/cpujul2020.html Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html Third Party Advisory
https://www.synology.com/support/security/Synology_SA_18_23 Third Party Advisory
https://www.us-cert.gov/ncas/alerts/TA18-141A Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

OR cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3770d:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3775:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3775d:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3785:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_z:z3795:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:32nm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i3:45nm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:32nm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i5:45nm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:32nm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_i7:45nm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_m:32nm:*:*:*:*:*:*:*
cpe:2.3:h:intel:core_m:45nm:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium:n4000:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium:n4100:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium:n4200:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_j:j4205:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_silver:j5005:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_silver:n5000:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e-1105c:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:125c_:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1220_:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1275_:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1505m_v6:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1515m_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1535m_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1535m_v6:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1545m_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1558l_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1565l_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1575m_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1578l_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1585_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:1585l_v5:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:3600:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:5600:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:7500:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:e5502:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:e5503:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:e5504:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:e5506:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:e5507:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:e5520:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:e5530:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:e5540:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:e6510:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:e6540:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:e6550:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:l3403:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:l3406:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:l3426:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:l5506:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:l5508_:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:l5518_:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:l5520:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:l5530:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:w5580:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:w5590:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:x3430:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:x3440:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:x3450:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:x3460:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:x3470:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:x3480:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:x5550:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:x5560:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3:x5570:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1105c_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1125c_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1220_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1220_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_12201:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_12201_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1220l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1225:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1225_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1225_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1226_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1230:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1230_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1230_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1230l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1231_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1235:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1240:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1240_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1240_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1240l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1241_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1245:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1245_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1245_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1246_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1258l_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1260l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1265l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1265l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1265l_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1268l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1270:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1270_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1270_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1271_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1275_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1275_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1275l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1276_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1278l_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1280:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1280_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1280_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1281_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1285_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1285_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1285l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1285l_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1286_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1286l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1290:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1290_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1501l_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1501m_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1505l_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1505l_v6:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e3_1505m_v5:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2650l_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2658:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2658_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2658_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2658_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2658a_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2660:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2660_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2660_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2660_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2665:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2667:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2667_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2667_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2667_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2670:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2670_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2670_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2680:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2680_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2680_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2680_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2683_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2683_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2687w:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2687w_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2687w_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2687w_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2690:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2690_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2690_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2690_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2695_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2695_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2695_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2697_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2697_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2697_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2697a_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2698_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2698_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2699_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2699_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2699a_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:2699r_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4603:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4603_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4607:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4607_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4610:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4610_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4610_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4610_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4617:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4620:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4620_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4620_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4620_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4624l_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4627_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4627_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4627_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4628l_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4640:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4640_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4640_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4640_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4648_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4650:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4650_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4650_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4650_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4650l:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4655_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4655_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4657l_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4660_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4660_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4667_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4667_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4669_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5:4669_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1428l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1428l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1428l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1620:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1620_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1620_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1620_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1630_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1630_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1650:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1650_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1650_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1650_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1660:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1660_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1660_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1660_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1680_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_1680_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2403:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2403_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2407:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2407_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2408l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2418l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2418l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2418l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2420:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2420_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2428l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2428l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2428l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2430:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2430_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2430l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2430l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2438l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2440:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2440_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2448l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2448l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2450:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2450_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2450l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2450l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2470:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2470_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2603:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2603_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2603_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2603_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2608l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2608l_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2609:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2609_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2609_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2609_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2618l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2618l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2618l_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2620:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2620_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2620_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2620_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2623_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2623_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2628l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2628l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2628l_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2630:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2630_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2630_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2630_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2630l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2630l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2630l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2630l_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2637:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2637_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2637_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2637_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2640:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2640_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2640_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2640_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2643:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2643_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2643_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2643_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2648l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2648l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2648l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2648l_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2650:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2650_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2650_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2650_v4:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2650l:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2650l_v2:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e5_2650l_v3:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2803:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2820:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2830:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2850:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2850_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2860:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2870:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2870_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2880_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:2890_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4807:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4809_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4809_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4809_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4820:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4820_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4820_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4820_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4830:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4830_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4830_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4830_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4850:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4850_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4850_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4850_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4860:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4860_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4870:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4870_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4880_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:4890_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8830:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8837:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8850:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8850_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8857_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8860:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8860_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8860_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8867_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8867_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8867l:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8870:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8870_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8870_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8870_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8880_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8880_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8880_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8880l_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8880l_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8890_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8890_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8890_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8891_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8891_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8891_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8893_v2:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8893_v3:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8893_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_e7:8894_v4:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:85115:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:85118:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:85119t:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:85120:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:85120t:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:85122:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86126:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86126f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86126t:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86128:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86130:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86130f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86130t:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86132:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86134:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86134m:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86136:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86138:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86138f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86138t:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86140:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86140m:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86142:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86142f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86142m:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86144:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86146:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86148:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86148f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86150:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86152:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_gold:86154:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*
cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:h:arm:cortex-a:15:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a:57:*:*:*:*:*:*:*
cpe:2.3:h:arm:cortex-a:72:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:redhat:mrg_realtime:2.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*
cpe:2.3:a:redhat:virtualization_manager:4.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:virtualization_manager:4.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:siemens:itc1500_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:itc1500:3:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:siemens:itc1500_pro_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:itc1500_pro:3:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:siemens:itc1900_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:itc1900:3:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:siemens:itc1900_pro_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:itc1900_pro:3:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:siemens:itc2200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:itc2200:3:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:siemens:itc2200_pro_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:itc2200_pro:3:*:*:*:*:*:*:*

Configuration 12 (hide)

OR cpe:2.3:a:oracle:local_service_management_system:*:*:*:*:*:*:*:*
cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:siemens:ruggedcom_ape_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:ruggedcom_ape:-:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
cpe:2.3:o:siemens:simatic_et_200_sp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_et_200_sp:-:*:*:*:*:*:*:*

Configuration 15 (hide)

AND
cpe:2.3:o:siemens:simatic_field_pg_m4_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_field_pg_m4:-:*:*:*:*:*:*:*

Configuration 16 (hide)

AND
cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*

Configuration 17 (hide)

AND
cpe:2.3:o:siemens:simatic_ipc3000_smart_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_ipc3000_smart:2:*:*:*:*:*:*:*

Configuration 18 (hide)

AND
cpe:2.3:o:siemens:simatic_ipc347e_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_ipc347e:-:*:*:*:*:*:*:*

Configuration 19 (hide)

AND
cpe:2.3:o:siemens:simatic_ipc427c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_ipc427c:-:*:*:*:*:*:*:*

Configuration 20 (hide)

AND
cpe:2.3:o:siemens:simatic_ipc427d_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_ipc427d:-:*:*:*:*:*:*:*

Configuration 21 (hide)

AND
cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*

Configuration 22 (hide)

AND
cpe:2.3:o:siemens:simatic_ipc477c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_ipc477c:-:*:*:*:*:*:*:*

Configuration 23 (hide)

AND
cpe:2.3:o:siemens:simatic_ipc477d_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_ipc477d:-:*:*:*:*:*:*:*

Configuration 24 (hide)

AND
cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*

Configuration 25 (hide)

AND
cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*

Configuration 26 (hide)

AND
cpe:2.3:o:siemens:simatic_ipc547e_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_ipc547e:-:*:*:*:*:*:*:*

Configuration 27 (hide)

AND
cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*

Configuration 28 (hide)

AND
cpe:2.3:o:siemens:simatic_ipc627c_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_ipc627c:-:*:*:*:*:*:*:*

Configuration 29 (hide)

AND
cpe:2.3:o:siemens:simatic_ipc627d_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_ipc627d:-:*:*:*:*:*:*:*

Configuration 30 (hide)

AND
cpe:2.3:o:siemens:simatic_ipc647c_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_ipc647c:-:*:*:*:*:*:*:*

Configuration 31 (hide)

AND
cpe:2.3:o:siemens:simatic_ipc647d_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_ipc647d:-:*:*:*:*:*:*:*

Configuration 32 (hide)

AND
cpe:2.3:o:siemens:simatic_ipc677d_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_ipc677d:-:*:*:*:*:*:*:*

Configuration 33 (hide)

AND
cpe:2.3:o:siemens:simatic_ipc677c_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_ipc677c:-:*:*:*:*:*:*:*

Configuration 34 (hide)

AND
cpe:2.3:o:siemens:simatic_ipc827c_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_ipc827c:-:*:*:*:*:*:*:*

Configuration 35 (hide)

AND
cpe:2.3:o:siemens:simatic_ipc827d_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_ipc827d:-:*:*:*:*:*:*:*

Configuration 36 (hide)

AND
cpe:2.3:o:siemens:simatic_ipc847c_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_ipc847c:-:*:*:*:*:*:*:*

Configuration 37 (hide)

AND
cpe:2.3:o:siemens:simatic_ipc847d_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_ipc847d:-:*:*:*:*:*:*:*

Configuration 38 (hide)

AND
cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*

Configuration 39 (hide)

AND
cpe:2.3:o:siemens:simatic_s7-1500_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simatic_s7-1500:-:*:*:*:*:*:*:*

Configuration 40 (hide)

AND
cpe:2.3:o:siemens:simotion_p320-4e_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:simotion_p320-4e:-:*:*:*:*:*:*:*

Configuration 41 (hide)

AND
cpe:2.3:o:siemens:sinumerik_840_d_sl_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:sinumerik_840_d_sl:-:*:*:*:*:*:*:*

Configuration 42 (hide)

AND
cpe:2.3:o:siemens:sinumerik_pcu_50.5_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:siemens:sinumerik_pcu_50.5:-:*:*:*:*:*:*:*

Configuration 43 (hide)

AND
cpe:2.3:o:siemens:sinumerik_tcu_30.3_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:sinumerik_tcu_30.3:-:*:*:*:*:*:*:*

Configuration 44 (hide)

AND
cpe:2.3:o:siemens:sinema_remote_connect_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:siemens:sinema_remote_connect:-:*:*:*:*:*:*:*

Configuration 45 (hide)

OR cpe:2.3:a:mitel:micloud_management_portal:*:*:*:*:*:*:*:*
cpe:2.3:a:mitel:micollab:-:*:*:*:*:*:*:*
cpe:2.3:a:mitel:mivoic_mx-one:-:*:*:*:*:*:*:*
cpe:2.3:a:mitel:mivoice_5000:-:*:*:*:*:*:*:*
cpe:2.3:a:mitel:mivoice_border_gateway:-:*:*:*:*:*:*:*
cpe:2.3:a:mitel:mivoice_business:-:*:*:*:*:*:*:*
cpe:2.3:a:mitel:mivoice_connect:-:*:*:*:*:*:*:*
cpe:2.3:a:mitel:open_integration_gateway:-:*:*:*:*:*:*:*

Configuration 46 (hide)

OR cpe:2.3:a:sonicwall:cloud_global_management_system:-:*:*:*:*:*:*:*
cpe:2.3:a:sonicwall:email_security:-:*:*:*:*:*:*:*
cpe:2.3:a:sonicwall:global_management_system:-:*:*:*:*:*:*:*
cpe:2.3:a:sonicwall:secure_mobile_access:-:*:*:*:*:*:*:*
cpe:2.3:a:sonicwall:web_application_firewall:-:*:*:*:*:*:*:*
cpe:2.3:o:sonicwall:sonicosv:-:*:*:*:*:*:*:*

Configuration 47 (hide)

cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*

Configuration 48 (hide)

AND
cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

Configuration 49 (hide)

OR cpe:2.3:a:nvidia:jetson_tx1:*:*:*:*:*:*:*:*
cpe:2.3:a:nvidia:jetson_tx2:*:*:*:*:*:*:*:*

Configuration 50 (hide)

OR cpe:2.3:h:microsoft:surface:-:*:*:*:*:*:*:*
cpe:2.3:h:microsoft:surface_book:-:*:*:*:*:*:*:*
cpe:2.3:h:microsoft:surface_book:2:*:*:*:*:*:*:*
cpe:2.3:h:microsoft:surface_pro:3:*:*:*:*:*:*:*
cpe:2.3:h:microsoft:surface_pro:4:*:*:*:*:*:*:*
cpe:2.3:h:microsoft:surface_pro:1796:*:*:*:*:*:*:*
cpe:2.3:h:microsoft:surface_pro_with_lte_advanced:1807:*:*:*:*:*:*:*
cpe:2.3:h:microsoft:surface_studio:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2008:sp2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*

History

21 Nov 2024, 04:05

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html - Broken Link () http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html - Broken Link
References () http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html - Broken Link () http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html - Broken Link
References () http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html - Broken Link () http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html - Broken Link
References () http://support.lenovo.com/us/en/solutions/LEN-22133 - Third Party Advisory () http://support.lenovo.com/us/en/solutions/LEN-22133 - Third Party Advisory
References () http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html - Third Party Advisory () http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html - Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2020/06/10/1 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2020/06/10/1 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2020/06/10/2 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2020/06/10/2 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2020/06/10/5 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2020/06/10/5 - Mailing List, Third Party Advisory
References () http://www.securityfocus.com/bid/104232 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/104232 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1040949 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1040949 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1042004 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1042004 - Third Party Advisory, VDB Entry
References () http://xenbits.xen.org/xsa/advisory-263.html - Third Party Advisory () http://xenbits.xen.org/xsa/advisory-263.html - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1629 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1629 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1630 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1630 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1632 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1632 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1633 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1633 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1635 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1635 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1636 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1636 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1637 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1637 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1638 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1638 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1639 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1639 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1640 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1640 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1641 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1641 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1642 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1642 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1643 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1643 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1644 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1644 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1645 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1645 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1646 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1646 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1647 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1647 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1648 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1648 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1649 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1649 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1650 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1650 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1651 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1651 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1652 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1652 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1653 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1653 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1654 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1654 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1655 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1655 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1656 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1656 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1657 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1657 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1658 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1658 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1659 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1659 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1660 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1660 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1661 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1661 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1662 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1662 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1663 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1663 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1664 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1664 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1665 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1665 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1666 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1666 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1667 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1667 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1668 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1668 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1669 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1669 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1674 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1674 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1675 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1675 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1676 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1676 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1686 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1686 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1688 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1688 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1689 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1689 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1690 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1690 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1696 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1696 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1710 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1710 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1711 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1711 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1737 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1737 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1738 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1738 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1826 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1826 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1854 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1854 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1965 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1965 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1967 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1967 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1997 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1997 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:2001 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:2001 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:2003 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:2003 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:2006 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:2006 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:2060 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:2060 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:2161 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:2161 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:2162 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:2162 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:2164 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:2164 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:2171 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:2171 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:2172 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:2172 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:2216 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:2216 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:2228 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:2228 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:2246 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:2246 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:2250 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:2250 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:2258 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:2258 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:2289 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:2289 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:2309 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:2309 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:2328 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:2328 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:2363 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:2363 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:2364 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:2364 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:2387 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:2387 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:2394 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:2394 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:2396 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:2396 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:2948 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:2948 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:3396 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:3396 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:3397 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:3397 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:3398 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:3398 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:3399 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:3399 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:3400 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:3400 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:3401 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:3401 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:3402 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:3402 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:3407 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:3407 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:3423 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:3423 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:3424 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:3424 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:3425 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:3425 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:0148 - Broken Link () https://access.redhat.com/errata/RHSA-2019:0148 - Broken Link
References () https://access.redhat.com/errata/RHSA-2019:1046 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:1046 - Third Party Advisory
References () https://bugs.chromium.org/p/project-zero/issues/detail?id=1528 - Exploit, Issue Tracking, Patch, Third Party Advisory () https://bugs.chromium.org/p/project-zero/issues/detail?id=1528 - Exploit, Issue Tracking, Patch, Third Party Advisory
References () https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf - Third Party Advisory () https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf - Third Party Advisory
References () https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf - Third Party Advisory () https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf - Third Party Advisory
References () https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf - Third Party Advisory () https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf - Third Party Advisory
References () https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability - Third Party Advisory () https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability - Third Party Advisory
References () https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 - Third Party Advisory () https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html - Mailing List, Third Party Advisory
References () https://nvidia.custhelp.com/app/answers/detail/a_id/4787 - Third Party Advisory () https://nvidia.custhelp.com/app/answers/detail/a_id/4787 - Third Party Advisory
References () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012 - Patch, Third Party Advisory, Vendor Advisory () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012 - Patch, Third Party Advisory, Vendor Advisory
References () https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004 - Third Party Advisory () https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004 - Third Party Advisory
References () https://seclists.org/bugtraq/2019/Jun/36 - Issue Tracking, Mailing List, Third Party Advisory () https://seclists.org/bugtraq/2019/Jun/36 - Issue Tracking, Mailing List, Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20180521-0001/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20180521-0001/ - Third Party Advisory
References () https://support.citrix.com/article/CTX235225 - Third Party Advisory () https://support.citrix.com/article/CTX235225 - Third Party Advisory
References () https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03850en_us - Third Party Advisory () https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03850en_us - Third Party Advisory
References () https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html - Third Party Advisory () https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html - Third Party Advisory
References () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel - Third Party Advisory () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel - Third Party Advisory
References () https://usn.ubuntu.com/3651-1/ - Third Party Advisory () https://usn.ubuntu.com/3651-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3652-1/ - Third Party Advisory () https://usn.ubuntu.com/3652-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3653-1/ - Third Party Advisory () https://usn.ubuntu.com/3653-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3653-2/ - Third Party Advisory () https://usn.ubuntu.com/3653-2/ - Third Party Advisory
References () https://usn.ubuntu.com/3654-1/ - Third Party Advisory () https://usn.ubuntu.com/3654-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3654-2/ - Third Party Advisory () https://usn.ubuntu.com/3654-2/ - Third Party Advisory
References () https://usn.ubuntu.com/3655-1/ - Third Party Advisory () https://usn.ubuntu.com/3655-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3655-2/ - Third Party Advisory () https://usn.ubuntu.com/3655-2/ - Third Party Advisory
References () https://usn.ubuntu.com/3679-1/ - Third Party Advisory () https://usn.ubuntu.com/3679-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3680-1/ - Third Party Advisory () https://usn.ubuntu.com/3680-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3756-1/ - Third Party Advisory () https://usn.ubuntu.com/3756-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3777-3/ - Third Party Advisory () https://usn.ubuntu.com/3777-3/ - Third Party Advisory
References () https://www.debian.org/security/2018/dsa-4210 - Third Party Advisory () https://www.debian.org/security/2018/dsa-4210 - Third Party Advisory
References () https://www.debian.org/security/2018/dsa-4273 - Third Party Advisory () https://www.debian.org/security/2018/dsa-4273 - Third Party Advisory
References () https://www.exploit-db.com/exploits/44695/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/44695/ - Exploit, Third Party Advisory, VDB Entry
References () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html - Third Party Advisory () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html - Third Party Advisory
References () https://www.kb.cert.org/vuls/id/180049 - Third Party Advisory, US Government Resource () https://www.kb.cert.org/vuls/id/180049 - Third Party Advisory, US Government Resource
References () https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006 - Third Party Advisory () https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006 - Third Party Advisory
References () https://www.oracle.com/security-alerts/cpujul2020.html - Third Party Advisory () https://www.oracle.com/security-alerts/cpujul2020.html - Third Party Advisory
References () https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html - Third Party Advisory () https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html - Third Party Advisory
References () https://www.synology.com/support/security/Synology_SA_18_23 - Third Party Advisory () https://www.synology.com/support/security/Synology_SA_18_23 - Third Party Advisory
References () https://www.us-cert.gov/ncas/alerts/TA18-141A - Third Party Advisory, US Government Resource () https://www.us-cert.gov/ncas/alerts/TA18-141A - Third Party Advisory, US Government Resource

Information

Published : 2018-05-22 12:29

Updated : 2024-11-21 04:05


NVD link : CVE-2018-3639

Mitre link : CVE-2018-3639

CVE.ORG link : CVE-2018-3639


JSON object : View

Products Affected

intel

  • xeon_e5_2640_v2
  • xeon_e5_2630
  • atom_x7-e3950
  • xeon_e3_1245_v3
  • xeon_e3_1270_v3
  • xeon_e5_2643_v2
  • xeon_e5_2643_v3
  • xeon_e3_1501l_v6
  • xeon_e3_1280_v5
  • atom_x5-e3930
  • xeon_e3_1275_v6
  • xeon_e5_2450l_v2
  • xeon_e3_1235l_v5
  • xeon_e5_2640
  • xeon_e3_1240l_v3
  • xeon_e5_2420_v2
  • xeon_e3_1245
  • xeon_e5_2628l_v4
  • xeon_e3_1275_v3
  • xeon_e5_2603
  • xeon_e3_1245_v2
  • xeon_e3_1270_v5
  • xeon_e3_1240_v3
  • xeon_e5_2637_v4
  • xeon_e5_2470
  • xeon_e5_2637_v3
  • xeon_e5_2428l_v2
  • xeon_e3_1268l_v5
  • xeon_e5_2650_v2
  • xeon_e3_1245_v6
  • xeon_e5_2448l
  • xeon_e5_2648l_v2
  • xeon_e3_1285_v4
  • xeon_e3_1275l_v3
  • xeon_e5_2648l
  • xeon_e3_12201_v2
  • xeon_e5_2418l_v3
  • xeon_e3_1230_v3
  • xeon_e3_1246_v3
  • xeon_e5_1660_v2
  • xeon_e3_1278l_v4
  • xeon_e5_2620_v4
  • xeon_e3_1275_v5
  • xeon_e5_2630l_v4
  • xeon_e3_1105c_v2
  • xeon_e5_2430
  • core_i3
  • xeon_e5_2628l_v2
  • xeon_e3_1225
  • xeon_e5_2609
  • xeon_e5_2440
  • xeon_e3_1240_v6
  • xeon_e5_1630_v3
  • xeon_e5_1680_v4
  • xeon_e5_2603_v4
  • xeon_e3_1240l_v5
  • xeon_e5_2630_v4
  • xeon_e5_2650
  • xeon_platinum
  • xeon_e3_1220_v5
  • xeon_e5_2650l_v2
  • xeon_e5_2648l_v4
  • xeon_e5_1660
  • xeon_e3_1501m_v6
  • xeon_e5_2609_v3
  • xeon_e3_1270_v2
  • xeon_e3_1280_v2
  • xeon_e3_1290_v2
  • xeon_silver
  • xeon_e5_2609_v4
  • xeon_e3_12201
  • xeon_e3_1505m_v5
  • xeon_e5_2630l_v2
  • xeon_e3_1270
  • xeon_e5_2603_v3
  • xeon_e5_2450_v2
  • xeon_e5_2428l_v3
  • xeon_e5_2418l
  • xeon_e3_1225_v3
  • xeon_e5_2403_v2
  • xeon_e5_1630_v4
  • xeon_e5_2470_v2
  • xeon_e5_1660_v4
  • xeon_e5_2650_v3
  • xeon_e5_2640_v4
  • xeon_e3_1125c_v2
  • xeon_e5_2650l
  • atom_e
  • xeon_e7
  • xeon_e3_1231_v3
  • xeon_e5_2630l_v3
  • xeon_e5_2438l_v3
  • xeon_e5_2407_v2
  • xeon_gold
  • xeon_e5_2628l_v3
  • xeon_e3_1275_v2
  • xeon_e5_1620
  • xeon_e5_2420
  • xeon_e3_1230_v5
  • xeon_e5_2408l_v3
  • xeon_e5_2620_v2
  • xeon_e3_1226_v3
  • celeron_j
  • xeon_e5_1620_v2
  • pentium_j
  • xeon_e5_2608l_v4
  • xeon_e5_2430l_v2
  • xeon_e3_1220l_v3
  • xeon_e5_2623_v3
  • xeon_e3_1240_v5
  • xeon_e5_2630_v2
  • xeon_e3_1505l_v6
  • xeon_e5_2608l_v3
  • xeon_e3_1265l_v2
  • xeon_e5_2430l
  • xeon_e5_1650_v3
  • xeon_e3_1225_v2
  • xeon_e5_2630_v3
  • xeon_e3_1265l_v4
  • xeon_e5_2609_v2
  • xeon_e5_2640_v3
  • atom_z
  • xeon_e3_1268l_v3
  • xeon_e5
  • xeon_e3_1230_v2
  • xeon_e3_1270_v6
  • atom_c
  • xeon_e5_2618l_v4
  • xeon_e5_2637_v2
  • xeon_e3_1240_v2
  • xeon_e3_1265l_v3
  • xeon_e5_2430_v2
  • xeon_e5_1620_v3
  • xeon_e5_1680_v3
  • xeon_e5_1650
  • xeon_e3_1230l_v3
  • xeon_e5_1650_v4
  • xeon_e5_2650l_v3
  • xeon_e3_1241_v3
  • xeon_e3_1220_v2
  • xeon_e5_2623_v4
  • xeon_e3_1220_v6
  • xeon_e5_2643
  • xeon_e3_1290
  • xeon_e5_2440_v2
  • xeon_e3_1260l_v5
  • xeon_e3_1285l_v4
  • xeon_e3_1225_v6
  • xeon_e3_1286_v3
  • xeon_e3_1258l_v4
  • xeon_e5_2603_v2
  • celeron_n
  • xeon_e5_2650_v4
  • xeon_e3_1285_v3
  • xeon_e3_1240
  • xeon_e3_1260l
  • xeon_e3_1285l_v3
  • xeon_e3_1225_v5
  • xeon_e3_1280_v3
  • xeon_e5_2620
  • xeon_e5_2637
  • xeon_e3_1235
  • xeon_e5_1620_v4
  • xeon_e5_2620_v3
  • pentium
  • xeon_e5_2448l_v2
  • xeon_e5_2428l
  • xeon_e3_1505l_v5
  • xeon_e5_2643_v4
  • xeon_e3_1276_v3
  • pentium_silver
  • xeon_e3_1271_v3
  • xeon_e5_1428l_v3
  • xeon_e3_1281_v3
  • atom_x5-e3940
  • xeon_e3_1245_v5
  • xeon_e-1105c
  • xeon_e5_2450
  • xeon_e3_1230_v6
  • xeon_e5_2403
  • core_i5
  • xeon_e5_2618l_v2
  • xeon_e3_1230
  • xeon_e3
  • xeon_e5_2630l
  • xeon_e5_1650_v2
  • xeon_e3_1280
  • xeon_e3_1280_v6
  • xeon_e5_1660_v3
  • core_m
  • xeon_e5_2407
  • xeon_e5_1428l
  • xeon_e3_1220_v3
  • xeon_e3_1286l_v3
  • xeon_e5_1428l_v2
  • xeon_e5_2618l_v3
  • core_i7
  • xeon_e5_2418l_v2
  • xeon_e3_1285_v6
  • xeon_e5_2450l
  • xeon_e5_2648l_v3

microsoft

  • windows_server_2012
  • windows_10
  • windows_7
  • windows_server_2016
  • surface_pro
  • windows_server_2008
  • surface_book
  • surface_pro_with_lte_advanced
  • surface_studio
  • windows_8.1
  • surface

oracle

  • solaris
  • local_service_management_system

siemens

  • simatic_ipc547g_firmware
  • simatic_ipc547e
  • simatic_ipc827d
  • sinumerik_pcu_50.5_firmware
  • simatic_ipc847c
  • simatic_itp1000
  • simatic_field_pg_m4_firmware
  • simatic_ipc347e
  • simatic_et_200_sp_firmware
  • simatic_ipc3000_smart_firmware
  • simatic_ipc477e_pro_firmware
  • simatic_ipc427e_firmware
  • simatic_ipc627d_firmware
  • simotion_p320-4e_firmware
  • simatic_ipc677d_firmware
  • itc2200
  • simatic_ipc647c
  • simatic_ipc647d
  • simatic_ipc427d_firmware
  • simatic_ipc477d
  • simatic_s7-1500_firmware
  • itc2200_pro_firmware
  • simatic_ipc547g
  • itc1900_pro
  • simatic_ipc477e_pro
  • simatic_ipc477e_firmware
  • itc1900_firmware
  • sinema_remote_connect_firmware
  • simatic_ipc427e
  • simatic_field_pg_m5
  • itc1500_pro
  • simatic_ipc647d_firmware
  • simatic_field_pg_m5_firmware
  • itc1900_pro_firmware
  • sinumerik_tcu_30.3
  • simatic_ipc477c
  • simatic_ipc477d_firmware
  • simatic_ipc3000_smart
  • simatic_ipc347e_firmware
  • itc1500_firmware
  • itc2200_pro
  • sinumerik_840_d_sl_firmware
  • simatic_s7-1500
  • sinema_remote_connect
  • simatic_ipc847d
  • simatic_ipc677d
  • simatic_ipc827d_firmware
  • simatic_et_200_sp
  • simatic_ipc677c
  • itc1500_pro_firmware
  • sinumerik_pcu_50.5
  • itc1500
  • simatic_field_pg_m4
  • simotion_p320-4e
  • simatic_ipc427c
  • simatic_ipc627c
  • simatic_ipc427c_firmware
  • itc1900
  • simatic_ipc627d
  • simatic_ipc677c_firmware
  • itc2200_firmware
  • simatic_ipc647c_firmware
  • sinumerik_tcu_30.3_firmware
  • simatic_ipc627c_firmware
  • simatic_ipc477c_firmware
  • simatic_ipc827c
  • simatic_ipc847c_firmware
  • sinumerik_840_d_sl
  • simatic_itp1000_firmware
  • ruggedcom_ape
  • simatic_ipc827c_firmware
  • simatic_ipc847d_firmware
  • simatic_ipc427d
  • simatic_ipc477e
  • ruggedcom_ape_firmware
  • simatic_ipc547e_firmware

mitel

  • mivoice_border_gateway
  • mivoic_mx-one
  • mivoice_connect
  • open_integration_gateway
  • mivoice_business
  • micloud_management_portal
  • mivoice_5000
  • micollab

sonicwall

  • email_security
  • web_application_firewall
  • global_management_system
  • cloud_global_management_system
  • secure_mobile_access
  • sonicosv

redhat

  • virtualization_manager
  • enterprise_linux_desktop
  • virtualization
  • openstack
  • enterprise_linux_eus
  • enterprise_linux_workstation
  • mrg_realtime
  • enterprise_linux_server_tus
  • enterprise_linux_server_aus
  • enterprise_linux
  • enterprise_linux_server

schneider-electric

  • struxureware_data_center_expert

arm

  • cortex-a

nvidia

  • jetson_tx1
  • jetson_tx2

canonical

  • ubuntu_linux

debian

  • debian_linux
CWE
CWE-203

Observable Discrepancy