ID AIX_IJ03036.NASL Type nessus Reporter This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof. Modified 2021-03-02T00:00:00
Description
Systems with microprocessors utilizing speculative execution and indirect
branch prediction may allow unauthorized disclosure of information to an
attacker with local user access via a side-channel analysis.
#
# (C) Tenable Network Security, Inc.
#
# The text in the description was extracted from AIX Security
# Advisory spectre_meltdown_advisory.asc.
#
include("compat.inc");
if (description)
{
script_id(106316);
script_version("1.9");
script_cvs_date("Date: 2019/04/05 23:25:05");
script_cve_id("CVE-2017-5715", "CVE-2017-5753", "CVE-2017-5754");
script_xref(name:"IAVA", value:"2018-A-0019");
script_xref(name:"IAVA", value:"2018-A-0020");
script_name(english:"AIX 7.2 TL 2 : spectre_meltdown (IJ03036) (Meltdown) (Spectre)");
script_summary(english:"Check for APAR IJ03036");
script_set_attribute(
attribute:"synopsis",
value:"The remote AIX host is missing a security patch."
);
script_set_attribute(
attribute:"description",
value:
"Systems with microprocessors utilizing speculative execution and indirect
branch prediction may allow unauthorized disclosure of information to an
attacker with local user access via a side-channel analysis."
);
# http://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?0ecfba9a"
);
script_set_attribute(
attribute:"solution",
value:"Install the appropriate interim fix."
);
script_set_cvss_base_vector("CVSS2#AV:L/AC:M/Au:N/C:C/I:N/A:N");
script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N");
script_set_cvss3_temporal_vector("CVSS:3.0/E:H/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2017-5715");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"exploited_by_malware", value:"true");
script_set_attribute(attribute:"exploit_framework_canvas", value:"true");
script_set_attribute(attribute:"canvas_package", value:'CANVAS');
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:ibm:aix:7.2");
script_set_attribute(attribute:"vuln_publication_date", value:"2018/01/25");
script_set_attribute(attribute:"patch_publication_date", value:"2018/01/25");
script_set_attribute(attribute:"in_the_news", value:"true");
script_set_attribute(attribute:"generated_plugin", value:"former");
script_set_attribute(attribute:"plugin_publication_date", value:"2018/01/25");
script_set_attribute(attribute:"stig_severity", value:"I");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"AIX Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/AIX/lslpp", "Host/local_checks_enabled", "Host/AIX/version");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("aix.inc");
include("misc_func.inc");
if ( ! get_kb_item("Host/local_checks_enabled") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if ( ! get_kb_item("Host/AIX/version") ) audit(AUDIT_OS_NOT, "AIX");
if ( ! get_kb_item("Host/AIX/lslpp") ) audit(AUDIT_PACKAGE_LIST_MISSING);
if ( get_kb_item("Host/AIX/emgr_failure" ) ) exit(0, "This iFix check is disabled because : "+get_kb_item("Host/AIX/emgr_failure") );
flag = 0;
if (aix_check_ifix(release:"7.2", ml:"02", sp:"00", patch:"(IJ03036m1a|IJ05818m1a)", package:"bos.mp64", minfilesetver:"7.2.2.0", maxfilesetver:"7.2.2.0") < 0) flag++;
if (aix_check_ifix(release:"7.2", ml:"02", sp:"01", patch:"(IJ03036m1a|IJ05818m1a)", package:"bos.mp64", minfilesetver:"7.2.2.0", maxfilesetver:"7.2.2.0") < 0) flag++;
if (flag)
{
aix_report_extra = ereg_replace(string:aix_report_get(), pattern:"[()]", replace:"");
aix_report_extra = ereg_replace(string:aix_report_extra, pattern:"[|]", replace:" or ");
if (report_verbosity > 0) security_warning(port:0, extra:aix_report_get());
else security_warning(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
{"id": "AIX_IJ03036.NASL", "bulletinFamily": "scanner", "title": "AIX 7.2 TL 2 : spectre_meltdown (IJ03036) (Meltdown) (Spectre)", "description": "Systems with microprocessors utilizing speculative execution and indirect\nbranch prediction may allow unauthorized disclosure of information to an\nattacker with local user access via a side-channel analysis.", "published": "2018-01-25T00:00:00", "modified": "2021-03-02T00:00:00", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}, "href": "https://www.tenable.com/plugins/nessus/106316", "reporter": "This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["http://www.nessus.org/u?0ecfba9a"], "cvelist": ["CVE-2017-5753", "CVE-2017-5754", "CVE-2017-5715"], "type": "nessus", "lastseen": "2021-03-01T01:17:53", "edition": 29, "viewCount": 15, "enchantments": {"dependencies": {"references": [{"type": "citrix", "idList": ["CTX231399"]}, {"type": "f5", "idList": ["F5:K91229003"]}, {"type": "symantec", "idList": ["SMNTC-102378", "SMNTC-102371"]}, {"type": "cve", "idList": ["CVE-2017-5754", "CVE-2017-5715", "CVE-2017-5753"]}, {"type": "cloudfoundry", "idList": ["CFOUNDRY:86B5C35F8F0E334D1CCCDAF1214EDFEF"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310812398", "OPENVAS:1361412562310812397", "OPENVAS:1361412562310843423", "OPENVAS:1361412562310882855", "OPENVAS:1361412562310812295", "OPENVAS:1361412562310843405", "OPENVAS:1361412562311220181001", "OPENVAS:1361412562311220191638", "OPENVAS:1361412562310812740", "OPENVAS:1361412562310107830"]}, {"type": "redhat", "idList": ["RHSA-2018:0007", "RHSA-2018:0021", "RHSA-2018:0182", "RHSA-2018:0017", "RHSA-2018:0009", "RHSA-2018:0292", "RHSA-2018:0496", "RHSA-2018:0020", "RHSA-2018:0047", "RHSA-2018:0045"]}, {"type": "oraclelinux", "idList": ["ELSA-2018-0007"]}, {"type": "nessus", "idList": ["SL_20180103_KERNEL_ON_SL6_X.NASL", "AIX_IJ03029.NASL", "VIRTUOZZO_VZA-2018-002.NASL", "REDHAT-RHSA-2018-0007.NASL", "CENTOS_RHSA-2018-0512.NASL", "UBUNTU_USN-3540-2.NASL", "ORACLEVM_OVMSA-2018-0029.NASL", "SUSE_SU-2018-0171-1.NASL", "AIX_IJ03034.NASL", "AIX_IJ03035.NASL"]}, {"type": "nvidia", "idList": ["NVIDIA:4613", "NVIDIA:4610", "NVIDIA:4616", "NVIDIA:4617"]}, {"type": "thn", "idList": ["THN:58CFE19533148E77597FE0AC59963145"]}, {"type": "centos", "idList": ["CESA-2018:0008", "CESA-2018:0512"]}, {"type": "ubuntu", "idList": ["USN-3541-2", "USN-3541-1", "USN-3540-1"]}, {"type": "cisco", "idList": ["CISCO-SA-20180104-CPUSIDECHANNEL"]}, {"type": "huawei", "idList": ["HUAWEI-SA-20180106-01-CPU"]}, {"type": "xen", "idList": ["XSA-254"]}, {"type": "qualysblog", "idList": ["QUALYSBLOG:F7C32BA5E6651A8CE3584BB84A88A0C0", "QUALYSBLOG:F8AA5B21D90BCDD30391A24D6FD47892", "QUALYSBLOG:3ACE52E54FF5FE3EF1B0FC328181FA66", "QUALYSBLOG:BD020D07BF02B0790C62701D997BFD4D"]}, {"type": "suse", "idList": ["SUSE-SU-2018:0171-1", "SUSE-SU-2018:0131-1"]}, {"type": "malwarebytes", "idList": ["MALWAREBYTES:C47D8F4321BF60FB315B6C46B47DF46F", "MALWAREBYTES:3DDE32E41BE8356C194673EE3ED7FDBE"]}, {"type": "virtuozzo", "idList": ["VZA-2018-006"]}, {"type": "seebug", "idList": ["SSV:97059"]}, {"type": "talosblog", "idList": ["TALOSBLOG:6AF8BBB020A686E442B50095CA9B7A36"]}, {"type": "cert", "idList": ["VU:584653"]}, {"type": "threatpost", "idList": ["THREATPOST:0F9EDE9A622A021B9B79C50214D7E8AD"]}], "modified": "2021-03-01T01:17:53", "rev": 2}, "score": {"value": 5.7, "vector": "NONE", "modified": "2021-03-01T01:17:53", "rev": 2}, "vulnersScore": 5.7}, "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The text in the description was extracted from AIX Security\n# Advisory spectre_meltdown_advisory.asc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(106316);\n script_version(\"1.9\");\n script_cvs_date(\"Date: 2019/04/05 23:25:05\");\n\n script_cve_id(\"CVE-2017-5715\", \"CVE-2017-5753\", \"CVE-2017-5754\");\n script_xref(name:\"IAVA\", value:\"2018-A-0019\");\n script_xref(name:\"IAVA\", value:\"2018-A-0020\");\n\n script_name(english:\"AIX 7.2 TL 2 : spectre_meltdown (IJ03036) (Meltdown) (Spectre)\");\n script_summary(english:\"Check for APAR IJ03036\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote AIX host is missing a security patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Systems with microprocessors utilizing speculative execution and indirect\nbranch prediction may allow unauthorized disclosure of information to an\nattacker with local user access via a side-channel analysis.\"\n );\n # http://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?0ecfba9a\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Install the appropriate interim fix.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:C/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2017-5715\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'CANVAS');\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:ibm:aix:7.2\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/01/25\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/01/25\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"former\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/01/25\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"AIX Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/AIX/lslpp\", \"Host/local_checks_enabled\", \"Host/AIX/version\");\n\n exit(0);\n}\n\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"aix.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif ( ! get_kb_item(\"Host/AIX/version\") ) audit(AUDIT_OS_NOT, \"AIX\");\nif ( ! get_kb_item(\"Host/AIX/lslpp\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nif ( get_kb_item(\"Host/AIX/emgr_failure\" ) ) exit(0, \"This iFix check is disabled because : \"+get_kb_item(\"Host/AIX/emgr_failure\") );\n\nflag = 0;\n\nif (aix_check_ifix(release:\"7.2\", ml:\"02\", sp:\"00\", patch:\"(IJ03036m1a|IJ05818m1a)\", package:\"bos.mp64\", minfilesetver:\"7.2.2.0\", maxfilesetver:\"7.2.2.0\") < 0) flag++;\nif (aix_check_ifix(release:\"7.2\", ml:\"02\", sp:\"01\", patch:\"(IJ03036m1a|IJ05818m1a)\", package:\"bos.mp64\", minfilesetver:\"7.2.2.0\", maxfilesetver:\"7.2.2.0\") < 0) flag++;\n\nif (flag)\n{\n aix_report_extra = ereg_replace(string:aix_report_get(), pattern:\"[()]\", replace:\"\");\n aix_report_extra = ereg_replace(string:aix_report_extra, pattern:\"[|]\", replace:\" or \");\n if (report_verbosity > 0) security_warning(port:0, extra:aix_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "naslFamily": "AIX Local Security Checks", "pluginID": "106316", "cpe": ["cpe:/o:ibm:aix:7.2"], "scheme": null, "cvss3": {"score": 5.6, "vector": "AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}}
{"citrix": [{"lastseen": "2020-11-18T15:29:36", "bulletinFamily": "software", "cvelist": ["CVE-2017-5753", "CVE-2017-5754", "CVE-2017-5715"], "description": "<section class=\"article-content\" data-swapid=\"ArticleContent\">\n<div class=\"content-block\" data-swapid=\"ContentBlock\"><div>\n<div>\n<h2> Overview</h2>\n<div>\n<div>\n<div>\n<p>A new class of issues has been identified in common CPU architectures. The presently known issues could allow unprivileged code to read privileged memory locations.</p>\n<p>Citrix is analysing the potential impact of these issues across its product range. This bulletin will be updated as further information becomes available on the impacts of these issues and their variants.</p>\n<p>Please note that, although these are issues in the underlying processor hardware, Citrix intends to provide software updates, together with our partners, to mitigate these issues where practical.</p>\n<p>Please review the following sections for information on your specific Citrix products. This bulletin will be updated as more information becomes available. Customers can receive e-mail notifications about updated or new security bulletins by subscribing at the following address: <a href=\"https://support.citrix.com/user/alerts\">https://support.citrix.com/user/alerts</a> </p>\n</div>\n</div>\n</div>\n</div>\n<div>\n<h2> Products that we believe are not impacted:</h2>\n<div>\n<div>\n<div>\n<ul>\n<li>Citrix XenMobile Server: Citrix believes that currently supported versions of Citrix XenMobile Server are not impacted by the presently known variants of these issues.</li>\n<li>Citrix XenMobile MDX Toolkit and SDK: Citrix believes that currently supported versions of Citrix XenMobile MDX Toolkit and SDK are not impacted by the presently known variants of these issues.<br/> </li>\n<li>Citrix NetScaler (MPX/VPX): Citrix believes that currently supported versions of Citrix NetScaler MPX and VPX are not impacted by the presently known variants of these issues.</li>\n<li>Citrix NetScaler AppFirewall Platforms: Citrix believes that currently supported versions of Citrix NetScaler AppFirewall Platforms are not impacted by the presently known variants of these issues.<br/> </li>\n<li>Citrix NetScaler Management Analytics Service (MAS): Citrix believes that currently supported versions of the Citrix NetScaler Management Analytics Service are not impacted by presently known variants of these issues.</li>\n<li>Citrix Command Center: Citrix believes that currently supported versions of the Citrix Command Center, both hardware and software components, are not impacted by presently known variants of these issues.</li>\n<li>Citrix NetScaler Insight Center: Citrix believes that currently supported versions of Citrix NetScaler Insight Center are not impacted by the presently known variants of these issues.<br/> </li>\n<li>Citrix NetScaler SD-WAN (Standard. Enterprise, WAN Optimization (except 1000WS/2000WS platform) editions) / SD-WAN Center: Citrix believes that currently supported versions of Citrix NetScaler SD-WAN are not impacted by the presently known variants of these issues.</li>\n<li>Citrix ShareFile StorageZones Controller: Citrix believes that currently supported versions of Citrix ShareFile StorageZones Controller are not impacted by the presently known variants of these issues.</li>\n<li>Citrix License Server: Citrix believes that currently supported versions of Citrix License Server are not impacted by the presently known variants of these issues.<br/> </li>\n<li>Citrix StoreFront: Citrix believes that currently supported versions of Citrix StoreFront are not impacted by the presently known variants of these issues.<br/> </li>\n<li>Citrix App Orchestration: Citrix believes that currently supported versions of Citrix App Orchestration are not impacted by the presently known variants of these issues.<br/> </li>\n<li>Citrix App Layering: Citrix believes that currently supported versions of Citrix App Layering are not impacted by the presently known variants of these issues.<br/> </li>\n</ul>\n</div>\n</div>\n</div>\n</div>\n<div>\n<h2> Products that may require Third Party updates:</h2>\n<div>\n<div>\n<div>\n<ul>\n<li>Citrix XenApp/XenDesktop: Citrix believes that currently supported versions of the core Citrix XenApp and XenDesktop products are not impacted by presently known variants of these issues. However, it is probable that the underlying operating system, drivers and CPU firmware will require updating. Citrix strongly recommends that customers contact their operating system and hardware vendors for information on how to obtain these updates.</li>\n<li>Citrix Provisioning Services: Citrix believes that currently supported versions of Citrix Provisioning Services products are not impacted by presently known variants of these issues. However, it is probable that the underlying operating system, drivers and CPU firmware will require updating. Citrix strongly recommends that customers contact their operating system and hardware vendors for information on how to obtain these updates.</li>\n<li>Citrix AppDNA: Citrix believes that currently supported versions of Citrix AppDNA are not impacted by presently known variants of these issues. However, it is probable that the underlying operating system, drivers and CPU firmware will require updating. Citrix strongly recommends that customers contact their operating system and hardware vendors for information on how to obtain these updates.</li>\n<li>Citrix Linux VDA: Citrix believes that currently supported versions of Citrix Linux VDA are not impacted by presently known variants of these issues. However, it is probable that the underlying operating system, drivers and CPU firmware will require updating. Citrix strongly recommends that customers contact their operating system and hardware vendors for information on how to obtain these updates.</li>\n<li>Citrix XenMobile Apps: Citrix believes that currently supported versions of Citrix XenMobile Apps are not impacted by presently known variants of these issues. However, it is probable that the underlying operating system, drivers and CPU firmware will require updating. Citrix strongly recommends that customers contact their operating system and hardware vendors for information on how to obtain these updates.</li>\n<li>Citrix ShareFile Clients on Desktop and Mobile: Citrix believes that currently supported versions Citrix ShareFile Clients are not impacted by presently known variants of these issues. However, it is probable that the underlying operating system, drivers and CPU firmware will require updating. Citrix strongly recommends that customers contact their operating system and hardware vendors for information on how to obtain these updates.</li>\n<li>Citrix Receivers for Desktop and Mobile: Citrix believes that currently supported versions of Citrix Receivers are not impacted by presently known variants of these issues. However, it is probable that the underlying operating system, drivers and CPU firmware will require updating. Citrix strongly recommends that customers contact their operating system and hardware vendors for information on how to obtain these updates.</li>\n<li>ByteMobile products: When deployed in line with Citrix recommendations, Citrix believes that currently supported versions of ByteMobile products are not impacted by the presently known variants of these issues. However, Citrix strongly recommends that customers using virtualized installations of ByteMobile products contact their Citrix ByteMobile Telco Support contact for potential mitigations steps and further information.</li>\n</ul>\n<p> </p>\n</div>\n</div>\n</div>\n</div>\n<div>\n<h2> Products that we believe are impacted:</h2>\n<div>\n<div>\n<div>\n<ul>\n<li>Citrix NetScaler SDX: Citrix believes that currently supported versions of Citrix NetScaler SDX are not at risk from malicious network traffic. However, in light of these issues, Citrix strongly recommends that customers only deploy NetScaler instances on Citrix NetScaler SDX where the NetScaler admins are trusted.</li>\n<li>Citrix NetScaler SD-WAN (WANOpt1000WS/2000WS): When deployed in environments with only trusted administrators, Citrix believes that currently supported WAN Optimization versions of Citrix SD-WAN on 1000WS/2000WS platforms are not at risk from malicious network traffic. Citrix strongly recommends that Citrix SD-WAN 1000WS and 2000WS administrators ensure that access to the Citrix supplied Windows VM is limited to trusted administrators only</li>\n<li>Citrix XenServer: Please see <a href=\"https://support.citrix.com/article/ctx231390\">https://support.citrix.com/article/ctx231390</a> for information on Citrix XenServer</li>\n</ul>\n</div>\n</div>\n</div>\n</div>\n<div>\n<h2> What Citrix Is Doing</h2>\n<div>\n<div>\n<div>\n<div>\n<div>\n<p>Citrix is notifying customers and channel partners about this potential security issue. This article is also available from the Citrix Knowledge Center at <u> <a href=\"http://support.citrix.com/\">http://support.citrix.com/</a></u>.</p>\n</div>\n</div>\n</div>\n</div>\n</div>\n</div>\n<div>\n<h2> Obtaining Support on This Issue</h2>\n<div>\n<div>\n<div>\n<div>\n<div>\n<p>If you require technical assistance with this issue, please contact Citrix Technical Support. Contact details for Citrix Technical Support are available at <u> <a href=\"https://www.citrix.com/support/open-a-support-case.html\">https://www.citrix.com/support/open-a-support-case.html</a></u>. </p>\n</div>\n</div>\n</div>\n</div>\n</div>\n</div>\n<div>\n<h2> Reporting Security Vulnerabilities</h2>\n<div>\n<div>\n<div>\n<div>\n<div>\n<p>Citrix welcomes input regarding the security of its products and considers any and all potential vulnerabilities seriously. For guidance on how to report security-related issues to Citrix, please see the following document: CTX081743 \u2013 <a href=\"http://support.citrix.com/article/CTX081743\">Reporting Security Issues to Citrix</a></p>\n</div>\n</div>\n</div>\n</div>\n</div>\n</div>\n<div>\n<h2> Changelog</h2>\n<div>\n<div>\n<div>\n<table width=\"100%\">\n<tbody>\n<tr>\n<td colspan=\"1\" rowspan=\"1\">Date </td>\n<td colspan=\"1\" rowspan=\"1\">Change</td>\n</tr>\n<tr>\n<td colspan=\"1\" rowspan=\"1\">3rd January 2018 </td>\n<td colspan=\"1\" rowspan=\"1\">Initial publishing</td>\n</tr>\n<tr>\n<td colspan=\"1\" rowspan=\"1\">3rd January 2018</td>\n<td colspan=\"1\" rowspan=\"1\">Updated immediately after embargo expiry</td>\n</tr>\n<tr>\n<td colspan=\"1\" rowspan=\"1\">4th January 2018</td>\n<td colspan=\"1\" rowspan=\"1\">Updated to include XenServer</td>\n</tr>\n<tr>\n<td colspan=\"1\" rowspan=\"1\">5th January 2018</td>\n<td colspan=\"1\" rowspan=\"1\">Expanded product coverage</td>\n</tr>\n<tr>\n<td colspan=\"1\" rowspan=\"1\">9th January 2018</td>\n<td colspan=\"1\" rowspan=\"1\">Updated product coverage</td>\n</tr>\n<tr>\n<td colspan=\"1\" rowspan=\"1\">11th January 2018</td>\n<td colspan=\"1\" rowspan=\"1\">Added information for ByteMobile products</td>\n</tr>\n<tr>\n<td colspan=\"1\" rowspan=\"1\">14th January 2018</td>\n<td colspan=\"1\" rowspan=\"1\">Added information for NetScaler SD-WAN</td>\n</tr>\n<tr>\n<td colspan=\"1\" rowspan=\"1\">1st February 2018</td>\n<td colspan=\"1\" rowspan=\"1\">Added information for NetScaler MAS and Command Center</td>\n</tr>\n<tr>\n<td colspan=\"1\" rowspan=\"1\">6th February 2018</td>\n<td colspan=\"1\" rowspan=\"1\">Updated naming for XenMobile client components</td>\n</tr>\n</tbody>\n</table>\n</div>\n</div>\n</div>\n</div>\n</div></div>\n</section>", "edition": 2, "modified": "2018-02-06T04:00:00", "published": "2018-01-03T04:00:00", "id": "CTX231399", "href": "https://support.citrix.com/article/CTX231399", "title": "Citrix Security Updates for CVE-2017-5715, CVE-2017-5753, CVE-2017-5754", "type": "citrix", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}], "f5": [{"lastseen": "2020-04-06T22:39:55", "bulletinFamily": "software", "cvelist": ["CVE-2017-5753", "CVE-2017-5754", "CVE-2017-5715"], "description": "\nF5 Product Development has assigned IDs 698651, 701445, 701447, 704490, and 704483 (BIG-IP); 702233, 702236, and 702237 (BIG-IQ); 702353, 702354, and 702355 (Enterprise Manager); 702355, 702377, and 702378 (iWorkflow); CPF-24782, CPF-24783, and CPF-24784 (Traffix); LRS-65859, LRS-65860, and LRS-65861 (LineRate) to this vulnerability. Additionally, [BIG-IP iHealth](<https://www.f5.com/support/support-tools/big-ip-ihealth>) may list Heuristic H91229003 on the **Diagnostics** > **Identified** > **Medium** page.\n\nTo determine if your product and version have been evaluated for this vulnerability, refer to the **Applies to (see versions)** box. To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table.\n\nProduct | Branch | Versions known to be vulnerable | Fixes introduced in | Severity | CVSSv3 score1 | Vulnerable component or feature \n---|---|---|---|---|---|--- \nBIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, GTM, Link Controller, PEM, WebAccelerator, WebSafe) | 15.x | None | 15.0.0 | Medium (CVE-2017-5715) \nMedium (CVE-2017-5753) \nMedium (CVE-2017-5754) | [6.4](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:F/RL:U/RC:C>) CVE-2017-5715 \n[5.3](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N/E:P/RL:U/RC:C>) CVE-2017-5753 \n[6.4](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:F/RL:U/RC:C>) CVE-2017-5754 | CPU, BIOS, and kernel \n14.x | None | 14.0.02 \n13.x | 13.0.0 - 13.1.0 | 13.1.0.42 \n13.0.12 \n12.x | 12.1.0 - 12.1.3 | 12.1.3.32 \n11.x | 11.6.1 - 11.6.3 \n11.5.1 - 11.5.5 \n11.2.1 | 11.6.3.12 \n11.5.62 \nEnterprise Manager | 3.x | 3.1.1 | None | Medium (CVE-2017-5715) \nMedium (CVE-2017-5753) \nMedium (CVE-2017-5754) | [6.4](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:F/RL:U/RC:C>) CVE-2017-5715 \n[5.3](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N/E:P/RL:U/RC:C>) CVE-2017-5753 \n[6.4](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:F/RL:U/RC:C>) CVE-2017-5754 | CPU, BIOS, and kernel \nBIG-IQ (Cloud, Device, Security, ADC) | 4.x | 4.5.0 | None | Medium (CVE-2017-5715) \nMedium (CVE-2017-5753) \nMedium (CVE-2017-5754) | [6.4](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:F/RL:U/RC:C>) CVE-2017-5715 \n[5.3](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N/E:P/RL:U/RC:C>) CVE-2017-5753 \n[6.4](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:F/RL:U/RC:C>) CVE-2017-5754 | CPU, BIOS, and kernel \nBIG-IQ Centralized Management | 6.x | 6.0.0 | 6.0.12 | Medium (CVE-2017-5715) \nMedium (CVE-2017-5753) \nMedium (CVE-2017-5754) | [6.4](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:F/RL:U/RC:C>) CVE-2017-5715 \n[5.3](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N/E:P/RL:U/RC:C>) CVE-2017-5753 \n[6.4](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:F/RL:U/RC:C>) CVE-2017-5754 | CPU, BIOS, and kernel \n5.x | 5.0.0 - 5.4.0 | None \n4.x | 4.6.0 | None \nBIG-IQ Cloud and Orchestration | 1.x | 1.0.0 | None | Medium (CVE-2017-5715) \nMedium (CVE-2017-5753) \nMedium (CVE-2017-5754) | [6.4](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:F/RL:U/RC:C>) CVE-2017-5715 \n[5.3](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N/E:P/RL:U/RC:C>) CVE-2017-5753 \n[6.4](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:F/RL:U/RC:C>) CVE-2017-5754 | CPU, BIOS, and kernel \nF5 iWorkflow | 2.x | 2.3.0 \n2.2.0 \n2.1.0 \n2.0.1 - 2.0.2 | None | Medium (CVE-2017-5715) \nMedium (CVE-2017-5753) \nMedium (CVE-2017-5754) | [6.4](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:F/RL:U/RC:C>) CVE-2017-5715 \n[5.3](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N/E:P/RL:U/RC:C>) CVE-2017-5753 \n[6.4](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:F/RL:U/RC:C>) CVE-2017-5754 | CPU, BIOS, and kernel \nLineRate | 2.x | 2.6.0 | None | Medium | ** | CPU, BIOS, and kernel \nTraffix SDC | 5.x | 5.0.0 - 5.1.0 | Security bulletin build 93 (5.1.0) \nSecurity bulletin build 32 (5.0.0) | Medium (CVE-2017-5715) \nHigh (CVE-2017-5753) \nHigh (CVE-2017-5754) | [6.7](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N>) (CVE-2017-5715) \n[8.2](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N>) (CVE-2017-5753) \n[7.9](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N>) (CVE-2017-5754) | CPU, BIOS, and kernel \n4.x | 4.0.0 - 4.4.0 | Security bulletin build 14 (4.4.0) \n \n1The CVSSv3 score link takes you to a resource outside of AskF5, and it is possible that the document may be removed without our knowledge.\n\n2Notes about fixes for CVE-2017-5753 (Spectre-PHT) and CVE-2017-5754 (Meltdown-US):\n\n**Important**: F5 does not plan to release an official fix for CVE-2017-5715 (Spectre-BTB) that is based on Intel's microcode updates. The rationale for this decision is based on significant performance degradation when enabling Intel's microcode fixes in our platforms. During testing of the microcode fix, F5 has observed from 10 percent to more than 50 percent performance degradation for many workloads.\n\n**Important**: Only CVE-2017-5754 (Meltdown-US) is fixed in BIG-IQ.\n\n * Performance impact: \n * CVE-2017-5753 (Spectre-PHT)\n\nF5 does not anticipate a performance impact as a result of the fix for CVE-2017-5753 Spectre-PHT.\n\n * CVE-2017-5754 (Meltdown-US)\n\nIn most scenarios, the fix for Meltdown-US has a negligible performance impact. F5 recommends testing the performance impact before deploying the fix in a production environment, or testing the fix during a maintenance window with consideration to the possible impact on your specific environment. If you encounter unacceptable performance issues in testing and choose to disable the Meltdown-US fix, you can do so by typing the following command:\n\ntmsh modify sys db kernel.pti value disable\n\n**Note:** This database variable change is applied without requirement for a reboot.\n\n**Important:** If you choose to disable the Meltdown-US fix, the system will be vulnerable to the Meltdown-US vulnerability. However, in order to take advantage of this vulnerability, the attacker must already possess the ability to run arbitrary code on the system. For non-vCMP systems, good access controls and keeping your system up-to-date with security fixes will mitigate this risk. For vCMP systems with multiple tenants, F5 recommends that you leave the Meltdown-US fix enabled.\n\n * Virtual F5 products/vCMP guests:\n\nThe Meltdown-US and Spectre-PHT fixes block the ability for those exploits to be executed on the patched OS. If the exploit allows cross-VM boundary information leaks, then a fixed VM is still vulnerable to attacks from a non-fixed VM or the host. Therefore, it is important to apply fixes to both guest VMs and the host that runs them.\n\n * Known issues:\n\nDue to a known issue with the Meltdown-US fix on BIG-IP platforms equipped with an AMD processor, the system may spontaneously reboot. Refer to the table in the **Impact** section for information about which BIG-IP platforms have an AMD processor. F5 Product Development has assigned ID 719711 to this issue. To work around the issue, you can disable the Meltdown-US fix (BIG-IP platforms with an AMD processor are not vulnerable to Meltdown-US per the table in the** Impact** section). To do so, perform the following procedure:\n\n**Note**: Performing the procedure to disable kernel page-table isolation does not disable the Spectre-PHT fix.\n\n 1. Log in to the BIG-IP command line.\n 2. Disable the kernel page-table isolation (PTI) database key by typing the following command: \n\ntmsh modify sys db kernel.pti value disable\n\n 3. Reboot the BIG-IP system by typing the following command: \n\nreboot\n\n**Note**: A reboot is required for this workaround.\n\n**Important**: This command will interrupt traffic while the BIG-IP system either fails over to a peer system or completes the reboot process. \n\nIf you are running a version listed in the **Versions known to be vulnerable** column, you can eliminate this vulnerability by upgrading to a version listed in the **Fixes introduced in** column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.\n\nMitigation\n\nBIG-IP\n\nThe only roles on a BIG-IP system that can exploit these vulnerabilities are the Administrator, Resource Administrator, Manager, and iRules Manager roles. To mitigate against all three vulnerabilities, ensure that you limit access to these roles to only trusted employees.\n\nTo mitigate the Spectre-BTB vulnerability in multi-tenancy vCMP configurations, ensure that all guests are set to at least two **Cores Per Guest**.\n\nTraffix SDC\n\nFixes for CVE-2017-5715, CVE-2017-5753, and CVE-2017-5754 are available from F5 via the following security bulletins for Traffix SDC 5.1.0, 5.0.0, and 4.4.0:\n\n * **5.1.0** \\- security bulletin build 93\n * **5.0.0** \\- security bulletin build 32\n * **4.4.0** \\- security bulletin build 14\n\nFor more information, contact your Traffix SDC Technical Support representative.\n\n * <https://googleprojectzero.blogspot.ca/2018/01/reading-privileged-memory-with-side.html>\n\n**Note**: This link takes you to a resource outside of AskF5. The third party could remove the document without our knowledge.\n\n * <https://meltdownattack.com/>\n\n**Note**: This link takes you to a resource outside of AskF5. The third party could remove the document without our knowledge.\n\n * [K51812227: Understanding Security Advisory versioning](<https://support.f5.com/csp/article/K51812227>)\n * [K9970: Subscribing to email notifications regarding F5 products](<https://support.f5.com/csp/article/K9970>)\n * [K9957: Creating a custom RSS feed to view new and updated documents](<https://support.f5.com/csp/article/K9957>)\n * [K4602: Overview of the F5 security vulnerability response policy](<https://support.f5.com/csp/article/K4602>)\n * [K4918: Overview of the F5 critical issue hotfix policy](<https://support.f5.com/csp/article/K4918>)\n * [K9502: BIG-IP hotfix and point release matrix](<https://support.f5.com/csp/article/K9502>)\n", "edition": 1, "modified": "2019-05-28T22:51:00", "published": "2018-01-04T04:46:00", "id": "F5:K91229003", "href": "https://support.f5.com/csp/article/K91229003", "title": "Side-channel processor vulnerabilities CVE-2017-5715, CVE-2017-5753, and CVE-2017-5754", "type": "f5", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}], "symantec": [{"lastseen": "2018-03-11T18:48:52", "bulletinFamily": "software", "cvelist": ["CVE-2017-5753", "CVE-2017-5754", "CVE-2017-5715"], "description": "### Description\n\nMultiple CPU Hardware are prone to an information-disclosure vulnerability. Attackers can exploit this issue to obtain sensitive information that may aid in further attacks.\n\n### Technologies Affected\n\n * AMD FX(tm)-8320 Eight-Core Processor \n * AMD PRO A8-9600 R7, 10 COMPUTE CORES 4C+6G \n * ARM Cortex A57 \n * Apple Mac Os X 10.11.6 \n * Apple Safari 1.0.0 \n * Apple Safari 1.0.0 \n * Apple Safari 1.0.3 \n * Apple Safari 1.1.0 \n * Apple Safari 1.1.1 \n * Apple Safari 1.2.0 \n * Apple Safari 1.2.1 \n * Apple Safari 1.2.2 \n * Apple Safari 1.2.3 \n * Apple Safari 1.2.4 \n * Apple Safari 1.2.5 \n * Apple Safari 1.3.0 \n * Apple Safari 1.3.0 \n * Apple Safari 1.3.1 \n * Apple Safari 1.3.2 312.5 \n * Apple Safari 1.3.2 312.6 \n * Apple Safari 1.3.2 \n * Apple Safari 10 \n * Apple Safari 10.0.1 \n * Apple Safari 10.0.2 \n * Apple Safari 10.0.3 \n * Apple Safari 10.1 \n * Apple Safari 10.1.1 \n * Apple Safari 10.1.2 \n * Apple Safari 11 \n * Apple Safari 2 \n * Apple Safari 2.0.1 \n * Apple Safari 2.0.2 \n * Apple Safari 2.0.3 417.8 \n * Apple Safari 2.0.3 417.9 \n * Apple Safari 2.0.3 417.9.2 \n * Apple Safari 2.0.3 417.9.3 \n * Apple Safari 2.0.3 \n * Apple Safari 2.0.4 419.3 \n * Apple Safari 2.0.4 \n * Apple Safari 3 \n * Apple Safari 3 \n * Apple Safari 3.0.0 \n * Apple Safari 3.1 \n * Apple Safari 3.1.0B \n * Apple Safari 3.1.1 \n * Apple Safari 3.1.2 \n * Apple Safari 3.2 \n * Apple Safari 3.2.1 \n * Apple Safari 3.2.2 \n * Apple Safari 3.2.3 \n * Apple Safari 3.52 \n * Apple Safari 4 \n * Apple Safari 4.0 \n * Apple Safari 4.0.1 \n * Apple Safari 4.0.2 \n * Apple Safari 4.0.3 \n * Apple Safari 4.0.4 \n * Apple Safari 4.0.5 \n * Apple Safari 4.1 \n * Apple Safari 4.1.1 \n * Apple Safari 4.1.2 \n * Apple Safari 4.1.3 \n * Apple Safari 4.28 \n * Apple Safari 4.30 \n * Apple Safari 4.31 \n * Apple Safari 5.0 \n * Apple Safari 5.0.1 \n * Apple Safari 5.0.2 \n * Apple Safari 5.0.3 \n * Apple Safari 5.0.4 \n * Apple Safari 5.0.5 \n * Apple Safari 5.0.6 \n * Apple Safari 5.1 \n * Apple Safari 5.1.1 \n * Apple Safari 5.1.10 \n * Apple Safari 5.1.2 \n * Apple Safari 5.1.3 \n * Apple Safari 5.1.4 \n * Apple Safari 5.1.5 \n * Apple Safari 5.1.6 \n * Apple Safari 5.1.7 \n * Apple Safari 5.31 \n * Apple Safari 5.33 \n * Apple Safari 5.34 \n * Apple Safari 6.0 \n * Apple Safari 6.0.1 \n * Apple Safari 6.0.2 \n * Apple Safari 6.0.3 \n * Apple Safari 6.0.4 \n * Apple Safari 6.0.5 \n * Apple Safari 6.1 \n * Apple Safari 6.1.1 \n * Apple Safari 6.1.2 \n * Apple Safari 6.1.3 \n * Apple Safari 6.1.4 \n * Apple Safari 6.1.5 \n * Apple Safari 6.1.6 \n * Apple Safari 6.2 \n * Apple Safari 6.2.1 \n * Apple Safari 6.2.2 \n * Apple Safari 6.2.3 \n * Apple Safari 6.2.4 \n * Apple Safari 6.2.5 \n * Apple Safari 6.2.6 \n * Apple Safari 6.2.7 \n * Apple Safari 6.2.8 \n * Apple Safari 7.0.1 \n * Apple Safari 7.0.2 \n * Apple Safari 7.0.3 \n * Apple Safari 7.0.4 \n * Apple Safari 7.0.5 \n * Apple Safari 7.0.6 \n * Apple Safari 7.1 \n * Apple Safari 7.1.0 \n * Apple Safari 7.1.1 \n * Apple Safari 7.1.2 \n * Apple Safari 7.1.3 \n * Apple Safari 7.1.4 \n * Apple Safari 7.1.5 \n * Apple Safari 7.1.6 \n * Apple Safari 7.1.7 \n * Apple Safari 7.1.8 \n * Apple Safari 8.0 \n * Apple Safari 8.0.1 \n * Apple Safari 8.0.2 \n * Apple Safari 8.0.3 \n * Apple Safari 8.0.4 \n * Apple Safari 8.0.5 \n * Apple Safari 8.0.6 \n * Apple Safari 8.0.7 \n * Apple Safari 8.0.8 \n * Apple Safari 9 \n * Apple Safari 9.0.1 \n * Apple Safari 9.0.2 \n * Apple Safari 9.0.3 \n * Apple Safari 9.1 \n * Apple Safari 9.1.1 \n * Apple Safari 9.1.2 \n * Apple Safari 9.1.3 \n * Apple Safari \n * Apple iOS 10 \n * Apple iOS 10.0.1 \n * Apple iOS 10.1 \n * Apple iOS 10.2 \n * Apple iOS 10.2.1 \n * Apple iOS 10.3 \n * Apple iOS 10.3.1 \n * Apple iOS 10.3.2 \n * Apple iOS 10.3.3 \n * Apple iOS 11 \n * Apple iOS 11.1 \n * Apple iOS 11.2 \n * Apple iOS 11.2.1 \n * Apple iOS 2.0 \n * Apple iOS 2.1 \n * Apple iOS 3 \n * Apple iOS 3.0 \n * Apple iOS 3.1 \n * Apple iOS 3.2 \n * Apple iOS 3.2.1 \n * Apple iOS 3.2.2 \n * Apple iOS 4 \n * Apple iOS 4 \n * Apple iOS 4.0.1 \n * Apple iOS 4.0.2 \n * Apple iOS 4.1 \n * Apple iOS 4.2 \n * Apple iOS 4.2.1 \n * Apple iOS 4.2.10 \n * Apple iOS 4.2.5 \n * Apple iOS 4.2.6 \n * Apple iOS 4.2.7 \n * Apple iOS 4.2.8 \n * Apple iOS 4.2.9 \n * Apple iOS 4.3 \n * Apple iOS 4.3.1 \n * Apple iOS 4.3.2 \n * Apple iOS 4.3.3 \n * Apple iOS 4.3.4 \n * Apple iOS 4.3.5 \n * Apple iOS 5 \n * Apple iOS 5 \n * Apple iOS 5.0.1 \n * Apple iOS 5.1 \n * Apple iOS 5.1.1 \n * Apple iOS 6 \n * Apple iOS 6.0.1 \n * Apple iOS 6.0.2 \n * Apple iOS 6.1 \n * Apple iOS 6.1.3 \n * Apple iOS 6.1.4 \n * Apple iOS 6.1.6 \n * Apple iOS 6.3.1 \n * Apple iOS 7 \n * Apple iOS 7.0.1 \n * Apple iOS 7.0.2 \n * Apple iOS 7.0.3 \n * Apple iOS 7.0.4 \n * Apple iOS 7.0.5 \n * Apple iOS 7.0.6 \n * Apple iOS 7.1 \n * Apple iOS 7.1.1 \n * Apple iOS 7.1.2 \n * Apple iOS 7.2.0 \n * Apple iOS 8 \n * Apple iOS 8.1 \n * Apple iOS 8.1.1 \n * Apple iOS 8.1.2 \n * Apple iOS 8.1.3 \n * Apple iOS 8.2 \n * Apple iOS 8.3 \n * Apple iOS 8.4 \n * Apple iOS 8.4.1 \n * Apple iOS 9 \n * Apple iOS 9.0.1 \n * Apple iOS 9.0.2 \n * Apple iOS 9.1 \n * Apple iOS 9.2 \n * Apple iOS 9.2.1 \n * Apple iOS 9.3 \n * Apple iOS 9.3.1 \n * Apple iOS 9.3.2 \n * Apple iOS 9.3.3 \n * Apple iOS 9.3.4 \n * Apple iOS 9.3.5 \n * Apple iPad Air \n * Apple iPhone \n * Apple iPod Touch \n * Apple macOS 10.12.6 \n * Apple macOS \n * Apple tvOS \n * Apple watchOS \n * BD Accuri C6 Plus \n * BD Alaris Systems Manager \n * BD Assurity Linc \n * BD BACTEC 9050 \n * BD BACTEC 9120/9240 \n * BD BACTEC FX \n * BD BACTEC FX40 \n * BD Data Innovations \n * BD FACSAria Fusion \n * BD FACSAria I/II/III \n * BD FACSCalibur \n * BD FACSCanto 10-color \n * BD FACSCanto 10-color clinical \n * BD FACSCanto II \n * BD FACSCanto II clinical \n * BD FACSCelesta \n * BD FACSCount \n * BD FACSDuet Sample Prep (ASaP) \n * BD FACSJazz \n * BD FACSLink Interface \n * BD FACSLyric \n * BD FACSMelody \n * BD FACSPresto \n * BD FACSSample Prep Assistant (SPA) III \n * BD FACSVerse \n * BD FACSVia \n * BD Focal Point - Linux \n * BD Focal Point - Solaris \n * BD GenCell CliC \n * BD Influx \n * BD Innova \n * BD Kiestra InoqulA Standalone \n * BD Kiestra TLA/WCA \n * BD LSR II \n * BD LSRFortessa \n * BD LSRFortessa X-20 \n * BD Lyse Wash Assistant \n * BD Panel Designer \n * BD Phoenix \n * BD PrepStain \n * BD Pyxis Anesthesia ES \n * BD Pyxis Anesthesia System 3500 \n * BD Pyxis CIISafe -Workstation \n * BD Pyxis CUBIE Replenishment Station \n * BD Pyxis CathRack v8 \n * BD Pyxis DuoStation \n * BD Pyxis EcoStation System \n * BD Pyxis Infant Care Verification \n * BD Pyxis MedStation 3500 \n * BD Pyxis MedStation 4000 Console \n * BD Pyxis MedStation ES \n * BD Pyxis Medication Administration \n * BD Pyxis Nursing Data Collection \n * BD Pyxis ParAssist System \n * BD Pyxis Parx \n * BD Pyxis Parx handheld \n * BD Pyxis ProcedureStation \n * BD Pyxis ScrubStation System \n * BD Pyxis Specimen Collection Verification \n * BD Pyxis StockStation System \n * BD Pyxis Supply Roller \n * BD Pyxis SupplyStation \n * BD Pyxis Transfusion Verification \n * BD Rowa Dose \n * BD Rowa Smart \n * BD Rowa Vmax System \n * BD Totalys Multiprocessor \n * BD Totalys SlidePrep \n * BD Veritor Plus System \n * BD Viper LT \n * BD Viper XTR \n * Bluecoat Content Analysis 2.1 \n * Bluecoat Content Analysis 2.2 \n * Bluecoat Malware Analysis Appliance 4.2 \n * Bluecoat Security Analytics 7.1 \n * Bluecoat Security Analytics 7.2 \n * Bluecoat Security Analytics 7.3 \n * Bluecoat X-Series XOS 10.0 \n * Bluecoat X-Series XOS 11.0 \n * Bluecoat X-Series XOS 9.7 \n * Cisco Carrier Routing System 6.6.0.BASE \n * Cisco Unified Computing System 2.2 \n * Cisco Unified Computing System 3.1 \n * Cisco Unified Computing System 3.2 \n * Google Android \n * Google Chrome 0.1.38.1 \n * Google Chrome 0.1.38.2 \n * Google Chrome 0.1.38.4 \n * Google Chrome 0.1.40.1 \n * Google Chrome 0.1.42.2 \n * Google Chrome 0.1.42.3 \n * Google Chrome 0.2.149.27 \n * Google Chrome 0.2.149.29 \n * Google Chrome 0.2.149.30 \n * Google Chrome 0.2.152.1 \n * Google Chrome 0.2.153.1 \n * Google Chrome 0.3.154 9 \n * Google Chrome 0.3.154.0 \n * Google Chrome 0.3.154.3 \n * Google Chrome 0.4.154.18 \n * Google Chrome 0.4.154.22 \n * Google Chrome 0.4.154.31 \n * Google Chrome 0.4.154.33 \n * Google Chrome 1.0.154.36 \n * Google Chrome 1.0.154.39 \n * Google Chrome 1.0.154.42 \n * Google Chrome 1.0.154.43 \n * Google Chrome 1.0.154.46 \n * Google Chrome 1.0.154.48 \n * Google Chrome 1.0.154.52 \n * Google Chrome 1.0.154.53 \n * Google Chrome 1.0.154.55 \n * Google Chrome 1.0.154.59 \n * Google Chrome 1.0.154.61 \n * Google Chrome 1.0.154.64 \n * Google Chrome 1.0.154.65 \n * Google Chrome 10 \n * Google Chrome 10.0.601.0 \n * Google Chrome 10.0.602.0 \n * Google Chrome 10.0.603.0 \n * Google Chrome 10.0.603.2 \n * Google Chrome 10.0.603.3 \n * Google Chrome 10.0.604.0 \n * Google Chrome 10.0.605.0 \n * Google Chrome 10.0.606.0 \n * Google Chrome 10.0.607.0 \n * Google Chrome 10.0.608.0 \n * Google Chrome 10.0.609.0 \n * Google Chrome 10.0.610.0 \n * Google Chrome 10.0.611.0 \n * Google Chrome 10.0.611.1 \n * Google Chrome 10.0.612.0 \n * Google Chrome 10.0.612.1 \n * Google Chrome 10.0.612.2 \n * Google Chrome 10.0.612.3 \n * Google Chrome 10.0.613.0 \n * Google Chrome 10.0.614.0 \n * Google Chrome 10.0.615.0 \n * Google Chrome 10.0.616.0 \n * Google Chrome 10.0.617.0 \n * Google Chrome 10.0.618.0 \n * Google Chrome 10.0.619.0 \n * Google Chrome 10.0.620.0 \n * Google Chrome 10.0.621.0 \n * Google Chrome 10.0.622.0 \n * Google Chrome 10.0.622.1 \n * Google Chrome 10.0.623.0 \n * Google Chrome 10.0.624.0 \n * Google Chrome 10.0.625.0 \n * Google Chrome 10.0.626.0 \n * Google Chrome 10.0.627.0 \n * Google Chrome 10.0.628.0 \n * Google Chrome 10.0.629.0 \n * Google Chrome 10.0.630.0 \n * Google Chrome 10.0.631.0 \n * Google Chrome 10.0.632.0 \n * Google Chrome 10.0.633.0 \n * Google Chrome 10.0.634.0 \n * Google Chrome 10.0.634.1 \n * Google Chrome 10.0.635.0 \n * Google Chrome 10.0.636.0 \n * Google Chrome 10.0.638.0 \n * Google Chrome 10.0.638.1 \n * Google Chrome 10.0.639.0 \n * Google Chrome 10.0.640.0 \n * Google Chrome 10.0.642.0 \n * Google Chrome 10.0.642.1 \n * Google Chrome 10.0.642.2 \n * Google Chrome 10.0.643.0 \n * Google Chrome 10.0.644.0 \n * Google Chrome 10.0.645.0 \n * Google Chrome 10.0.646.0 \n * Google Chrome 10.0.647.0 \n * Google Chrome 10.0.648.0 \n * Google Chrome 10.0.648.1 \n * Google Chrome 10.0.648.10 \n * Google Chrome 10.0.648.101 \n * Google Chrome 10.0.648.103 \n * Google Chrome 10.0.648.105 \n * Google Chrome 10.0.648.107 \n * Google Chrome 10.0.648.11 \n * Google Chrome 10.0.648.114 \n * Google Chrome 10.0.648.116 \n * Google Chrome 10.0.648.118 \n * Google Chrome 10.0.648.119 \n * Google Chrome 10.0.648.12 \n * Google Chrome 10.0.648.120 \n * Google Chrome 10.0.648.121 \n * Google Chrome 10.0.648.122 \n * Google Chrome 10.0.648.123 \n * Google Chrome 10.0.648.124 \n * Google Chrome 10.0.648.125 \n * Google Chrome 10.0.648.126 \n * Google Chrome 10.0.648.127 \n * Google Chrome 10.0.648.128 \n * Google Chrome 10.0.648.129 \n * Google Chrome 10.0.648.13 \n * Google Chrome 10.0.648.130 \n * Google Chrome 10.0.648.131 \n * Google Chrome 10.0.648.132 \n * Google Chrome 10.0.648.133 \n * Google Chrome 10.0.648.134 \n * Google Chrome 10.0.648.135 \n * Google Chrome 10.0.648.151 \n * Google Chrome 10.0.648.18 \n * Google Chrome 10.0.648.2 \n * Google Chrome 10.0.648.201 \n * Google Chrome 10.0.648.203 \n * Google Chrome 10.0.648.204 \n * Google Chrome 10.0.648.205 \n * Google Chrome 10.0.648.23 \n * Google Chrome 10.0.648.26 \n * Google Chrome 10.0.648.28 \n * Google Chrome 10.0.648.3 \n * Google Chrome 10.0.648.32 \n * Google Chrome 10.0.648.35 \n * Google Chrome 10.0.648.38 \n * Google Chrome 10.0.648.4 \n * Google Chrome 10.0.648.42 \n * Google Chrome 10.0.648.45 \n * Google Chrome 10.0.648.49 \n * Google Chrome 10.0.648.5 \n * Google Chrome 10.0.648.54 \n * Google Chrome 10.0.648.56 \n * Google Chrome 10.0.648.59 \n * Google Chrome 10.0.648.6 \n * Google Chrome 10.0.648.62 \n * Google Chrome 10.0.648.66 \n * Google Chrome 10.0.648.68 \n * Google Chrome 10.0.648.7 \n * Google Chrome 10.0.648.70 \n * Google Chrome 10.0.648.72 \n * Google Chrome 10.0.648.76 \n * Google Chrome 10.0.648.79 \n * Google Chrome 10.0.648.8 \n * Google Chrome 10.0.648.82 \n * Google Chrome 10.0.648.84 \n * Google Chrome 10.0.648.87 \n * Google Chrome 10.0.648.9 \n * Google Chrome 10.0.648.90 \n * Google Chrome 10.0.649.0 \n * Google Chrome 10.0.650.0 \n * Google Chrome 10.0.651.0 \n * Google Chrome 11 \n * Google Chrome 11.0.652.0 \n * Google Chrome 11.0.653.0 \n * Google Chrome 11.0.654.0 \n * Google Chrome 11.0.655.0 \n * Google Chrome 11.0.656.0 \n * Google Chrome 11.0.657.0 \n * Google Chrome 11.0.658.0 \n * Google Chrome 11.0.658.1 \n * Google Chrome 11.0.659.0 \n * Google Chrome 11.0.660.0 \n * Google Chrome 11.0.661.0 \n * Google Chrome 11.0.662.0 \n * Google Chrome 11.0.663.0 \n * Google Chrome 11.0.664.1 \n * Google Chrome 11.0.665.0 \n * Google Chrome 11.0.666.0 \n * Google Chrome 11.0.667.0 \n * Google Chrome 11.0.667.2 \n * Google Chrome 11.0.667.3 \n * Google Chrome 11.0.667.4 \n * Google Chrome 11.0.668.0 \n * Google Chrome 11.0.669.0 \n * Google Chrome 11.0.670.0 \n * Google Chrome 11.0.671.0 \n * Google Chrome 11.0.672.0 \n * Google Chrome 11.0.672.1 \n * Google Chrome 11.0.672.2 \n * Google Chrome 11.0.673.0 \n * Google Chrome 11.0.674.0 \n * Google Chrome 11.0.675.0 \n * Google Chrome 11.0.676.0 \n * Google Chrome 11.0.677.0 \n * Google Chrome 11.0.678.0 \n * Google Chrome 11.0.679.0 \n * Google Chrome 11.0.680.0 \n * Google Chrome 11.0.681.0 \n * Google Chrome 11.0.682.0 \n * Google Chrome 11.0.683.0 \n * Google Chrome 11.0.684.0 \n * Google Chrome 11.0.685.0 \n * Google Chrome 11.0.686.0 \n * Google Chrome 11.0.686.1 \n * Google Chrome 11.0.686.2 \n * Google Chrome 11.0.686.3 \n * Google Chrome 11.0.687.0 \n * Google Chrome 11.0.687.1 \n * Google Chrome 11.0.688.0 \n * Google Chrome 11.0.689.0 \n * Google Chrome 11.0.690.0 \n * Google Chrome 11.0.690.1 \n * Google Chrome 11.0.691.0 \n * Google Chrome 11.0.692.0 \n * Google Chrome 11.0.693.0 \n * Google Chrome 11.0.694.0 \n * Google Chrome 11.0.695.0 \n * Google Chrome 11.0.696.0 \n * Google Chrome 11.0.696.1 \n * Google Chrome 11.0.696.10 \n * Google Chrome 11.0.696.11 \n * Google Chrome 11.0.696.12 \n * Google Chrome 11.0.696.13 \n * Google Chrome 11.0.696.14 \n * Google Chrome 11.0.696.15 \n * Google Chrome 11.0.696.16 \n * Google Chrome 11.0.696.17 \n * Google Chrome 11.0.696.18 \n * Google Chrome 11.0.696.19 \n * Google Chrome 11.0.696.2 \n * Google Chrome 11.0.696.20 \n * Google Chrome 11.0.696.21 \n * Google Chrome 11.0.696.22 \n * Google Chrome 11.0.696.23 \n * Google Chrome 11.0.696.24 \n * Google Chrome 11.0.696.25 \n * Google Chrome 11.0.696.26 \n * Google Chrome 11.0.696.27 \n * Google Chrome 11.0.696.28 \n * Google Chrome 11.0.696.29 \n * Google Chrome 11.0.696.3 \n * Google Chrome 11.0.696.30 \n * Google Chrome 11.0.696.31 \n * Google Chrome 11.0.696.32 \n * Google Chrome 11.0.696.33 \n * Google Chrome 11.0.696.34 \n * Google Chrome 11.0.696.35 \n * Google Chrome 11.0.696.36 \n * Google Chrome 11.0.696.37 \n * Google Chrome 11.0.696.38 \n * Google Chrome 11.0.696.39 \n * Google Chrome 11.0.696.4 \n * Google Chrome 11.0.696.40 \n * Google Chrome 11.0.696.41 \n * Google Chrome 11.0.696.42 \n * Google Chrome 11.0.696.43 \n * Google Chrome 11.0.696.44 \n * Google Chrome 11.0.696.45 \n * Google Chrome 11.0.696.46 \n * Google Chrome 11.0.696.47 \n * Google Chrome 11.0.696.48 \n * Google Chrome 11.0.696.49 \n * Google Chrome 11.0.696.5 \n * Google Chrome 11.0.696.50 \n * Google Chrome 11.0.696.51 \n * Google Chrome 11.0.696.52 \n * Google Chrome 11.0.696.53 \n * Google Chrome 11.0.696.54 \n * Google Chrome 11.0.696.55 \n * Google Chrome 11.0.696.56 \n * Google Chrome 11.0.696.57 \n * Google Chrome 11.0.696.58 \n * Google Chrome 11.0.696.59 \n * Google Chrome 11.0.696.60 \n * Google Chrome 11.0.696.61 \n * Google Chrome 11.0.696.62 \n * Google Chrome 11.0.696.63 \n * Google Chrome 11.0.696.64 \n * Google Chrome 11.0.696.65 \n * Google Chrome 11.0.696.66 \n * Google Chrome 11.0.696.67 \n * Google Chrome 11.0.696.68 \n * Google Chrome 11.0.696.69 \n * Google Chrome 11.0.696.7 \n * Google Chrome 11.0.696.70 \n * Google Chrome 11.0.696.71 \n * Google Chrome 11.0.696.72 \n * Google Chrome 11.0.696.77 \n * Google Chrome 11.0.696.8 \n * Google Chrome 11.0.696.9 \n * Google Chrome 11.0.697.0 \n * Google Chrome 11.0.698.0 \n * Google Chrome 11.0.699.0 \n * Google Chrome 12 \n * Google Chrome 12.0.700.0 \n * Google Chrome 12.0.701.0 \n * Google Chrome 12.0.702.0 \n * Google Chrome 12.0.702.1 \n * Google Chrome 12.0.702.2 \n * Google Chrome 12.0.703.0 \n * Google Chrome 12.0.704.0 \n * Google Chrome 12.0.705.0 \n * Google Chrome 12.0.706.0 \n * Google Chrome 12.0.707.0 \n * Google Chrome 12.0.708.0 \n * Google Chrome 12.0.709.0 \n * Google Chrome 12.0.710.0 \n * Google Chrome 12.0.711.0 \n * Google Chrome 12.0.712.0 \n * Google Chrome 12.0.713.0 \n * Google Chrome 12.0.714.0 \n * Google Chrome 12.0.715.0 \n * Google Chrome 12.0.716.0 \n * Google Chrome 12.0.717.0 \n * Google Chrome 12.0.718.0 \n * Google Chrome 12.0.719.0 \n * Google Chrome 12.0.719.1 \n * Google Chrome 12.0.720.0 \n * Google Chrome 12.0.721.0 \n * Google Chrome 12.0.721.1 \n * Google Chrome 12.0.722.0 \n * Google Chrome 12.0.723.0 \n * Google Chrome 12.0.723.1 \n * Google Chrome 12.0.724.0 \n * Google Chrome 12.0.725.0 \n * Google Chrome 12.0.726.0 \n * Google Chrome 12.0.727.0 \n * Google Chrome 12.0.728.0 \n * Google Chrome 12.0.729.0 \n * Google Chrome 12.0.730.0 \n * Google Chrome 12.0.731.0 \n * Google Chrome 12.0.732.0 \n * Google Chrome 12.0.733.0 \n * Google Chrome 12.0.734.0 \n * Google Chrome 12.0.735.0 \n * Google Chrome 12.0.736.0 \n * Google Chrome 12.0.737.0 \n * Google Chrome 12.0.738.0 \n * Google Chrome 12.0.739.0 \n * Google Chrome 12.0.740.0 \n * Google Chrome 12.0.741.0 \n * Google Chrome 12.0.742.0 \n * Google Chrome 12.0.742.1 \n * Google Chrome 12.0.742.10 \n * Google Chrome 12.0.742.100 \n * Google Chrome 12.0.742.105 \n * Google Chrome 12.0.742.11 \n * Google Chrome 12.0.742.111 \n * Google Chrome 12.0.742.112 \n * Google Chrome 12.0.742.113 \n * Google Chrome 12.0.742.114 \n * Google Chrome 12.0.742.115 \n * Google Chrome 12.0.742.12 \n * Google Chrome 12.0.742.120 \n * Google Chrome 12.0.742.121 \n * Google Chrome 12.0.742.122 \n * Google Chrome 12.0.742.123 \n * Google Chrome 12.0.742.124 \n * Google Chrome 12.0.742.13 \n * Google Chrome 12.0.742.14 \n * Google Chrome 12.0.742.15 \n * Google Chrome 12.0.742.16 \n * Google Chrome 12.0.742.17 \n * Google Chrome 12.0.742.18 \n * Google Chrome 12.0.742.19 \n * Google Chrome 12.0.742.2 \n * Google Chrome 12.0.742.20 \n * Google Chrome 12.0.742.21 \n * Google Chrome 12.0.742.22 \n * Google Chrome 12.0.742.3 \n * Google Chrome 12.0.742.30 \n * Google Chrome 12.0.742.4 \n * Google Chrome 12.0.742.41 \n * Google Chrome 12.0.742.42 \n * Google Chrome 12.0.742.43 \n * Google Chrome 12.0.742.44 \n * Google Chrome 12.0.742.45 \n * Google Chrome 12.0.742.46 \n * Google Chrome 12.0.742.47 \n * Google Chrome 12.0.742.48 \n * Google Chrome 12.0.742.49 \n * Google Chrome 12.0.742.5 \n * Google Chrome 12.0.742.50 \n * Google Chrome 12.0.742.51 \n * Google Chrome 12.0.742.52 \n * Google Chrome 12.0.742.53 \n * Google Chrome 12.0.742.54 \n * Google Chrome 12.0.742.55 \n * Google Chrome 12.0.742.56 \n * Google Chrome 12.0.742.57 \n * Google Chrome 12.0.742.58 \n * Google Chrome 12.0.742.59 \n * Google Chrome 12.0.742.6 \n * Google Chrome 12.0.742.60 \n * Google Chrome 12.0.742.61 \n * Google Chrome 12.0.742.63 \n * Google Chrome 12.0.742.64 \n * Google Chrome 12.0.742.65 \n * Google Chrome 12.0.742.66 \n * Google Chrome 12.0.742.67 \n * Google Chrome 12.0.742.68 \n * Google Chrome 12.0.742.69 \n * Google Chrome 12.0.742.70 \n * Google Chrome 12.0.742.71 \n * Google Chrome 12.0.742.72 \n * Google Chrome 12.0.742.73 \n * Google Chrome 12.0.742.74 \n * Google Chrome 12.0.742.75 \n * Google Chrome 12.0.742.77 \n * Google Chrome 12.0.742.8 \n * Google Chrome 12.0.742.82 \n * Google Chrome 12.0.742.9 \n * Google Chrome 12.0.742.91 \n * Google Chrome 12.0.742.92 \n * Google Chrome 12.0.742.93 \n * Google Chrome 12.0.742.94 \n * Google Chrome 12.0.743.0 \n * Google Chrome 12.0.744.0 \n * Google Chrome 12.0.745.0 \n * Google Chrome 12.0.746.0 \n * Google Chrome 12.0.747.0 \n * Google Chrome 13 \n * Google Chrome 13.0.748.0 \n * Google Chrome 13.0.749.0 \n * Google Chrome 13.0.750.0 \n * Google Chrome 13.0.751.0 \n * Google Chrome 13.0.752.0 \n * Google Chrome 13.0.753.0 \n * Google Chrome 13.0.754.0 \n * Google Chrome 13.0.755.0 \n * Google Chrome 13.0.756.0 \n * Google Chrome 13.0.757.0 \n * Google Chrome 13.0.758.0 \n * Google Chrome 13.0.759.0 \n * Google Chrome 13.0.760.0 \n * Google Chrome 13.0.761.0 \n * Google Chrome 13.0.761.1 \n * Google Chrome 13.0.762.0 \n * Google Chrome 13.0.762.1 \n * Google Chrome 13.0.763.0 \n * Google Chrome 13.0.764.0 \n * Google Chrome 13.0.765.0 \n * Google Chrome 13.0.766.0 \n * Google Chrome 13.0.767.0 \n * Google Chrome 13.0.767.1 \n * Google Chrome 13.0.768.0 \n * Google Chrome 13.0.769.0 \n * Google Chrome 13.0.770.0 \n * Google Chrome 13.0.771.0 \n * Google Chrome 13.0.772.0 \n * Google Chrome 13.0.773.0 \n * Google Chrome 13.0.774.0 \n * Google Chrome 13.0.775.0 \n * Google Chrome 13.0.775.1 \n * Google Chrome 13.0.775.2 \n * Google Chrome 13.0.775.4 \n * Google Chrome 13.0.776.0 \n * Google Chrome 13.0.776.1 \n * Google Chrome 13.0.777.0 \n * Google Chrome 13.0.777.1 \n * Google Chrome 13.0.777.2 \n * Google Chrome 13.0.777.3 \n * Google Chrome 13.0.777.4 \n * Google Chrome 13.0.777.5 \n * Google Chrome 13.0.777.6 \n * Google Chrome 13.0.778.0 \n * Google Chrome 13.0.779.0 \n * Google Chrome 13.0.780.0 \n * Google Chrome 13.0.781.0 \n * Google Chrome 13.0.782.0 \n * Google Chrome 13.0.782.1 \n * Google Chrome 13.0.782.10 \n * Google Chrome 13.0.782.100 \n * Google Chrome 13.0.782.101 \n * Google Chrome 13.0.782.102 \n * Google Chrome 13.0.782.103 \n * Google Chrome 13.0.782.104 \n * Google Chrome 13.0.782.105 \n * Google Chrome 13.0.782.106 \n * Google Chrome 13.0.782.107 \n * Google Chrome 13.0.782.108 \n * Google Chrome 13.0.782.109 \n * Google Chrome 13.0.782.11 \n * Google Chrome 13.0.782.112 \n * Google Chrome 13.0.782.12 \n * Google Chrome 13.0.782.13 \n * Google Chrome 13.0.782.14 \n * Google Chrome 13.0.782.15 \n * Google Chrome 13.0.782.16 \n * Google Chrome 13.0.782.17 \n * Google Chrome 13.0.782.18 \n * Google Chrome 13.0.782.19 \n * Google Chrome 13.0.782.20 \n * Google Chrome 13.0.782.21 \n * Google Chrome 13.0.782.210 \n * Google Chrome 13.0.782.211 \n * Google Chrome 13.0.782.212 \n * Google Chrome 13.0.782.213 \n * Google Chrome 13.0.782.214 \n * Google Chrome 13.0.782.215 \n * Google Chrome 13.0.782.216 \n * Google Chrome 13.0.782.217 \n * Google Chrome 13.0.782.218 \n * Google Chrome 13.0.782.219 \n * Google Chrome 13.0.782.220 \n * Google Chrome 13.0.782.23 \n * Google Chrome 13.0.782.237 \n * Google Chrome 13.0.782.238 \n * Google Chrome 13.0.782.24 \n * Google Chrome 13.0.782.25 \n * Google Chrome 13.0.782.26 \n * Google Chrome 13.0.782.27 \n * Google Chrome 13.0.782.28 \n * Google Chrome 13.0.782.29 \n * Google Chrome 13.0.782.3 \n * Google Chrome 13.0.782.30 \n * Google Chrome 13.0.782.31 \n * Google Chrome 13.0.782.32 \n * Google Chrome 13.0.782.33 \n * Google Chrome 13.0.782.34 \n * Google Chrome 13.0.782.35 \n * Google Chrome 13.0.782.36 \n * Google Chrome 13.0.782.37 \n * Google Chrome 13.0.782.38 \n * Google Chrome 13.0.782.39 \n * Google Chrome 13.0.782.4 \n * Google Chrome 13.0.782.40 \n * Google Chrome 13.0.782.41 \n * Google Chrome 13.0.782.42 \n * Google Chrome 13.0.782.43 \n * Google Chrome 13.0.782.44 \n * Google Chrome 13.0.782.45 \n * Google Chrome 13.0.782.46 \n * Google Chrome 13.0.782.47 \n * Google Chrome 13.0.782.48 \n * Google Chrome 13.0.782.49 \n * Google Chrome 13.0.782.50 \n * Google Chrome 13.0.782.51 \n * Google Chrome 13.0.782.52 \n * Google Chrome 13.0.782.53 \n * Google Chrome 13.0.782.55 \n * Google Chrome 13.0.782.56 \n * Google Chrome 13.0.782.6 \n * Google Chrome 13.0.782.7 \n * Google Chrome 13.0.782.81 \n * Google Chrome 13.0.782.82 \n * Google Chrome 13.0.782.83 \n * Google Chrome 13.0.782.84 \n * Google Chrome 13.0.782.85 \n * Google Chrome 13.0.782.86 \n * Google Chrome 13.0.782.87 \n * Google Chrome 13.0.782.88 \n * Google Chrome 13.0.782.89 \n * Google Chrome 13.0.782.90 \n * Google Chrome 13.0.782.91 \n * Google Chrome 13.0.782.92 \n * Google Chrome 13.0.782.93 \n * Google Chrome 13.0.782.94 \n * Google Chrome 13.0.782.95 \n * Google Chrome 13.0.782.96 \n * Google Chrome 13.0.782.97 \n * Google Chrome 13.0.782.98 \n * Google Chrome 13.0.782.99 \n * Google Chrome 14 \n * Google Chrome 14.0.783.0 \n * Google Chrome 14.0.784.0 \n * Google Chrome 14.0.785.0 \n * Google Chrome 14.0.786.0 \n * Google Chrome 14.0.787.0 \n * Google Chrome 14.0.788.0 \n * Google Chrome 14.0.789.0 \n * Google Chrome 14.0.790.0 \n * Google Chrome 14.0.791.0 \n * Google Chrome 14.0.792.0 \n * Google Chrome 14.0.793.0 \n * Google Chrome 14.0.794.0 \n * Google Chrome 14.0.795.0 \n * Google Chrome 14.0.796.0 \n * Google Chrome 14.0.797.0 \n * Google Chrome 14.0.798.0 \n * Google Chrome 14.0.799.0 \n * Google Chrome 14.0.800.0 \n * Google Chrome 14.0.801.0 \n * Google Chrome 14.0.802.0 \n * Google Chrome 14.0.803.0 \n * Google Chrome 14.0.804.0 \n * Google Chrome 14.0.805.0 \n * Google Chrome 14.0.806.0 \n * Google Chrome 14.0.807.0 \n * Google Chrome 14.0.808.0 \n * Google Chrome 14.0.809.0 \n * Google Chrome 14.0.810.0 \n * Google Chrome 14.0.811.0 \n * Google Chrome 14.0.812.0 \n * Google Chrome 14.0.813.0 \n * Google Chrome 14.0.814.0 \n * Google Chrome 14.0.815.0 \n * Google Chrome 14.0.816.0 \n * Google Chrome 14.0.818.0 \n * Google Chrome 14.0.819.0 \n * Google Chrome 14.0.820.0 \n * Google Chrome 14.0.821.0 \n * Google Chrome 14.0.822.0 \n * Google Chrome 14.0.823.0 \n * Google Chrome 14.0.824.0 \n * Google Chrome 14.0.825.0 \n * Google Chrome 14.0.826.0 \n * Google Chrome 14.0.827.0 \n * Google Chrome 14.0.827.10 \n * Google Chrome 14.0.827.12 \n * Google Chrome 14.0.829.1 \n * Google Chrome 14.0.830.0 \n * Google Chrome 14.0.831.0 \n * Google Chrome 14.0.832.0 \n * Google Chrome 14.0.833.0 \n * Google Chrome 14.0.834.0 \n * Google Chrome 14.0.835.0 \n * Google Chrome 14.0.835.1 \n * Google Chrome 14.0.835.100 \n * Google Chrome 14.0.835.101 \n * Google Chrome 14.0.835.102 \n * Google Chrome 14.0.835.103 \n * Google Chrome 14.0.835.104 \n * Google Chrome 14.0.835.105 \n * Google Chrome 14.0.835.106 \n * Google Chrome 14.0.835.107 \n * Google Chrome 14.0.835.108 \n * Google Chrome 14.0.835.109 \n * Google Chrome 14.0.835.11 \n * Google Chrome 14.0.835.110 \n * Google Chrome 14.0.835.111 \n * Google Chrome 14.0.835.112 \n * Google Chrome 14.0.835.113 \n * Google Chrome 14.0.835.114 \n * Google Chrome 14.0.835.115 \n * Google Chrome 14.0.835.116 \n * Google Chrome 14.0.835.117 \n * Google Chrome 14.0.835.118 \n * Google Chrome 14.0.835.119 \n * Google Chrome 14.0.835.120 \n * Google Chrome 14.0.835.121 \n * Google Chrome 14.0.835.122 \n * Google Chrome 14.0.835.123 \n * Google Chrome 14.0.835.124 \n * Google Chrome 14.0.835.125 \n * Google Chrome 14.0.835.126 \n * Google Chrome 14.0.835.127 \n * Google Chrome 14.0.835.128 \n * Google Chrome 14.0.835.13 \n * Google Chrome 14.0.835.14 \n * Google Chrome 14.0.835.149 \n * Google Chrome 14.0.835.15 \n * Google Chrome 14.0.835.150 \n * Google Chrome 14.0.835.151 \n * Google Chrome 14.0.835.152 \n * Google Chrome 14.0.835.153 \n * Google Chrome 14.0.835.154 \n * Google Chrome 14.0.835.155 \n * Google Chrome 14.0.835.156 \n * Google Chrome 14.0.835.157 \n * Google Chrome 14.0.835.158 \n * Google Chrome 14.0.835.159 \n * Google Chrome 14.0.835.16 \n * Google Chrome 14.0.835.160 \n * Google Chrome 14.0.835.161 \n * Google Chrome 14.0.835.162 \n * Google Chrome 14.0.835.163 \n * Google Chrome 14.0.835.18 \n * Google Chrome 14.0.835.184 \n * Google Chrome 14.0.835.186 \n * Google Chrome 14.0.835.187 \n * Google Chrome 14.0.835.2 \n * Google Chrome 14.0.835.20 \n * Google Chrome 14.0.835.202 \n * Google Chrome 14.0.835.203 \n * Google Chrome 14.0.835.204 \n * Google Chrome 14.0.835.21 \n * Google Chrome 14.0.835.22 \n * Google Chrome 14.0.835.23 \n * Google Chrome 14.0.835.24 \n * Google Chrome 14.0.835.25 \n * Google Chrome 14.0.835.26 \n * Google Chrome 14.0.835.27 \n * Google Chrome 14.0.835.28 \n * Google Chrome 14.0.835.29 \n * Google Chrome 14.0.835.30 \n * Google Chrome 14.0.835.31 \n * Google Chrome 14.0.835.32 \n * Google Chrome 14.0.835.33 \n * Google Chrome 14.0.835.34 \n * Google Chrome 14.0.835.35 \n * Google Chrome 14.0.835.4 \n * Google Chrome 14.0.835.8 \n * Google Chrome 14.0.835.86 \n * Google Chrome 14.0.835.87 \n * Google Chrome 14.0.835.88 \n * Google Chrome 14.0.835.89 \n * Google Chrome 14.0.835.9 \n * Google Chrome 14.0.835.90 \n * Google Chrome 14.0.835.91 \n * Google Chrome 14.0.835.92 \n * Google Chrome 14.0.835.93 \n * Google Chrome 14.0.835.94 \n * Google Chrome 14.0.835.95 \n * Google Chrome 14.0.835.96 \n * Google Chrome 14.0.835.97 \n * Google Chrome 14.0.835.98 \n * Google Chrome 14.0.835.99 \n * Google Chrome 14.0.836.0 \n * Google Chrome 14.0.837.0 \n * Google Chrome 14.0.838.0 \n * Google Chrome 14.0.839.0 \n * Google Chrome 15 \n * Google Chrome 15.0.859.0 \n * Google Chrome 15.0.860.0 \n * Google Chrome 15.0.861.0 \n * Google Chrome 15.0.862.0 \n * Google Chrome 15.0.862.1 \n * Google Chrome 15.0.863.0 \n * Google Chrome 15.0.864.0 \n * Google Chrome 15.0.865.0 \n * Google Chrome 15.0.866.0 \n * Google Chrome 15.0.867.0 \n * Google Chrome 15.0.868.0 \n * Google Chrome 15.0.868.1 \n * Google Chrome 15.0.869.0 \n * Google Chrome 15.0.870.0 \n * Google Chrome 15.0.871.0 \n * Google Chrome 15.0.871.1 \n * Google Chrome 15.0.872.0 \n * Google Chrome 15.0.873.0 \n * Google Chrome 15.0.874 102 \n * Google Chrome 15.0.874.0 \n * Google Chrome 15.0.874.1 \n * Google Chrome 15.0.874.10 \n * Google Chrome 15.0.874.101 \n * Google Chrome 15.0.874.102 \n * Google Chrome 15.0.874.103 \n * Google Chrome 15.0.874.104 \n * Google Chrome 15.0.874.106 \n * Google Chrome 15.0.874.11 \n * Google Chrome 15.0.874.116 \n * Google Chrome 15.0.874.117 \n * Google Chrome 15.0.874.119 \n * Google Chrome 15.0.874.12 \n * Google Chrome 15.0.874.120 \n * Google Chrome 15.0.874.121 \n * Google Chrome 15.0.874.13 \n * Google Chrome 15.0.874.14 \n * Google Chrome 15.0.874.15 \n * Google Chrome 15.0.874.16 \n * Google Chrome 15.0.874.17 \n * Google Chrome 15.0.874.18 \n * Google Chrome 15.0.874.19 \n * Google Chrome 15.0.874.2 \n * Google Chrome 15.0.874.20 \n * Google Chrome 15.0.874.21 \n * Google Chrome 15.0.874.22 \n * Google Chrome 15.0.874.23 \n * Google Chrome 15.0.874.24 \n * Google Chrome 15.0.874.3 \n * Google Chrome 15.0.874.4 \n * Google Chrome 15.0.874.44 \n * Google Chrome 15.0.874.45 \n * Google Chrome 15.0.874.46 \n * Google Chrome 15.0.874.47 \n * Google Chrome 15.0.874.48 \n * Google Chrome 15.0.874.49 \n * Google Chrome 15.0.874.5 \n * Google Chrome 15.0.874.6 \n * Google Chrome 15.0.874.7 \n * Google Chrome 15.0.874.8 \n * Google Chrome 15.0.874.9 \n * Google Chrome 16 \n * Google Chrome 16.0.877.0 \n * Google Chrome 16.0.878.0 \n * Google Chrome 16.0.879.0 \n * Google Chrome 16.0.880.0 \n * Google Chrome 16.0.881.0 \n * Google Chrome 16.0.882.0 \n * Google Chrome 16.0.883.0 \n * Google Chrome 16.0.884.0 \n * Google Chrome 16.0.885.0 \n * Google Chrome 16.0.886.0 \n * Google Chrome 16.0.886.1 \n * Google Chrome 16.0.887.0 \n * Google Chrome 16.0.888.0 \n * Google Chrome 16.0.889.0 \n * Google Chrome 16.0.889.2 \n * Google Chrome 16.0.889.3 \n * Google Chrome 16.0.890.0 \n * Google Chrome 16.0.890.1 \n * Google Chrome 16.0.891.0 \n * Google Chrome 16.0.891.1 \n * Google Chrome 16.0.892.0 \n * Google Chrome 16.0.893.0 \n * Google Chrome 16.0.893.1 \n * Google Chrome 16.0.894.0 \n * Google Chrome 16.0.895.0 \n * Google Chrome 16.0.896.0 \n * Google Chrome 16.0.897.0 \n * Google Chrome 16.0.898.0 \n * Google Chrome 16.0.899.0 \n * Google Chrome 16.0.900.0 \n * Google Chrome 16.0.901.0 \n * Google Chrome 16.0.902.0 \n * Google Chrome 16.0.903.0 \n * Google Chrome 16.0.904.0 \n * Google Chrome 16.0.905.0 \n * Google Chrome 16.0.906.0 \n * Google Chrome 16.0.906.1 \n * Google Chrome 16.0.907.0 \n * Google Chrome 16.0.908.0 \n * Google Chrome 16.0.909.0 \n * Google Chrome 16.0.910.0 \n * Google Chrome 16.0.911.0 \n * Google Chrome 16.0.911.1 \n * Google Chrome 16.0.911.2 \n * Google Chrome 16.0.912.0 \n * Google Chrome 16.0.912.1 \n * Google Chrome 16.0.912.10 \n * Google Chrome 16.0.912.11 \n * Google Chrome 16.0.912.12 \n * Google Chrome 16.0.912.13 \n * Google Chrome 16.0.912.14 \n * Google Chrome 16.0.912.15 \n * Google Chrome 16.0.912.19 \n * Google Chrome 16.0.912.2 \n * Google Chrome 16.0.912.20 \n * Google Chrome 16.0.912.21 \n * Google Chrome 16.0.912.22 \n * Google Chrome 16.0.912.23 \n * Google Chrome 16.0.912.24 \n * Google Chrome 16.0.912.25 \n * Google Chrome 16.0.912.26 \n * Google Chrome 16.0.912.27 \n * Google Chrome 16.0.912.28 \n * Google Chrome 16.0.912.29 \n * Google Chrome 16.0.912.3 \n * Google Chrome 16.0.912.30 \n * Google Chrome 16.0.912.31 \n * Google Chrome 16.0.912.32 \n * Google Chrome 16.0.912.33 \n * Google Chrome 16.0.912.34 \n * Google Chrome 16.0.912.35 \n * Google Chrome 16.0.912.36 \n * Google Chrome 16.0.912.37 \n * Google Chrome 16.0.912.38 \n * Google Chrome 16.0.912.39 \n * Google Chrome 16.0.912.4 \n * Google Chrome 16.0.912.40 \n * Google Chrome 16.0.912.41 \n * Google Chrome 16.0.912.42 \n * Google Chrome 16.0.912.43 \n * Google Chrome 16.0.912.5 \n * Google Chrome 16.0.912.6 \n * Google Chrome 16.0.912.62 \n * Google Chrome 16.0.912.63 \n * Google Chrome 16.0.912.66 \n * Google Chrome 16.0.912.7 \n * Google Chrome 16.0.912.74 \n * Google Chrome 16.0.912.75 \n * Google Chrome 16.0.912.76 \n * Google Chrome 16.0.912.77 \n * Google Chrome 16.0.912.8 \n * Google Chrome 16.0.912.9 \n * Google Chrome 17 \n * Google Chrome 17.0.921.3 \n * Google Chrome 17.0.922.0 \n * Google Chrome 17.0.923.0 \n * Google Chrome 17.0.923.1 \n * Google Chrome 17.0.924.0 \n * Google Chrome 17.0.925.0 \n * Google Chrome 17.0.926.0 \n * Google Chrome 17.0.927.0 \n * Google Chrome 17.0.928.0 \n * Google Chrome 17.0.928.1 \n * Google Chrome 17.0.928.2 \n * Google Chrome 17.0.928.3 \n * Google Chrome 17.0.929.0 \n * Google Chrome 17.0.930.0 \n * Google Chrome 17.0.931.0 \n * Google Chrome 17.0.932.0 \n * Google Chrome 17.0.933.0 \n * Google Chrome 17.0.933.1 \n * Google Chrome 17.0.934.0 \n * Google Chrome 17.0.935.0 \n * Google Chrome 17.0.935.1 \n * Google Chrome 17.0.936.0 \n * Google Chrome 17.0.936.1 \n * Google Chrome 17.0.937.0 \n * Google Chrome 17.0.938.0 \n * Google Chrome 17.0.939.0 \n * Google Chrome 17.0.939.1 \n * Google Chrome 17.0.940.0 \n * Google Chrome 17.0.941.0 \n * Google Chrome 17.0.942.0 \n * Google Chrome 17.0.943.0 \n * Google Chrome 17.0.944.0 \n * Google Chrome 17.0.945.0 \n * Google Chrome 17.0.946.0 \n * Google Chrome 17.0.947.0 \n * Google Chrome 17.0.948.0 \n * Google Chrome 17.0.949.0 \n * Google Chrome 17.0.950.0 \n * Google Chrome 17.0.951.0 \n * Google Chrome 17.0.952.0 \n * Google Chrome 17.0.953.0 \n * Google Chrome 17.0.954.0 \n * Google Chrome 17.0.954.1 \n * Google Chrome 17.0.954.2 \n * Google Chrome 17.0.954.3 \n * Google Chrome 17.0.955.0 \n * Google Chrome 17.0.956.0 \n * Google Chrome 17.0.957.0 \n * Google Chrome 17.0.958.0 \n * Google Chrome 17.0.958.1 \n * Google Chrome 17.0.959.0 \n * Google Chrome 17.0.960.0 \n * Google Chrome 17.0.961.0 \n * Google Chrome 17.0.962.0 \n * Google Chrome 17.0.963.0 \n * Google Chrome 17.0.963.1 \n * Google Chrome 17.0.963.10 \n * Google Chrome 17.0.963.11 \n * Google Chrome 17.0.963.12 \n * Google Chrome 17.0.963.13 \n * Google Chrome 17.0.963.14 \n * Google Chrome 17.0.963.15 \n * Google Chrome 17.0.963.16 \n * Google Chrome 17.0.963.17 \n * Google Chrome 17.0.963.18 \n * Google Chrome 17.0.963.19 \n * Google Chrome 17.0.963.2 \n * Google Chrome 17.0.963.20 \n * Google Chrome 17.0.963.21 \n * Google Chrome 17.0.963.22 \n * Google Chrome 17.0.963.23 \n * Google Chrome 17.0.963.24 \n * Google Chrome 17.0.963.25 \n * Google Chrome 17.0.963.26 \n * Google Chrome 17.0.963.27 \n * Google Chrome 17.0.963.28 \n * Google Chrome 17.0.963.29 \n * Google Chrome 17.0.963.3 \n * Google Chrome 17.0.963.30 \n * Google Chrome 17.0.963.31 \n * Google Chrome 17.0.963.32 \n * Google Chrome 17.0.963.33 \n * Google Chrome 17.0.963.34 \n * Google Chrome 17.0.963.35 \n * Google Chrome 17.0.963.36 \n * Google Chrome 17.0.963.37 \n * Google Chrome 17.0.963.38 \n * Google Chrome 17.0.963.39 \n * Google Chrome 17.0.963.4 \n * Google Chrome 17.0.963.40 \n * Google Chrome 17.0.963.41 \n * Google Chrome 17.0.963.42 \n * Google Chrome 17.0.963.43 \n * Google Chrome 17.0.963.44 \n * Google Chrome 17.0.963.45 \n * Google Chrome 17.0.963.46 \n * Google Chrome 17.0.963.47 \n * Google Chrome 17.0.963.48 \n * Google Chrome 17.0.963.49 \n * Google Chrome 17.0.963.5 \n * Google Chrome 17.0.963.50 \n * Google Chrome 17.0.963.51 \n * Google Chrome 17.0.963.52 \n * Google Chrome 17.0.963.53 \n * Google Chrome 17.0.963.54 \n * Google Chrome 17.0.963.55 \n * Google Chrome 17.0.963.56 \n * Google Chrome 17.0.963.57 \n * Google Chrome 17.0.963.59 \n * Google Chrome 17.0.963.6 \n * Google Chrome 17.0.963.60 \n * Google Chrome 17.0.963.61 \n * Google Chrome 17.0.963.62 \n * Google Chrome 17.0.963.63 \n * Google Chrome 17.0.963.64 \n * Google Chrome 17.0.963.65 \n * Google Chrome 17.0.963.66 \n * Google Chrome 17.0.963.67 \n * Google Chrome 17.0.963.69 \n * Google Chrome 17.0.963.7 \n * Google Chrome 17.0.963.70 \n * Google Chrome 17.0.963.74 \n * Google Chrome 17.0.963.75 \n * Google Chrome 17.0.963.76 \n * Google Chrome 17.0.963.77 \n * Google Chrome 17.0.963.78 \n * Google Chrome 17.0.963.79 \n * Google Chrome 17.0.963.8 \n * Google Chrome 17.0.963.80 \n * Google Chrome 17.0.963.81 \n * Google Chrome 17.0.963.82 \n * Google Chrome 17.0.963.83 \n * Google Chrome 17.0.963.84 \n * Google Chrome 17.0.963.9 \n * Google Chrome 18 \n * Google Chrome 18.0.1000.0 \n * Google Chrome 18.0.1001.0 \n * Google Chrome 18.0.1001.1 \n * Google Chrome 18.0.1002.0 \n * Google Chrome 18.0.1003.0 \n * Google Chrome 18.0.1003.1 \n * Google Chrome 18.0.1004.0 \n * Google Chrome 18.0.1005.0 \n * Google Chrome 18.0.1006.0 \n * Google Chrome 18.0.1007.0 \n * Google Chrome 18.0.1008.0 \n * Google Chrome 18.0.1009.0 \n * Google Chrome 18.0.1010.0 \n * Google Chrome 18.0.1010.1 \n * Google Chrome 18.0.1010.2 \n * Google Chrome 18.0.1011.1 \n * Google Chrome 18.0.1012.0 \n * Google Chrome 18.0.1012.1 \n * Google Chrome 18.0.1012.2 \n * Google Chrome 18.0.1013.0 \n * Google Chrome 18.0.1014.0 \n * Google Chrome 18.0.1015.0 \n * Google Chrome 18.0.1016.0 \n * Google Chrome 18.0.1017.0 \n * Google Chrome 18.0.1017.1 \n * Google Chrome 18.0.1017.2 \n * Google Chrome 18.0.1017.3 \n * Google Chrome 18.0.1018.0 \n * Google Chrome 18.0.1019.0 \n * Google Chrome 18.0.1019.1 \n * Google Chrome 18.0.1020.0 \n * Google Chrome 18.0.1021.0 \n * Google Chrome 18.0.1022.0 \n * Google Chrome 18.0.1023.0 \n * Google Chrome 18.0.1024.0 \n * Google Chrome 18.0.1025.0 \n * Google Chrome 18.0.1025.1 \n * Google Chrome 18.0.1025.10 \n * Google Chrome 18.0.1025.100 \n * Google Chrome 18.0.1025.102 \n * Google Chrome 18.0.1025.107 \n * Google Chrome 18.0.1025.108 \n * Google Chrome 18.0.1025.109 \n * Google Chrome 18.0.1025.110 \n * Google Chrome 18.0.1025.111 \n * Google Chrome 18.0.1025.112 \n * Google Chrome 18.0.1025.113 \n * Google Chrome 18.0.1025.114 \n * Google Chrome 18.0.1025.116 \n * Google Chrome 18.0.1025.117 \n * Google Chrome 18.0.1025.118 \n * Google Chrome 18.0.1025.120 \n * Google Chrome 18.0.1025.129 \n * Google Chrome 18.0.1025.130 \n * Google Chrome 18.0.1025.131 \n * Google Chrome 18.0.1025.132 \n * Google Chrome 18.0.1025.133 \n * Google Chrome 18.0.1025.134 \n * Google Chrome 18.0.1025.135 \n * Google Chrome 18.0.1025.136 \n * Google Chrome 18.0.1025.137 \n * Google Chrome 18.0.1025.139 \n * Google Chrome 18.0.1025.140 \n * Google Chrome 18.0.1025.142 \n * Google Chrome 18.0.1025.145 \n * Google Chrome 18.0.1025.146 \n * Google Chrome 18.0.1025.147 \n * Google Chrome 18.0.1025.148 \n * Google Chrome 18.0.1025.149 \n * Google Chrome 18.0.1025.150 \n * Google Chrome 18.0.1025.151 \n * Google Chrome 18.0.1025.162 \n * Google Chrome 18.0.1025.168 \n * Google Chrome 18.0.1025.2 \n * Google Chrome 18.0.1025.29 \n * Google Chrome 18.0.1025.3 \n * Google Chrome 18.0.1025.30 \n * Google Chrome 18.0.1025.31 \n * Google Chrome 18.0.1025.32 \n * Google Chrome 18.0.1025.33 \n * Google Chrome 18.0.1025.35 \n * Google Chrome 18.0.1025.36 \n * Google Chrome 18.0.1025.37 \n * Google Chrome 18.0.1025.38 \n * Google Chrome 18.0.1025.39 \n * Google Chrome 18.0.1025.4 \n * Google Chrome 18.0.1025.40 \n * Google Chrome 18.0.1025.41 \n * Google Chrome 18.0.1025.42 \n * Google Chrome 18.0.1025.43 \n * Google Chrome 18.0.1025.44 \n * Google Chrome 18.0.1025.45 \n * Google Chrome 18.0.1025.46 \n * Google Chrome 18.0.1025.47 \n * Google Chrome 18.0.1025.48 \n * Google Chrome 18.0.1025.49 \n * Google Chrome 18.0.1025.5 \n * Google Chrome 18.0.1025.50 \n * Google Chrome 18.0.1025.51 \n * Google Chrome 18.0.1025.52 \n * Google Chrome 18.0.1025.54 \n * Google Chrome 18.0.1025.55 \n * Google Chrome 18.0.1025.56 \n * Google Chrome 18.0.1025.57 \n * Google Chrome 18.0.1025.58 \n * Google Chrome 18.0.1025.6 \n * Google Chrome 18.0.1025.60 \n * Google Chrome 18.0.1025.7 \n * Google Chrome 18.0.1025.73 \n * Google Chrome 18.0.1025.74 \n * Google Chrome 18.0.1025.8 \n * Google Chrome 18.0.1025.9 \n * Google Chrome 18.0.1025.95 \n * Google Chrome 18.0.1025.96 \n * Google Chrome 18.0.1025.97 \n * Google Chrome 18.0.1025.98 \n * Google Chrome 18.0.1025.99 \n * Google Chrome 19 \n * Google Chrome 19.0.1028.0 \n * Google Chrome 19.0.1029.0 \n * Google Chrome 19.0.1030.0 \n * Google Chrome 19.0.1031.0 \n * Google Chrome 19.0.1032.0 \n * Google Chrome 19.0.1033.0 \n * Google Chrome 19.0.1034.0 \n * Google Chrome 19.0.1035.0 \n * Google Chrome 19.0.1036.0 \n * Google Chrome 19.0.1036.2 \n * Google Chrome 19.0.1036.3 \n * Google Chrome 19.0.1036.4 \n * Google Chrome 19.0.1036.6 \n * Google Chrome 19.0.1036.7 \n * Google Chrome 19.0.1037.0 \n * Google Chrome 19.0.1038.0 \n * Google Chrome 19.0.1039.0 \n * Google Chrome 19.0.1040.0 \n * Google Chrome 19.0.1041.0 \n * Google Chrome 19.0.1042.0 \n * Google Chrome 19.0.1043.0 \n * Google Chrome 19.0.1044.0 \n * Google Chrome 19.0.1045.0 \n * Google Chrome 19.0.1046.0 \n * Google Chrome 19.0.1047.0 \n * Google Chrome 19.0.1048.0 \n * Google Chrome 19.0.1049.0 \n * Google Chrome 19.0.1049.1 \n * Google Chrome 19.0.1049.2 \n * Google Chrome 19.0.1049.3 \n * Google Chrome 19.0.1050.0 \n * Google Chrome 19.0.1051.0 \n * Google Chrome 19.0.1052.0 \n * Google Chrome 19.0.1053.0 \n * Google Chrome 19.0.1054.0 \n * Google Chrome 19.0.1055.0 \n * Google Chrome 19.0.1055.1 \n * Google Chrome 19.0.1055.2 \n * Google Chrome 19.0.1055.3 \n * Google Chrome 19.0.1056.0 \n * Google Chrome 19.0.1056.1 \n * Google Chrome 19.0.1057.0 \n * Google Chrome 19.0.1057.1 \n * Google Chrome 19.0.1057.3 \n * Google Chrome 19.0.1058.0 \n * Google Chrome 19.0.1058.1 \n * Google Chrome 19.0.1059.0 \n * Google Chrome 19.0.1060.0 \n * Google Chrome 19.0.1060.1 \n * Google Chrome 19.0.1061.0 \n * Google Chrome 19.0.1061.1 \n * Google Chrome 19.0.1062.0 \n * Google Chrome 19.0.1062.1 \n * Google Chrome 19.0.1063.0 \n * Google Chrome 19.0.1063.1 \n * Google Chrome 19.0.1064.0 \n * Google Chrome 19.0.1065.0 \n * Google Chrome 19.0.1066.0 \n * Google Chrome 19.0.1067.0 \n * Google Chrome 19.0.1068.0 \n * Google Chrome 19.0.1068.1 \n * Google Chrome 19.0.1069.0 \n * Google Chrome 19.0.1070.0 \n * Google Chrome 19.0.1071.0 \n * Google Chrome 19.0.1072.0 \n * Google Chrome 19.0.1073.0 \n * Google Chrome 19.0.1074.0 \n * Google Chrome 19.0.1075.0 \n * Google Chrome 19.0.1076.0 \n * Google Chrome 19.0.1076.1 \n * Google Chrome 19.0.1077.0 \n * Google Chrome 19.0.1077.1 \n * Google Chrome 19.0.1077.2 \n * Google Chrome 19.0.1077.3 \n * Google Chrome 19.0.1078.0 \n * Google Chrome 19.0.1079.0 \n * Google Chrome 19.0.1080.0 \n * Google Chrome 19.0.1081.0 \n * Google Chrome 19.0.1081.2 \n * Google Chrome 19.0.1082.0 \n * Google Chrome 19.0.1082.1 \n * Google Chrome 19.0.1083.0 \n * Google Chrome 19.0.1084.0 \n * Google Chrome 19.0.1084.1 \n * Google Chrome 19.0.1084.10 \n * Google Chrome 19.0.1084.11 \n * Google Chrome 19.0.1084.12 \n * Google Chrome 19.0.1084.13 \n * Google Chrome 19.0.1084.14 \n * Google Chrome 19.0.1084.15 \n * Google Chrome 19.0.1084.16 \n * Google Chrome 19.0.1084.17 \n * Google Chrome 19.0.1084.18 \n * Google Chrome 19.0.1084.19 \n * Google Chrome 19.0.1084.2 \n * Google Chrome 19.0.1084.20 \n * Google Chrome 19.0.1084.21 \n * Google Chrome 19.0.1084.22 \n * Google Chrome 19.0.1084.23 \n * Google Chrome 19.0.1084.24 \n * Google Chrome 19.0.1084.25 \n * Google Chrome 19.0.1084.26 \n * Google Chrome 19.0.1084.27 \n * Google Chrome 19.0.1084.28 \n * Google Chrome 19.0.1084.29 \n * Google Chrome 19.0.1084.3 \n * Google Chrome 19.0.1084.30 \n * Google Chrome 19.0.1084.31 \n * Google Chrome 19.0.1084.32 \n * Google Chrome 19.0.1084.33 \n * Google Chrome 19.0.1084.35 \n * Google Chrome 19.0.1084.36 \n * Google Chrome 19.0.1084.37 \n * Google Chrome 19.0.1084.38 \n * Google Chrome 19.0.1084.39 \n * Google Chrome 19.0.1084.4 \n * Google Chrome 19.0.1084.40 \n * Google Chrome 19.0.1084.41 \n * Google Chrome 19.0.1084.42 \n * Google Chrome 19.0.1084.43 \n * Google Chrome 19.0.1084.44 \n * Google Chrome 19.0.1084.45 \n * Google Chrome 19.0.1084.46 \n * Google Chrome 19.0.1084.47 \n * Google Chrome 19.0.1084.48 \n * Google Chrome 19.0.1084.5 \n * Google Chrome 19.0.1084.50 \n * Google Chrome 19.0.1084.51 \n * Google Chrome 19.0.1084.52 \n * Google Chrome 19.0.1084.6 \n * Google Chrome 19.0.1084.7 \n * Google Chrome 19.0.1084.8 \n * Google Chrome 19.0.1084.9 \n * Google Chrome 19.0.1085.0 \n * Google Chrome 2.0.156.1 \n * Google Chrome 2.0.157.0 \n * Google Chrome 2.0.157.2 \n * Google Chrome 2.0.158.0 \n * Google Chrome 2.0.159.0 \n * Google Chrome 2.0.169.0 \n * Google Chrome 2.0.169.1 \n * Google Chrome 2.0.170.0 \n * Google Chrome 2.0.172 \n * Google Chrome 2.0.172.2 \n * Google Chrome 2.0.172.27 \n * Google Chrome 2.0.172.28 \n * Google Chrome 2.0.172.30 \n * Google Chrome 2.0.172.31 \n * Google Chrome 2.0.172.33 \n * Google Chrome 2.0.172.37 \n * Google Chrome 2.0.172.38 \n * Google Chrome 2.0.172.43 \n * Google Chrome 2.0.172.8 \n * Google Chrome 20 \n * Google Chrome 20.0.1132.0 \n * Google Chrome 20.0.1132.1 \n * Google Chrome 20.0.1132.10 \n * Google Chrome 20.0.1132.11 \n * Google Chrome 20.0.1132.12 \n * Google Chrome 20.0.1132.13 \n * Google Chrome 20.0.1132.14 \n * Google Chrome 20.0.1132.15 \n * Google Chrome 20.0.1132.16 \n * Google Chrome 20.0.1132.17 \n * Google Chrome 20.0.1132.18 \n * Google Chrome 20.0.1132.19 \n * Google Chrome 20.0.1132.2 \n * Google Chrome 20.0.1132.20 \n * Google Chrome 20.0.1132.21 \n * Google Chrome 20.0.1132.22 \n * Google Chrome 20.0.1132.23 \n * Google Chrome 20.0.1132.24 \n * Google Chrome 20.0.1132.25 \n * Google Chrome 20.0.1132.26 \n * Google Chrome 20.0.1132.27 \n * Google Chrome 20.0.1132.28 \n * Google Chrome 20.0.1132.29 \n * Google Chrome 20.0.1132.3 \n * Google Chrome 20.0.1132.30 \n * Google Chrome 20.0.1132.31 \n * Google Chrome 20.0.1132.32 \n * Google Chrome 20.0.1132.33 \n * Google Chrome 20.0.1132.34 \n * Google Chrome 20.0.1132.35 \n * Google Chrome 20.0.1132.36 \n * Google Chrome 20.0.1132.37 \n * Google Chrome 20.0.1132.38 \n * Google Chrome 20.0.1132.39 \n * Google Chrome 20.0.1132.4 \n * Google Chrome 20.0.1132.40 \n * Google Chrome 20.0.1132.41 \n * Google Chrome 20.0.1132.42 \n * Google Chrome 20.0.1132.43 \n * Google Chrome 20.0.1132.45 \n * Google Chrome 20.0.1132.46 \n * Google Chrome 20.0.1132.47 \n * Google Chrome 20.0.1132.5 \n * Google Chrome 20.0.1132.54 \n * Google Chrome 20.0.1132.55 \n * Google Chrome 20.0.1132.56 \n * Google Chrome 20.0.1132.57 \n * Google Chrome 20.0.1132.6 \n * Google Chrome 20.0.1132.7 \n * Google Chrome 20.0.1132.8 \n * Google Chrome 20.0.1132.9 \n * Google Chrome 21 \n * Google Chrome 21.0.1180.0 \n * Google Chrome 21.0.1180.1 \n * Google Chrome 21.0.1180.2 \n * Google Chrome 21.0.1180.31 \n * Google Chrome 21.0.1180.32 \n * Google Chrome 21.0.1180.33 \n * Google Chrome 21.0.1180.34 \n * Google Chrome 21.0.1180.35 \n * Google Chrome 21.0.1180.36 \n * Google Chrome 21.0.1180.37 \n * Google Chrome 21.0.1180.38 \n * Google Chrome 21.0.1180.39 \n * Google Chrome 21.0.1180.41 \n * Google Chrome 21.0.1180.46 \n * Google Chrome 21.0.1180.47 \n * Google Chrome 21.0.1180.48 \n * Google Chrome 21.0.1180.49 \n * Google Chrome 21.0.1180.50 \n * Google Chrome 21.0.1180.51 \n * Google Chrome 21.0.1180.52 \n * Google Chrome 21.0.1180.53 \n * Google Chrome 21.0.1180.54 \n * Google Chrome 21.0.1180.55 \n * Google Chrome 21.0.1180.56 \n * Google Chrome 21.0.1180.57 \n * Google Chrome 21.0.1180.59 \n * Google Chrome 21.0.1180.60 \n * Google Chrome 21.0.1180.61 \n * Google Chrome 21.0.1180.62 \n * Google Chrome 21.0.1180.63 \n * Google Chrome 21.0.1180.64 \n * Google Chrome 21.0.1180.68 \n * Google Chrome 21.0.1180.69 \n * Google Chrome 21.0.1180.70 \n * Google Chrome 21.0.1180.71 \n * Google Chrome 21.0.1180.72 \n * Google Chrome 21.0.1180.73 \n * Google Chrome 21.0.1180.74 \n * Google Chrome 21.0.1180.75 \n * Google Chrome 21.0.1180.76 \n * Google Chrome 21.0.1180.77 \n * Google Chrome 21.0.1180.78 \n * Google Chrome 21.0.1180.79 \n * Google Chrome 21.0.1180.80 \n * Google Chrome 21.0.1180.81 \n * Google Chrome 21.0.1180.82 \n * Google Chrome 21.0.1180.83 \n * Google Chrome 21.0.1180.84 \n * Google Chrome 21.0.1180.85 \n * Google Chrome 21.0.1180.86 \n * Google Chrome 21.0.1180.87 \n * Google Chrome 21.0.1180.88 \n * Google Chrome 21.0.1180.89 \n * Google Chrome 22 \n * Google Chrome 22.0.1229.0 \n * Google Chrome 22.0.1229.1 \n * Google Chrome 22.0.1229.10 \n * Google Chrome 22.0.1229.11 \n * Google Chrome 22.0.1229.12 \n * Google Chrome 22.0.1229.14 \n * Google Chrome 22.0.1229.16 \n * Google Chrome 22.0.1229.17 \n * Google Chrome 22.0.1229.18 \n * Google Chrome 22.0.1229.2 \n * Google Chrome 22.0.1229.20 \n * Google Chrome 22.0.1229.21 \n * Google Chrome 22.0.1229.22 \n * Google Chrome 22.0.1229.23 \n * Google Chrome 22.0.1229.24 \n * Google Chrome 22.0.1229.25 \n * Google Chrome 22.0.1229.26 \n * Google Chrome 22.0.1229.27 \n * Google Chrome 22.0.1229.28 \n * Google Chrome 22.0.1229.29 \n * Google Chrome 22.0.1229.3 \n * Google Chrome 22.0.1229.31 \n * Google Chrome 22.0.1229.32 \n * Google Chrome 22.0.1229.33 \n * Google Chrome 22.0.1229.35 \n * Google Chrome 22.0.1229.36 \n * Google Chrome 22.0.1229.37 \n * Google Chrome 22.0.1229.39 \n * Google Chrome 22.0.1229.4 \n * Google Chrome 22.0.1229.48 \n * Google Chrome 22.0.1229.49 \n * Google Chrome 22.0.1229.50 \n * Google Chrome 22.0.1229.51 \n * Google Chrome 22.0.1229.52 \n * Google Chrome 22.0.1229.53 \n * Google Chrome 22.0.1229.54 \n * Google Chrome 22.0.1229.55 \n * Google Chrome 22.0.1229.56 \n * Google Chrome 22.0.1229.57 \n * Google Chrome 22.0.1229.58 \n * Google Chrome 22.0.1229.59 \n * Google Chrome 22.0.1229.6 \n * Google Chrome 22.0.1229.60 \n * Google Chrome 22.0.1229.62 \n * Google Chrome 22.0.1229.63 \n * Google Chrome 22.0.1229.64 \n * Google Chrome 22.0.1229.65 \n * Google Chrome 22.0.1229.67 \n * Google Chrome 22.0.1229.7 \n * Google Chrome 22.0.1229.76 \n * Google Chrome 22.0.1229.78 \n * Google Chrome 22.0.1229.79 \n * Google Chrome 22.0.1229.8 \n * Google Chrome 22.0.1229.89 \n * Google Chrome 22.0.1229.9 \n * Google Chrome 22.0.1229.91 \n * Google Chrome 22.0.1229.92 \n * Google Chrome 22.0.1229.94 \n * Google Chrome 22.0.1229.95 \n * Google Chrome 22.0.1229.96 \n * Google Chrome 23.0.1271.0 \n * Google Chrome 23.0.1271.1 \n * Google Chrome 23.0.1271.10 \n * Google Chrome 23.0.1271.11 \n * Google Chrome 23.0.1271.12 \n * Google Chrome 23.0.1271.13 \n * Google Chrome 23.0.1271.14 \n * Google Chrome 23.0.1271.15 \n * Google Chrome 23.0.1271.16 \n * Google Chrome 23.0.1271.17 \n * Google Chrome 23.0.1271.18 \n * Google Chrome 23.0.1271.19 \n * Google Chrome 23.0.1271.2 \n * Google Chrome 23.0.1271.20 \n * Google Chrome 23.0.1271.21 \n * Google Chrome 23.0.1271.22 \n * Google Chrome 23.0.1271.23 \n * Google Chrome 23.0.1271.24 \n * Google Chrome 23.0.1271.26 \n * Google Chrome 23.0.1271.3 \n * Google Chrome 23.0.1271.30 \n * Google Chrome 23.0.1271.31 \n * Google Chrome 23.0.1271.32 \n * Google Chrome 23.0.1271.33 \n * Google Chrome 23.0.1271.35 \n * Google Chrome 23.0.1271.36 \n * Google Chrome 23.0.1271.37 \n * Google Chrome 23.0.1271.38 \n * Google Chrome 23.0.1271.39 \n * Google Chrome 23.0.1271.4 \n * Google Chrome 23.0.1271.40 \n * Google Chrome 23.0.1271.41 \n * Google Chrome 23.0.1271.44 \n * Google Chrome 23.0.1271.45 \n * Google Chrome 23.0.1271.46 \n * Google Chrome 23.0.1271.49 \n * Google Chrome 23.0.1271.5 \n * Google Chrome 23.0.1271.50 \n * Google Chrome 23.0.1271.51 \n * Google Chrome 23.0.1271.52 \n * Google Chrome 23.0.1271.53 \n * Google Chrome 23.0.1271.54 \n * Google Chrome 23.0.1271.55 \n * Google Chrome 23.0.1271.56 \n * Google Chrome 23.0.1271.57 \n * Google Chrome 23.0.1271.58 \n * Google Chrome 23.0.1271.59 \n * Google Chrome 23.0.1271.6 \n * Google Chrome 23.0.1271.60 \n * Google Chrome 23.0.1271.61 \n * Google Chrome 23.0.1271.62 \n * Google Chrome 23.0.1271.64 \n * Google Chrome 23.0.1271.7 \n * Google Chrome 23.0.1271.8 \n * Google Chrome 23.0.1271.83 \n * Google Chrome 23.0.1271.84 \n * Google Chrome 23.0.1271.85 \n * Google Chrome 23.0.1271.86 \n * Google Chrome 23.0.1271.87 \n * Google Chrome 23.0.1271.88 \n * Google Chrome 23.0.1271.89 \n * Google Chrome 23.0.1271.9 \n * Google Chrome 23.0.1271.91 \n * Google Chrome 23.0.1271.95 \n * Google Chrome 23.0.1271.96 \n * Google Chrome 23.0.1271.97 \n * Google Chrome 24.0.1272.0 \n * Google Chrome 24.0.1272.1 \n * Google Chrome 24.0.1273.0 \n * Google Chrome 24.0.1274.0 \n * Google Chrome 24.0.1275.0 \n * Google Chrome 24.0.1276.0 \n * Google Chrome 24.0.1276.1 \n * Google Chrome 24.0.1277.0 \n * Google Chrome 24.0.1278.0 \n * Google Chrome 24.0.1279.0 \n * Google Chrome 24.0.1280.0 \n * Google Chrome 24.0.1281.0 \n * Google Chrome 24.0.1281.1 \n * Google Chrome 24.0.1281.2 \n * Google Chrome 24.0.1281.3 \n * Google Chrome 24.0.1282.0 \n * Google Chrome 24.0.1283.0 \n * Google Chrome 24.0.1284.0 \n * Google Chrome 24.0.1284.1 \n * Google Chrome 24.0.1284.2 \n * Google Chrome 24.0.1285.0 \n * Google Chrome 24.0.1285.1 \n * Google Chrome 24.0.1285.2 \n * Google Chrome 24.0.1286.0 \n * Google Chrome 24.0.1286.1 \n * Google Chrome 24.0.1287.0 \n * Google Chrome 24.0.1287.1 \n * Google Chrome 24.0.1288.0 \n * Google Chrome 24.0.1288.1 \n * Google Chrome 24.0.1289.0 \n * Google Chrome 24.0.1289.1 \n * Google Chrome 24.0.1290.0 \n * Google Chrome 24.0.1291.0 \n * Google Chrome 24.0.1292.0 \n * Google Chrome 24.0.1293.0 \n * Google Chrome 24.0.1294.0 \n * Google Chrome 24.0.1295.0 \n * Google Chrome 24.0.1296.0 \n * Google Chrome 24.0.1297.0 \n * Google Chrome 24.0.1298.0 \n * Google Chrome 24.0.1299.0 \n * Google Chrome 24.0.1300.0 \n * Google Chrome 24.0.1301.0 \n * Google Chrome 24.0.1301.2 \n * Google Chrome 24.0.1302.0 \n * Google Chrome 24.0.1303.0 \n * Google Chrome 24.0.1304.0 \n * Google Chrome 24.0.1304.1 \n * Google Chrome 24.0.1305.0 \n * Google Chrome 24.0.1305.1 \n * Google Chrome 24.0.1305.2 \n * Google Chrome 24.0.1305.3 \n * Google Chrome 24.0.1305.4 \n * Google Chrome 24.0.1306.0 \n * Google Chrome 24.0.1306.1 \n * Google Chrome 24.0.1307.0 \n * Google Chrome 24.0.1307.1 \n * Google Chrome 24.0.1308.0 \n * Google Chrome 24.0.1309.0 \n * Google Chrome 24.0.1310.0 \n * Google Chrome 24.0.1311.0 \n * Google Chrome 24.0.1311.1 \n * Google Chrome 24.0.1312.0 \n * Google Chrome 24.0.1312.1 \n * Google Chrome 24.0.1312.10 \n * Google Chrome 24.0.1312.11 \n * Google Chrome 24.0.1312.12 \n * Google Chrome 24.0.1312.13 \n * Google Chrome 24.0.1312.14 \n * Google Chrome 24.0.1312.15 \n * Google Chrome 24.0.1312.16 \n * Google Chrome 24.0.1312.17 \n * Google Chrome 24.0.1312.18 \n * Google Chrome 24.0.1312.19 \n * Google Chrome 24.0.1312.20 \n * Google Chrome 24.0.1312.21 \n * Google Chrome 24.0.1312.22 \n * Google Chrome 24.0.1312.23 \n * Google Chrome 24.0.1312.24 \n * Google Chrome 24.0.1312.25 \n * Google Chrome 24.0.1312.26 \n * Google Chrome 24.0.1312.27 \n * Google Chrome 24.0.1312.28 \n * Google Chrome 24.0.1312.29 \n * Google Chrome 24.0.1312.30 \n * Google Chrome 24.0.1312.31 \n * Google Chrome 24.0.1312.32 \n * Google Chrome 24.0.1312.33 \n * Google Chrome 24.0.1312.34 \n * Google Chrome 24.0.1312.35 \n * Google Chrome 24.0.1312.36 \n * Google Chrome 24.0.1312.37 \n * Google Chrome 24.0.1312.38 \n * Google Chrome 24.0.1312.39 \n * Google Chrome 24.0.1312.4 \n * Google Chrome 24.0.1312.40 \n * Google Chrome 24.0.1312.41 \n * Google Chrome 24.0.1312.42 \n * Google Chrome 24.0.1312.43 \n * Google Chrome 24.0.1312.44 \n * Google Chrome 24.0.1312.45 \n * Google Chrome 24.0.1312.46 \n * Google Chrome 24.0.1312.47 \n * Google Chrome 24.0.1312.48 \n * Google Chrome 24.0.1312.49 \n * Google Chrome 24.0.1312.5 \n * Google Chrome 24.0.1312.50 \n * Google Chrome 24.0.1312.51 \n * Google Chrome 24.0.1312.52 \n * Google Chrome 24.0.1312.53 \n * Google Chrome 24.0.1312.54 \n * Google Chrome 24.0.1312.55 \n * Google Chrome 24.0.1312.56 \n * Google Chrome 24.0.1312.57 \n * Google Chrome 24.0.1312.6 \n * Google Chrome 24.0.1312.7 \n * Google Chrome 24.0.1312.70 \n * Google Chrome 24.0.1312.8 \n * Google Chrome 24.0.1312.9 \n * Google Chrome 25 \n * Google Chrome 25.0.1364.0 \n * Google Chrome 25.0.1364.1 \n * Google Chrome 25.0.1364.10 \n * Google Chrome 25.0.1364.108 \n * Google Chrome 25.0.1364.11 \n * Google Chrome 25.0.1364.110 \n * Google Chrome 25.0.1364.112 \n * Google Chrome 25.0.1364.113 \n * Google Chrome 25.0.1364.114 \n * Google Chrome 25.0.1364.115 \n * Google Chrome 25.0.1364.116 \n * Google Chrome 25.0.1364.117 \n * Google Chrome 25.0.1364.118 \n * Google Chrome 25.0.1364.119 \n * Google Chrome 25.0.1364.12 \n * Google Chrome 25.0.1364.120 \n * Google Chrome 25.0.1364.121 \n * Google Chrome 25.0.1364.122 \n * Google Chrome 25.0.1364.123 \n * Google Chrome 25.0.1364.124 \n * Google Chrome 25.0.1364.125 \n * Google Chrome 25.0.1364.126 \n * Google Chrome 25.0.1364.13 \n * Google Chrome 25.0.1364.14 \n * Google Chrome 25.0.1364.15 \n * Google Chrome 25.0.1364.152 \n * Google Chrome 25.0.1364.16 \n * Google Chrome 25.0.1364.160 \n * Google Chrome 25.0.1364.17 \n * Google Chrome 25.0.1364.172 \n * Google Chrome 25.0.1364.18 \n * Google Chrome 25.0.1364.19 \n * Google Chrome 25.0.1364.2 \n * Google Chrome 25.0.1364.20 \n * Google Chrome 25.0.1364.21 \n * Google Chrome 25.0.1364.22 \n * Google Chrome 25.0.1364.23 \n * Google Chrome 25.0.1364.24 \n * Google Chrome 25.0.1364.25 \n * Google Chrome 25.0.1364.26 \n * Google Chrome 25.0.1364.27 \n * Google Chrome 25.0.1364.28 \n * Google Chrome 25.0.1364.29 \n * Google Chrome 25.0.1364.3 \n * Google Chrome 25.0.1364.30 \n * Google Chrome 25.0.1364.31 \n * Google Chrome 25.0.1364.32 \n * Google Chrome 25.0.1364.33 \n * Google Chrome 25.0.1364.34 \n * Google Chrome 25.0.1364.35 \n * Google Chrome 25.0.1364.36 \n * Google Chrome 25.0.1364.37 \n * Google Chrome 25.0.1364.38 \n * Google Chrome 25.0.1364.39 \n * Google Chrome 25.0.1364.40 \n * Google Chrome 25.0.1364.41 \n * Google Chrome 25.0.1364.42 \n * Google Chrome 25.0.1364.43 \n * Google Chrome 25.0.1364.44 \n * Google Chrome 25.0.1364.45 \n * Google Chrome 25.0.1364.46 \n * Google Chrome 25.0.1364.47 \n * Google Chrome 25.0.1364.48 \n * Google Chrome 25.0.1364.49 \n * Google Chrome 25.0.1364.5 \n * Google Chrome 25.0.1364.50 \n * Google Chrome 25.0.1364.51 \n * Google Chrome 25.0.1364.52 \n * Google Chrome 25.0.1364.53 \n * Google Chrome 25.0.1364.54 \n * Google Chrome 25.0.1364.55 \n * Google Chrome 25.0.1364.56 \n * Google Chrome 25.0.1364.57 \n * Google Chrome 25.0.1364.58 \n * Google Chrome 25.0.1364.61 \n * Google Chrome 25.0.1364.62 \n * Google Chrome 25.0.1364.63 \n * Google Chrome 25.0.1364.65 \n * Google Chrome 25.0.1364.66 \n * Google Chrome 25.0.1364.67 \n * Google Chrome 25.0.1364.68 \n * Google Chrome 25.0.1364.7 \n * Google Chrome 25.0.1364.70 \n * Google Chrome 25.0.1364.72 \n * Google Chrome 25.0.1364.73 \n * Google Chrome 25.0.1364.74 \n * Google Chrome 25.0.1364.75 \n * Google Chrome 25.0.1364.76 \n * Google Chrome 25.0.1364.77 \n * Google Chrome 25.0.1364.78 \n * Google Chrome 25.0.1364.79 \n * Google Chrome 25.0.1364.8 \n * Google Chrome 25.0.1364.80 \n * Google Chrome 25.0.1364.81 \n * Google Chrome 25.0.1364.82 \n * Google Chrome 25.0.1364.84 \n * Google Chrome 25.0.1364.85 \n * Google Chrome 25.0.1364.86 \n * Google Chrome 25.0.1364.87 \n * Google Chrome 25.0.1364.88 \n * Google Chrome 25.0.1364.89 \n * Google Chrome 25.0.1364.9 \n * Google Chrome 25.0.1364.90 \n * Google Chrome 25.0.1364.91 \n * Google Chrome 25.0.1364.92 \n * Google Chrome 25.0.1364.93 \n * Google Chrome 25.0.1364.95 \n * Google Chrome 25.0.1364.97 \n * Google Chrome 25.0.1364.98 \n * Google Chrome 25.0.1364.99 \n * Google Chrome 26.0.1410.28 \n * Google Chrome 26.0.1410.43 \n * Google Chrome 26.0.1410.46 \n * Google Chrome 26.0.1410.53 \n * Google Chrome 26.0.1410.63 \n * Google Chrome 26.0.1410.64 \n * Google Chrome 27.0.1444.0 \n * Google Chrome 27.0.1444.3 \n * Google Chrome 27.0.1453.0 \n * Google Chrome 27.0.1453.1 \n * Google Chrome 27.0.1453.10 \n * Google Chrome 27.0.1453.102 \n * Google Chrome 27.0.1453.103 \n * Google Chrome 27.0.1453.104 \n * Google Chrome 27.0.1453.105 \n * Google Chrome 27.0.1453.106 \n * Google Chrome 27.0.1453.107 \n * Google Chrome 27.0.1453.108 \n * Google Chrome 27.0.1453.109 \n * Google Chrome 27.0.1453.11 \n * Google Chrome 27.0.1453.110 \n * Google Chrome 27.0.1453.111 \n * Google Chrome 27.0.1453.112 \n * Google Chrome 27.0.1453.113 \n * Google Chrome 27.0.1453.114 \n * Google Chrome 27.0.1453.115 \n * Google Chrome 27.0.1453.116 \n * Google Chrome 27.0.1453.12 \n * Google Chrome 27.0.1453.13 \n * Google Chrome 27.0.1453.15 \n * Google Chrome 27.0.1453.2 \n * Google Chrome 27.0.1453.3 \n * Google Chrome 27.0.1453.34 \n * Google Chrome 27.0.1453.35 \n * Google Chrome 27.0.1453.36 \n * Google Chrome 27.0.1453.37 \n * Google Chrome 27.0.1453.38 \n * Google Chrome 27.0.1453.39 \n * Google Chrome 27.0.1453.4 \n * Google Chrome 27.0.1453.40 \n * Google Chrome 27.0.1453.41 \n * Google Chrome 27.0.1453.42 \n * Google Chrome 27.0.1453.43 \n * Google Chrome 27.0.1453.44 \n * Google Chrome 27.0.1453.45 \n * Google Chrome 27.0.1453.46 \n * Google Chrome 27.0.1453.47 \n * Google Chrome 27.0.1453.49 \n * Google Chrome 27.0.1453.5 \n * Google Chrome 27.0.1453.50 \n * Google Chrome 27.0.1453.51 \n * Google Chrome 27.0.1453.52 \n * Google Chrome 27.0.1453.54 \n * Google Chrome 27.0.1453.55 \n * Google Chrome 27.0.1453.56 \n * Google Chrome 27.0.1453.57 \n * Google Chrome 27.0.1453.58 \n * Google Chrome 27.0.1453.59 \n * Google Chrome 27.0.1453.6 \n * Google Chrome 27.0.1453.60 \n * Google Chrome 27.0.1453.61 \n * Google Chrome 27.0.1453.62 \n * Google Chrome 27.0.1453.63 \n * Google Chrome 27.0.1453.64 \n * Google Chrome 27.0.1453.65 \n * Google Chrome 27.0.1453.66 \n * Google Chrome 27.0.1453.67 \n * Google Chrome 27.0.1453.68 \n * Google Chrome 27.0.1453.69 \n * Google Chrome 27.0.1453.7 \n * Google Chrome 27.0.1453.70 \n * Google Chrome 27.0.1453.71 \n * Google Chrome 27.0.1453.72 \n * Google Chrome 27.0.1453.73 \n * Google Chrome 27.0.1453.74 \n * Google Chrome 27.0.1453.75 \n * Google Chrome 27.0.1453.76 \n * Google Chrome 27.0.1453.77 \n * Google Chrome 27.0.1453.78 \n * Google Chrome 27.0.1453.79 \n * Google Chrome 27.0.1453.8 \n * Google Chrome 27.0.1453.80 \n * Google Chrome 27.0.1453.81 \n * Google Chrome 27.0.1453.82 \n * Google Chrome 27.0.1453.83 \n * Google Chrome 27.0.1453.84 \n * Google Chrome 27.0.1453.85 \n * Google Chrome 27.0.1453.86 \n * Google Chrome 27.0.1453.87 \n * Google Chrome 27.0.1453.88 \n * Google Chrome 27.0.1453.89 \n * Google Chrome 27.0.1453.9 \n * Google Chrome 27.0.1453.90 \n * Google Chrome 27.0.1453.91 \n * Google Chrome 27.0.1453.93 \n * Google Chrome 27.0.1453.94 \n * Google Chrome 28.0.1498.0 \n * Google Chrome 28.0.1500.0 \n * Google Chrome 28.0.1500.10 \n * Google Chrome 28.0.1500.11 \n * Google Chrome 28.0.1500.12 \n * Google Chrome 28.0.1500.13 \n * Google Chrome 28.0.1500.14 \n * Google Chrome 28.0.1500.15 \n * Google Chrome 28.0.1500.16 \n * Google Chrome 28.0.1500.17 \n * Google Chrome 28.0.1500.18 \n * Google Chrome 28.0.1500.19 \n * Google Chrome 28.0.1500.2 \n * Google Chrome 28.0.1500.20 \n * Google Chrome 28.0.1500.21 \n * Google Chrome 28.0.1500.22 \n * Google Chrome 28.0.1500.23 \n * Google Chrome 28.0.1500.24 \n * Google Chrome 28.0.1500.25 \n * Google Chrome 28.0.1500.26 \n * Google Chrome 28.0.1500.27 \n * Google Chrome 28.0.1500.28 \n * Google Chrome 28.0.1500.29 \n * Google Chrome 28.0.1500.3 \n * Google Chrome 28.0.1500.31 \n * Google Chrome 28.0.1500.32 \n * Google Chrome 28.0.1500.33 \n * Google Chrome 28.0.1500.34 \n * Google Chrome 28.0.1500.35 \n * Google Chrome 28.0.1500.36 \n * Google Chrome 28.0.1500.37 \n * Google Chrome 28.0.1500.38 \n * Google Chrome 28.0.1500.39 \n * Google Chrome 28.0.1500.4 \n * Google Chrome 28.0.1500.40 \n * Google Chrome 28.0.1500.41 \n * Google Chrome 28.0.1500.42 \n * Google Chrome 28.0.1500.43 \n * Google Chrome 28.0.1500.44 \n * Google Chrome 28.0.1500.45 \n * Google Chrome 28.0.1500.46 \n * Google Chrome 28.0.1500.47 \n * Google Chrome 28.0.1500.48 \n * Google Chrome 28.0.1500.49 \n * Google Chrome 28.0.1500.5 \n * Google Chrome 28.0.1500.50 \n * Google Chrome 28.0.1500.51 \n * Google Chrome 28.0.1500.52 \n * Google Chrome 28.0.1500.53 \n * Google Chrome 28.0.1500.54 \n * Google Chrome 28.0.1500.56 \n * Google Chrome 28.0.1500.58 \n * Google Chrome 28.0.1500.59 \n * Google Chrome 28.0.1500.6 \n * Google Chrome 28.0.1500.60 \n * Google Chrome 28.0.1500.61 \n * Google Chrome 28.0.1500.62 \n * Google Chrome 28.0.1500.63 \n * Google Chrome 28.0.1500.64 \n * Google Chrome 28.0.1500.66 \n * Google Chrome 28.0.1500.68 \n * Google Chrome 28.0.1500.70 \n * Google Chrome 28.0.1500.71 \n * Google Chrome 28.0.1500.72 \n * Google Chrome 28.0.1500.8 \n * Google Chrome 28.0.1500.89 \n * Google Chrome 28.0.1500.9 \n * Google Chrome 28.0.1500.91 \n * Google Chrome 28.0.1500.93 \n * Google Chrome 28.0.1500.94 \n * Google Chrome 28.0.1500.95 \n * Google Chrome 29.0.1547.0 \n * Google Chrome 29.0.1547.10 \n * Google Chrome 29.0.1547.12 \n * Google Chrome 29.0.1547.14 \n * Google Chrome 29.0.1547.16 \n * Google Chrome 29.0.1547.18 \n * Google Chrome 29.0.1547.2 \n * Google Chrome 29.0.1547.21 \n * Google Chrome 29.0.1547.23 \n * Google Chrome 29.0.1547.28 \n * Google Chrome 29.0.1547.3 \n * Google Chrome 29.0.1547.31 \n * Google Chrome 29.0.1547.33 \n * Google Chrome 29.0.1547.35 \n * Google Chrome 29.0.1547.37 \n * Google Chrome 29.0.1547.39 \n * Google Chrome 29.0.1547.40 \n * Google Chrome 29.0.1547.42 \n * Google Chrome 29.0.1547.46 \n * Google Chrome 29.0.1547.48 \n * Google Chrome 29.0.1547.5 \n * Google Chrome 29.0.1547.51 \n * Google Chrome 29.0.1547.53 \n * Google Chrome 29.0.1547.55 \n * Google Chrome 29.0.1547.57 \n * Google Chrome 29.0.1547.7 \n * Google Chrome 29.0.1547.76 \n * Google Chrome 29.0.1547.9 \n * Google Chrome 3 \n * Google Chrome 3.0 Beta \n * Google Chrome 3.0.182.2 \n * Google Chrome 3.0.190.2 \n * Google Chrome 3.0.193.2 Beta \n * Google Chrome 3.0.195.2 \n * Google Chrome 3.0.195.21 \n * Google Chrome 3.0.195.24 \n * Google Chrome 3.0.195.25 \n * Google Chrome 3.0.195.27 \n * Google Chrome 3.0.195.32 \n * Google Chrome 3.0.195.33 \n * Google Chrome 3.0.195.36 \n * Google Chrome 3.0.195.37 \n * Google Chrome 3.0.195.38 \n * Google Chrome 30.0.1599.0 \n * Google Chrome 30.0.1599.10 \n * Google Chrome 30.0.1599.100 \n * Google Chrome 30.0.1599.101 \n * Google Chrome 30.0.1599.12 \n * Google Chrome 30.0.1599.14 \n * Google Chrome 30.0.1599.16 \n * Google Chrome 30.0.1599.18 \n * Google Chrome 30.0.1599.2 \n * Google Chrome 30.0.1599.21 \n * Google Chrome 30.0.1599.23 \n * Google Chrome 30.0.1599.25 \n * Google Chrome 30.0.1599.27 \n * Google Chrome 30.0.1599.29 \n * Google Chrome 30.0.1599.31 \n * Google Chrome 30.0.1599.33 \n * Google Chrome 30.0.1599.35 \n * Google Chrome 30.0.1599.37 \n * Google Chrome 30.0.1599.39 \n * Google Chrome 30.0.1599.40 \n * Google Chrome 30.0.1599.42 \n * Google Chrome 30.0.1599.44 \n * Google Chrome 30.0.1599.48 \n * Google Chrome 30.0.1599.5 \n * Google Chrome 30.0.1599.51 \n * Google Chrome 30.0.1599.53 \n * Google Chrome 30.0.1599.57 \n * Google Chrome 30.0.1599.59 \n * Google Chrome 30.0.1599.60 \n * Google Chrome 30.0.1599.64 \n * Google Chrome 30.0.1599.66 \n * Google Chrome 30.0.1599.67 \n * Google Chrome 30.0.1599.68 \n * Google Chrome 30.0.1599.69 \n * Google Chrome 30.0.1599.7 \n * Google Chrome 30.0.1599.79 \n * Google Chrome 30.0.1599.80 \n * Google Chrome 30.0.1599.81 \n * Google Chrome 30.0.1599.82 \n * Google Chrome 30.0.1599.84 \n * Google Chrome 30.0.1599.85 \n * Google Chrome 30.0.1599.86 \n * Google Chrome 30.0.1599.87 \n * Google Chrome 30.0.1599.88 \n * Google Chrome 30.0.1599.9 \n * Google Chrome 30.0.1599.90 \n * Google Chrome 31.0.1650.0 \n * Google Chrome 31.0.1650.10 \n * Google Chrome 31.0.1650.11 \n * Google Chrome 31.0.1650.12 \n * Google Chrome 31.0.1650.13 \n * Google Chrome 31.0.1650.14 \n * Google Chrome 31.0.1650.15 \n * Google Chrome 31.0.1650.16 \n * Google Chrome 31.0.1650.17 \n * Google Chrome 31.0.1650.18 \n * Google Chrome 31.0.1650.19 \n * Google Chrome 31.0.1650.2 \n * Google Chrome 31.0.1650.20 \n * Google Chrome 31.0.1650.22 \n * Google Chrome 31.0.1650.23 \n * Google Chrome 31.0.1650.25 \n * Google Chrome 31.0.1650.26 \n * Google Chrome 31.0.1650.27 \n * Google Chrome 31.0.1650.28 \n * Google Chrome 31.0.1650.29 \n * Google Chrome 31.0.1650.3 \n * Google Chrome 31.0.1650.30 \n * Google Chrome 31.0.1650.31 \n * Google Chrome 31.0.1650.32 \n * Google Chrome 31.0.1650.33 \n * Google Chrome 31.0.1650.34 \n * Google Chrome 31.0.1650.35 \n * Google Chrome 31.0.1650.36 \n * Google Chrome 31.0.1650.37 \n * Google Chrome 31.0.1650.38 \n * Google Chrome 31.0.1650.39 \n * Google Chrome 31.0.1650.4 \n * Google Chrome 31.0.1650.41 \n * Google Chrome 31.0.1650.42 \n * Google Chrome 31.0.1650.43 \n * Google Chrome 31.0.1650.44 \n * Google Chrome 31.0.1650.45 \n * Google Chrome 31.0.1650.46 \n * Google Chrome 31.0.1650.47 \n * Google Chrome 31.0.1650.48 \n * Google Chrome 31.0.1650.49 \n * Google Chrome 31.0.1650.5 \n * Google Chrome 31.0.1650.50 \n * Google Chrome 31.0.1650.52 \n * Google Chrome 31.0.1650.54 \n * Google Chrome 31.0.1650.57 \n * Google Chrome 31.0.1650.58 \n * Google Chrome 31.0.1650.6 \n * Google Chrome 31.0.1650.60 \n * Google Chrome 31.0.1650.61 \n * Google Chrome 31.0.1650.62 \n * Google Chrome 31.0.1650.63 \n * Google Chrome 31.0.1650.7 \n * Google Chrome 31.0.1650.8 \n * Google Chrome 31.0.1650.9 \n * Google Chrome 32.0.1651.2 \n * Google Chrome 32.0.1652.1 \n * Google Chrome 32.0.1653.1 \n * Google Chrome 32.0.1654.0 \n * Google Chrome 32.0.1654.3 \n * Google Chrome 32.0.1655.1 \n * Google Chrome 32.0.1656.1 \n * Google Chrome 32.0.1657.0 \n * Google Chrome 32.0.1658.0 \n * Google Chrome 32.0.1658.2 \n * Google Chrome 32.0.1659.1 \n * Google Chrome 32.0.1659.3 \n * Google Chrome 32.0.1660.1 \n * Google Chrome 32.0.1661.0 \n * Google Chrome 32.0.1662.0 \n * Google Chrome 32.0.1662.2 \n * Google Chrome 32.0.1663.1 \n * Google Chrome 32.0.1663.3 \n * Google Chrome 32.0.1664.1 \n * Google Chrome 32.0.1664.3 \n * Google Chrome 32.0.1666.0 \n * Google Chrome 32.0.1667.0 \n * Google Chrome 32.0.1668.0 \n * Google Chrome 32.0.1668.2 \n * Google Chrome 32.0.1668.4 \n * Google Chrome 32.0.1668.6 \n * Google Chrome 32.0.1669.1 \n * Google Chrome 32.0.1669.3 \n * Google Chrome 32.0.1670.1 \n * Google Chrome 32.0.1670.3 \n * Google Chrome 32.0.1670.5 \n * Google Chrome 32.0.1671.2 \n * Google Chrome 32.0.1671.4 \n * Google Chrome 32.0.1671.8 \n * Google Chrome 32.0.1672.2 \n * Google Chrome 32.0.1673.2 \n * Google Chrome 32.0.1673.4 \n * Google Chrome 32.0.1674.1 \n * Google Chrome 32.0.1675.0 \n * Google Chrome 32.0.1675.2 \n * Google Chrome 32.0.1676.0 \n * Google Chrome 32.0.1676.2 \n * Google Chrome 32.0.1677.1 \n * Google Chrome 32.0.1678.1 \n * Google Chrome 32.0.1679.0 \n * Google Chrome 32.0.1680.0 \n * Google Chrome 32.0.1681.0 \n * Google Chrome 32.0.1681.3 \n * Google Chrome 32.0.1682.3 \n * Google Chrome 32.0.1682.5 \n * Google Chrome 32.0.1683.1 \n * Google Chrome 32.0.1684.0 \n * Google Chrome 32.0.1684.2 \n * Google Chrome 32.0.1685.0 \n * Google Chrome 32.0.1685.2 \n * Google Chrome 32.0.1686.0 \n * Google Chrome 32.0.1687.0 \n * Google Chrome 32.0.1688.0 \n * Google Chrome 32.0.1689.0 \n * Google Chrome 32.0.1689.2 \n * Google Chrome 32.0.1690.0 \n * Google Chrome 32.0.1700.0 \n * Google Chrome 32.0.1700.100 \n * Google Chrome 32.0.1700.102 \n * Google Chrome 32.0.1700.103 \n * Google Chrome 32.0.1700.107 \n * Google Chrome 32.0.1700.11 \n * Google Chrome 32.0.1700.13 \n * Google Chrome 32.0.1700.15 \n * Google Chrome 32.0.1700.17 \n * Google Chrome 32.0.1700.19 \n * Google Chrome 32.0.1700.21 \n * Google Chrome 32.0.1700.23 \n * Google Chrome 32.0.1700.26 \n * Google Chrome 32.0.1700.28 \n * Google Chrome 32.0.1700.3 \n * Google Chrome 32.0.1700.31 \n * Google Chrome 32.0.1700.33 \n * Google Chrome 32.0.1700.35 \n * Google Chrome 32.0.1700.39 \n * Google Chrome 32.0.1700.41 \n * Google Chrome 32.0.1700.50 \n * Google Chrome 32.0.1700.52 \n * Google Chrome 32.0.1700.54 \n * Google Chrome 32.0.1700.56 \n * Google Chrome 32.0.1700.58 \n * Google Chrome 32.0.1700.6 \n * Google Chrome 32.0.1700.63 \n * Google Chrome 32.0.1700.65 \n * Google Chrome 32.0.1700.67 \n * Google Chrome 32.0.1700.69 \n * Google Chrome 32.0.1700.70 \n * Google Chrome 32.0.1700.74 \n * Google Chrome 32.0.1700.76 \n * Google Chrome 32.0.1700.77 \n * Google Chrome 32.0.1700.9 \n * Google Chrome 32.0.1700.95 \n * Google Chrome 32.0.1700.97 \n * Google Chrome 32.0.1700.98 \n * Google Chrome 33.0.1750.0 \n * Google Chrome 33.0.1750.10 \n * Google Chrome 33.0.1750.106 \n * Google Chrome 33.0.1750.108 \n * Google Chrome 33.0.1750.11 \n * Google Chrome 33.0.1750.111 \n * Google Chrome 33.0.1750.113 \n * Google Chrome 33.0.1750.116 \n * Google Chrome 33.0.1750.117 \n * Google Chrome 33.0.1750.124 \n * Google Chrome 33.0.1750.125 \n * Google Chrome 33.0.1750.13 \n * Google Chrome 33.0.1750.132 \n * Google Chrome 33.0.1750.135 \n * Google Chrome 33.0.1750.14 \n * Google Chrome 33.0.1750.144 \n * Google Chrome 33.0.1750.146 \n * Google Chrome 33.0.1750.149 \n * Google Chrome 33.0.1750.151 \n * Google Chrome 33.0.1750.152 \n * Google Chrome 33.0.1750.154 \n * Google Chrome 33.0.1750.16 \n * Google Chrome 33.0.1750.166 \n * Google Chrome 33.0.1750.168 \n * Google Chrome 33.0.1750.19 \n * Google Chrome 33.0.1750.20 \n * Google Chrome 33.0.1750.22 \n * Google Chrome 33.0.1750.24 \n * Google Chrome 33.0.1750.26 \n * Google Chrome 33.0.1750.28 \n * Google Chrome 33.0.1750.3 \n * Google Chrome 33.0.1750.31 \n * Google Chrome 33.0.1750.35 \n * Google Chrome 33.0.1750.37 \n * Google Chrome 33.0.1750.39 \n * Google Chrome 33.0.1750.40 \n * Google Chrome 33.0.1750.42 \n * Google Chrome 33.0.1750.44 \n * Google Chrome 33.0.1750.46 \n * Google Chrome 33.0.1750.48 \n * Google Chrome 33.0.1750.5 \n * Google Chrome 33.0.1750.51 \n * Google Chrome 33.0.1750.53 \n * Google Chrome 33.0.1750.55 \n * Google Chrome 33.0.1750.57 \n * Google Chrome 33.0.1750.59 \n * Google Chrome 33.0.1750.60 \n * Google Chrome 33.0.1750.62 \n * Google Chrome 33.0.1750.64 \n * Google Chrome 33.0.1750.66 \n * Google Chrome 33.0.1750.68 \n * Google Chrome 33.0.1750.7 \n * Google Chrome 33.0.1750.71 \n * Google Chrome 33.0.1750.74 \n * Google Chrome 33.0.1750.76 \n * Google Chrome 33.0.1750.79 \n * Google Chrome 33.0.1750.80 \n * Google Chrome 33.0.1750.82 \n * Google Chrome 33.0.1750.85 \n * Google Chrome 33.0.1750.89 \n * Google Chrome 33.0.1750.90 \n * Google Chrome 33.0.1750.92 \n * Google Chrome 34.0.1847.0 \n * Google Chrome 34.0.1847.10 \n * Google Chrome 34.0.1847.101 \n * Google Chrome 34.0.1847.103 \n * Google Chrome 34.0.1847.109 \n * Google Chrome 34.0.1847.112 \n * Google Chrome 34.0.1847.114 \n * Google Chrome 34.0.1847.116 \n * Google Chrome 34.0.1847.118 \n * Google Chrome 34.0.1847.120 \n * Google Chrome 34.0.1847.130 \n * Google Chrome 34.0.1847.131 \n * Google Chrome 34.0.1847.132 \n * Google Chrome 34.0.1847.134 \n * Google Chrome 34.0.1847.136 \n * Google Chrome 34.0.1847.137 \n * Google Chrome 34.0.1847.15 \n * Google Chrome 34.0.1847.23 \n * Google Chrome 34.0.1847.25 \n * Google Chrome 34.0.1847.36 \n * Google Chrome 34.0.1847.38 \n * Google Chrome 34.0.1847.4 \n * Google Chrome 34.0.1847.42 \n * Google Chrome 34.0.1847.44 \n * Google Chrome 34.0.1847.46 \n * Google Chrome 34.0.1847.48 \n * Google Chrome 34.0.1847.5 \n * Google Chrome 34.0.1847.51 \n * Google Chrome 34.0.1847.53 \n * Google Chrome 34.0.1847.55 \n * Google Chrome 34.0.1847.57 \n * Google Chrome 34.0.1847.59 \n * Google Chrome 34.0.1847.60 \n * Google Chrome 34.0.1847.62 \n * Google Chrome 34.0.1847.64 \n * Google Chrome 34.0.1847.66 \n * Google Chrome 34.0.1847.68 \n * Google Chrome 34.0.1847.7 \n * Google Chrome 34.0.1847.72 \n * Google Chrome 34.0.1847.74 \n * Google Chrome 34.0.1847.76 \n * Google Chrome 34.0.1847.78 \n * Google Chrome 34.0.1847.8 \n * Google Chrome 34.0.1847.81 \n * Google Chrome 34.0.1847.83 \n * Google Chrome 34.0.1847.86 \n * Google Chrome 34.0.1847.9 \n * Google Chrome 34.0.1847.92 \n * Google Chrome 34.0.1847.97 \n * Google Chrome 34.0.1847.99 \n * Google Chrome 35.0.1916.0 \n * Google Chrome 35.0.1916.10 \n * Google Chrome 35.0.1916.103 \n * Google Chrome 35.0.1916.105 \n * Google Chrome 35.0.1916.107 \n * Google Chrome 35.0.1916.109 \n * Google Chrome 35.0.1916.110 \n * Google Chrome 35.0.1916.112 \n * Google Chrome 35.0.1916.114 \n * Google Chrome 35.0.1916.13 \n * Google Chrome 35.0.1916.15 \n * Google Chrome 35.0.1916.153 \n * Google Chrome 35.0.1916.18 \n * Google Chrome 35.0.1916.2 \n * Google Chrome 35.0.1916.21 \n * Google Chrome 35.0.1916.23 \n * Google Chrome 35.0.1916.3 \n * Google Chrome 35.0.1916.32 \n * Google Chrome 35.0.1916.34 \n * Google Chrome 35.0.1916.36 \n * Google Chrome 35.0.1916.38 \n * Google Chrome 35.0.1916.4 \n * Google Chrome 35.0.1916.41 \n * Google Chrome 35.0.1916.43 \n * Google Chrome 35.0.1916.45 \n * Google Chrome 35.0.1916.47 \n * Google Chrome 35.0.1916.49 \n * Google Chrome 35.0.1916.51 \n * Google Chrome 35.0.1916.54 \n * Google Chrome 35.0.1916.57 \n * Google Chrome 35.0.1916.6 \n * Google Chrome 35.0.1916.68 \n * Google Chrome 35.0.1916.7 \n * Google Chrome 35.0.1916.72 \n * Google Chrome 35.0.1916.77 \n * Google Chrome 35.0.1916.80 \n * Google Chrome 35.0.1916.84 \n * Google Chrome 35.0.1916.86 \n * Google Chrome 35.0.1916.9 \n * Google Chrome 35.0.1916.92 \n * Google Chrome 35.0.1916.95 \n * Google Chrome 35.0.1916.98 \n * Google Chrome 36.0.1985.122 \n * Google Chrome 36.0.1985.143 \n * Google Chrome 37.0.2062.0 \n * Google Chrome 37.0.2062.10 \n * Google Chrome 37.0.2062.12 \n * Google Chrome 37.0.2062.120 \n * Google Chrome 37.0.2062.124 \n * Google Chrome 37.0.2062.14 \n * Google Chrome 37.0.2062.16 \n * Google Chrome 37.0.2062.18 \n * Google Chrome 37.0.2062.2 \n * Google Chrome 37.0.2062.21 \n * Google Chrome 37.0.2062.23 \n * Google Chrome 37.0.2062.25 \n * Google Chrome 37.0.2062.27 \n * Google Chrome 37.0.2062.29 \n * Google Chrome 37.0.2062.30 \n * Google Chrome 37.0.2062.32 \n * Google Chrome 37.0.2062.34 \n * Google Chrome 37.0.2062.36 \n * Google Chrome 37.0.2062.39 \n * Google Chrome 37.0.2062.43 \n * Google Chrome 37.0.2062.45 \n * Google Chrome 37.0.2062.47 \n * Google Chrome 37.0.2062.49 \n * Google Chrome 37.0.2062.50 \n * Google Chrome 37.0.2062.52 \n * Google Chrome 37.0.2062.54 \n * Google Chrome 37.0.2062.56 \n * Google Chrome 37.0.2062.58 \n * Google Chrome 37.0.2062.6 \n * Google Chrome 37.0.2062.61 \n * Google Chrome 37.0.2062.63 \n * Google Chrome 37.0.2062.65 \n * Google Chrome 37.0.2062.67 \n * Google Chrome 37.0.2062.69 \n * Google Chrome 37.0.2062.70 \n * Google Chrome 37.0.2062.72 \n * Google Chrome 37.0.2062.74 \n * Google Chrome 37.0.2062.76 \n * Google Chrome 37.0.2062.78 \n * Google Chrome 37.0.2062.80 \n * Google Chrome 37.0.2062.89 \n * Google Chrome 37.0.2062.90 \n * Google Chrome 37.0.2062.92 \n * Google Chrome 37.0.2062.94 \n * Google Chrome 37.0.2062.95 \n * Google Chrome 37.0.2062.97 \n * Google Chrome 38.0.2125.101 \n * Google Chrome 38.0.2125.101 ~~~Android~~ \n * Google Chrome 38.0.2125.122 \n * Google Chrome 39.0.2171.63 \n * Google Chrome 39.0.2171.65 \n * Google Chrome 4 \n * Google Chrome 4.0.211.0 \n * Google Chrome 4.0.212.0 \n * Google Chrome 4.0.212.1 \n * Google Chrome 4.0.221.8 \n * Google Chrome 4.0.222.0 \n * Google Chrome 4.0.222.1 \n * Google Chrome 4.0.222.12 \n * Google Chrome 4.0.222.5 \n * Google Chrome 4.0.223.0 \n * Google Chrome 4.0.223.1 \n * Google Chrome 4.0.223.2 \n * Google Chrome 4.0.223.4 \n * Google Chrome 4.0.223.5 \n * Google Chrome 4.0.223.7 \n * Google Chrome 4.0.223.8 \n * Google Chrome 4.0.224.0 \n * Google Chrome 4.0.229.1 \n * Google Chrome 4.0.235.0 \n * Google Chrome 4.0.236.0 \n * Google Chrome 4.0.237.0 \n * Google Chrome 4.0.237.1 \n * Google Chrome 4.0.239.0 \n * Google Chrome 4.0.240.0 \n * Google Chrome 4.0.241.0 \n * Google Chrome 4.0.242.0 \n * Google Chrome 4.0.243.0 \n * Google Chrome 4.0.244.0 \n * Google Chrome 4.0.245.0 \n * Google Chrome 4.0.246.0 \n * Google Chrome 4.0.247.0 \n * Google Chrome 4.0.248.0 \n * Google Chrome 4.0.249.0 \n * Google Chrome 4.0.249.1 \n * Google Chrome 4.0.249.10 \n * Google Chrome 4.0.249.11 \n * Google Chrome 4.0.249.12 \n * Google Chrome 4.0.249.14 \n * Google Chrome 4.0.249.16 \n * Google Chrome 4.0.249.17 \n * Google Chrome 4.0.249.18 \n * Google Chrome 4.0.249.19 \n * Google Chrome 4.0.249.2 \n * Google Chrome 4.0.249.20 \n * Google Chrome 4.0.249.21 \n * Google Chrome 4.0.249.22 \n * Google Chrome 4.0.249.23 \n * Google Chrome 4.0.249.24 \n * Google Chrome 4.0.249.25 \n * Google Chrome 4.0.249.26 \n * Google Chrome 4.0.249.27 \n * Google Chrome 4.0.249.28 \n * Google Chrome 4.0.249.29 \n * Google Chrome 4.0.249.3 \n * Google Chrome 4.0.249.30 \n * Google Chrome 4.0.249.31 \n * Google Chrome 4.0.249.32 \n * Google Chrome 4.0.249.33 \n * Google Chrome 4.0.249.34 \n * Google Chrome 4.0.249.35 \n * Google Chrome 4.0.249.36 \n * Google Chrome 4.0.249.37 \n * Google Chrome 4.0.249.38 \n * Google Chrome 4.0.249.39 \n * Google Chrome 4.0.249.4 \n * Google Chrome 4.0.249.40 \n * Google Chrome 4.0.249.41 \n * Google Chrome 4.0.249.42 \n * Google Chrome 4.0.249.43 \n * Google Chrome 4.0.249.44 \n * Google Chrome 4.0.249.45 \n * Google Chrome 4.0.249.46 \n * Google Chrome 4.0.249.47 \n * Google Chrome 4.0.249.48 \n * Google Chrome 4.0.249.49 \n * Google Chrome 4.0.249.5 \n * Google Chrome 4.0.249.50 \n * Google Chrome 4.0.249.51 \n * Google Chrome 4.0.249.52 \n * Google Chrome 4.0.249.53 \n * Google Chrome 4.0.249.54 \n * Google Chrome 4.0.249.55 \n * Google Chrome 4.0.249.56 \n * Google Chrome 4.0.249.57 \n * Google Chrome 4.0.249.58 \n * Google Chrome 4.0.249.59 \n * Google Chrome 4.0.249.6 \n * Google Chrome 4.0.249.60 \n * Google Chrome 4.0.249.61 \n * Google Chrome 4.0.249.62 \n * Google Chrome 4.0.249.63 \n * Google Chrome 4.0.249.64 \n * Google Chrome 4.0.249.65 \n * Google Chrome 4.0.249.66 \n * Google Chrome 4.0.249.67 \n * Google Chrome 4.0.249.68 \n * Google Chrome 4.0.249.69 \n * Google Chrome 4.0.249.7 \n * Google Chrome 4.0.249.70 \n * Google Chrome 4.0.249.71 \n * Google Chrome 4.0.249.72 \n * Google Chrome 4.0.249.73 \n * Google Chrome 4.0.249.74 \n * Google Chrome 4.0.249.75 \n * Google Chrome 4.0.249.76 \n * Google Chrome 4.0.249.77 \n * Google Chrome 4.0.249.78 \n * Google Chrome 4.0.249.78 Beta \n * Google Chrome 4.0.249.79 \n * Google Chrome 4.0.249.8 \n * Google Chrome 4.0.249.80 \n * Google Chrome 4.0.249.81 \n * Google Chrome 4.0.249.82 \n * Google Chrome 4.0.249.89 \n * Google Chrome 4.0.249.9 \n * Google Chrome 4.0.250.0 \n * Google Chrome 4.0.250.2 \n * Google Chrome 4.0.251.0 \n * Google Chrome 4.0.252.0 \n * Google Chrome 4.0.254.0 \n * Google Chrome 4.0.255.0 \n * Google Chrome 4.0.256.0 \n * Google Chrome 4.0.257.0 \n * Google Chrome 4.0.258.0 \n * Google Chrome 4.0.259.0 \n * Google Chrome 4.0.260.0 \n * Google Chrome 4.0.261.0 \n * Google Chrome 4.0.262.0 \n * Google Chrome 4.0.263.0 \n * Google Chrome 4.0.264.0 \n * Google Chrome 4.0.265.0 \n * Google Chrome 4.0.266.0 \n * Google Chrome 4.0.267.0 \n * Google Chrome 4.0.268.0 \n * Google Chrome 4.0.269.0 \n * Google Chrome 4.0.271.0 \n * Google Chrome 4.0.272.0 \n * Google Chrome 4.0.275.0 \n * Google Chrome 4.0.275.1 \n * Google Chrome 4.0.276.0 \n * Google Chrome 4.0.277.0 \n * Google Chrome 4.0.278.0 \n * Google Chrome 4.0.286.0 \n * Google Chrome 4.0.287.0 \n * Google Chrome 4.0.288.0 \n * Google Chrome 4.0.288.1 \n * Google Chrome 4.0.289.0 \n * Google Chrome 4.0.290.0 \n * Google Chrome 4.0.292.0 \n * Google Chrome 4.0.294.0 \n * Google Chrome 4.0.295.0 \n * Google Chrome 4.0.296.0 \n * Google Chrome 4.0.299.0 \n * Google Chrome 4.0.300.0 \n * Google Chrome 4.0.301.0 \n * Google Chrome 4.0.302.0 \n * Google Chrome 4.0.302.1 \n * Google Chrome 4.0.302.2 \n * Google Chrome 4.0.302.3 \n * Google Chrome 4.0.303.0 \n * Google Chrome 4.0.304.0 \n * Google Chrome 4.0.305.0 \n * Google Chrome 4.1 Beta \n * Google Chrome 4.1.249.0 \n * Google Chrome 4.1.249.1001 \n * Google Chrome 4.1.249.1004 \n * Google Chrome 4.1.249.1006 \n * Google Chrome 4.1.249.1007 \n * Google Chrome 4.1.249.1008 \n * Google Chrome 4.1.249.1009 \n * Google Chrome 4.1.249.1010 \n * Google Chrome 4.1.249.1011 \n * Google Chrome 4.1.249.1012 \n * Google Chrome 4.1.249.1013 \n * Google Chrome 4.1.249.1014 \n * Google Chrome 4.1.249.1015 \n * Google Chrome 4.1.249.1016 \n * Google Chrome 4.1.249.1017 \n * Google Chrome 4.1.249.1018 \n * Google Chrome 4.1.249.1019 \n * Google Chrome 4.1.249.1020 \n * Google Chrome 4.1.249.1021 \n * Google Chrome 4.1.249.1022 \n * Google Chrome 4.1.249.1023 \n * Google Chrome 4.1.249.1024 \n * Google Chrome 4.1.249.1025 \n * Google Chrome 4.1.249.1026 \n * Google Chrome 4.1.249.1027 \n * Google Chrome 4.1.249.1028 \n * Google Chrome 4.1.249.1029 \n * Google Chrome 4.1.249.1030 \n * Google Chrome 4.1.249.1031 \n * Google Chrome 4.1.249.1032 \n * Google Chrome 4.1.249.1033 \n * Google Chrome 4.1.249.1034 \n * Google Chrome 4.1.249.1035 \n * Google Chrome 4.1.249.1036 \n * Google Chrome 4.1.249.1037 \n * Google Chrome 4.1.249.1038 \n * Google Chrome 4.1.249.1039 \n * Google Chrome 4.1.249.1040 \n * Google Chrome 4.1.249.1041 \n * Google Chrome 4.1.249.1042 \n * Google Chrome 4.1.249.1043 \n * Google Chrome 4.1.249.1044 \n * Google Chrome 4.1.249.1045 \n * Google Chrome 4.1.249.1046 \n * Google Chrome 4.1.249.1047 \n * Google Chrome 4.1.249.1048 \n * Google Chrome 4.1.249.1049 \n * Google Chrome 4.1.249.1050 \n * Google Chrome 4.1.249.1051 \n * Google Chrome 4.1.249.1052 \n * Google Chrome 4.1.249.1053 \n * Google Chrome 4.1.249.1054 \n * Google Chrome 4.1.249.1055 \n * Google Chrome 4.1.249.1056 \n * Google Chrome 4.1.249.1057 \n * Google Chrome 4.1.249.1058 \n * Google Chrome 4.1.249.1059 \n * Google Chrome 4.1.249.1060 \n * Google Chrome 4.1.249.1061 \n * Google Chrome 4.1.249.1062 \n * Google Chrome 4.1.249.1063 \n * Google Chrome 4.1.249.1064 \n * Google Chrome 40.0.2214.111 \n * Google Chrome 40.0.2214.115 \n * Google Chrome 40.0.2214.85 \n * Google Chrome 40.0.2214.91 \n * Google Chrome 41.0.2272 \n * Google Chrome 41.0.2272.118 \n * Google Chrome 41.0.2272.76 \n * Google Chrome 42.0.2311 \n * Google Chrome 42.0.2311.135 \n * Google Chrome 42.0.2311.90 \n * Google Chrome 43.0.2357 \n * Google Chrome 43.0.2357.130 \n * Google Chrome 43.0.2357.65 \n * Google Chrome 44.0.2403 \n * Google Chrome 44.0.2403.157 \n * Google Chrome 44.0.2403.89 \n * Google Chrome 45.0.2454 \n * Google Chrome 45.0.2454.101 \n * Google Chrome 45.0.2454.85 \n * Google Chrome 46.0.2490 \n * Google Chrome 46.0.2490.71 \n * Google Chrome 46.0.2490.76 \n * Google Chrome 46.0.2490.86 \n * Google Chrome 47.0 \n * Google Chrome 47.0.2526.106 \n * Google Chrome 47.0.2526.73 \n * Google Chrome 47.0.2526.80 \n * Google Chrome 48.0.2564.109 \n * Google Chrome 48.0.2564.116 \n * Google Chrome 48.0.2564.82 \n * Google Chrome 49.0.2566.0 \n * Google Chrome 49.0.2623.108 \n * Google Chrome 49.0.2623.75 \n * Google Chrome 49.0.2623.87 \n * Google Chrome 5.0.306.0 \n * Google Chrome 5.0.306.1 \n * Google Chrome 5.0.307.1 \n * Google Chrome 5.0.307.10 \n * Google Chrome 5.0.307.11 \n * Google Chrome 5.0.307.3 \n * Google Chrome 5.0.307.4 \n * Google Chrome 5.0.307.5 \n * Google Chrome 5.0.307.6 \n * Google Chrome 5.0.307.7 \n * Google Chrome 5.0.307.8 \n * Google Chrome 5.0.307.9 \n * Google Chrome 5.0.308.0 \n * Google Chrome 5.0.309.0 \n * Google Chrome 5.0.313.0 \n * Google Chrome 5.0.314.0 \n * Google Chrome 5.0.314.1 \n * Google Chrome 5.0.315.0 \n * Google Chrome 5.0.316.0 \n * Google Chrome 5.0.317.0 \n * Google Chrome 5.0.317.1 \n * Google Chrome 5.0.317.2 \n * Google Chrome 5.0.318.0 \n * Google Chrome 5.0.319.0 \n * Google Chrome 5.0.320.0 \n * Google Chrome 5.0.321.0 \n * Google Chrome 5.0.322.0 \n * Google Chrome 5.0.322.1 \n * Google Chrome 5.0.322.2 \n * Google Chrome 5.0.323.0 \n * Google Chrome 5.0.324.0 \n * Google Chrome 5.0.325.0 \n * Google Chrome 5.0.326.0 \n * Google Chrome 5.0.327.0 \n * Google Chrome 5.0.328.0 \n * Google Chrome 5.0.329.0 \n * Google Chrome 5.0.330.0 \n * Google Chrome 5.0.332.0 \n * Google Chrome 5.0.333.0 \n * Google Chrome 5.0.334.0 \n * Google Chrome 5.0.335.0 \n * Google Chrome 5.0.335.1 \n * Google Chrome 5.0.335.2 \n * Google Chrome 5.0.335.3 \n * Google Chrome 5.0.335.4 \n * Google Chrome 5.0.336.0 \n * Google Chrome 5.0.337.0 \n * Google Chrome 5.0.338.0 \n * Google Chrome 5.0.339.0 \n * Google Chrome 5.0.340.0 \n * Google Chrome 5.0.341.0 \n * Google Chrome 5.0.342.0 \n * Google Chrome 5.0.342.1 \n * Google Chrome 5.0.342.2 \n * Google Chrome 5.0.342.3 \n * Google Chrome 5.0.342.4 \n * Google Chrome 5.0.342.5 \n * Google Chrome 5.0.342.6 \n * Google Chrome 5.0.342.7 \n * Google Chrome 5.0.342.7 Beta Mac \n * Google Chrome 5.0.342.8 \n * Google Chrome 5.0.342.9 \n * Google Chrome 5.0.343.0 \n * Google Chrome 5.0.344.0 \n * Google Chrome 5.0.345.0 \n * Google Chrome 5.0.346.0 \n * Google Chrome 5.0.347.0 \n * Google Chrome 5.0.348.0 \n * Google Chrome 5.0.349.0 \n * Google Chrome 5.0.350.0 \n * Google Chrome 5.0.350.1 \n * Google Chrome 5.0.351.0 \n * Google Chrome 5.0.353.0 \n * Google Chrome 5.0.354.0 \n * Google Chrome 5.0.354.1 \n * Google Chrome 5.0.355.0 \n * Google Chrome 5.0.356.0 \n * Google Chrome 5.0.356.1 \n * Google Chrome 5.0.356.2 \n * Google Chrome 5.0.357.0 \n * Google Chrome 5.0.358.0 \n * Google Chrome 5.0.359.0 \n * Google Chrome 5.0.360.0 \n * Google Chrome 5.0.360.3 \n * Google Chrome 5.0.360.4 \n * Google Chrome 5.0.360.5 \n * Google Chrome 5.0.361.0 \n * Google Chrome 5.0.362.0 \n * Google Chrome 5.0.363.0 \n * Google Chrome 5.0.364.0 \n * Google Chrome 5.0.365.0 \n * Google Chrome 5.0.366.0 \n * Google Chrome 5.0.366.1 \n * Google Chrome 5.0.366.2 \n * Google Chrome 5.0.366.3 \n * Google Chrome 5.0.366.4 \n * Google Chrome 5.0.367.0 \n * Google Chrome 5.0.368.0 \n * Google Chrome 5.0.369.0 \n * Google Chrome 5.0.369.1 \n * Google Chrome 5.0.369.2 \n * Google Chrome 5.0.370.0 \n * Google Chrome 5.0.371.0 \n * Google Chrome 5.0.372.0 \n * Google Chrome 5.0.373.0 \n * Google Chrome 5.0.374.0 \n * Google Chrome 5.0.375.0 \n * Google Chrome 5.0.375.1 \n * Google Chrome 5.0.375.10 \n * Google Chrome 5.0.375.11 \n * Google Chrome 5.0.375.12 \n * Google Chrome 5.0.375.125 \n * Google Chrome 5.0.375.126 \n * Google Chrome 5.0.375.127 \n * Google Chrome 5.0.375.13 \n * Google Chrome 5.0.375.14 \n * Google Chrome 5.0.375.15 \n * Google Chrome 5.0.375.16 \n * Google Chrome 5.0.375.17 \n * Google Chrome 5.0.375.18 \n * Google Chrome 5.0.375.19 \n * Google Chrome 5.0.375.2 \n * Google Chrome 5.0.375.20 \n * Google Chrome 5.0.375.21 \n * Google Chrome 5.0.375.22 \n * Google Chrome 5.0.375.23 \n * Google Chrome 5.0.375.25 \n * Google Chrome 5.0.375.26 \n * Google Chrome 5.0.375.27 \n * Google Chrome 5.0.375.28 \n * Google Chrome 5.0.375.29 \n * Google Chrome 5.0.375.3 \n * Google Chrome 5.0.375.30 \n * Google Chrome 5.0.375.31 \n * Google Chrome 5.0.375.32 \n * Google Chrome 5.0.375.33 \n * Google Chrome 5.0.375.34 \n * Google Chrome 5.0.375.35 \n * Google Chrome 5.0.375.36 \n * Google Chrome 5.0.375.37 \n * Google Chrome 5.0.375.38 \n * Google Chrome 5.0.375.39 \n * Google Chrome 5.0.375.4 \n * Google Chrome 5.0.375.40 \n * Google Chrome 5.0.375.41 \n * Google Chrome 5.0.375.42 \n * Google Chrome 5.0.375.43 \n * Google Chrome 5.0.375.44 \n * Google Chrome 5.0.375.45 \n * Google Chrome 5.0.375.46 \n * Google Chrome 5.0.375.47 \n * Google Chrome 5.0.375.48 \n * Google Chrome 5.0.375.49 \n * Google Chrome 5.0.375.5 \n * Google Chrome 5.0.375.50 \n * Google Chrome 5.0.375.51 \n * Google Chrome 5.0.375.52 \n * Google Chrome 5.0.375.53 \n * Google Chrome 5.0.375.54 \n * Google Chrome 5.0.375.55 \n * Google Chrome 5.0.375.56 \n * Google Chrome 5.0.375.57 \n * Google Chrome 5.0.375.58 \n * Google Chrome 5.0.375.59 \n * Google Chrome 5.0.375.6 \n * Google Chrome 5.0.375.60 \n * Google Chrome 5.0.375.61 \n * Google Chrome 5.0.375.62 \n * Google Chrome 5.0.375.63 \n * Google Chrome 5.0.375.64 \n * Google Chrome 5.0.375.65 \n * Google Chrome 5.0.375.66 \n * Google Chrome 5.0.375.67 \n * Google Chrome 5.0.375.68 \n * Google Chrome 5.0.375.69 \n * Google Chrome 5.0.375.7 \n * Google Chrome 5.0.375.70 \n * Google Chrome 5.0.375.71 \n * Google Chrome 5.0.375.72 \n * Google Chrome 5.0.375.73 \n * Google Chrome 5.0.375.74 \n * Google Chrome 5.0.375.75 \n * Google Chrome 5.0.375.76 \n * Google Chrome 5.0.375.77 \n * Google Chrome 5.0.375.78 \n * Google Chrome 5.0.375.79 \n * Google Chrome 5.0.375.8 \n * Google Chrome 5.0.375.80 \n * Google Chrome 5.0.375.81 \n * Google Chrome 5.0.375.82 \n * Google Chrome 5.0.375.83 \n * Google Chrome 5.0.375.84 \n * Google Chrome 5.0.375.85 \n * Google Chrome 5.0.375.86 \n * Google Chrome 5.0.375.87 \n * Google Chrome 5.0.375.88 \n * Google Chrome 5.0.375.89 \n * Google Chrome 5.0.375.9 \n * Google Chrome 5.0.375.90 \n * Google Chrome 5.0.375.91 \n * Google Chrome 5.0.375.92 \n * Google Chrome 5.0.375.93 \n * Google Chrome 5.0.375.94 \n * Google Chrome 5.0.375.95 \n * Google Chrome 5.0.375.96 \n * Google Chrome 5.0.375.97 \n * Google Chrome 5.0.375.98 \n * Google Chrome 5.0.375.99 \n * Google Chrome 5.0.376.0 \n * Google Chrome 5.0.378.0 \n * Google Chrome 5.0.379.0 \n * Google Chrome 5.0.380.0 \n * Google Chrome 5.0.381.0 \n * Google Chrome 5.0.382.0 \n * Google Chrome 5.0.382.3 \n * Google Chrome 5.0.383.0 \n * Google Chrome 5.0.384.0 \n * Google Chrome 5.0.385.0 \n * Google Chrome 5.0.386.0 \n * Google Chrome 5.0.387.0 \n * Google Chrome 5.0.390.0 \n * Google Chrome 5.0.391.0 \n * Google Chrome 5.0.392.0 \n * Google Chrome 5.0.393.0 \n * Google Chrome 5.0.394.0 \n * Google Chrome 5.0.395.0 \n * Google Chrome 5.0.396.0 \n * Google Chrome 50.0.2661.102 \n * Google Chrome 50.0.2661.75 \n * Google Chrome 50.0.2661.94 \n * Google Chrome 51.0.2704.103 \n * Google Chrome 51.0.2704.63 \n * Google Chrome 51.0.2704.79 \n * Google Chrome 52.0.2743.116 \n * Google Chrome 52.0.2743.82 \n * Google Chrome 53.0.2785.113 \n * Google Chrome 53.0.2785.143 \n * Google Chrome 53.0.2785.89 \n * Google Chrome 54.0.2840.59 \n * Google Chrome 54.0.2840.85 \n * Google Chrome 54.0.2840.87 \n * Google Chrome 54.0.2840.90 \n * Google Chrome 54.0.2840.98 \n * Google Chrome 54.0.2840.99 \n * Google Chrome 55.0.2883.75 \n * Google Chrome 56.0.2924.76 \n * Google Chrome 57.0.2987.133 \n * Google Chrome 57.0.2987.98 \n * Google Chrome 58.0.3029.81 \n * Google Chrome 58.0.3029.96 \n * Google Chrome 59.0.3071.104 \n * Google Chrome 59.0.3071.115 \n * Google Chrome 59.0.3071.86 \n * Google Chrome 6.0.397.0 \n * Google Chrome 6.0.398.0 \n * Google Chrome 6.0.399.0 \n * Google Chrome 6.0.400.0 \n * Google Chrome 6.0.401.0 \n * Google Chrome 6.0.401.1 \n * Google Chrome 6.0.403.0 \n * Google Chrome 6.0.404.0 \n * Google Chrome 6.0.404.1 \n * Google Chrome 6.0.404.2 \n * Google Chrome 6.0.405.0 \n * Google Chrome 6.0.406.0 \n * Google Chrome 6.0.407.0 \n * Google Chrome 6.0.408.0 \n * Google Chrome 6.0.408.1 \n * Google Chrome 6.0.408.10 \n * Google Chrome 6.0.408.2 \n * Google Chrome 6.0.408.3 \n * Google Chrome 6.0.408.4 \n * Google Chrome 6.0.408.5 \n * Google Chrome 6.0.408.6 \n * Google Chrome 6.0.408.7 \n * Google Chrome 6.0.408.8 \n * Google Chrome 6.0.408.9 \n * Google Chrome 6.0.409.0 \n * Google Chrome 6.0.410.0 \n * Google Chrome 6.0.411.0 \n * Google Chrome 6.0.412.0 \n * Google Chrome 6.0.413.0 \n * Google Chrome 6.0.414.0 \n * Google Chrome 6.0.415.0 \n * Google Chrome 6.0.415.1 \n * Google Chrome 6.0.416.0 \n * Google Chrome 6.0.416.1 \n * Google Chrome 6.0.417.0 \n * Google Chrome 6.0.418.0 \n * Google Chrome 6.0.418.1 \n * Google Chrome 6.0.418.2 \n * Google Chrome 6.0.418.3 \n * Google Chrome 6.0.418.4 \n * Google Chrome 6.0.418.5 \n * Google Chrome 6.0.418.6 \n * Google Chrome 6.0.418.7 \n * Google Chrome 6.0.418.8 \n * Google Chrome 6.0.418.9 \n * Google Chrome 6.0.419.0 \n * Google Chrome 6.0.421.0 \n * Google Chrome 6.0.422.0 \n * Google Chrome 6.0.423.0 \n * Google Chrome 6.0.424.0 \n * Google Chrome 6.0.425.0 \n * Google Chrome 6.0.426.0 \n * Google Chrome 6.0.427.0 \n * Google Chrome 6.0.428.0 \n * Google Chrome 6.0.430.0 \n * Google Chrome 6.0.431.0 \n * Google Chrome 6.0.432.0 \n * Google Chrome 6.0.433.0 \n * Google Chrome 6.0.434.0 \n * Google Chrome 6.0.435.0 \n * Google Chrome 6.0.436.0 \n * Google Chrome 6.0.437.0 \n * Google Chrome 6.0.437.1 \n * Google Chrome 6.0.437.2 \n * Google Chrome 6.0.437.3 \n * Google Chrome 6.0.438.0 \n * Google Chrome 6.0.440.0 \n * Google Chrome 6.0.441.0 \n * Google Chrome 6.0.443.0 \n * Google Chrome 6.0.444.0 \n * Google Chrome 6.0.445.0 \n * Google Chrome 6.0.445.1 \n * Google Chrome 6.0.446.0 \n * Google Chrome 6.0.447.0 \n * Google Chrome 6.0.447.1 \n * Google Chrome 6.0.447.2 \n * Google Chrome 6.0.449.0 \n * Google Chrome 6.0.450.0 \n * Google Chrome 6.0.450.1 \n * Google Chrome 6.0.450.2 \n * Google Chrome 6.0.450.3 \n * Google Chrome 6.0.450.4 \n * Google Chrome 6.0.451.0 \n * Google Chrome 6.0.452.0 \n * Google Chrome 6.0.452.1 \n * Google Chrome 6.0.453.0 \n * Google Chrome 6.0.453.1 \n * Google Chrome 6.0.454.0 \n * Google Chrome 6.0.455.0 \n * Google Chrome 6.0.456.0 \n * Google Chrome 6.0.457.0 \n * Google Chrome 6.0.458.0 \n * Google Chrome 6.0.458.1 \n * Google Chrome 6.0.458.2 \n * Google Chrome 6.0.459.0 \n * Google Chrome 6.0.460.0 \n * Google Chrome 6.0.461.0 \n * Google Chrome 6.0.462.0 \n * Google Chrome 6.0.464.1 \n * Google Chrome 6.0.465.1 \n * Google Chrome 6.0.465.2 \n * Google Chrome 6.0.466.0 \n * Google Chrome 6.0.466.1 \n * Google Chrome 6.0.466.2 \n * Google Chrome 6.0.466.3 \n * Google Chrome 6.0.466.4 \n * Google Chrome 6.0.466.5 \n * Google Chrome 6.0.466.6 \n * Google Chrome 6.0.467.0 \n * Google Chrome 6.0.469.0 \n * Google Chrome 6.0.470.0 \n * Google Chrome 6.0.471.0 \n * Google Chrome 6.0.472.0 \n * Google Chrome 6.0.472.1 \n * Google Chrome 6.0.472.10 \n * Google Chrome 6.0.472.11 \n * Google Chrome 6.0.472.12 \n * Google Chrome 6.0.472.13 \n * Google Chrome 6.0.472.14 \n * Google Chrome 6.0.472.15 \n * Google Chrome 6.0.472.16 \n * Google Chrome 6.0.472.17 \n * Google Chrome 6.0.472.18 \n * Google Chrome 6.0.472.19 \n * Google Chrome 6.0.472.2 \n * Google Chrome 6.0.472.20 \n * Google Chrome 6.0.472.21 \n * Google Chrome 6.0.472.22 \n * Google Chrome 6.0.472.23 \n * Google Chrome 6.0.472.24 \n * Google Chrome 6.0.472.25 \n * Google Chrome 6.0.472.26 \n * Google Chrome 6.0.472.27 \n * Google Chrome 6.0.472.28 \n * Google Chrome 6.0.472.29 \n * Google Chrome 6.0.472.3 \n * Google Chrome 6.0.472.30 \n * Google Chrome 6.0.472.31 \n * Google Chrome 6.0.472.32 \n * Google Chrome 6.0.472.33 \n * Google Chrome 6.0.472.34 \n * Google Chrome 6.0.472.35 \n * Google Chrome 6.0.472.36 \n * Google Chrome 6.0.472.37 \n * Google Chrome 6.0.472.38 \n * Google Chrome 6.0.472.39 \n * Google Chrome 6.0.472.4 \n * Google Chrome 6.0.472.40 \n * Google Chrome 6.0.472.41 \n * Google Chrome 6.0.472.42 \n * Google Chrome 6.0.472.43 \n * Google Chrome 6.0.472.44 \n * Google Chrome 6.0.472.45 \n * Google Chrome 6.0.472.46 \n * Google Chrome 6.0.472.47 \n * Google Chrome 6.0.472.48 \n * Google Chrome 6.0.472.49 \n * Google Chrome 6.0.472.5 \n * Google Chrome 6.0.472.50 \n * Google Chrome 6.0.472.51 \n * Google Chrome 6.0.472.52 \n * Google Chrome 6.0.472.53 \n * Google Chrome 6.0.472.54 \n * Google Chrome 6.0.472.55 \n * Google Chrome 6.0.472.56 \n * Google Chrome 6.0.472.57 \n * Google Chrome 6.0.472.58 \n * Google Chrome 6.0.472.59 \n * Google Chrome 6.0.472.6 \n * Google Chrome 6.0.472.60 \n * Google Chrome 6.0.472.61 \n * Google Chrome 6.0.472.62 \n * Google Chrome 6.0.472.63 \n * Google Chrome 6.0.472.7 \n * Google Chrome 6.0.472.8 \n * Google Chrome 6.0.472.9 \n * Google Chrome 6.0.473.0 \n * Google Chrome 6.0.474.0 \n * Google Chrome 6.0.475.0 \n * Google Chrome 6.0.476.0 \n * Google Chrome 6.0.477.0 \n * Google Chrome 6.0.478.0 \n * Google Chrome 6.0.479.0 \n * Google Chrome 6.0.480.0 \n * Google Chrome 6.0.481.0 \n * Google Chrome 6.0.482.0 \n * Google Chrome 6.0.483.0 \n * Google Chrome 6.0.484.0 \n * Google Chrome 6.0.485.0 \n * Google Chrome 6.0.486.0 \n * Google Chrome 6.0.487.0 \n * Google Chrome 6.0.488.0 \n * Google Chrome 6.0.489.0 \n * Google Chrome 6.0.490.0 \n * Google Chrome 6.0.490.1 \n * Google Chrome 6.0.491.0 \n * Google Chrome 6.0.492.0 \n * Google Chrome 6.0.493.0 \n * Google Chrome 6.0.494.0 \n * Google Chrome 6.0.495.0 \n * Google Chrome 6.0.495.1 \n * Google Chrome 6.0.496.0 \n * Google Chrome 60.0.3080.5 \n * Google Chrome 60.0.3112.78 \n * Google Chrome 60.0.3112.80 \n * Google Chrome 61.0.3163.100 \n * Google Chrome 61.0.3163.79 \n * Google Chrome 62.0.3202.62 \n * Google Chrome 62.0.3202.75 \n * Google Chrome 62.0.3202.89 \n * Google Chrome 7.0.497.0 \n * Google Chrome 7.0.498.0 \n * Google Chrome 7.0.499.0 \n * Google Chrome 7.0.499.1 \n * Google Chrome 7.0.500.0 \n * Google Chrome 7.0.500.1 \n * Google Chrome 7.0.503.0 \n * Google Chrome 7.0.503.1 \n * Google Chrome 7.0.504.0 \n * Google Chrome 7.0.505.0 \n * Google Chrome 7.0.506.0 \n * Google Chrome 7.0.507.0 \n * Google Chrome 7.0.507.1 \n * Google Chrome 7.0.507.2 \n * Google Chrome 7.0.507.3 \n * Google Chrome 7.0.509.0 \n * Google Chrome 7.0.510.0 \n * Google Chrome 7.0.511.1 \n * Google Chrome 7.0.511.2 \n * Google Chrome 7.0.511.4 \n * Google Chrome 7.0.512.0 \n * Google Chrome 7.0.513.0 \n * Google Chrome 7.0.514.0 \n * Google Chrome 7.0.514.1 \n * Google Chrome 7.0.515.0 \n * Google Chrome 7.0.516.0 \n * Google Chrome 7.0.517.0 \n * Google Chrome 7.0.517.10 \n * Google Chrome 7.0.517.11 \n * Google Chrome 7.0.517.12 \n * Google Chrome 7.0.517.13 \n * Google Chrome 7.0.517.14 \n * Google Chrome 7.0.517.16 \n * Google Chrome 7.0.517.17 \n * Google Chrome 7.0.517.18 \n * Google Chrome 7.0.517.19 \n * Google Chrome 7.0.517.2 \n * Google Chrome 7.0.517.20 \n * Google Chrome 7.0.517.21 \n * Google Chrome 7.0.517.22 \n * Google Chrome 7.0.517.23 \n * Google Chrome 7.0.517.24 \n * Google Chrome 7.0.517.25 \n * Google Chrome 7.0.517.26 \n * Google Chrome 7.0.517.27 \n * Google Chrome 7.0.517.28 \n * Google Chrome 7.0.517.29 \n * Google Chrome 7.0.517.30 \n * Google Chrome 7.0.517.31 \n * Google Chrome 7.0.517.32 \n * Google Chrome 7.0.517.33 \n * Google Chrome 7.0.517.34 \n * Google Chrome 7.0.517.35 \n * Google Chrome 7.0.517.36 \n * Google Chrome 7.0.517.37 \n * Google Chrome 7.0.517.38 \n * Google Chrome 7.0.517.39 \n * Google Chrome 7.0.517.4 \n * Google Chrome 7.0.517.40 \n * Google Chrome 7.0.517.41 \n * Google Chrome 7.0.517.42 \n * Google Chrome 7.0.517.43 \n * Google Chrome 7.0.517.44 \n * Google Chrome 7.0.517.5 \n * Google Chrome 7.0.517.6 \n * Google Chrome 7.0.517.7 \n * Google Chrome 7.0.517.8 \n * Google Chrome 7.0.517.9 \n * Google Chrome 7.0.518.0 \n * Google Chrome 7.0.519.0 \n * Google Chrome 7.0.520.0 \n * Google Chrome 7.0.521.0 \n * Google Chrome 7.0.522.0 \n * Google Chrome 7.0.524.0 \n * Google Chrome 7.0.525.0 \n * Google Chrome 7.0.526.0 \n * Google Chrome 7.0.528.0 \n * Google Chrome 7.0.529.0 \n * Google Chrome 7.0.529.1 \n * Google Chrome 7.0.529.2 \n * Google Chrome 7.0.530.0 \n * Google Chrome 7.0.531.0 \n * Google Chrome 7.0.531.1 \n * Google Chrome 7.0.531.2 \n * Google Chrome 7.0.535.1 \n * Google Chrome 7.0.535.2 \n * Google Chrome 7.0.536.0 \n * Google Chrome 7.0.536.1 \n * Google Chrome 7.0.536.2 \n * Google Chrome 7.0.536.3 \n * Google Chrome 7.0.536.4 \n * Google Chrome 7.0.537.0 \n * Google Chrome 7.0.538.0 \n * Google Chrome 7.0.539.0 \n * Google Chrome 7.0.540.0 \n * Google Chrome 7.0.541.0 \n * Google Chrome 7.0.542.0 \n * Google Chrome 7.0.544.0 \n * Google Chrome 7.0.547.0 \n * Google Chrome 7.0.547.1 \n * Google Chrome 7.0.548.0 \n * Google Chrome 8.0.549.0 \n * Google Chrome 8.0.550.0 \n * Google Chrome 8.0.551.0 \n * Google Chrome 8.0.551.1 \n * Google Chrome 8.0.552.0 \n * Google Chrome 8.0.552.1 \n * Google Chrome 8.0.552.10 \n * Google Chrome 8.0.552.100 \n * Google Chrome 8.0.552.101 \n * Google Chrome 8.0.552.102 \n * Google Chrome 8.0.552.103 \n * Google Chrome 8.0.552.104 \n * Google Chrome 8.0.552.105 \n * Google Chrome 8.0.552.11 \n * Google Chrome 8.0.552.12 \n * Google Chrome 8.0.552.13 \n * Google Chrome 8.0.552.14 \n * Google Chrome 8.0.552.15 \n * Google Chrome 8.0.552.16 \n * Google Chrome 8.0.552.17 \n * Google Chrome 8.0.552.18 \n * Google Chrome 8.0.552.19 \n * Google Chrome 8.0.552.2 \n * Google Chrome 8.0.552.20 \n * Google Chrome 8.0.552.200 \n * Google Chrome 8.0.552.201 \n * Google Chrome 8.0.552.202 \n * Google Chrome 8.0.552.203 \n * Google Chrome 8.0.552.204 \n * Google Chrome 8.0.552.205 \n * Google Chrome 8.0.552.206 \n * Google Chrome 8.0.552.207 \n * Google Chrome 8.0.552.208 \n * Google Chrome 8.0.552.209 \n * Google Chrome 8.0.552.21 \n * Google Chrome 8.0.552.210 \n * Google Chrome 8.0.552.211 \n * Google Chrome 8.0.552.212 \n * Google Chrome 8.0.552.213 \n * Google Chrome 8.0.552.214 \n * Google Chrome 8.0.552.215 \n * Google Chrome 8.0.552.216 \n * Google Chrome 8.0.552.217 \n * Google Chrome 8.0.552.218 \n * Google Chrome 8.0.552.219 \n * Google Chrome 8.0.552.220 \n * Google Chrome 8.0.552.221 \n * Google Chrome 8.0.552.222 \n * Google Chrome 8.0.552.223 \n * Google Chrome 8.0.552.224 \n * Google Chrome 8.0.552.225 \n * Google Chrome 8.0.552.226 \n * Google Chrome 8.0.552.227 \n * Google Chrome 8.0.552.228 \n * Google Chrome 8.0.552.229 \n * Google Chrome 8.0.552.23 \n * Google Chrome 8.0.552.230 \n * Google Chrome 8.0.552.231 \n * Google Chrome 8.0.552.232 \n * Google Chrome 8.0.552.233 \n * Google Chrome 8.0.552.234 \n * Google Chrome 8.0.552.235 \n * Google Chrome 8.0.552.237 \n * Google Chrome 8.0.552.24 \n * Google Chrome 8.0.552.25 \n * Google Chrome 8.0.552.26 \n * Google Chrome 8.0.552.27 \n * Google Chrome 8.0.552.28 \n * Google Chrome 8.0.552.29 \n * Google Chrome 8.0.552.300 \n * Google Chrome 8.0.552.301 \n * Google Chrome 8.0.552.302 \n * Google Chrome 8.0.552.303 \n * Google Chrome 8.0.552.304 \n * Google Chrome 8.0.552.305 \n * Google Chrome 8.0.552.306 \n * Google Chrome 8.0.552.307 \n * Google Chrome 8.0.552.308 \n * Google Chrome 8.0.552.309 \n * Google Chrome 8.0.552.310 \n * Google Chrome 8.0.552.311 \n * Google Chrome 8.0.552.312 \n * Google Chrome 8.0.552.313 \n * Google Chrome 8.0.552.315 \n * Google Chrome 8.0.552.316 \n * Google Chrome 8.0.552.317 \n * Google Chrome 8.0.552.318 \n * Google Chrome 8.0.552.319 \n * Google Chrome 8.0.552.320 \n * Google Chrome 8.0.552.321 \n * Google Chrome 8.0.552.322 \n * Google Chrome 8.0.552.323 \n * Google Chrome 8.0.552.324 \n * Google Chrome 8.0.552.325 \n * Google Chrome 8.0.552.326 \n * Google Chrome 8.0.552.327 \n * Google Chrome 8.0.552.328 \n * Google Chrome 8.0.552.329 \n * Google Chrome 8.0.552.330 \n * Google Chrome 8.0.552.331 \n * Google Chrome 8.0.552.332 \n * Google Chrome 8.0.552.333 \n * Google Chrome 8.0.552.334 \n * Google Chrome 8.0.552.335 \n * Google Chrome 8.0.552.336 \n * Google Chrome 8.0.552.337 \n * Google Chrome 8.0.552.338 \n * Google Chrome 8.0.552.339 \n * Google Chrome 8.0.552.340 \n * Google Chrome 8.0.552.341 \n * Google Chrome 8.0.552.342 \n * Google Chrome 8.0.552.343 \n * Google Chrome 8.0.552.344 \n * Google Chrome 8.0.552.35 \n * Google Chrome 8.0.552.4 \n * Google Chrome 8.0.552.40 \n * Google Chrome 8.0.552.41 \n * Google Chrome 8.0.552.42 \n * Google Chrome 8.0.552.43 \n * Google Chrome 8.0.552.44 \n * Google Chrome 8.0.552.45 \n * Google Chrome 8.0.552.47 \n * Google Chrome 8.0.552.48 \n * Google Chrome 8.0.552.49 \n * Google Chrome 8.0.552.5 \n * Google Chrome 8.0.552.50 \n * Google Chrome 8.0.552.51 \n * Google Chrome 8.0.552.52 \n * Google Chrome 8.0.552.6 \n * Google Chrome 8.0.552.7 \n * Google Chrome 8.0.552.8 \n * Google Chrome 8.0.552.9 \n * Google Chrome 8.0.553.0 \n * Google Chrome 8.0.554.0 \n * Google Chrome 8.0.556.0 \n * Google Chrome 8.0.557.0 \n * Google Chrome 8.0.558.0 \n * Google Chrome 8.0.559.0 \n * Google Chrome 8.0.560.0 \n * Google Chrome 8.0.561.0 \n * Google Chrome 9 \n * Google Chrome 9.0.562.0 \n * Google Chrome 9.0.563.0 \n * Google Chrome 9.0.564.0 \n * Google Chrome 9.0.565.0 \n * Google Chrome 9.0.566.0 \n * Google Chrome 9.0.567.0 \n * Google Chrome 9.0.568.0 \n * Google Chrome 9.0.569.0 \n * Google Chrome 9.0.570.0 \n * Google Chrome 9.0.570.1 \n * Google Chrome 9.0.571.0 \n * Google Chrome 9.0.572.0 \n * Google Chrome 9.0.572.1 \n * Google Chrome 9.0.573.0 \n * Google Chrome 9.0.574.0 \n * Google Chrome 9.0.575.0 \n * Google Chrome 9.0.576.0 \n * Google Chrome 9.0.577.0 \n * Google Chrome 9.0.578.0 \n * Google Chrome 9.0.579.0 \n * Google Chrome 9.0.580.0 \n * Google Chrome 9.0.581.0 \n * Google Chrome 9.0.582.0 \n * Google Chrome 9.0.583.0 \n * Google Chrome 9.0.584.0 \n * Google Chrome 9.0.585.0 \n * Google Chrome 9.0.586.0 \n * Google Chrome 9.0.587.0 \n * Google Chrome 9.0.587.1 \n * Google Chrome 9.0.588.0 \n * Google Chrome 9.0.589.0 \n * Google Chrome 9.0.590.0 \n * Google Chrome 9.0.591.0 \n * Google Chrome 9.0.592.0 \n * Google Chrome 9.0.593.0 \n * Google Chrome 9.0.594.0 \n * Google Chrome 9.0.595.0 \n * Google Chrome 9.0.596.0 \n * Google Chrome 9.0.597.0 \n * Google Chrome 9.0.597.1 \n * Google Chrome 9.0.597.10 \n * Google Chrome 9.0.597.100 \n * Google Chrome 9.0.597.101 \n * Google Chrome 9.0.597.102 \n * Google Chrome 9.0.597.106 \n * Google Chrome 9.0.597.107 \n * Google Chrome 9.0.597.11 \n * Google Chrome 9.0.597.12 \n * Google Chrome 9.0.597.14 \n * Google Chrome 9.0.597.15 \n * Google Chrome 9.0.597.16 \n * Google Chrome 9.0.597.17 \n * Google Chrome 9.0.597.18 \n * Google Chrome 9.0.597.19 \n * Google Chrome 9.0.597.2 \n * Google Chrome 9.0.597.20 \n * Google Chrome 9.0.597.21 \n * Google Chrome 9.0.597.22 \n * Google Chrome 9.0.597.23 \n * Google Chrome 9.0.597.24 \n * Google Chrome 9.0.597.25 \n * Google Chrome 9.0.597.26 \n * Google Chrome 9.0.597.27 \n * Google Chrome 9.0.597.28 \n * Google Chrome 9.0.597.29 \n * Google Chrome 9.0.597.30 \n * Google Chrome 9.0.597.31 \n * Google Chrome 9.0.597.32 \n * Google Chrome 9.0.597.33 \n * Google Chrome 9.0.597.34 \n * Google Chrome 9.0.597.35 \n * Google Chrome 9.0.597.36 \n * Google Chrome 9.0.597.37 \n * Google Chrome 9.0.597.38 \n * Google Chrome 9.0.597.39 \n * Google Chrome 9.0.597.4 \n * Google Chrome 9.0.597.40 \n * Google Chrome 9.0.597.41 \n * Google Chrome 9.0.597.42 \n * Google Chrome 9.0.597.44 \n * Google Chrome 9.0.597.45 \n * Google Chrome 9.0.597.46 \n * Google Chrome 9.0.597.47 \n * Google Chrome 9.0.597.5 \n * Google Chrome 9.0.597.54 \n * Google Chrome 9.0.597.55 \n * Google Chrome 9.0.597.56 \n * Google Chrome 9.0.597.57 \n * Google Chrome 9.0.597.58 \n * Google Chrome 9.0.597.59 \n * Google Chrome 9.0.597.60 \n * Google Chrome 9.0.597.62 \n * Google Chrome 9.0.597.63 \n * Google Chrome 9.0.597.64 \n * Google Chrome 9.0.597.65 \n * Google Chrome 9.0.597.66 \n * Google Chrome 9.0.597.67 \n * Google Chrome 9.0.597.68 \n * Google Chrome 9.0.597.69 \n * Google Chrome 9.0.597.7 \n * Google Chrome 9.0.597.70 \n * Google Chrome 9.0.597.71 \n * Google Chrome 9.0.597.72 \n * Google Chrome 9.0.597.73 \n * Google Chrome 9.0.597.74 \n * Google Chrome 9.0.597.75 \n * Google Chrome 9.0.597.76 \n * Google Chrome 9.0.597.77 \n * Google Chrome 9.0.597.78 \n * Google Chrome 9.0.597.79 \n * Google Chrome 9.0.597.8 \n * Google Chrome 9.0.597.80 \n * Google Chrome 9.0.597.81 \n * Google Chrome 9.0.597.82 \n * Google Chrome 9.0.597.83 \n * Google Chrome 9.0.597.84 \n * Google Chrome 9.0.597.85 \n * Google Chrome 9.0.597.86 \n * Google Chrome 9.0.597.88 \n * Google Chrome 9.0.597.9 \n * Google Chrome 9.0.597.90 \n * Google Chrome 9.0.597.92 \n * Google Chrome 9.0.597.94 \n * Google Chrome 9.0.597.96 \n * Google Chrome 9.0.597.97 \n * Google Chrome 9.0.597.98 \n * Google Chrome 9.0.597.99 \n * Google Chrome 9.0.598.0 \n * Google Chrome 9.0.599.0 \n * Google Chrome 9.0.600.0 \n * Google Chrome OS 0.10.140.0 \n * Google Chrome OS 0.9.110.6 \n * Google Chrome OS 0.9.126.0 \n * Google Chrome OS 0.9.128.3 \n * Google Chrome OS 0.9.130.14 Beta \n * Google Chrome OS 0.9.131.0 \n * Google Chrome OS 0.9.134.14 \n * Google Chrome OS 20.0.1132.0 \n * Google Chrome OS 20.0.1132.1 \n * Google Chrome OS 20.0.1132.10 \n * Google Chrome OS 20.0.1132.11 \n * Google Chrome OS 20.0.1132.12 \n * Google Chrome OS 20.0.1132.13 \n * Google Chrome OS 20.0.1132.14 \n * Google Chrome OS 20.0.1132.15 \n * Google Chrome OS 20.0.1132.16 \n * Google Chrome OS 20.0.1132.17 \n * Google Chrome OS 20.0.1132.18 \n * Google Chrome OS 20.0.1132.19 \n * Google Chrome OS 20.0.1132.2 \n * Google Chrome OS 20.0.1132.20 \n * Google Chrome OS 20.0.1132.21 \n * Google Chrome OS 20.0.1132.3 \n * Google Chrome OS 20.0.1132.4 \n * Google Chrome OS 20.0.1132.5 \n * Google Chrome OS 20.0.1132.6 \n * Google Chrome OS 20.0.1132.7 \n * Google Chrome OS 20.0.1132.8 \n * Google Chrome OS 20.0.1132.9 \n * Google Chrome OS 21.0.1180.0 \n * Google Chrome OS 21.0.1180.1 \n * Google Chrome OS 21.0.1180.10 \n * Google Chrome OS 21.0.1180.11 \n * Google Chrome OS 21.0.1180.13 \n * Google Chrome OS 21.0.1180.14 \n * Google Chrome OS 21.0.1180.15 \n * Google Chrome OS 21.0.1180.17 \n * Google Chrome OS 21.0.1180.18 \n * Google Chrome OS 21.0.1180.2 \n * Google Chrome OS 21.0.1180.3 \n * Google Chrome OS 21.0.1180.31 \n * Google Chrome OS 21.0.1180.32 \n * Google Chrome OS 21.0.1180.33 \n * Google Chrome OS 21.0.1180.34 \n * Google Chrome OS 21.0.1180.35 \n * Google Chrome OS 21.0.1180.36 \n * Google Chrome OS 21.0.1180.37 \n * Google Chrome OS 21.0.1180.38 \n * Google Chrome OS 21.0.1180.39 \n * Google Chrome OS 21.0.1180.4 \n * Google Chrome OS 21.0.1180.41 \n * Google Chrome OS 21.0.1180.46 \n * Google Chrome OS 21.0.1180.47 \n * Google Chrome OS 21.0.1180.48 \n * Google Chrome OS 21.0.1180.49 \n * Google Chrome OS 21.0.1180.5 \n * Google Chrome OS 21.0.1180.50 \n * Google Chrome OS 21.0.1180.51 \n * Google Chrome OS 21.0.1180.52 \n * Google Chrome OS 21.0.1180.53 \n * Google Chrome OS 21.0.1180.54 \n * Google Chrome OS 21.0.1180.55 \n * Google Chrome OS 21.0.1180.56 \n * Google Chrome OS 21.0.1180.57 \n * Google Chrome OS 21.0.1180.6 \n * Google Chrome OS 21.0.1180.7 \n * Google Chrome OS 21.0.1180.79 \n * Google Chrome OS 21.0.1180.8 \n * Google Chrome OS 21.0.1180.81 \n * Google Chrome OS 21.0.1180.9 \n * Google Chrome OS 21.0.1183.0 \n * Google Chrome OS 23.0.1271.94 \n * Google Chrome OS 25.0.1364.0 \n * Google Chrome OS 25.0.1364.1 \n * Google Chrome OS 25.0.1364.10 \n * Google Chrome OS 25.0.1364.108 \n * Google Chrome OS 25.0.1364.11 \n * Google Chrome OS 25.0.1364.110 \n * Google Chrome OS 25.0.1364.112 \n * Google Chrome OS 25.0.1364.113 \n * Google Chrome OS 25.0.1364.114 \n * Google Chrome OS 25.0.1364.115 \n * Google Chrome OS 25.0.1364.116 \n * Google Chrome OS 25.0.1364.117 \n * Google Chrome OS 25.0.1364.118 \n * Google Chrome OS 25.0.1364.119 \n * Google Chrome OS 25.0.1364.12 \n * Google Chrome OS 25.0.1364.120 \n * Google Chrome OS 25.0.1364.121 \n * Google Chrome OS 25.0.1364.122 \n * Google Chrome OS 25.0.1364.123 \n * Google Chrome OS 25.0.1364.124 \n * Google Chrome OS 25.0.1364.125 \n * Google Chrome OS 25.0.1364.126 \n * Google Chrome OS 25.0.1364.13 \n * Google Chrome OS 25.0.1364.14 \n * Google Chrome OS 25.0.1364.15 \n * Google Chrome OS 25.0.1364.152 \n * Google Chrome OS 25.0.1364.154 \n * Google Chrome OS 25.0.1364.155 \n * Google Chrome OS 25.0.1364.156 \n * Google Chrome OS 25.0.1364.159 \n * Google Chrome OS 25.0.1364.16 \n * Google Chrome OS 25.0.1364.160 \n * Google Chrome OS 25.0.1364.161 \n * Google Chrome OS 25.0.1364.168 \n * Google Chrome OS 25.0.1364.169 \n * Google Chrome OS 25.0.1364.17 \n * Google Chrome OS 25.0.1364.170 \n * Google Chrome OS 25.0.1364.171 \n * Google Chrome OS 25.0.1364.172 \n * Google Chrome OS 25.0.1364.173 \n * Google Chrome OS 25.0.1364.18 \n * Google Chrome OS 25.0.1364.19 \n * Google Chrome OS 25.0.1364.2 \n * Google Chrome OS 25.0.1364.20 \n * Google Chrome OS 25.0.1364.21 \n * Google Chrome OS 25.0.1364.22 \n * Google Chrome OS 25.0.1364.23 \n * Google Chrome OS 25.0.1364.24 \n * Google Chrome OS 25.0.1364.25 \n * Google Chrome OS 25.0.1364.26 \n * Google Chrome OS 25.0.1364.27 \n * Google Chrome OS 25.0.1364.28 \n * Google Chrome OS 25.0.1364.29 \n * Google Chrome OS 25.0.1364.3 \n * Google Chrome OS 25.0.1364.30 \n * Google Chrome OS 25.0.1364.31 \n * Google Chrome OS 25.0.1364.32 \n * Google Chrome OS 25.0.1364.33 \n * Google Chrome OS 25.0.1364.34 \n * Google Chrome OS 25.0.1364.35 \n * Google Chrome OS 25.0.1364.36 \n * Google Chrome OS 25.0.1364.37 \n * Google Chrome OS 25.0.1364.38 \n * Google Chrome OS 25.0.1364.39 \n * Google Chrome OS 25.0.1364.40 \n * Google Chrome OS 25.0.1364.41 \n * Google Chrome OS 25.0.1364.42 \n * Google Chrome OS 25.0.1364.43 \n * Google Chrome OS 25.0.1364.44 \n * Google Chrome OS 25.0.1364.45 \n * Google Chrome OS 25.0.1364.46 \n * Google Chrome OS 25.0.1364.47 \n * Google Chrome OS 25.0.1364.48 \n * Google Chrome OS 25.0.1364.49 \n * Google Chrome OS 25.0.1364.5 \n * Google Chrome OS 25.0.1364.50 \n * Google Chrome OS 25.0.1364.51 \n * Google Chrome OS 25.0.1364.52 \n * Google Chrome OS 25.0.1364.53 \n * Google Chrome OS 25.0.1364.54 \n * Google Chrome OS 25.0.1364.55 \n * Google Chrome OS 25.0.1364.56 \n * Google Chrome OS 25.0.1364.57 \n * Google Chrome OS 25.0.1364.58 \n * Google Chrome OS 25.0.1364.61 \n * Google Chrome OS 25.0.1364.62 \n * Google Chrome OS 25.0.1364.63 \n * Google Chrome OS 25.0.1364.65 \n * Google Chrome OS 25.0.1364.66 \n * Google Chrome OS 25.0.1364.67 \n * Google Chrome OS 25.0.1364.68 \n * Google Chrome OS 25.0.1364.7 \n * Google Chrome OS 25.0.1364.70 \n * Google Chrome OS 25.0.1364.72 \n * Google Chrome OS 25.0.1364.73 \n * Google Chrome OS 25.0.1364.74 \n * Google Chrome OS 25.0.1364.75 \n * Google Chrome OS 25.0.1364.76 \n * Google Chrome OS 25.0.1364.77 \n * Google Chrome OS 25.0.1364.78 \n * Google Chrome OS 25.0.1364.79 \n * Google Chrome OS 25.0.1364.8 \n * Google Chrome OS 25.0.1364.80 \n * Google Chrome OS 25.0.1364.81 \n * Google Chrome OS 25.0.1364.82 \n * Google Chrome OS 25.0.1364.84 \n * Google Chrome OS 25.0.1364.85 \n * Google Chrome OS 25.0.1364.86 \n * Google Chrome OS 25.0.1364.87 \n * Google Chrome OS 25.0.1364.88 \n * Google Chrome OS 25.0.1364.89 \n * Google Chrome OS 25.0.1364.9 \n * Google Chrome OS 25.0.1364.90 \n * Google Chrome OS 25.0.1364.91 \n * Google Chrome OS 25.0.1364.92 \n * Google Chrome OS 25.0.1364.93 \n * Google Chrome OS 25.0.1364.95 \n * Google Chrome OS 25.0.1364.98 \n * Google Chrome OS 25.0.1364.99 \n * Google Chrome OS 26.0.1410.0 \n * Google Chrome OS 26.0.1410.1 \n * Google Chrome OS 26.0.1410.10 \n * Google Chrome OS 26.0.1410.11 \n * Google Chrome OS 26.0.1410.12 \n * Google Chrome OS 26.0.1410.14 \n * Google Chrome OS 26.0.1410.15 \n * Google Chrome OS 26.0.1410.16 \n * Google Chrome OS 26.0.1410.17 \n * Google Chrome OS 26.0.1410.18 \n * Google Chrome OS 26.0.1410.19 \n * Google Chrome OS 26.0.1410.20 \n * Google Chrome OS 26.0.1410.21 \n * Google Chrome OS 26.0.1410.22 \n * Google Chrome OS 26.0.1410.23 \n * Google Chrome OS 26.0.1410.24 \n * Google Chrome OS 26.0.1410.25 \n * Google Chrome OS 26.0.1410.26 \n * Google Chrome OS 26.0.1410.27 \n * Google Chrome OS 26.0.1410.28 \n * Google Chrome OS 26.0.1410.29 \n * Google Chrome OS 26.0.1410.3 \n * Google Chrome OS 26.0.1410.30 \n * Google Chrome OS 26.0.1410.31 \n * Google Chrome OS 26.0.1410.32 \n * Google Chrome OS 26.0.1410.33 \n * Google Chrome OS 26.0.1410.34 \n * Google Chrome OS 26.0.1410.35 \n * Google Chrome OS 26.0.1410.36 \n * Google Chrome OS 26.0.1410.37 \n * Google Chrome OS 26.0.1410.38 \n * Google Chrome OS 26.0.1410.39 \n * Google Chrome OS 26.0.1410.4 \n * Google Chrome OS 26.0.1410.40 \n * Google Chrome OS 26.0.1410.41 \n * Google Chrome OS 26.0.1410.42 \n * Google Chrome OS 26.0.1410.43 \n * Google Chrome OS 26.0.1410.44 \n * Google Chrome OS 26.0.1410.45 \n * Google Chrome OS 26.0.1410.46 \n * Google Chrome OS 26.0.1410.47 \n * Google Chrome OS 26.0.1410.48 \n * Google Chrome OS 26.0.1410.49 \n * Google Chrome OS 26.0.1410.5 \n * Google Chrome OS 26.0.1410.50 \n * Google Chrome OS 26.0.1410.51 \n * Google Chrome OS 26.0.1410.52 \n * Google Chrome OS 26.0.1410.54 \n * Google Chrome OS 26.0.1410.55 \n * Google Chrome OS 26.0.1410.56 \n * Google Chrome OS 26.0.1410.57 \n * Google Chrome OS 26.0.1410.6 \n * Google Chrome OS 26.0.1410.7 \n * Google Chrome OS 26.0.1410.8 \n * Google Chrome OS 26.0.1410.9 \n * Google Chrome OS 28.0.1500.71 \n * Google Chrome OS 28.0.1500.95 \n * Google Chrome OS 32.0.1700.95 \n * Google Chrome OS 33.0.1750.152 \n * Google Chrome OS 35.0.1916.155 \n * Google Chrome OS 37.0.2062.119 \n * Google Chrome OS 40.0.2214.114 \n * Google Chrome OS 48.0.2564.116 \n * Google Chrome OS 48.0.2564.92 \n * Google Chrome OS 52.0.2743.85 \n * Google Chrome OS 53.0.2785.103 \n * Google Chrome OS 53.0.2785.144 \n * Google Chrome OS 54.0.2840.79 \n * Google Chrome OS 57.0.2987.137 \n * Google Chrome OS 58.0.3029.89 \n * Google Chrome OS 59.0.3071.91 \n * Google Chrome OS 59.0.3071.92 \n * Google Chrome OS 60.0.3112.114 \n * Google Chrome OS 61.0.3163.113 \n * Google Chrome OS 62.0.3202.97 \n * Google Chrome OS 8.0.552.342 \n * Google Chrome OS 8.0.552.343 \n * Google Chrome OS 8.0.552.344 \n * Google Nexus 5X \n * Google Nexus 6P \n * Google Pixel 2 XL \n * Google Pixel C \n * Google Pixel XL \n * Google V8 \n * HP ProLiant DL385 Gen10 Server 1.02 \n * IBM AIX 5.3 \n * IBM AIX 6.1 \n * IBM AIX 7.1 \n * IBM Aix 7.2 \n * IBM Vios 2.2.0 \n * Intel Xeon CPU E5-1650 v3 \n * Linux kernel 4.14.11 \n * Linux kernel 4.9.74 \n * Microsoft Edge \n * Microsoft Internet Explorer 11 \n * Microsoft SQL Server 2008 R2 for 32-bit Systems Service Pack 3 \n * Microsoft SQL Server 2008 R2 for x64-based Systems Service Pack 3 \n * Microsoft SQL Server 2008 for 32-bit Systems Service Pack 4 \n * Microsoft SQL Server 2008 for x64-based Systems Service Pack 4 \n * Microsoft SQL Server 2012 for 32-bit Systems Service Pack 3 \n * Microsoft SQL Server 2012 for 32-bit Systems Service Pack 4 \n * Microsoft SQL Server 2012 for x64-based Systems Service Pack 3 \n * Microsoft SQL Server 2012 for x64-based Systems Service Pack 4 \n * Microsoft SQL Server 2014 for 32-bit Systems Service Pack 2 \n * Microsoft SQL Server 2014 for x64-based Systems Service Pack 2 \n * Microsoft SQL Server 2016 for x64-based Systems \n * Microsoft SQL Server 2016 for x64-based Systems Service Pack 1 \n * Microsoft SQL Server 2017 for x64-based Systems \n * Microsoft Windows 10 Version 1607 for 32-bit Systems \n * Microsoft Windows 10 Version 1607 for x64-based Systems \n * Microsoft Windows 10 for 32-bit Systems \n * Microsoft Windows 10 for x64-based Systems \n * Microsoft Windows 10 version 1511 for 32-bit Systems \n * Microsoft Windows 10 version 1511 for x64-based Systems \n * Microsoft Windows 10 version 1703 for 32-bit Systems \n * Microsoft Windows 10 version 1703 for x64-based Systems \n * Microsoft Windows 10 version 1709 for 32-bit Systems \n * Microsoft Windows 7 for 32-bit Systems SP1 \n * Microsoft Windows 7 for x64-based Systems SP1 \n * Microsoft Windows 8.1 for 32-bit Systems \n * Microsoft Windows 8.1 for x64-based Systems \n * Microsoft Windows Server 2008 R2 for Itanium-based Systems SP1 \n * Microsoft Windows Server 2008 R2 for x64-based Systems SP1 \n * Microsoft Windows Server 2012 \n * Microsoft Windows Server 2012 R2 \n * Microsoft Windows Server 2016 \n * Mozilla Firefox 0.1 \n * Mozilla Firefox 0.10.0 \n * Mozilla Firefox 0.10.1 \n * Mozilla Firefox 0.2 \n * Mozilla Firefox 0.3 \n * Mozilla Firefox 0.4 \n * Mozilla Firefox 0.5 \n * Mozilla Firefox 0.6 \n * Mozilla Firefox 0.6.1 \n * Mozilla Firefox 0.7 \n * Mozilla Firefox 0.7.1 \n * Mozilla Firefox 0.8.0 \n * Mozilla Firefox 0.9.0 \n * Mozilla Firefox 0.9.1 \n * Mozilla Firefox 0.9.2 \n * Mozilla Firefox 0.9.3 \n * Mozilla Firefox 1.0.0 \n * Mozilla Firefox 1.0.1 \n * Mozilla Firefox 1.0.2 \n * Mozilla Firefox 1.0.3 \n * Mozilla Firefox 1.0.4 \n * Mozilla Firefox 1.0.5 \n * Mozilla Firefox 1.0.6 \n * Mozilla Firefox 1.0.7 \n * Mozilla Firefox 1.0.8 \n * Mozilla Firefox 1.4.1 \n * Mozilla Firefox 1.5.0 12 \n * Mozilla Firefox 1.5.0 \n * Mozilla Firefox 1.5.0.1 \n * Mozilla Firefox 1.5.0.10 \n * Mozilla Firefox 1.5.0.11 \n * Mozilla Firefox 1.5.0.2 \n * Mozilla Firefox 1.5.0.3 \n * Mozilla Firefox 1.5.0.4 \n * Mozilla Firefox 1.5.0.5 \n * Mozilla Firefox 1.5.0.6 \n * Mozilla Firefox 1.5.0.7 \n * Mozilla Firefox 1.5.0.8 \n * Mozilla Firefox 1.5.0.9 \n * Mozilla Firefox 1.5.1 \n * Mozilla Firefox 1.5.2 \n * Mozilla Firefox 1.5.3 \n * Mozilla Firefox 1.5.4 \n * Mozilla Firefox 1.5.5 \n * Mozilla Firefox 1.5.6 \n * Mozilla Firefox 1.5.7 \n * Mozilla Firefox 1.5.8 \n * Mozilla Firefox 1.8 \n * Mozilla Firefox 10 \n * Mozilla Firefox 10.0 \n * Mozilla Firefox 10.0.1 \n * Mozilla Firefox 10.0.10 \n * Mozilla Firefox 10.0.11 \n * Mozilla Firefox 10.0.12 \n * Mozilla Firefox 10.0.2 \n * Mozilla Firefox 10.0.3 \n * Mozilla Firefox 10.0.4 \n * Mozilla Firefox 10.0.5 \n * Mozilla Firefox 10.0.6 \n * Mozilla Firefox 10.0.7 \n * Mozilla Firefox 10.0.8 \n * Mozilla Firefox 10.0.9 \n * Mozilla Firefox 11.0 \n * Mozilla Firefox 12.0 \n * Mozilla Firefox 13.0 \n * Mozilla Firefox 13.0.1 \n * Mozilla Firefox 14 \n * Mozilla Firefox 14.0 \n * Mozilla Firefox 14.0.1 \n * Mozilla Firefox 14.01 \n * Mozilla Firefox 15 \n * Mozilla Firefox 15.0 \n * Mozilla Firefox 15.0.1 \n * Mozilla Firefox 16 \n * Mozilla Firefox 16.0 \n * Mozilla Firefox 16.0.1 \n * Mozilla Firefox 16.0.2 \n * Mozilla Firefox 17.0 \n * Mozilla Firefox 17.0.1 \n * Mozilla Firefox 17.0.10 \n * Mozilla Firefox 17.0.11 \n * Mozilla Firefox 17.0.2 \n * Mozilla Firefox 17.0.3 \n * Mozilla Firefox 17.0.4 \n * Mozilla Firefox 17.0.5 \n * Mozilla Firefox 17.0.6 \n * Mozilla Firefox 17.0.7 \n * Mozilla Firefox 17.0.8 \n * Mozilla Firefox 17.0.9 \n * Mozilla Firefox 18.0 \n * Mozilla Firefox 18.0.1 \n * Mozilla Firefox 18.0.2 \n * Mozilla Firefox 19.0 \n * Mozilla Firefox 19.0.1 \n * Mozilla Firefox 19.0.2 \n * Mozilla Firefox 2.0 .1 \n * Mozilla Firefox 2.0 .10 \n * Mozilla Firefox 2.0 .4 \n * Mozilla Firefox 2.0 .5 \n * Mozilla Firefox 2.0 .6 \n * Mozilla Firefox 2.0 .7 \n * Mozilla Firefox 2.0 .9 \n * Mozilla Firefox 2.0 8 \n * Mozilla Firefox 2.0 \n * Mozilla Firefox 2.0.0 .19 \n * Mozilla Firefox 2.0.0 20 \n * Mozilla Firefox 2.0.0.1 \n * Mozilla Firefox 2.0.0.10 \n * Mozilla Firefox 2.0.0.11 \n * Mozilla Firefox 2.0.0.12 \n * Mozilla Firefox 2.0.0.13 \n * Mozilla Firefox 2.0.0.14 \n * Mozilla Firefox 2.0.0.15 \n * Mozilla Firefox 2.0.0.16 \n * Mozilla Firefox 2.0.0.17 \n * Mozilla Firefox 2.0.0.18 \n * Mozilla Firefox 2.0.0.19 \n * Mozilla Firefox 2.0.0.2 \n * Mozilla Firefox 2.0.0.21 \n * Mozilla Firefox 2.0.0.3 \n * Mozilla Firefox 2.0.0.4 \n * Mozilla Firefox 2.0.0.5 \n * Mozilla Firefox 2.0.0.6 \n * Mozilla Firefox 2.0.0.7 \n * Mozilla Firefox 2.0.0.8 \n * Mozilla Firefox 2.0.0.9 \n * Mozilla Firefox 20.0 \n * Mozilla Firefox 20.0.1 \n * Mozilla Firefox 21.0 \n * Mozilla Firefox 22.0 \n * Mozilla Firefox 22.0.0.4917 \n * Mozilla Firefox 23.0 \n * Mozilla Firefox 23.0.1 \n * Mozilla Firefox 24.0 \n * Mozilla Firefox 24.1 \n * Mozilla Firefox 24.1.1 \n * Mozilla Firefox 25.0 \n * Mozilla Firefox 25.0.1 \n * Mozilla Firefox 26 \n * Mozilla Firefox 26.0 \n * Mozilla Firefox 27 \n * Mozilla Firefox 27.0 \n * Mozilla Firefox 27.0.1 \n * Mozilla Firefox 28 \n * Mozilla Firefox 28.0 \n * Mozilla Firefox 28.0.1 \n * Mozilla Firefox 29 \n * Mozilla Firefox 29.0 \n * Mozilla Firefox 29.0.1 \n * Mozilla Firefox 3.0 \n * Mozilla Firefox 3.0.1 \n * Mozilla Firefox 3.0.10 \n * Mozilla Firefox 3.0.11 \n * Mozilla Firefox 3.0.12 \n * Mozilla Firefox 3.0.13 \n * Mozilla Firefox 3.0.14 \n * Mozilla Firefox 3.0.15 \n * Mozilla Firefox 3.0.16 \n * Mozilla Firefox 3.0.17 \n * Mozilla Firefox 3.0.18 \n * Mozilla Firefox 3.0.19 \n * Mozilla Firefox 3.0.2 \n * Mozilla Firefox 3.0.3 \n * Mozilla Firefox 3.0.4 \n * Mozilla Firefox 3.0.5 \n * Mozilla Firefox 3.0.6 \n * Mozilla Firefox 3.0.7 \n * Mozilla Firefox 3.0.8 \n * Mozilla Firefox 3.0.9 \n * Mozilla Firefox 3.1 \n * Mozilla Firefox 3.5.0 \n * Mozilla Firefox 3.5.1 \n * Mozilla Firefox 3.5.10 \n * Mozilla Firefox 3.5.11 \n * Mozilla Firefox 3.5.12 \n * Mozilla Firefox 3.5.13 \n * Mozilla Firefox 3.5.14 \n * Mozilla Firefox 3.5.15 \n * Mozilla Firefox 3.5.16 \n * Mozilla Firefox 3.5.17 \n * Mozilla Firefox 3.5.18 \n * Mozilla Firefox 3.5.19 \n * Mozilla Firefox 3.5.2 \n * Mozilla Firefox 3.5.3 \n * Mozilla Firefox 3.5.4 \n * Mozilla Firefox 3.5.5 \n * Mozilla Firefox 3.5.6 \n * Mozilla Firefox 3.5.7 \n * Mozilla Firefox 3.5.8 \n * Mozilla Firefox 3.5.9 \n * Mozilla Firefox 3.6 \n * Mozilla Firefox 3.6.1 \n * Mozilla Firefox 3.6.10 \n * Mozilla Firefox 3.6.11 \n * Mozilla Firefox 3.6.12 \n * Mozilla Firefox 3.6.13 \n * Mozilla Firefox 3.6.14 \n * Mozilla Firefox 3.6.15 \n * Mozilla Firefox 3.6.16 \n * Mozilla Firefox 3.6.17 \n * Mozilla Firefox 3.6.18 \n * Mozilla Firefox 3.6.19 \n * Mozilla Firefox 3.6.2 \n * Mozilla Firefox 3.6.20 \n * Mozilla Firefox 3.6.21 \n * Mozilla Firefox 3.6.22 \n * Mozilla Firefox 3.6.23 \n * Mozilla Firefox 3.6.24 \n * Mozilla Firefox 3.6.25 \n * Mozilla Firefox 3.6.26 \n * Mozilla Firefox 3.6.27 \n * Mozilla Firefox 3.6.28 \n * Mozilla Firefox 3.6.3 \n * Mozilla Firefox 3.6.4 \n * Mozilla Firefox 3.6.5 \n * Mozilla Firefox 3.6.6 \n * Mozilla Firefox 3.6.7 \n * Mozilla Firefox 3.6.8 \n * Mozilla Firefox 3.6.9 \n * Mozilla Firefox 30 \n * Mozilla Firefox 30.0 \n * Mozilla Firefox 31 \n * Mozilla Firefox 31.0 \n * Mozilla Firefox 31.1 \n * Mozilla Firefox 31.1.0 \n * Mozilla Firefox 31.6 \n * Mozilla Firefox 31.8 \n * Mozilla Firefox 31.8.0 \n * Mozilla Firefox 32 \n * Mozilla Firefox 32.0 \n * Mozilla Firefox 32.0.3 \n * Mozilla Firefox 33 \n * Mozilla Firefox 33.0 \n * Mozilla Firefox 34 \n * Mozilla Firefox 34.0.5 \n * Mozilla Firefox 35 \n * Mozilla Firefox 35.0.1 \n * Mozilla Firefox 36 \n * Mozilla Firefox 36.0.3 \n * Mozilla Firefox 36.0.4 \n * Mozilla Firefox 37 \n * Mozilla Firefox 37.0.1 \n * Mozilla Firefox 37.0.2 \n * Mozilla Firefox 38 \n * Mozilla Firefox 39 \n * Mozilla Firefox 39.0.3 \n * Mozilla Firefox 4.0 \n * Mozilla Firefox 4.0.1 \n * Mozilla Firefox 40 \n * Mozilla Firefox 40.0.3 \n * Mozilla Firefox 41 \n * Mozilla Firefox 41.0.2 \n * Mozilla Firefox 42 \n * Mozilla Firefox 43 \n * Mozilla Firefox 43.0.1 \n * Mozilla Firefox 43.0.2 \n * Mozilla Firefox 44 \n * Mozilla Firefox 44.0.2 \n * Mozilla Firefox 45 \n * Mozilla Firefox 45.0.2 \n * Mozilla Firefox 46 \n * Mozilla Firefox 46.0.1 \n * Mozilla Firefox 47 \n * Mozilla Firefox 48 \n * Mozilla Firefox 49 \n * Mozilla Firefox 49.0.1 \n * Mozilla Firefox 49.0.2 \n * Mozilla Firefox 5.0 \n * Mozilla Firefox 5.0.1 \n * Mozilla Firefox 50 \n * Mozilla Firefox 50.0.1 \n * Mozilla Firefox 50.0.2 \n * Mozilla Firefox 50.1 \n * Mozilla Firefox 51 \n * Mozilla Firefox 52 \n * Mozilla Firefox 52.0.1 \n * Mozilla Firefox 53 \n * Mozilla Firefox 53.0.2 \n * Mozilla Firefox 54 \n * Mozilla Firefox 55 \n * Mozilla Firefox 56 \n * Mozilla Firefox 57 \n * Mozilla Firefox 57.0.1 \n * Mozilla Firefox 57.0.2 \n * Mozilla Firefox 6 \n * Mozilla Firefox 6.0 \n * Mozilla Firefox 6.0.1 \n * Mozilla Firefox 6.0.2 \n * Mozilla Firefox 7 \n * Mozilla Firefox 7.0 \n * Mozilla Firefox 7.0.1 \n * Mozilla Firefox 8.0 \n * Mozilla Firefox 8.0.1 \n * Mozilla Firefox 9.0 \n * Mozilla Firefox 9.0.1 \n * Redhat Enterprise Linux 5 \n * Redhat Enterprise Linux 6 \n * Redhat Enterprise Linux 7 \n * Redhat Enterprise Linux Desktop 6 \n * Redhat Enterprise Linux Desktop 7 \n * Redhat Enterprise Linux EUS Compute Node 6.7 \n * Redhat Enterprise Linux EUS Compute Node 7.3 \n * Redhat Enterprise Linux EUS Compute Node 7.4 \n * Redhat Enterprise Linux Server (for IBM Power LE) - 4 Year Extended Upd 7.3 \n * Redhat Enterprise Linux Server (for IBM Power LE) - 4 Year Extended Update Support 7.4 \n * Redhat Enterprise Linux Server - 4 Year Extended Update Support 7.2 \n * Redhat Enterprise Linux Server - 4 Year Extended Update Support 7.3 \n * Redhat Enterprise Linux Server - 4 Year Extended Update Support 7.4 \n * Redhat Enterprise Linux Server - AUS 6.6 \n * Redhat Enterprise Linux Server - AUS 7.2 \n * Redhat Enterprise Linux Server - AUS 7.3 \n * Redhat Enterprise Linux Server - AUS 7.4 \n * Redhat Enterprise Linux Server - Extended Update Support 6.7 \n * Redhat Enterprise Linux Server - Extended Update Support 7.3 \n * Redhat Enterprise Linux Server - Extended Update Support 7.4 \n * Redhat Enterprise Linux Server - TUS 6.6 \n * Redhat Enterprise Linux Server - TUS 7.2 \n * Redhat Enterprise Linux Server - TUS 7.3 \n * Redhat Enterprise Linux Server - TUS 7.4 \n * Redhat Enterprise Linux Server 6 \n * Redhat Enterprise Linux Server 7 \n * Redhat Enterprise Linux Workstation 6 \n * Redhat Enterprise Linux Workstation 7 \n * Redhat Enterprise Linux for IBM z Systems - Extended Update Support 6.7 \n * Redhat Enterprise Linux for IBM z Systems - Extended Update Support 7.4 \n * Redhat Enterprise Linux for IBM z Systems 6 \n * Redhat Enterprise Linux for IBM z Systems 7 \n * Redhat Enterprise Linux for Power, big endian - Extended Update Support 6.7 \n * Redhat Enterprise Linux for Power, big endian - Extended Update Support 7.3 \n * Redhat Enterprise Linux for Power, big endian - Extended Update Support 7.4 \n * Redhat Enterprise Linux for Power, big endian 6 \n * Redhat Enterprise Linux for Power, big endian 7 \n * Redhat Enterprise Linux for Power, little endian - Extended Update Supp 7.3 \n * Redhat Enterprise Linux for Power, little endian - Extended Update Supp 7.4 \n * Redhat Enterprise Linux for Power, little endian 7 \n * Redhat Enterprise Linux for Real Time 7 \n * Redhat Enterprise Linux for Real Time for NFV 7 \n * Redhat Enterprise Linux for Scientific Computing 6 \n * Redhat Enterprise Linux for Scientific Computing 7 \n * Redhat Enterprise Mrg 2 \n * Redhat Virtualization Host 4 \n * VMWare ESXi 5.5 \n * VMWare Esxi 6.0 \n * VMWare Esxi 6.5 \n * VMWare Fusion 8.0 \n * VMWare Fusion 8.0.1 \n * VMWare Fusion 8.0.2 \n * VMWare Fusion 8.1.0 \n * VMWare Fusion 8.1.1 \n * VMWare Fusion 8.5 \n * VMWare Fusion 8.5.2 \n * VMWare Fusion 8.5.4 \n * VMWare Fusion 8.5.5 \n * VMWare Fusion 8.5.6 \n * VMWare Fusion 8.5.8 \n * VMWare Identity Manager 2.0 \n * VMWare Identity Manager 2.7 \n * VMWare Identity Manager 2.7.1 \n * VMWare Identity Manager 3.0 \n * VMWare Workstation 12.0 \n * VMWare Workstation 12.5.3 \n * VMWare Workstation 12.5.5 \n * VMWare Workstation 12.5.7 \n * VMWare vCenter Server 6.0 \n * VMWare vCenter Server 6.5 \n * VMWare vCloud Usage Meter 3.0 \n * VMWare vCloud Usage Meter 3.3 \n * VMWare vCloud Usage Meter 3.3.3 \n * VMWare vRealize Automation 6.0 \n * VMWare vRealize Automation 6.1 \n * VMWare vRealize Automation 6.2 \n * VMWare vRealize Automation 6.2.4 \n * VMWare vRealize Automation 6.2.4.1 \n * VMWare vRealize Automation 6.2.5 \n * VMWare vRealize Automation 7.0 \n * VMWare vRealize Automation 7.1 \n * VMWare vRealize Automation 7.2.0 \n * VMWare vRealize Automation 7.3.0 \n * VMWare vSphere Data Protection 6.0 \n * VMWare vSphere Data Protection 6.0.0 \n * VMWare vSphere Data Protection 6.0.5 \n * VMWare vSphere Data Protection 6.0.6 \n * VMWare vSphere Data Protection 6.0.7 \n * VMWare vSphere Data Protection 6.1 \n * VMWare vSphere Data Protection 6.1.0 \n * VMWare vSphere Data Protection 6.1.4 \n * VMWare vSphere Data Protection 6.1.5 \n * VMWare vSphere Data Protection 6.1.6 \n * VMWare vSphere Integrated Containers 1.0 \n * VMWare vSphere Integrated Containers 1.1 \n * VMWare vSphere Integrated Containers 1.2 \n * VMWare vSphere Integrated Containers 1.3 \n * Xen Xen \n\n### Recommendations\n\n**Permit local access for trusted individuals only. Where possible, use restricted environments and restricted shells.** \nGiven the local nature of this issue, grant only trusted and accountable individuals access to affected computers. \n\nUpdates are available. Please see the references or vendor advisory for more information.\n", "modified": "2018-01-03T00:00:00", "published": "2018-01-03T00:00:00", "id": "SMNTC-102371", "href": "https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/102371", "type": "symantec", "title": "Multiple CPU Hardware CVE-2017-5753 Information Disclosure Vulnerability", "cvss": {"score": 4.7, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:COMPLETE/I:NONE/A:NONE/"}}, {"lastseen": "2018-03-11T18:48:46", "bulletinFamily": "software", "cvelist": ["CVE-2017-5753", "CVE-2017-5754", "CVE-2017-5715"], "description": "### Description\n\nMultiple CPU Hardware are prone to an information-disclosure vulnerability. Attackers can exploit this issue to obtain sensitive information that may aid in further attacks.\n\n### Technologies Affected\n\n * Apple Mac Os X 10.11.6 \n * Apple iOS 11.2 \n * Apple macOS 10.12.6 \n * Apple macOS 10.13.2 \n * Apple tvOS 11.2 \n * BD Accuri C6 Plus \n * BD Assurity Linc \n * BD BACTEC 9120/9240 \n * BD BACTEC FX \n * BD BACTEC FX40 \n * BD Data Innovations \n * BD EpiCenter \n * BD FACSAria Fusion \n * BD FACSAria I/II/III \n * BD FACSCalibur \n * BD FACSCanto 10-color \n * BD FACSCanto 10-color clinical \n * BD FACSCanto II \n * BD FACSCanto II clinical \n * BD FACSCelesta \n * BD FACSCount \n * BD FACSDuet Sample Prep (ASaP) \n * BD FACSJazz \n * BD FACSLink Interface \n * BD FACSLyric \n * BD FACSMelody \n * BD FACSSample Prep Assistant III \n * BD FACSVerse \n * BD FACSVia \n * BD GenCell CliC \n * BD Influx \n * BD Kiestra TLA/WCA \n * BD LSR II \n * BD LSRFortessa \n * BD LSRFortessa X-20 \n * BD Lyse Wash Assistant \n * BD MAX \n * BD Panel Designer \n * BD Phoenix 100 \n * BD Phoenix M50 \n * BD Pyxis Anesthesia ES \n * BD Pyxis Anesthesia System 3500 \n * BD Pyxis CIISafe -Workstation \n * BD Pyxis CUBIE Replenishment Station \n * BD Pyxis CathRack \n * BD Pyxis DuoStation \n * BD Pyxis EcoStation System \n * BD Pyxis Infant Care Verification \n * BD Pyxis MedStation 3500 \n * BD Pyxis MedStation 4000 \n * BD Pyxis MedStation ES \n * BD Pyxis Medication Administration \n * BD Pyxis Nursing Data Collection \n * BD Pyxis ParAssist System \n * BD Pyxis Parx \n * BD Pyxis Parx handheld \n * BD Pyxis ProcedureStation \n * BD Pyxis ScrubStation System \n * BD Pyxis Specimen Collection Verification \n * BD Pyxis StockStation System \n * BD Pyxis Supply Roller \n * BD Pyxis SupplyStation \n * BD Pyxis Transfusion Verification \n * BD Rowa Dose \n * BD Rowa Smart \n * BD Rowa Vmax System \n * BD Totalys SlidePrep \n * BD Viper LT \n * BD Viper XTR \n * Bluecoat Content Analysis 2.1 \n * Bluecoat Content Analysis 2.2 \n * Bluecoat Malware Analysis Appliance 4.2 \n * Bluecoat Security Analytics 7.1 \n * Bluecoat Security Analytics 7.2 \n * Bluecoat Security Analytics 7.3 \n * Bluecoat X-Series XOS 10.0 \n * Bluecoat X-Series XOS 11.0 \n * Bluecoat X-Series XOS 9.7 \n * Cisco Carrier Routing System 6.6.0.BASE \n * Cisco Unified Computing System 2.2 \n * Cisco Unified Computing System 3.1 \n * Cisco Unified Computing System 3.2 \n * Google Android \n * Google Chrome 0.1.38.1 \n * Google Chrome 0.1.38.2 \n * Google Chrome 0.1.38.4 \n * Google Chrome 0.1.40.1 \n * Google Chrome 0.1.42.2 \n * Google Chrome 0.1.42.3 \n * Google Chrome 0.2.149.27 \n * Google Chrome 0.2.149.29 \n * Google Chrome 0.2.149.30 \n * Google Chrome 0.2.152.1 \n * Google Chrome 0.2.153.1 \n * Google Chrome 0.3.154 9 \n * Google Chrome 0.3.154.0 \n * Google Chrome 0.3.154.3 \n * Google Chrome 0.4.154.18 \n * Google Chrome 0.4.154.22 \n * Google Chrome 0.4.154.31 \n * Google Chrome 0.4.154.33 \n * Google Chrome 1.0.154.36 \n * Google Chrome 1.0.154.39 \n * Google Chrome 1.0.154.42 \n * Google Chrome 1.0.154.43 \n * Google Chrome 1.0.154.46 \n * Google Chrome 1.0.154.48 \n * Google Chrome 1.0.154.52 \n * Google Chrome 1.0.154.53 \n * Google Chrome 1.0.154.55 \n * Google Chrome 1.0.154.59 \n * Google Chrome 1.0.154.61 \n * Google Chrome 1.0.154.64 \n * Google Chrome 1.0.154.65 \n * Google Chrome 10 \n * Google Chrome 10.0.601.0 \n * Google Chrome 10.0.602.0 \n * Google Chrome 10.0.603.0 \n * Google Chrome 10.0.603.2 \n * Google Chrome 10.0.603.3 \n * Google Chrome 10.0.604.0 \n * Google Chrome 10.0.605.0 \n * Google Chrome 10.0.606.0 \n * Google Chrome 10.0.607.0 \n * Google Chrome 10.0.608.0 \n * Google Chrome 10.0.609.0 \n * Google Chrome 10.0.610.0 \n * Google Chrome 10.0.611.0 \n * Google Chrome 10.0.611.1 \n * Google Chrome 10.0.612.0 \n * Google Chrome 10.0.612.1 \n * Google Chrome 10.0.612.2 \n * Google Chrome 10.0.612.3 \n * Google Chrome 10.0.613.0 \n * Google Chrome 10.0.614.0 \n * Google Chrome 10.0.615.0 \n * Google Chrome 10.0.616.0 \n * Google Chrome 10.0.617.0 \n * Google Chrome 10.0.618.0 \n * Google Chrome 10.0.619.0 \n * Google Chrome 10.0.620.0 \n * Google Chrome 10.0.621.0 \n * Google Chrome 10.0.622.0 \n * Google Chrome 10.0.622.1 \n * Google Chrome 10.0.623.0 \n * Google Chrome 10.0.624.0 \n * Google Chrome 10.0.625.0 \n * Google Chrome 10.0.626.0 \n * Google Chrome 10.0.627.0 \n * Google Chrome 10.0.628.0 \n * Google Chrome 10.0.629.0 \n * Google Chrome 10.0.630.0 \n * Google Chrome 10.0.631.0 \n * Google Chrome 10.0.632.0 \n * Google Chrome 10.0.633.0 \n * Google Chrome 10.0.634.0 \n * Google Chrome 10.0.634.1 \n * Google Chrome 10.0.635.0 \n * Google Chrome 10.0.636.0 \n * Google Chrome 10.0.638.0 \n * Google Chrome 10.0.638.1 \n * Google Chrome 10.0.639.0 \n * Google Chrome 10.0.640.0 \n * Google Chrome 10.0.642.0 \n * Google Chrome 10.0.642.1 \n * Google Chrome 10.0.642.2 \n * Google Chrome 10.0.643.0 \n * Google Chrome 10.0.644.0 \n * Google Chrome 10.0.645.0 \n * Google Chrome 10.0.646.0 \n * Google Chrome 10.0.647.0 \n * Google Chrome 10.0.648.0 \n * Google Chrome 10.0.648.1 \n * Google Chrome 10.0.648.10 \n * Google Chrome 10.0.648.101 \n * Google Chrome 10.0.648.103 \n * Google Chrome 10.0.648.105 \n * Google Chrome 10.0.648.107 \n * Google Chrome 10.0.648.11 \n * Google Chrome 10.0.648.114 \n * Google Chrome 10.0.648.116 \n * Google Chrome 10.0.648.118 \n * Google Chrome 10.0.648.119 \n * Google Chrome 10.0.648.12 \n * Google Chrome 10.0.648.120 \n * Google Chrome 10.0.648.121 \n * Google Chrome 10.0.648.122 \n * Google Chrome 10.0.648.123 \n * Google Chrome 10.0.648.124 \n * Google Chrome 10.0.648.125 \n * Google Chrome 10.0.648.126 \n * Google Chrome 10.0.648.127 \n * Google Chrome 10.0.648.128 \n * Google Chrome 10.0.648.129 \n * Google Chrome 10.0.648.13 \n * Google Chrome 10.0.648.130 \n * Google Chrome 10.0.648.131 \n * Google Chrome 10.0.648.132 \n * Google Chrome 10.0.648.133 \n * Google Chrome 10.0.648.134 \n * Google Chrome 10.0.648.135 \n * Google Chrome 10.0.648.151 \n * Google Chrome 10.0.648.18 \n * Google Chrome 10.0.648.2 \n * Google Chrome 10.0.648.201 \n * Google Chrome 10.0.648.203 \n * Google Chrome 10.0.648.204 \n * Google Chrome 10.0.648.205 \n * Google Chrome 10.0.648.23 \n * Google Chrome 10.0.648.26 \n * Google Chrome 10.0.648.28 \n * Google Chrome 10.0.648.3 \n * Google Chrome 10.0.648.32 \n * Google Chrome 10.0.648.35 \n * Google Chrome 10.0.648.38 \n * Google Chrome 10.0.648.4 \n * Google Chrome 10.0.648.42 \n * Google Chrome 10.0.648.45 \n * Google Chrome 10.0.648.49 \n * Google Chrome 10.0.648.5 \n * Google Chrome 10.0.648.54 \n * Google Chrome 10.0.648.56 \n * Google Chrome 10.0.648.59 \n * Google Chrome 10.0.648.6 \n * Google Chrome 10.0.648.62 \n * Google Chrome 10.0.648.66 \n * Google Chrome 10.0.648.68 \n * Google Chrome 10.0.648.7 \n * Google Chrome 10.0.648.70 \n * Google Chrome 10.0.648.72 \n * Google Chrome 10.0.648.76 \n * Google Chrome 10.0.648.79 \n * Google Chrome 10.0.648.8 \n * Google Chrome 10.0.648.82 \n * Google Chrome 10.0.648.84 \n * Google Chrome 10.0.648.87 \n * Google Chrome 10.0.648.9 \n * Google Chrome 10.0.648.90 \n * Google Chrome 10.0.649.0 \n * Google Chrome 10.0.650.0 \n * Google Chrome 10.0.651.0 \n * Google Chrome 11 \n * Google Chrome 11.0.652.0 \n * Google Chrome 11.0.653.0 \n * Google Chrome 11.0.654.0 \n * Google Chrome 11.0.655.0 \n * Google Chrome 11.0.656.0 \n * Google Chrome 11.0.657.0 \n * Google Chrome 11.0.658.0 \n * Google Chrome 11.0.658.1 \n * Google Chrome 11.0.659.0 \n * Google Chrome 11.0.660.0 \n * Google Chrome 11.0.661.0 \n * Google Chrome 11.0.662.0 \n * Google Chrome 11.0.663.0 \n * Google Chrome 11.0.664.1 \n * Google Chrome 11.0.665.0 \n * Google Chrome 11.0.666.0 \n * Google Chrome 11.0.667.0 \n * Google Chrome 11.0.667.2 \n * Google Chrome 11.0.667.3 \n * Google Chrome 11.0.667.4 \n * Google Chrome 11.0.668.0 \n * Google Chrome 11.0.669.0 \n * Google Chrome 11.0.670.0 \n * Google Chrome 11.0.671.0 \n * Google Chrome 11.0.672.0 \n * Google Chrome 11.0.672.1 \n * Google Chrome 11.0.672.2 \n * Google Chrome 11.0.673.0 \n * Google Chrome 11.0.674.0 \n * Google Chrome 11.0.675.0 \n * Google Chrome 11.0.676.0 \n * Google Chrome 11.0.677.0 \n * Google Chrome 11.0.678.0 \n * Google Chrome 11.0.679.0 \n * Google Chrome 11.0.680.0 \n * Google Chrome 11.0.681.0 \n * Google Chrome 11.0.682.0 \n * Google Chrome 11.0.683.0 \n * Google Chrome 11.0.684.0 \n * Google Chrome 11.0.685.0 \n * Google Chrome 11.0.686.0 \n * Google Chrome 11.0.686.1 \n * Google Chrome 11.0.686.2 \n * Google Chrome 11.0.686.3 \n * Google Chrome 11.0.687.0 \n * Google Chrome 11.0.687.1 \n * Google Chrome 11.0.688.0 \n * Google Chrome 11.0.689.0 \n * Google Chrome 11.0.690.0 \n * Google Chrome 11.0.690.1 \n * Google Chrome 11.0.691.0 \n * Google Chrome 11.0.692.0 \n * Google Chrome 11.0.693.0 \n * Google Chrome 11.0.694.0 \n * Google Chrome 11.0.695.0 \n * Google Chrome 11.0.696.0 \n * Google Chrome 11.0.696.1 \n * Google Chrome 11.0.696.10 \n * Google Chrome 11.0.696.11 \n * Google Chrome 11.0.696.12 \n * Google Chrome 11.0.696.13 \n * Google Chrome 11.0.696.14 \n * Google Chrome 11.0.696.15 \n * Google Chrome 11.0.696.16 \n * Google Chrome 11.0.696.17 \n * Google Chrome 11.0.696.18 \n * Google Chrome 11.0.696.19 \n * Google Chrome 11.0.696.2 \n * Google Chrome 11.0.696.20 \n * Google Chrome 11.0.696.21 \n * Google Chrome 11.0.696.22 \n * Google Chrome 11.0.696.23 \n * Google Chrome 11.0.696.24 \n * Google Chrome 11.0.696.25 \n * Google Chrome 11.0.696.26 \n * Google Chrome 11.0.696.27 \n * Google Chrome 11.0.696.28 \n * Google Chrome 11.0.696.29 \n * Google Chrome 11.0.696.3 \n * Google Chrome 11.0.696.30 \n * Google Chrome 11.0.696.31 \n * Google Chrome 11.0.696.32 \n * Google Chrome 11.0.696.33 \n * Google Chrome 11.0.696.34 \n * Google Chrome 11.0.696.35 \n * Google Chrome 11.0.696.36 \n * Google Chrome 11.0.696.37 \n * Google Chrome 11.0.696.38 \n * Google Chrome 11.0.696.39 \n * Google Chrome 11.0.696.4 \n * Google Chrome 11.0.696.40 \n * Google Chrome 11.0.696.41 \n * Google Chrome 11.0.696.42 \n * Google Chrome 11.0.696.43 \n * Google Chrome 11.0.696.44 \n * Google Chrome 11.0.696.45 \n * Google Chrome 11.0.696.46 \n * Google Chrome 11.0.696.47 \n * Google Chrome 11.0.696.48 \n * Google Chrome 11.0.696.49 \n * Google Chrome 11.0.696.5 \n * Google Chrome 11.0.696.50 \n * Google Chrome 11.0.696.51 \n * Google Chrome 11.0.696.52 \n * Google Chrome 11.0.696.53 \n * Google Chrome 11.0.696.54 \n * Google Chrome 11.0.696.55 \n * Google Chrome 11.0.696.56 \n * Google Chrome 11.0.696.57 \n * Google Chrome 11.0.696.58 \n * Google Chrome 11.0.696.59 \n * Google Chrome 11.0.696.60 \n * Google Chrome 11.0.696.61 \n * Google Chrome 11.0.696.62 \n * Google Chrome 11.0.696.63 \n * Google Chrome 11.0.696.64 \n * Google Chrome 11.0.696.65 \n * Google Chrome 11.0.696.66 \n * Google Chrome 11.0.696.67 \n * Google Chrome 11.0.696.68 \n * Google Chrome 11.0.696.69 \n * Google Chrome 11.0.696.7 \n * Google Chrome 11.0.696.70 \n * Google Chrome 11.0.696.71 \n * Google Chrome 11.0.696.72 \n * Google Chrome 11.0.696.77 \n * Google Chrome 11.0.696.8 \n * Google Chrome 11.0.696.9 \n * Google Chrome 11.0.697.0 \n * Google Chrome 11.0.698.0 \n * Google Chrome 11.0.699.0 \n * Google Chrome 12 \n * Google Chrome 12.0.700.0 \n * Google Chrome 12.0.701.0 \n * Google Chrome 12.0.702.0 \n * Google Chrome 12.0.702.1 \n * Google Chrome 12.0.702.2 \n * Google Chrome 12.0.703.0 \n * Google Chrome 12.0.704.0 \n * Google Chrome 12.0.705.0 \n * Google Chrome 12.0.706.0 \n * Google Chrome 12.0.707.0 \n * Google Chrome 12.0.708.0 \n * Google Chrome 12.0.709.0 \n * Google Chrome 12.0.710.0 \n * Google Chrome 12.0.711.0 \n * Google Chrome 12.0.712.0 \n * Google Chrome 12.0.713.0 \n * Google Chrome 12.0.714.0 \n * Google Chrome 12.0.715.0 \n * Google Chrome 12.0.716.0 \n * Google Chrome 12.0.717.0 \n * Google Chrome 12.0.718.0 \n * Google Chrome 12.0.719.0 \n * Google Chrome 12.0.719.1 \n * Google Chrome 12.0.720.0 \n * Google Chrome 12.0.721.0 \n * Google Chrome 12.0.721.1 \n * Google Chrome 12.0.722.0 \n * Google Chrome 12.0.723.0 \n * Google Chrome 12.0.723.1 \n * Google Chrome 12.0.724.0 \n * Google Chrome 12.0.725.0 \n * Google Chrome 12.0.726.0 \n * Google Chrome 12.0.727.0 \n * Google Chrome 12.0.728.0 \n * Google Chrome 12.0.729.0 \n * Google Chrome 12.0.730.0 \n * Google Chrome 12.0.731.0 \n * Google Chrome 12.0.732.0 \n * Google Chrome 12.0.733.0 \n * Google Chrome 12.0.734.0 \n * Google Chrome 12.0.735.0 \n * Google Chrome 12.0.736.0 \n * Google Chrome 12.0.737.0 \n * Google Chrome 12.0.738.0 \n * Google Chrome 12.0.739.0 \n * Google Chrome 12.0.740.0 \n * Google Chrome 12.0.741.0 \n * Google Chrome 12.0.742.0 \n * Google Chrome 12.0.742.1 \n * Google Chrome 12.0.742.10 \n * Google Chrome 12.0.742.100 \n * Google Chrome 12.0.742.105 \n * Google Chrome 12.0.742.11 \n * Google Chrome 12.0.742.111 \n * Google Chrome 12.0.742.112 \n * Google Chrome 12.0.742.113 \n * Google Chrome 12.0.742.114 \n * Google Chrome 12.0.742.115 \n * Google Chrome 12.0.742.12 \n * Google Chrome 12.0.742.120 \n * Google Chrome 12.0.742.121 \n * Google Chrome 12.0.742.122 \n * Google Chrome 12.0.742.123 \n * Google Chrome 12.0.742.124 \n * Google Chrome 12.0.742.13 \n * Google Chrome 12.0.742.14 \n * Google Chrome 12.0.742.15 \n * Google Chrome 12.0.742.16 \n * Google Chrome 12.0.742.17 \n * Google Chrome 12.0.742.18 \n * Google Chrome 12.0.742.19 \n * Google Chrome 12.0.742.2 \n * Google Chrome 12.0.742.20 \n * Google Chrome 12.0.742.21 \n * Google Chrome 12.0.742.22 \n * Google Chrome 12.0.742.3 \n * Google Chrome 12.0.742.30 \n * Google Chrome 12.0.742.4 \n * Google Chrome 12.0.742.41 \n * Google Chrome 12.0.742.42 \n * Google Chrome 12.0.742.43 \n * Google Chrome 12.0.742.44 \n * Google Chrome 12.0.742.45 \n * Google Chrome 12.0.742.46 \n * Google Chrome 12.0.742.47 \n * Google Chrome 12.0.742.48 \n * Google Chrome 12.0.742.49 \n * Google Chrome 12.0.742.5 \n * Google Chrome 12.0.742.50 \n * Google Chrome 12.0.742.51 \n * Google Chrome 12.0.742.52 \n * Google Chrome 12.0.742.53 \n * Google Chrome 12.0.742.54 \n * Google Chrome 12.0.742.55 \n * Google Chrome 12.0.742.56 \n * Google Chrome 12.0.742.57 \n * Google Chrome 12.0.742.58 \n * Google Chrome 12.0.742.59 \n * Google Chrome 12.0.742.6 \n * Google Chrome 12.0.742.60 \n * Google Chrome 12.0.742.61 \n * Google Chrome 12.0.742.63 \n * Google Chrome 12.0.742.64 \n * Google Chrome 12.0.742.65 \n * Google Chrome 12.0.742.66 \n * Google Chrome 12.0.742.67 \n * Google Chrome 12.0.742.68 \n * Google Chrome 12.0.742.69 \n * Google Chrome 12.0.742.70 \n * Google Chrome 12.0.742.71 \n * Google Chrome 12.0.742.72 \n * Google Chrome 12.0.742.73 \n * Google Chrome 12.0.742.74 \n * Google Chrome 12.0.742.75 \n * Google Chrome 12.0.742.77 \n * Google Chrome 12.0.742.8 \n * Google Chrome 12.0.742.82 \n * Google Chrome 12.0.742.9 \n * Google Chrome 12.0.742.91 \n * Google Chrome 12.0.742.92 \n * Google Chrome 12.0.742.93 \n * Google Chrome 12.0.742.94 \n * Google Chrome 12.0.743.0 \n * Google Chrome 12.0.744.0 \n * Google Chrome 12.0.745.0 \n * Google Chrome 12.0.746.0 \n * Google Chrome 12.0.747.0 \n * Google Chrome 13 \n * Google Chrome 13.0.748.0 \n * Google Chrome 13.0.749.0 \n * Google Chrome 13.0.750.0 \n * Google Chrome 13.0.751.0 \n * Google Chrome 13.0.752.0 \n * Google Chrome 13.0.753.0 \n * Google Chrome 13.0.754.0 \n * Google Chrome 13.0.755.0 \n * Google Chrome 13.0.756.0 \n * Google Chrome 13.0.757.0 \n * Google Chrome 13.0.758.0 \n * Google Chrome 13.0.759.0 \n * Google Chrome 13.0.760.0 \n * Google Chrome 13.0.761.0 \n * Google Chrome 13.0.761.1 \n * Google Chrome 13.0.762.0 \n * Google Chrome 13.0.762.1 \n * Google Chrome 13.0.763.0 \n * Google Chrome 13.0.764.0 \n * Google Chrome 13.0.765.0 \n * Google Chrome 13.0.766.0 \n * Google Chrome 13.0.767.0 \n * Google Chrome 13.0.767.1 \n * Google Chrome 13.0.768.0 \n * Google Chrome 13.0.769.0 \n * Google Chrome 13.0.770.0 \n * Google Chrome 13.0.771.0 \n * Google Chrome 13.0.772.0 \n * Google Chrome 13.0.773.0 \n * Google Chrome 13.0.774.0 \n * Google Chrome 13.0.775.0 \n * Google Chrome 13.0.775.1 \n * Google Chrome 13.0.775.2 \n * Google Chrome 13.0.775.4 \n * Google Chrome 13.0.776.0 \n * Google Chrome 13.0.776.1 \n * Google Chrome 13.0.777.0 \n * Google Chrome 13.0.777.1 \n * Google Chrome 13.0.777.2 \n * Google Chrome 13.0.777.3 \n * Google Chrome 13.0.777.4 \n * Google Chrome 13.0.777.5 \n * Google Chrome 13.0.777.6 \n * Google Chrome 13.0.778.0 \n * Google Chrome 13.0.779.0 \n * Google Chrome 13.0.780.0 \n * Google Chrome 13.0.781.0 \n * Google Chrome 13.0.782.0 \n * Google Chrome 13.0.782.1 \n * Google Chrome 13.0.782.10 \n * Google Chrome 13.0.782.100 \n * Google Chrome 13.0.782.101 \n * Google Chrome 13.0.782.102 \n * Google Chrome 13.0.782.103 \n * Google Chrome 13.0.782.104 \n * Google Chrome 13.0.782.105 \n * Google Chrome 13.0.782.106 \n * Google Chrome 13.0.782.107 \n * Google Chrome 13.0.782.108 \n * Google Chrome 13.0.782.109 \n * Google Chrome 13.0.782.11 \n * Google Chrome 13.0.782.112 \n * Google Chrome 13.0.782.12 \n * Google Chrome 13.0.782.13 \n * Google Chrome 13.0.782.14 \n * Google Chrome 13.0.782.15 \n * Google Chrome 13.0.782.16 \n * Google Chrome 13.0.782.17 \n * Google Chrome 13.0.782.18 \n * Google Chrome 13.0.782.19 \n * Google Chrome 13.0.782.20 \n * Google Chrome 13.0.782.21 \n * Google Chrome 13.0.782.210 \n * Google Chrome 13.0.782.211 \n * Google Chrome 13.0.782.212 \n * Google Chrome 13.0.782.213 \n * Google Chrome 13.0.782.214 \n * Google Chrome 13.0.782.215 \n * Google Chrome 13.0.782.216 \n * Google Chrome 13.0.782.217 \n * Google Chrome 13.0.782.218 \n * Google Chrome 13.0.782.219 \n * Google Chrome 13.0.782.220 \n * Google Chrome 13.0.782.23 \n * Google Chrome 13.0.782.237 \n * Google Chrome 13.0.782.238 \n * Google Chrome 13.0.782.24 \n * Google Chrome 13.0.782.25 \n * Google Chrome 13.0.782.26 \n * Google Chrome 13.0.782.27 \n * Google Chrome 13.0.782.28 \n * Google Chrome 13.0.782.29 \n * Google Chrome 13.0.782.3 \n * Google Chrome 13.0.782.30 \n * Google Chrome 13.0.782.31 \n * Google Chrome 13.0.782.32 \n * Google Chrome 13.0.782.33 \n * Google Chrome 13.0.782.34 \n * Google Chrome 13.0.782.35 \n * Google Chrome 13.0.782.36 \n * Google Chrome 13.0.782.37 \n * Google Chrome 13.0.782.38 \n * Google Chrome 13.0.782.39 \n * Google Chrome 13.0.782.4 \n * Google Chrome 13.0.782.40 \n * Google Chrome 13.0.782.41 \n * Google Chrome 13.0.782.42 \n * Google Chrome 13.0.782.43 \n * Google Chrome 13.0.782.44 \n * Google Chrome 13.0.782.45 \n * Google Chrome 13.0.782.46 \n * Google Chrome 13.0.782.47 \n * Google Chrome 13.0.782.48 \n * Google Chrome 13.0.782.49 \n * Google Chrome 13.0.782.50 \n * Google Chrome 13.0.782.51 \n * Google Chrome 13.0.782.52 \n * Google Chrome 13.0.782.53 \n * Google Chrome 13.0.782.55 \n * Google Chrome 13.0.782.56 \n * Google Chrome 13.0.782.6 \n * Google Chrome 13.0.782.7 \n * Google Chrome 13.0.782.81 \n * Google Chrome 13.0.782.82 \n * Google Chrome 13.0.782.83 \n * Google Chrome 13.0.782.84 \n * Google Chrome 13.0.782.85 \n * Google Chrome 13.0.782.86 \n * Google Chrome 13.0.782.87 \n * Google Chrome 13.0.782.88 \n * Google Chrome 13.0.782.89 \n * Google Chrome 13.0.782.90 \n * Google Chrome 13.0.782.91 \n * Google Chrome 13.0.782.92 \n * Google Chrome 13.0.782.93 \n * Google Chrome 13.0.782.94 \n * Google Chrome 13.0.782.95 \n * Google Chrome 13.0.782.96 \n * Google Chrome 13.0.782.97 \n * Google Chrome 13.0.782.98 \n * Google Chrome 13.0.782.99 \n * Google Chrome 14 \n * Google Chrome 14.0.783.0 \n * Google Chrome 14.0.784.0 \n * Google Chrome 14.0.785.0 \n * Google Chrome 14.0.786.0 \n * Google Chrome 14.0.787.0 \n * Google Chrome 14.0.788.0 \n * Google Chrome 14.0.789.0 \n * Google Chrome 14.0.790.0 \n * Google Chrome 14.0.791.0 \n * Google Chrome 14.0.792.0 \n * Google Chrome 14.0.793.0 \n * Google Chrome 14.0.794.0 \n * Google Chrome 14.0.795.0 \n * Google Chrome 14.0.796.0 \n * Google Chrome 14.0.797.0 \n * Google Chrome 14.0.798.0 \n * Google Chrome 14.0.799.0 \n * Google Chrome 14.0.800.0 \n * Google Chrome 14.0.801.0 \n * Google Chrome 14.0.802.0 \n * Google Chrome 14.0.803.0 \n * Google Chrome 14.0.804.0 \n * Google Chrome 14.0.805.0 \n * Google Chrome 14.0.806.0 \n * Google Chrome 14.0.807.0 \n * Google Chrome 14.0.808.0 \n * Google Chrome 14.0.809.0 \n * Google Chrome 14.0.810.0 \n * Google Chrome 14.0.811.0 \n * Google Chrome 14.0.812.0 \n * Google Chrome 14.0.813.0 \n * Google Chrome 14.0.814.0 \n * Google Chrome 14.0.815.0 \n * Google Chrome 14.0.816.0 \n * Google Chrome 14.0.818.0 \n * Google Chrome 14.0.819.0 \n * Google Chrome 14.0.820.0 \n * Google Chrome 14.0.821.0 \n * Google Chrome 14.0.822.0 \n * Google Chrome 14.0.823.0 \n * Google Chrome 14.0.824.0 \n * Google Chrome 14.0.825.0 \n * Google Chrome 14.0.826.0 \n * Google Chrome 14.0.827.0 \n * Google Chrome 14.0.827.10 \n * Google Chrome 14.0.827.12 \n * Google Chrome 14.0.829.1 \n * Google Chrome 14.0.830.0 \n * Google Chrome 14.0.831.0 \n * Google Chrome 14.0.832.0 \n * Google Chrome 14.0.833.0 \n * Google Chrome 14.0.834.0 \n * Google Chrome 14.0.835.0 \n * Google Chrome 14.0.835.1 \n * Google Chrome 14.0.835.100 \n * Google Chrome 14.0.835.101 \n * Google Chrome 14.0.835.102 \n * Google Chrome 14.0.835.103 \n * Google Chrome 14.0.835.104 \n * Google Chrome 14.0.835.105 \n * Google Chrome 14.0.835.106 \n * Google Chrome 14.0.835.107 \n * Google Chrome 14.0.835.108 \n * Google Chrome 14.0.835.109 \n * Google Chrome 14.0.835.11 \n * Google Chrome 14.0.835.110 \n * Google Chrome 14.0.835.111 \n * Google Chrome 14.0.835.112 \n * Google Chrome 14.0.835.113 \n * Google Chrome 14.0.835.114 \n * Google Chrome 14.0.835.115 \n * Google Chrome 14.0.835.116 \n * Google Chrome 14.0.835.117 \n * Google Chrome 14.0.835.118 \n * Google Chrome 14.0.835.119 \n * Google Chrome 14.0.835.120 \n * Google Chrome 14.0.835.121 \n * Google Chrome 14.0.835.122 \n * Google Chrome 14.0.835.123 \n * Google Chrome 14.0.835.124 \n * Google Chrome 14.0.835.125 \n * Google Chrome 14.0.835.126 \n * Google Chrome 14.0.835.127 \n * Google Chrome 14.0.835.128 \n * Google Chrome 14.0.835.13 \n * Google Chrome 14.0.835.14 \n * Google Chrome 14.0.835.149 \n * Google Chrome 14.0.835.15 \n * Google Chrome 14.0.835.150 \n * Google Chrome 14.0.835.151 \n * Google Chrome 14.0.835.152 \n * Google Chrome 14.0.835.153 \n * Google Chrome 14.0.835.154 \n * Google Chrome 14.0.835.155 \n * Google Chrome 14.0.835.156 \n * Google Chrome 14.0.835.157 \n * Google Chrome 14.0.835.158 \n * Google Chrome 14.0.835.159 \n * Google Chrome 14.0.835.16 \n * Google Chrome 14.0.835.160 \n * Google Chrome 14.0.835.161 \n * Google Chrome 14.0.835.162 \n * Google Chrome 14.0.835.163 \n * Google Chrome 14.0.835.18 \n * Google Chrome 14.0.835.184 \n * Google Chrome 14.0.835.186 \n * Google Chrome 14.0.835.187 \n * Google Chrome 14.0.835.2 \n * Google Chrome 14.0.835.20 \n * Google Chrome 14.0.835.202 \n * Google Chrome 14.0.835.203 \n * Google Chrome 14.0.835.204 \n * Google Chrome 14.0.835.21 \n * Google Chrome 14.0.835.22 \n * Google Chrome 14.0.835.23 \n * Google Chrome 14.0.835.24 \n * Google Chrome 14.0.835.25 \n * Google Chrome 14.0.835.26 \n * Google Chrome 14.0.835.27 \n * Google Chrome 14.0.835.28 \n * Google Chrome 14.0.835.29 \n * Google Chrome 14.0.835.30 \n * Google Chrome 14.0.835.31 \n * Google Chrome 14.0.835.32 \n * Google Chrome 14.0.835.33 \n * Google Chrome 14.0.835.34 \n * Google Chrome 14.0.835.35 \n * Google Chrome 14.0.835.4 \n * Google Chrome 14.0.835.8 \n * Google Chrome 14.0.835.86 \n * Google Chrome 14.0.835.87 \n * Google Chrome 14.0.835.88 \n * Google Chrome 14.0.835.89 \n * Google Chrome 14.0.835.9 \n * Google Chrome 14.0.835.90 \n * Google Chrome 14.0.835.91 \n * Google Chrome 14.0.835.92 \n * Google Chrome 14.0.835.93 \n * Google Chrome 14.0.835.94 \n * Google Chrome 14.0.835.95 \n * Google Chrome 14.0.835.96 \n * Google Chrome 14.0.835.97 \n * Google Chrome 14.0.835.98 \n * Google Chrome 14.0.835.99 \n * Google Chrome 14.0.836.0 \n * Google Chrome 14.0.837.0 \n * Google Chrome 14.0.838.0 \n * Google Chrome 14.0.839.0 \n * Google Chrome 15 \n * Google Chrome 15.0.859.0 \n * Google Chrome 15.0.860.0 \n * Google Chrome 15.0.861.0 \n * Google Chrome 15.0.862.0 \n * Google Chrome 15.0.862.1 \n * Google Chrome 15.0.863.0 \n * Google Chrome 15.0.864.0 \n * Google Chrome 15.0.865.0 \n * Google Chrome 15.0.866.0 \n * Google Chrome 15.0.867.0 \n * Google Chrome 15.0.868.0 \n * Google Chrome 15.0.868.1 \n * Google Chrome 15.0.869.0 \n * Google Chrome 15.0.870.0 \n * Google Chrome 15.0.871.0 \n * Google Chrome 15.0.871.1 \n * Google Chrome 15.0.872.0 \n * Google Chrome 15.0.873.0 \n * Google Chrome 15.0.874 102 \n * Google Chrome 15.0.874.0 \n * Google Chrome 15.0.874.1 \n * Google Chrome 15.0.874.10 \n * Google Chrome 15.0.874.101 \n * Google Chrome 15.0.874.102 \n * Google Chrome 15.0.874.103 \n * Google Chrome 15.0.874.104 \n * Google Chrome 15.0.874.106 \n * Google Chrome 15.0.874.11 \n * Google Chrome 15.0.874.116 \n * Google Chrome 15.0.874.117 \n * Google Chrome 15.0.874.119 \n * Google Chrome 15.0.874.12 \n * Google Chrome 15.0.874.120 \n * Google Chrome 15.0.874.121 \n * Google Chrome 15.0.874.13 \n * Google Chrome 15.0.874.14 \n * Google Chrome 15.0.874.15 \n * Google Chrome 15.0.874.16 \n * Google Chrome 15.0.874.17 \n * Google Chrome 15.0.874.18 \n * Google Chrome 15.0.874.19 \n * Google Chrome 15.0.874.2 \n * Google Chrome 15.0.874.20 \n * Google Chrome 15.0.874.21 \n * Google Chrome 15.0.874.22 \n * Google Chrome 15.0.874.23 \n * Google Chrome 15.0.874.24 \n * Google Chrome 15.0.874.3 \n * Google Chrome 15.0.874.4 \n * Google Chrome 15.0.874.44 \n * Google Chrome 15.0.874.45 \n * Google Chrome 15.0.874.46 \n * Google Chrome 15.0.874.47 \n * Google Chrome 15.0.874.48 \n * Google Chrome 15.0.874.49 \n * Google Chrome 15.0.874.5 \n * Google Chrome 15.0.874.6 \n * Google Chrome 15.0.874.7 \n * Google Chrome 15.0.874.8 \n * Google Chrome 15.0.874.9 \n * Google Chrome 16 \n * Google Chrome 16.0.877.0 \n * Google Chrome 16.0.878.0 \n * Google Chrome 16.0.879.0 \n * Google Chrome 16.0.880.0 \n * Google Chrome 16.0.881.0 \n * Google Chrome 16.0.882.0 \n * Google Chrome 16.0.883.0 \n * Google Chrome 16.0.884.0 \n * Google Chrome 16.0.885.0 \n * Google Chrome 16.0.886.0 \n * Google Chrome 16.0.886.1 \n * Google Chrome 16.0.887.0 \n * Google Chrome 16.0.888.0 \n * Google Chrome 16.0.889.0 \n * Google Chrome 16.0.889.2 \n * Google Chrome 16.0.889.3 \n * Google Chrome 16.0.890.0 \n * Google Chrome 16.0.890.1 \n * Google Chrome 16.0.891.0 \n * Google Chrome 16.0.891.1 \n * Google Chrome 16.0.892.0 \n * Google Chrome 16.0.893.0 \n * Google Chrome 16.0.893.1 \n * Google Chrome 16.0.894.0 \n * Google Chrome 16.0.895.0 \n * Google Chrome 16.0.896.0 \n * Google Chrome 16.0.897.0 \n * Google Chrome 16.0.898.0 \n * Google Chrome 16.0.899.0 \n * Google Chrome 16.0.900.0 \n * Google Chrome 16.0.901.0 \n * Google Chrome 16.0.902.0 \n * Google Chrome 16.0.903.0 \n * Google Chrome 16.0.904.0 \n * Google Chrome 16.0.905.0 \n * Google Chrome 16.0.906.0 \n * Google Chrome 16.0.906.1 \n * Google Chrome 16.0.907.0 \n * Google Chrome 16.0.908.0 \n * Google Chrome 16.0.909.0 \n * Google Chrome 16.0.910.0 \n * Google Chrome 16.0.911.0 \n * Google Chrome 16.0.911.1 \n * Google Chrome 16.0.911.2 \n * Google Chrome 16.0.912.0 \n * Google Chrome 16.0.912.1 \n * Google Chrome 16.0.912.10 \n * Google Chrome 16.0.912.11 \n * Google Chrome 16.0.912.12 \n * Google Chrome 16.0.912.13 \n * Google Chrome 16.0.912.14 \n * Google Chrome 16.0.912.15 \n * Google Chrome 16.0.912.19 \n * Google Chrome 16.0.912.2 \n * Google Chrome 16.0.912.20 \n * Google Chrome 16.0.912.21 \n * Google Chrome 16.0.912.22 \n * Google Chrome 16.0.912.23 \n * Google Chrome 16.0.912.24 \n * Google Chrome 16.0.912.25 \n * Google Chrome 16.0.912.26 \n * Google Chrome 16.0.912.27 \n * Google Chrome 16.0.912.28 \n * Google Chrome 16.0.912.29 \n * Google Chrome 16.0.912.3 \n * Google Chrome 16.0.912.30 \n * Google Chrome 16.0.912.31 \n * Google Chrome 16.0.912.32 \n * Google Chrome 16.0.912.33 \n * Google Chrome 16.0.912.34 \n * Google Chrome 16.0.912.35 \n * Google Chrome 16.0.912.36 \n * Google Chrome 16.0.912.37 \n * Google Chrome 16.0.912.38 \n * Google Chrome 16.0.912.39 \n * Google Chrome 16.0.912.4 \n * Google Chrome 16.0.912.40 \n * Google Chrome 16.0.912.41 \n * Google Chrome 16.0.912.42 \n * Google Chrome 16.0.912.43 \n * Google Chrome 16.0.912.5 \n * Google Chrome 16.0.912.6 \n * Google Chrome 16.0.912.62 \n * Google Chrome 16.0.912.63 \n * Google Chrome 16.0.912.66 \n * Google Chrome 16.0.912.7 \n * Google Chrome 16.0.912.74 \n * Google Chrome 16.0.912.75 \n * Google Chrome 16.0.912.76 \n * Google Chrome 16.0.912.77 \n * Google Chrome 16.0.912.8 \n * Google Chrome 16.0.912.9 \n * Google Chrome 17 \n * Google Chrome 17.0.921.3 \n * Google Chrome 17.0.922.0 \n * Google Chrome 17.0.923.0 \n * Google Chrome 17.0.923.1 \n * Google Chrome 17.0.924.0 \n * Google Chrome 17.0.925.0 \n * Google Chrome 17.0.926.0 \n * Google Chrome 17.0.927.0 \n * Google Chrome 17.0.928.0 \n * Google Chrome 17.0.928.1 \n * Google Chrome 17.0.928.2 \n * Google Chrome 17.0.928.3 \n * Google Chrome 17.0.929.0 \n * Google Chrome 17.0.930.0 \n * Google Chrome 17.0.931.0 \n * Google Chrome 17.0.932.0 \n * Google Chrome 17.0.933.0 \n * Google Chrome 17.0.933.1 \n * Google Chrome 17.0.934.0 \n * Google Chrome 17.0.935.0 \n * Google Chrome 17.0.935.1 \n * Google Chrome 17.0.936.0 \n * Google Chrome 17.0.936.1 \n * Google Chrome 17.0.937.0 \n * Google Chrome 17.0.938.0 \n * Google Chrome 17.0.939.0 \n * Google Chrome 17.0.939.1 \n * Google Chrome 17.0.940.0 \n * Google Chrome 17.0.941.0 \n * Google Chrome 17.0.942.0 \n * Google Chrome 17.0.943.0 \n * Google Chrome 17.0.944.0 \n * Google Chrome 17.0.945.0 \n * Google Chrome 17.0.946.0 \n * Google Chrome 17.0.947.0 \n * Google Chrome 17.0.948.0 \n * Google Chrome 17.0.949.0 \n * Google Chrome 17.0.950.0 \n * Google Chrome 17.0.951.0 \n * Google Chrome 17.0.952.0 \n * Google Chrome 17.0.953.0 \n * Google Chrome 17.0.954.0 \n * Google Chrome 17.0.954.1 \n * Google Chrome 17.0.954.2 \n * Google Chrome 17.0.954.3 \n * Google Chrome 17.0.955.0 \n * Google Chrome 17.0.956.0 \n * Google Chrome 17.0.957.0 \n * Google Chrome 17.0.958.0 \n * Google Chrome 17.0.958.1 \n * Google Chrome 17.0.959.0 \n * Google Chrome 17.0.960.0 \n * Google Chrome 17.0.961.0 \n * Google Chrome 17.0.962.0 \n * Google Chrome 17.0.963.0 \n * Google Chrome 17.0.963.1 \n * Google Chrome 17.0.963.10 \n * Google Chrome 17.0.963.11 \n * Google Chrome 17.0.963.12 \n * Google Chrome 17.0.963.13 \n * Google Chrome 17.0.963.14 \n * Google Chrome 17.0.963.15 \n * Google Chrome 17.0.963.16 \n * Google Chrome 17.0.963.17 \n * Google Chrome 17.0.963.18 \n * Google Chrome 17.0.963.19 \n * Google Chrome 17.0.963.2 \n * Google Chrome 17.0.963.20 \n * Google Chrome 17.0.963.21 \n * Google Chrome 17.0.963.22 \n * Google Chrome 17.0.963.23 \n * Google Chrome 17.0.963.24 \n * Google Chrome 17.0.963.25 \n * Google Chrome 17.0.963.26 \n * Google Chrome 17.0.963.27 \n * Google Chrome 17.0.963.28 \n * Google Chrome 17.0.963.29 \n * Google Chrome 17.0.963.3 \n * Google Chrome 17.0.963.30 \n * Google Chrome 17.0.963.31 \n * Google Chrome 17.0.963.32 \n * Google Chrome 17.0.963.33 \n * Google Chrome 17.0.963.34 \n * Google Chrome 17.0.963.35 \n * Google Chrome 17.0.963.36 \n * Google Chrome 17.0.963.37 \n * Google Chrome 17.0.963.38 \n * Google Chrome 17.0.963.39 \n * Google Chrome 17.0.963.4 \n * Google Chrome 17.0.963.40 \n * Google Chrome 17.0.963.41 \n * Google Chrome 17.0.963.42 \n * Google Chrome 17.0.963.43 \n * Google Chrome 17.0.963.44 \n * Google Chrome 17.0.963.45 \n * Google Chrome 17.0.963.46 \n * Google Chrome 17.0.963.47 \n * Google Chrome 17.0.963.48 \n * Google Chrome 17.0.963.49 \n * Google Chrome 17.0.963.5 \n * Google Chrome 17.0.963.50 \n * Google Chrome 17.0.963.51 \n * Google Chrome 17.0.963.52 \n * Google Chrome 17.0.963.53 \n * Google Chrome 17.0.963.54 \n * Google Chrome 17.0.963.55 \n * Google Chrome 17.0.963.56 \n * Google Chrome 17.0.963.57 \n * Google Chrome 17.0.963.59 \n * Google Chrome 17.0.963.6 \n * Google Chrome 17.0.963.60 \n * Google Chrome 17.0.963.61 \n * Google Chrome 17.0.963.62 \n * Google Chrome 17.0.963.63 \n * Google Chrome 17.0.963.64 \n * Google Chrome 17.0.963.65 \n * Google Chrome 17.0.963.66 \n * Google Chrome 17.0.963.67 \n * Google Chrome 17.0.963.69 \n * Google Chrome 17.0.963.7 \n * Google Chrome 17.0.963.70 \n * Google Chrome 17.0.963.74 \n * Google Chrome 17.0.963.75 \n * Google Chrome 17.0.963.76 \n * Google Chrome 17.0.963.77 \n * Google Chrome 17.0.963.78 \n * Google Chrome 17.0.963.79 \n * Google Chrome 17.0.963.8 \n * Google Chrome 17.0.963.80 \n * Google Chrome 17.0.963.81 \n * Google Chrome 17.0.963.82 \n * Google Chrome 17.0.963.83 \n * Google Chrome 17.0.963.84 \n * Google Chrome 17.0.963.9 \n * Google Chrome 18 \n * Google Chrome 18.0.1000.0 \n * Google Chrome 18.0.1001.0 \n * Google Chrome 18.0.1001.1 \n * Google Chrome 18.0.1002.0 \n * Google Chrome 18.0.1003.0 \n * Google Chrome 18.0.1003.1 \n * Google Chrome 18.0.1004.0 \n * Google Chrome 18.0.1005.0 \n * Google Chrome 18.0.1006.0 \n * Google Chrome 18.0.1007.0 \n * Google Chrome 18.0.1008.0 \n * Google Chrome 18.0.1009.0 \n * Google Chrome 18.0.1010.0 \n * Google Chrome 18.0.1010.1 \n * Google Chrome 18.0.1010.2 \n * Google Chrome 18.0.1011.1 \n * Google Chrome 18.0.1012.0 \n * Google Chrome 18.0.1012.1 \n * Google Chrome 18.0.1012.2 \n * Google Chrome 18.0.1013.0 \n * Google Chrome 18.0.1014.0 \n * Google Chrome 18.0.1015.0 \n * Google Chrome 18.0.1016.0 \n * Google Chrome 18.0.1017.0 \n * Google Chrome 18.0.1017.1 \n * Google Chrome 18.0.1017.2 \n * Google Chrome 18.0.1017.3 \n * Google Chrome 18.0.1018.0 \n * Google Chrome 18.0.1019.0 \n * Google Chrome 18.0.1019.1 \n * Google Chrome 18.0.1020.0 \n * Google Chrome 18.0.1021.0 \n * Google Chrome 18.0.1022.0 \n * Google Chrome 18.0.1023.0 \n * Google Chrome 18.0.1024.0 \n * Google Chrome 18.0.1025.0 \n * Google Chrome 18.0.1025.1 \n * Google Chrome 18.0.1025.10 \n * Google Chrome 18.0.1025.100 \n * Google Chrome 18.0.1025.102 \n * Google Chrome 18.0.1025.107 \n * Google Chrome 18.0.1025.108 \n * Google Chrome 18.0.1025.109 \n * Google Chrome 18.0.1025.110 \n * Google Chrome 18.0.1025.111 \n * Google Chrome 18.0.1025.112 \n * Google Chrome 18.0.1025.113 \n * Google Chrome 18.0.1025.114 \n * Google Chrome 18.0.1025.116 \n * Google Chrome 18.0.1025.117 \n * Google Chrome 18.0.1025.118 \n * Google Chrome 18.0.1025.120 \n * Google Chrome 18.0.1025.129 \n * Google Chrome 18.0.1025.130 \n * Google Chrome 18.0.1025.131 \n * Google Chrome 18.0.1025.132 \n * Google Chrome 18.0.1025.133 \n * Google Chrome 18.0.1025.134 \n * Google Chrome 18.0.1025.135 \n * Google Chrome 18.0.1025.136 \n * Google Chrome 18.0.1025.137 \n * Google Chrome 18.0.1025.139 \n * Google Chrome 18.0.1025.140 \n * Google Chrome 18.0.1025.142 \n * Google Chrome 18.0.1025.145 \n * Google Chrome 18.0.1025.146 \n * Google Chrome 18.0.1025.147 \n * Google Chrome 18.0.1025.148 \n * Google Chrome 18.0.1025.149 \n * Google Chrome 18.0.1025.150 \n * Google Chrome 18.0.1025.151 \n * Google Chrome 18.0.1025.162 \n * Google Chrome 18.0.1025.168 \n * Google Chrome 18.0.1025.2 \n * Google Chrome 18.0.1025.29 \n * Google Chrome 18.0.1025.3 \n * Google Chrome 18.0.1025.30 \n * Google Chrome 18.0.1025.31 \n * Google Chrome 18.0.1025.32 \n * Google Chrome 18.0.1025.33 \n * Google Chrome 18.0.1025.35 \n * Google Chrome 18.0.1025.36 \n * Google Chrome 18.0.1025.37 \n * Google Chrome 18.0.1025.38 \n * Google Chrome 18.0.1025.39 \n * Google Chrome 18.0.1025.4 \n * Google Chrome 18.0.1025.40 \n * Google Chrome 18.0.1025.41 \n * Google Chrome 18.0.1025.42 \n * Google Chrome 18.0.1025.43 \n * Google Chrome 18.0.1025.44 \n * Google Chrome 18.0.1025.45 \n * Google Chrome 18.0.1025.46 \n * Google Chrome 18.0.1025.47 \n * Google Chrome 18.0.1025.48 \n * Google Chrome 18.0.1025.49 \n * Google Chrome 18.0.1025.5 \n * Google Chrome 18.0.1025.50 \n * Google Chrome 18.0.1025.51 \n * Google Chrome 18.0.1025.52 \n * Google Chrome 18.0.1025.54 \n * Google Chrome 18.0.1025.55 \n * Google Chrome 18.0.1025.56 \n * Google Chrome 18.0.1025.57 \n * Google Chrome 18.0.1025.58 \n * Google Chrome 18.0.1025.6 \n * Google Chrome 18.0.1025.60 \n * Google Chrome 18.0.1025.7 \n * Google Chrome 18.0.1025.73 \n * Google Chrome 18.0.1025.74 \n * Google Chrome 18.0.1025.8 \n * Google Chrome 18.0.1025.9 \n * Google Chrome 18.0.1025.95 \n * Google Chrome 18.0.1025.96 \n * Google Chrome 18.0.1025.97 \n * Google Chrome 18.0.1025.98 \n * Google Chrome 18.0.1025.99 \n * Google Chrome 19 \n * Google Chrome 19.0.1028.0 \n * Google Chrome 19.0.1029.0 \n * Google Chrome 19.0.1030.0 \n * Google Chrome 19.0.1031.0 \n * Google Chrome 19.0.1032.0 \n * Google Chrome 19.0.1033.0 \n * Google Chrome 19.0.1034.0 \n * Google Chrome 19.0.1035.0 \n * Google Chrome 19.0.1036.0 \n * Google Chrome 19.0.1036.2 \n * Google Chrome 19.0.1036.3 \n * Google Chrome 19.0.1036.4 \n * Google Chrome 19.0.1036.6 \n * Google Chrome 19.0.1036.7 \n * Google Chrome 19.0.1037.0 \n * Google Chrome 19.0.1038.0 \n * Google Chrome 19.0.1039.0 \n * Google Chrome 19.0.1040.0 \n * Google Chrome 19.0.1041.0 \n * Google Chrome 19.0.1042.0 \n * Google Chrome 19.0.1043.0 \n * Google Chrome 19.0.1044.0 \n * Google Chrome 19.0.1045.0 \n * Google Chrome 19.0.1046.0 \n * Google Chrome 19.0.1047.0 \n * Google Chrome 19.0.1048.0 \n * Google Chrome 19.0.1049.0 \n * Google Chrome 19.0.1049.1 \n * Google Chrome 19.0.1049.2 \n * Google Chrome 19.0.1049.3 \n * Google Chrome 19.0.1050.0 \n * Google Chrome 19.0.1051.0 \n * Google Chrome 19.0.1052.0 \n * Google Chrome 19.0.1053.0 \n * Google Chrome 19.0.1054.0 \n * Google Chrome 19.0.1055.0 \n * Google Chrome 19.0.1055.1 \n * Google Chrome 19.0.1055.2 \n * Google Chrome 19.0.1055.3 \n * Google Chrome 19.0.1056.0 \n * Google Chrome 19.0.1056.1 \n * Google Chrome 19.0.1057.0 \n * Google Chrome 19.0.1057.1 \n * Google Chrome 19.0.1057.3 \n * Google Chrome 19.0.1058.0 \n * Google Chrome 19.0.1058.1 \n * Google Chrome 19.0.1059.0 \n * Google Chrome 19.0.1060.0 \n * Google Chrome 19.0.1060.1 \n * Google Chrome 19.0.1061.0 \n * Google Chrome 19.0.1061.1 \n * Google Chrome 19.0.1062.0 \n * Google Chrome 19.0.1062.1 \n * Google Chrome 19.0.1063.0 \n * Google Chrome 19.0.1063.1 \n * Google Chrome 19.0.1064.0 \n * Google Chrome 19.0.1065.0 \n * Google Chrome 19.0.1066.0 \n * Google Chrome 19.0.1067.0 \n * Google Chrome 19.0.1068.0 \n * Google Chrome 19.0.1068.1 \n * Google Chrome 19.0.1069.0 \n * Google Chrome 19.0.1070.0 \n * Google Chrome 19.0.1071.0 \n * Google Chrome 19.0.1072.0 \n * Google Chrome 19.0.1073.0 \n * Google Chrome 19.0.1074.0 \n * Google Chrome 19.0.1075.0 \n * Google Chrome 19.0.1076.0 \n * Google Chrome 19.0.1076.1 \n * Google Chrome 19.0.1077.0 \n * Google Chrome 19.0.1077.1 \n * Google Chrome 19.0.1077.2 \n * Google Chrome 19.0.1077.3 \n * Google Chrome 19.0.1078.0 \n * Google Chrome 19.0.1079.0 \n * Google Chrome 19.0.1080.0 \n * Google Chrome 19.0.1081.0 \n * Google Chrome 19.0.1081.2 \n * Google Chrome 19.0.1082.0 \n * Google Chrome 19.0.1082.1 \n * Google Chrome 19.0.1083.0 \n * Google Chrome 19.0.1084.0 \n * Google Chrome 19.0.1084.1 \n * Google Chrome 19.0.1084.10 \n * Google Chrome 19.0.1084.11 \n * Google Chrome 19.0.1084.12 \n * Google Chrome 19.0.1084.13 \n * Google Chrome 19.0.1084.14 \n * Google Chrome 19.0.1084.15 \n * Google Chrome 19.0.1084.16 \n * Google Chrome 19.0.1084.17 \n * Google Chrome 19.0.1084.18 \n * Google Chrome 19.0.1084.19 \n * Google Chrome 19.0.1084.2 \n * Google Chrome 19.0.1084.20 \n * Google Chrome 19.0.1084.21 \n * Google Chrome 19.0.1084.22 \n * Google Chrome 19.0.1084.23 \n * Google Chrome 19.0.1084.24 \n * Google Chrome 19.0.1084.25 \n * Google Chrome 19.0.1084.26 \n * Google Chrome 19.0.1084.27 \n * Google Chrome 19.0.1084.28 \n * Google Chrome 19.0.1084.29 \n * Google Chrome 19.0.1084.3 \n * Google Chrome 19.0.1084.30 \n * Google Chrome 19.0.1084.31 \n * Google Chrome 19.0.1084.32 \n * Google Chrome 19.0.1084.33 \n * Google Chrome 19.0.1084.35 \n * Google Chrome 19.0.1084.36 \n * Google Chrome 19.0.1084.37 \n * Google Chrome 19.0.1084.38 \n * Google Chrome 19.0.1084.39 \n * Google Chrome 19.0.1084.4 \n * Google Chrome 19.0.1084.40 \n * Google Chrome 19.0.1084.41 \n * Google Chrome 19.0.1084.42 \n * Google Chrome 19.0.1084.43 \n * Google Chrome 19.0.1084.44 \n * Google Chrome 19.0.1084.45 \n * Google Chrome 19.0.1084.46 \n * Google Chrome 19.0.1084.47 \n * Google Chrome 19.0.1084.48 \n * Google Chrome 19.0.1084.5 \n * Google Chrome 19.0.1084.50 \n * Google Chrome 19.0.1084.51 \n * Google Chrome 19.0.1084.52 \n * Google Chrome 19.0.1084.6 \n * Google Chrome 19.0.1084.7 \n * Google Chrome 19.0.1084.8 \n * Google Chrome 19.0.1084.9 \n * Google Chrome 19.0.1085.0 \n * Google Chrome 2.0.156.1 \n * Google Chrome 2.0.157.0 \n * Google Chrome 2.0.157.2 \n * Google Chrome 2.0.158.0 \n * Google Chrome 2.0.159.0 \n * Google Chrome 2.0.169.0 \n * Google Chrome 2.0.169.1 \n * Google Chrome 2.0.170.0 \n * Google Chrome 2.0.172 \n * Google Chrome 2.0.172.2 \n * Google Chrome 2.0.172.27 \n * Google Chrome 2.0.172.28 \n * Google Chrome 2.0.172.30 \n * Google Chrome 2.0.172.31 \n * Google Chrome 2.0.172.33 \n * Google Chrome 2.0.172.37 \n * Google Chrome 2.0.172.38 \n * Google Chrome 2.0.172.43 \n * Google Chrome 2.0.172.8 \n * Google Chrome 20 \n * Google Chrome 20.0.1132.0 \n * Google Chrome 20.0.1132.1 \n * Google Chrome 20.0.1132.10 \n * Google Chrome 20.0.1132.11 \n * Google Chrome 20.0.1132.12 \n * Google Chrome 20.0.1132.13 \n * Google Chrome 20.0.1132.14 \n * Google Chrome 20.0.1132.15 \n * Google Chrome 20.0.1132.16 \n * Google Chrome 20.0.1132.17 \n * Google Chrome 20.0.1132.18 \n * Google Chrome 20.0.1132.19 \n * Google Chrome 20.0.1132.2 \n * Google Chrome 20.0.1132.20 \n * Google Chrome 20.0.1132.21 \n * Google Chrome 20.0.1132.22 \n * Google Chrome 20.0.1132.23 \n * Google Chrome 20.0.1132.24 \n * Google Chrome 20.0.1132.25 \n * Google Chrome 20.0.1132.26 \n * Google Chrome 20.0.1132.27 \n * Google Chrome 20.0.1132.28 \n * Google Chrome 20.0.1132.29 \n * Google Chrome 20.0.1132.3 \n * Google Chrome 20.0.1132.30 \n * Google Chrome 20.0.1132.31 \n * Google Chrome 20.0.1132.32 \n * Google Chrome 20.0.1132.33 \n * Google Chrome 20.0.1132.34 \n * Google Chrome 20.0.1132.35 \n * Google Chrome 20.0.1132.36 \n * Google Chrome 20.0.1132.37 \n * Google Chrome 20.0.1132.38 \n * Google Chrome 20.0.1132.39 \n * Google Chrome 20.0.1132.4 \n * Google Chrome 20.0.1132.40 \n * Google Chrome 20.0.1132.41 \n * Google Chrome 20.0.1132.42 \n * Google Chrome 20.0.1132.43 \n * Google Chrome 20.0.1132.45 \n * Google Chrome 20.0.1132.46 \n * Google Chrome 20.0.1132.47 \n * Google Chrome 20.0.1132.5 \n * Google Chrome 20.0.1132.54 \n * Google Chrome 20.0.1132.55 \n * Google Chrome 20.0.1132.56 \n * Google Chrome 20.0.1132.57 \n * Google Chrome 20.0.1132.6 \n * Google Chrome 20.0.1132.7 \n * Google Chrome 20.0.1132.8 \n * Google Chrome 20.0.1132.9 \n * Google Chrome 21 \n * Google Chrome 21.0.1180.0 \n * Google Chrome 21.0.1180.1 \n * Google Chrome 21.0.1180.2 \n * Google Chrome 21.0.1180.31 \n * Google Chrome 21.0.1180.32 \n * Google Chrome 21.0.1180.33 \n * Google Chrome 21.0.1180.34 \n * Google Chrome 21.0.1180.35 \n * Google Chrome 21.0.1180.36 \n * Google Chrome 21.0.1180.37 \n * Google Chrome 21.0.1180.38 \n * Google Chrome 21.0.1180.39 \n * Google Chrome 21.0.1180.41 \n * Google Chrome 21.0.1180.46 \n * Google Chrome 21.0.1180.47 \n * Google Chrome 21.0.1180.48 \n * Google Chrome 21.0.1180.49 \n * Google Chrome 21.0.1180.50 \n * Google Chrome 21.0.1180.51 \n * Google Chrome 21.0.1180.52 \n * Google Chrome 21.0.1180.53 \n * Google Chrome 21.0.1180.54 \n * Google Chrome 21.0.1180.55 \n * Google Chrome 21.0.1180.56 \n * Google Chrome 21.0.1180.57 \n * Google Chrome 21.0.1180.59 \n * Google Chrome 21.0.1180.60 \n * Google Chrome 21.0.1180.61 \n * Google Chrome 21.0.1180.62 \n * Google Chrome 21.0.1180.63 \n * Google Chrome 21.0.1180.64 \n * Google Chrome 21.0.1180.68 \n * Google Chrome 21.0.1180.69 \n * Google Chrome 21.0.1180.70 \n * Google Chrome 21.0.1180.71 \n * Google Chrome 21.0.1180.72 \n * Google Chrome 21.0.1180.73 \n * Google Chrome 21.0.1180.74 \n * Google Chrome 21.0.1180.75 \n * Google Chrome 21.0.1180.76 \n * Google Chrome 21.0.1180.77 \n * Google Chrome 21.0.1180.78 \n * Google Chrome 21.0.1180.79 \n * Google Chrome 21.0.1180.80 \n * Google Chrome 21.0.1180.81 \n * Google Chrome 21.0.1180.82 \n * Google Chrome 21.0.1180.83 \n * Google Chrome 21.0.1180.84 \n * Google Chrome 21.0.1180.85 \n * Google Chrome 21.0.1180.86 \n * Google Chrome 21.0.1180.87 \n * Google Chrome 21.0.1180.88 \n * Google Chrome 21.0.1180.89 \n * Google Chrome 22 \n * Google Chrome 22.0.1229.0 \n * Google Chrome 22.0.1229.1 \n * Google Chrome 22.0.1229.10 \n * Google Chrome 22.0.1229.11 \n * Google Chrome 22.0.1229.12 \n * Google Chrome 22.0.1229.14 \n * Google Chrome 22.0.1229.16 \n * Google Chrome 22.0.1229.17 \n * Google Chrome 22.0.1229.18 \n * Google Chrome 22.0.1229.2 \n * Google Chrome 22.0.1229.20 \n * Google Chrome 22.0.1229.21 \n * Google Chrome 22.0.1229.22 \n * Google Chrome 22.0.1229.23 \n * Google Chrome 22.0.1229.24 \n * Google Chrome 22.0.1229.25 \n * Google Chrome 22.0.1229.26 \n * Google Chrome 22.0.1229.27 \n * Google Chrome 22.0.1229.28 \n * Google Chrome 22.0.1229.29 \n * Google Chrome 22.0.1229.3 \n * Google Chrome 22.0.1229.31 \n * Google Chrome 22.0.1229.32 \n * Google Chrome 22.0.1229.33 \n * Google Chrome 22.0.1229.35 \n * Google Chrome 22.0.1229.36 \n * Google Chrome 22.0.1229.37 \n * Google Chrome 22.0.1229.39 \n * Google Chrome 22.0.1229.4 \n * Google Chrome 22.0.1229.48 \n * Google Chrome 22.0.1229.49 \n * Google Chrome 22.0.1229.50 \n * Google Chrome 22.0.1229.51 \n * Google Chrome 22.0.1229.52 \n * Google Chrome 22.0.1229.53 \n * Google Chrome 22.0.1229.54 \n * Google Chrome 22.0.1229.55 \n * Google Chrome 22.0.1229.56 \n * Google Chrome 22.0.1229.57 \n * Google Chrome 22.0.1229.58 \n * Google Chrome 22.0.1229.59 \n * Google Chrome 22.0.1229.6 \n * Google Chrome 22.0.1229.60 \n * Google Chrome 22.0.1229.62 \n * Google Chrome 22.0.1229.63 \n * Google Chrome 22.0.1229.64 \n * Google Chrome 22.0.1229.65 \n * Google Chrome 22.0.1229.67 \n * Google Chrome 22.0.1229.7 \n * Google Chrome 22.0.1229.76 \n * Google Chrome 22.0.1229.78 \n * Google Chrome 22.0.1229.79 \n * Google Chrome 22.0.1229.8 \n * Google Chrome 22.0.1229.89 \n * Google Chrome 22.0.1229.9 \n * Google Chrome 22.0.1229.91 \n * Google Chrome 22.0.1229.92 \n * Google Chrome 22.0.1229.94 \n * Google Chrome 22.0.1229.95 \n * Google Chrome 22.0.1229.96 \n * Google Chrome 23.0.1271.0 \n * Google Chrome 23.0.1271.1 \n * Google Chrome 23.0.1271.10 \n * Google Chrome 23.0.1271.11 \n * Google Chrome 23.0.1271.12 \n * Google Chrome 23.0.1271.13 \n * Google Chrome 23.0.1271.14 \n * Google Chrome 23.0.1271.15 \n * Google Chrome 23.0.1271.16 \n * Google Chrome 23.0.1271.17 \n * Google Chrome 23.0.1271.18 \n * Google Chrome 23.0.1271.19 \n * Google Chrome 23.0.1271.2 \n * Google Chrome 23.0.1271.20 \n * Google Chrome 23.0.1271.21 \n * Google Chrome 23.0.1271.22 \n * Google Chrome 23.0.1271.23 \n * Google Chrome 23.0.1271.24 \n * Google Chrome 23.0.1271.26 \n * Google Chrome 23.0.1271.3 \n * Google Chrome 23.0.1271.30 \n * Google Chrome 23.0.1271.31 \n * Google Chrome 23.0.1271.32 \n * Google Chrome 23.0.1271.33 \n * Google Chrome 23.0.1271.35 \n * Google Chrome 23.0.1271.36 \n * Google Chrome 23.0.1271.37 \n * Google Chrome 23.0.1271.38 \n * Google Chrome 23.0.1271.39 \n * Google Chrome 23.0.1271.4 \n * Google Chrome 23.0.1271.40 \n * Google Chrome 23.0.1271.41 \n * Google Chrome 23.0.1271.44 \n * Google Chrome 23.0.1271.45 \n * Google Chrome 23.0.1271.46 \n * Google Chrome 23.0.1271.49 \n * Google Chrome 23.0.1271.5 \n * Google Chrome 23.0.1271.50 \n * Google Chrome 23.0.1271.51 \n * Google Chrome 23.0.1271.52 \n * Google Chrome 23.0.1271.53 \n * Google Chrome 23.0.1271.54 \n * Google Chrome 23.0.1271.55 \n * Google Chrome 23.0.1271.56 \n * Google Chrome 23.0.1271.57 \n * Google Chrome 23.0.1271.58 \n * Google Chrome 23.0.1271.59 \n * Google Chrome 23.0.1271.6 \n * Google Chrome 23.0.1271.60 \n * Google Chrome 23.0.1271.61 \n * Google Chrome 23.0.1271.62 \n * Google Chrome 23.0.1271.64 \n * Google Chrome 23.0.1271.7 \n * Google Chrome 23.0.1271.8 \n * Google Chrome 23.0.1271.83 \n * Google Chrome 23.0.1271.84 \n * Google Chrome 23.0.1271.85 \n * Google Chrome 23.0.1271.86 \n * Google Chrome 23.0.1271.87 \n * Google Chrome 23.0.1271.88 \n * Google Chrome 23.0.1271.89 \n * Google Chrome 23.0.1271.9 \n * Google Chrome 23.0.1271.91 \n * Google Chrome 23.0.1271.95 \n * Google Chrome 23.0.1271.96 \n * Google Chrome 23.0.1271.97 \n * Google Chrome 24.0.1272.0 \n * Google Chrome 24.0.1272.1 \n * Google Chrome 24.0.1273.0 \n * Google Chrome 24.0.1274.0 \n * Google Chrome 24.0.1275.0 \n * Google Chrome 24.0.1276.0 \n * Google Chrome 24.0.1276.1 \n * Google Chrome 24.0.1277.0 \n * Google Chrome 24.0.1278.0 \n * Google Chrome 24.0.1279.0 \n * Google Chrome 24.0.1280.0 \n * Google Chrome 24.0.1281.0 \n * Google Chrome 24.0.1281.1 \n * Google Chrome 24.0.1281.2 \n * Google Chrome 24.0.1281.3 \n * Google Chrome 24.0.1282.0 \n * Google Chrome 24.0.1283.0 \n * Google Chrome 24.0.1284.0 \n * Google Chrome 24.0.1284.1 \n * Google Chrome 24.0.1284.2 \n * Google Chrome 24.0.1285.0 \n * Google Chrome 24.0.1285.1 \n * Google Chrome 24.0.1285.2 \n * Google Chrome 24.0.1286.0 \n * Google Chrome 24.0.1286.1 \n * Google Chrome 24.0.1287.0 \n * Google Chrome 24.0.1287.1 \n * Google Chrome 24.0.1288.0 \n * Google Chrome 24.0.1288.1 \n * Google Chrome 24.0.1289.0 \n * Google Chrome 24.0.1289.1 \n * Google Chrome 24.0.1290.0 \n * Google Chrome 24.0.1291.0 \n * Google Chrome 24.0.1292.0 \n * Google Chrome 24.0.1293.0 \n * Google Chrome 24.0.1294.0 \n * Google Chrome 24.0.1295.0 \n * Google Chrome 24.0.1296.0 \n * Google Chrome 24.0.1297.0 \n * Google Chrome 24.0.1298.0 \n * Google Chrome 24.0.1299.0 \n * Google Chrome 24.0.1300.0 \n * Google Chrome 24.0.1301.0 \n * Google Chrome 24.0.1301.2 \n * Google Chrome 24.0.1302.0 \n * Google Chrome 24.0.1303.0 \n * Google Chrome 24.0.1304.0 \n * Google Chrome 24.0.1304.1 \n * Google Chrome 24.0.1305.0 \n * Google Chrome 24.0.1305.1 \n * Google Chrome 24.0.1305.2 \n * Google Chrome 24.0.1305.3 \n * Google Chrome 24.0.1305.4 \n * Google Chrome 24.0.1306.0 \n * Google Chrome 24.0.1306.1 \n * Google Chrome 24.0.1307.0 \n * Google Chrome 24.0.1307.1 \n * Google Chrome 24.0.1308.0 \n * Google Chrome 24.0.1309.0 \n * Google Chrome 24.0.1310.0 \n * Google Chrome 24.0.1311.0 \n * Google Chrome 24.0.1311.1 \n * Google Chrome 24.0.1312.0 \n * Google Chrome 24.0.1312.1 \n * Google Chrome 24.0.1312.10 \n * Google Chrome 24.0.1312.11 \n * Google Chrome 24.0.1312.12 \n * Google Chrome 24.0.1312.13 \n * Google Chrome 24.0.1312.14 \n * Google Chrome 24.0.1312.15 \n * Google Chrome 24.0.1312.16 \n * Google Chrome 24.0.1312.17 \n * Google Chrome 24.0.1312.18 \n * Google Chrome 24.0.1312.19 \n * Google Chrome 24.0.1312.20 \n * Google Chrome 24.0.1312.21 \n * Google Chrome 24.0.1312.22 \n * Google Chrome 24.0.1312.23 \n * Google Chrome 24.0.1312.24 \n * Google Chrome 24.0.1312.25 \n * Google Chrome 24.0.1312.26 \n * Google Chrome 24.0.1312.27 \n * Google Chrome 24.0.1312.28 \n * Google Chrome 24.0.1312.29 \n * Google Chrome 24.0.1312.30 \n * Google Chrome 24.0.1312.31 \n * Google Chrome 24.0.1312.32 \n * Google Chrome 24.0.1312.33 \n * Google Chrome 24.0.1312.34 \n * Google Chrome 24.0.1312.35 \n * Google Chrome 24.0.1312.36 \n * Google Chrome 24.0.1312.37 \n * Google Chrome 24.0.1312.38 \n * Google Chrome 24.0.1312.39 \n * Google Chrome 24.0.1312.4 \n * Google Chrome 24.0.1312.40 \n * Google Chrome 24.0.1312.41 \n * Google Chrome 24.0.1312.42 \n * Google Chrome 24.0.1312.43 \n * Google Chrome 24.0.1312.44 \n * Google Chrome 24.0.1312.45 \n * Google Chrome 24.0.1312.46 \n * Google Chrome 24.0.1312.47 \n * Google Chrome 24.0.1312.48 \n * Google Chrome 24.0.1312.49 \n * Google Chrome 24.0.1312.5 \n * Google Chrome 24.0.1312.50 \n * Google Chrome 24.0.1312.51 \n * Google Chrome 24.0.1312.52 \n * Google Chrome 24.0.1312.53 \n * Google Chrome 24.0.1312.54 \n * Google Chrome 24.0.1312.55 \n * Google Chrome 24.0.1312.56 \n * Google Chrome 24.0.1312.57 \n * Google Chrome 24.0.1312.6 \n * Google Chrome 24.0.1312.7 \n * Google Chrome 24.0.1312.70 \n * Google Chrome 24.0.1312.8 \n * Google Chrome 24.0.1312.9 \n * Google Chrome 25 \n * Google Chrome 25.0.1364.0 \n * Google Chrome 25.0.1364.1 \n * Google Chrome 25.0.1364.10 \n * Google Chrome 25.0.1364.108 \n * Google Chrome 25.0.1364.11 \n * Google Chrome 25.0.1364.110 \n * Google Chrome 25.0.1364.112 \n * Google Chrome 25.0.1364.113 \n * Google Chrome 25.0.1364.114 \n * Google Chrome 25.0.1364.115 \n * Google Chrome 25.0.1364.116 \n * Google Chrome 25.0.1364.117 \n * Google Chrome 25.0.1364.118 \n * Google Chrome 25.0.1364.119 \n * Google Chrome 25.0.1364.12 \n * Google Chrome 25.0.1364.120 \n * Google Chrome 25.0.1364.121 \n * Google Chrome 25.0.1364.122 \n * Google Chrome 25.0.1364.123 \n * Google Chrome 25.0.1364.124 \n * Google Chrome 25.0.1364.125 \n * Google Chrome 25.0.1364.126 \n * Google Chrome 25.0.1364.13 \n * Google Chrome 25.0.1364.14 \n * Google Chrome 25.0.1364.15 \n * Google Chrome 25.0.1364.152 \n * Google Chrome 25.0.1364.16 \n * Google Chrome 25.0.1364.160 \n * Google Chrome 25.0.1364.17 \n * Google Chrome 25.0.1364.172 \n * Google Chrome 25.0.1364.18 \n * Google Chrome 25.0.1364.19 \n * Google Chrome 25.0.1364.2 \n * Google Chrome 25.0.1364.20 \n * Google Chrome 25.0.1364.21 \n * Google Chrome 25.0.1364.22 \n * Google Chrome 25.0.1364.23 \n * Google Chrome 25.0.1364.24 \n * Google Chrome 25.0.1364.25 \n * Google Chrome 25.0.1364.26 \n * Google Chrome 25.0.1364.27 \n * Google Chrome 25.0.1364.28 \n * Google Chrome 25.0.1364.29 \n * Google Chrome 25.0.1364.3 \n * Google Chrome 25.0.1364.30 \n * Google Chrome 25.0.1364.31 \n * Google Chrome 25.0.1364.32 \n * Google Chrome 25.0.1364.33 \n * Google Chrome 25.0.1364.34 \n * Google Chrome 25.0.1364.35 \n * Google Chrome 25.0.1364.36 \n * Google Chrome 25.0.1364.37 \n * Google Chrome 25.0.1364.38 \n * Google Chrome 25.0.1364.39 \n * Google Chrome 25.0.1364.40 \n * Google Chrome 25.0.1364.41 \n * Google Chrome 25.0.1364.42 \n * Google Chrome 25.0.1364.43 \n * Google Chrome 25.0.1364.44 \n * Google Chrome 25.0.1364.45 \n * Google Chrome 25.0.1364.46 \n * Google Chrome 25.0.1364.47 \n * Google Chrome 25.0.1364.48 \n * Google Chrome 25.0.1364.49 \n * Google Chrome 25.0.1364.5 \n * Google Chrome 25.0.1364.50 \n * Google Chrome 25.0.1364.51 \n * Google Chrome 25.0.1364.52 \n * Google Chrome 25.0.1364.53 \n * Google Chrome 25.0.1364.54 \n * Google Chrome 25.0.1364.55 \n * Google Chrome 25.0.1364.56 \n * Google Chrome 25.0.1364.57 \n * Google Chrome 25.0.1364.58 \n * Google Chrome 25.0.1364.61 \n * Google Chrome 25.0.1364.62 \n * Google Chrome 25.0.1364.63 \n * Google Chrome 25.0.1364.65 \n * Google Chrome 25.0.1364.66 \n * Google Chrome 25.0.1364.67 \n * Google Chrome 25.0.1364.68 \n * Google Chrome 25.0.1364.7 \n * Google Chrome 25.0.1364.70 \n * Google Chrome 25.0.1364.72 \n * Google Chrome 25.0.1364.73 \n * Google Chrome 25.0.1364.74 \n * Google Chrome 25.0.1364.75 \n * Google Chrome 25.0.1364.76 \n * Google Chrome 25.0.1364.77 \n * Google Chrome 25.0.1364.78 \n * Google Chrome 25.0.1364.79 \n * Google Chrome 25.0.1364.8 \n * Google Chrome 25.0.1364.80 \n * Google Chrome 25.0.1364.81 \n * Google Chrome 25.0.1364.82 \n * Google Chrome 25.0.1364.84 \n * Google Chrome 25.0.1364.85 \n * Google Chrome 25.0.1364.86 \n * Google Chrome 25.0.1364.87 \n * Google Chrome 25.0.1364.88 \n * Google Chrome 25.0.1364.89 \n * Google Chrome 25.0.1364.9 \n * Google Chrome 25.0.1364.90 \n * Google Chrome 25.0.1364.91 \n * Google Chrome 25.0.1364.92 \n * Google Chrome 25.0.1364.93 \n * Google Chrome 25.0.1364.95 \n * Google Chrome 25.0.1364.97 \n * Google Chrome 25.0.1364.98 \n * Google Chrome 25.0.1364.99 \n * Google Chrome 26.0.1410.28 \n * Google Chrome 26.0.1410.43 \n * Google Chrome 26.0.1410.46 \n * Google Chrome 26.0.1410.53 \n * Google Chrome 26.0.1410.63 \n * Google Chrome 26.0.1410.64 \n * Google Chrome 27.0.1444.0 \n * Google Chrome 27.0.1444.3 \n * Google Chrome 27.0.1453.0 \n * Google Chrome 27.0.1453.1 \n * Google Chrome 27.0.1453.10 \n * Google Chrome 27.0.1453.102 \n * Google Chrome 27.0.1453.103 \n * Google Chrome 27.0.1453.104 \n * Google Chrome 27.0.1453.105 \n * Google Chrome 27.0.1453.106 \n * Google Chrome 27.0.1453.107 \n * Google Chrome 27.0.1453.108 \n * Google Chrome 27.0.1453.109 \n * Google Chrome 27.0.1453.11 \n * Google Chrome 27.0.1453.110 \n * Google Chrome 27.0.1453.111 \n * Google Chrome 27.0.1453.112 \n * Google Chrome 27.0.1453.113 \n * Google Chrome 27.0.1453.114 \n * Google Chrome 27.0.1453.115 \n * Google Chrome 27.0.1453.116 \n * Google Chrome 27.0.1453.12 \n * Google Chrome 27.0.1453.13 \n * Google Chrome 27.0.1453.15 \n * Google Chrome 27.0.1453.2 \n * Google Chrome 27.0.1453.3 \n * Google Chrome 27.0.1453.34 \n * Google Chrome 27.0.1453.35 \n * Google Chrome 27.0.1453.36 \n * Google Chrome 27.0.1453.37 \n * Google Chrome 27.0.1453.38 \n * Google Chrome 27.0.1453.39 \n * Google Chrome 27.0.1453.4 \n * Google Chrome 27.0.1453.40 \n * Google Chrome 27.0.1453.41 \n * Google Chrome 27.0.1453.42 \n * Google Chrome 27.0.1453.43 \n * Google Chrome 27.0.1453.44 \n * Google Chrome 27.0.1453.45 \n * Google Chrome 27.0.1453.46 \n * Google Chrome 27.0.1453.47 \n * Google Chrome 27.0.1453.49 \n * Google Chrome 27.0.1453.5 \n * Google Chrome 27.0.1453.50 \n * Google Chrome 27.0.1453.51 \n * Google Chrome 27.0.1453.52 \n * Google Chrome 27.0.1453.54 \n * Google Chrome 27.0.1453.55 \n * Google Chrome 27.0.1453.56 \n * Google Chrome 27.0.1453.57 \n * Google Chrome 27.0.1453.58 \n * Google Chrome 27.0.1453.59 \n * Google Chrome 27.0.1453.6 \n * Google Chrome 27.0.1453.60 \n * Google Chrome 27.0.1453.61 \n * Google Chrome 27.0.1453.62 \n * Google Chrome 27.0.1453.63 \n * Google Chrome 27.0.1453.64 \n * Google Chrome 27.0.1453.65 \n * Google Chrome 27.0.1453.66 \n * Google Chrome 27.0.1453.67 \n * Google Chrome 27.0.1453.68 \n * Google Chrome 27.0.1453.69 \n * Google Chrome 27.0.1453.7 \n * Google Chrome 27.0.1453.70 \n * Google Chrome 27.0.1453.71 \n * Google Chrome 27.0.1453.72 \n * Google Chrome 27.0.1453.73 \n * Google Chrome 27.0.1453.74 \n * Google Chrome 27.0.1453.75 \n * Google Chrome 27.0.1453.76 \n * Google Chrome 27.0.1453.77 \n * Google Chrome 27.0.1453.78 \n * Google Chrome 27.0.1453.79 \n * Google Chrome 27.0.1453.8 \n * Google Chrome 27.0.1453.80 \n * Google Chrome 27.0.1453.81 \n * Google Chrome 27.0.1453.82 \n * Google Chrome 27.0.1453.83 \n * Google Chrome 27.0.1453.84 \n * Google Chrome 27.0.1453.85 \n * Google Chrome 27.0.1453.86 \n * Google Chrome 27.0.1453.87 \n * Google Chrome 27.0.1453.88 \n * Google Chrome 27.0.1453.89 \n * Google Chrome 27.0.1453.9 \n * Google Chrome 27.0.1453.90 \n * Google Chrome 27.0.1453.91 \n * Google Chrome 27.0.1453.93 \n * Google Chrome 27.0.1453.94 \n * Google Chrome 28.0.1498.0 \n * Google Chrome 28.0.1500.0 \n * Google Chrome 28.0.1500.10 \n * Google Chrome 28.0.1500.11 \n * Google Chrome 28.0.1500.12 \n * Google Chrome 28.0.1500.13 \n * Google Chrome 28.0.1500.14 \n * Google Chrome 28.0.1500.15 \n * Google Chrome 28.0.1500.16 \n * Google Chrome 28.0.1500.17 \n * Google Chrome 28.0.1500.18 \n * Google Chrome 28.0.1500.19 \n * Google Chrome 28.0.1500.2 \n * Google Chrome 28.0.1500.20 \n * Google Chrome 28.0.1500.21 \n * Google Chrome 28.0.1500.22 \n * Google Chrome 28.0.1500.23 \n * Google Chrome 28.0.1500.24 \n * Google Chrome 28.0.1500.25 \n * Google Chrome 28.0.1500.26 \n * Google Chrome 28.0.1500.27 \n * Google Chrome 28.0.1500.28 \n * Google Chrome 28.0.1500.29 \n * Google Chrome 28.0.1500.3 \n * Google Chrome 28.0.1500.31 \n * Google Chrome 28.0.1500.32 \n * Google Chrome 28.0.1500.33 \n * Google Chrome 28.0.1500.34 \n * Google Chrome 28.0.1500.35 \n * Google Chrome 28.0.1500.36 \n * Google Chrome 28.0.1500.37 \n * Google Chrome 28.0.1500.38 \n * Google Chrome 28.0.1500.39 \n * Google Chrome 28.0.1500.4 \n * Google Chrome 28.0.1500.40 \n * Google Chrome 28.0.1500.41 \n * Google Chrome 28.0.1500.42 \n * Google Chrome 28.0.1500.43 \n * Google Chrome 28.0.1500.44 \n * Google Chrome 28.0.1500.45 \n * Google Chrome 28.0.1500.46 \n * Google Chrome 28.0.1500.47 \n * Google Chrome 28.0.1500.48 \n * Google Chrome 28.0.1500.49 \n * Google Chrome 28.0.1500.5 \n * Google Chrome 28.0.1500.50 \n * Google Chrome 28.0.1500.51 \n * Google Chrome 28.0.1500.52 \n * Google Chrome 28.0.1500.53 \n * Google Chrome 28.0.1500.54 \n * Google Chrome 28.0.1500.56 \n * Google Chrome 28.0.1500.58 \n * Google Chrome 28.0.1500.59 \n * Google Chrome 28.0.1500.6 \n * Google Chrome 28.0.1500.60 \n * Google Chrome 28.0.1500.61 \n * Google Chrome 28.0.1500.62 \n * Google Chrome 28.0.1500.63 \n * Google Chrome 28.0.1500.64 \n * Google Chrome 28.0.1500.66 \n * Google Chrome 28.0.1500.68 \n * Google Chrome 28.0.1500.70 \n * Google Chrome 28.0.1500.71 \n * Google Chrome 28.0.1500.72 \n * Google Chrome 28.0.1500.8 \n * Google Chrome 28.0.1500.89 \n * Google Chrome 28.0.1500.9 \n * Google Chrome 28.0.1500.91 \n * Google Chrome 28.0.1500.93 \n * Google Chrome 28.0.1500.94 \n * Google Chrome 28.0.1500.95 \n * Google Chrome 29.0.1547.0 \n * Google Chrome 29.0.1547.10 \n * Google Chrome 29.0.1547.12 \n * Google Chrome 29.0.1547.14 \n * Google Chrome 29.0.1547.16 \n * Google Chrome 29.0.1547.18 \n * Google Chrome 29.0.1547.2 \n * Google Chrome 29.0.1547.21 \n * Google Chrome 29.0.1547.23 \n * Google Chrome 29.0.1547.28 \n * Google Chrome 29.0.1547.3 \n * Google Chrome 29.0.1547.31 \n * Google Chrome 29.0.1547.33 \n * Google Chrome 29.0.1547.35 \n * Google Chrome 29.0.1547.37 \n * Google Chrome 29.0.1547.39 \n * Google Chrome 29.0.1547.40 \n * Google Chrome 29.0.1547.42 \n * Google Chrome 29.0.1547.46 \n * Google Chrome 29.0.1547.48 \n * Google Chrome 29.0.1547.5 \n * Google Chrome 29.0.1547.51 \n * Google Chrome 29.0.1547.53 \n * Google Chrome 29.0.1547.55 \n * Google Chrome 29.0.1547.57 \n * Google Chrome 29.0.1547.7 \n * Google Chrome 29.0.1547.76 \n * Google Chrome 29.0.1547.9 \n * Google Chrome 3 \n * Google Chrome 3.0 Beta \n * Google Chrome 3.0.182.2 \n * Google Chrome 3.0.190.2 \n * Google Chrome 3.0.193.2 Beta \n * Google Chrome 3.0.195.2 \n * Google Chrome 3.0.195.21 \n * Google Chrome 3.0.195.24 \n * Google Chrome 3.0.195.25 \n * Google Chrome 3.0.195.27 \n * Google Chrome 3.0.195.32 \n * Google Chrome 3.0.195.33 \n * Google Chrome 3.0.195.36 \n * Google Chrome 3.0.195.37 \n * Google Chrome 3.0.195.38 \n * Google Chrome 30.0.1599.0 \n * Google Chrome 30.0.1599.10 \n * Google Chrome 30.0.1599.100 \n * Google Chrome 30.0.1599.101 \n * Google Chrome 30.0.1599.12 \n * Google Chrome 30.0.1599.14 \n * Google Chrome 30.0.1599.16 \n * Google Chrome 30.0.1599.18 \n * Google Chrome 30.0.1599.2 \n * Google Chrome 30.0.1599.21 \n * Google Chrome 30.0.1599.23 \n * Google Chrome 30.0.1599.25 \n * Google Chrome 30.0.1599.27 \n * Google Chrome 30.0.1599.29 \n * Google Chrome 30.0.1599.31 \n * Google Chrome 30.0.1599.33 \n * Google Chrome 30.0.1599.35 \n * Google Chrome 30.0.1599.37 \n * Google Chrome 30.0.1599.39 \n * Google Chrome 30.0.1599.40 \n * Google Chrome 30.0.1599.42 \n * Google Chrome 30.0.1599.44 \n * Google Chrome 30.0.1599.48 \n * Google Chrome 30.0.1599.5 \n * Google Chrome 30.0.1599.51 \n * Google Chrome 30.0.1599.53 \n * Google Chrome 30.0.1599.57 \n * Google Chrome 30.0.1599.59 \n * Google Chrome 30.0.1599.60 \n * Google Chrome 30.0.1599.64 \n * Google Chrome 30.0.1599.66 \n * Google Chrome 30.0.1599.67 \n * Google Chrome 30.0.1599.68 \n * Google Chrome 30.0.1599.69 \n * Google Chrome 30.0.1599.7 \n * Google Chrome 30.0.1599.79 \n * Google Chrome 30.0.1599.80 \n * Google Chrome 30.0.1599.81 \n * Google Chrome 30.0.1599.82 \n * Google Chrome 30.0.1599.84 \n * Google Chrome 30.0.1599.85 \n * Google Chrome 30.0.1599.86 \n * Google Chrome 30.0.1599.87 \n * Google Chrome 30.0.1599.88 \n * Google Chrome 30.0.1599.9 \n * Google Chrome 30.0.1599.90 \n * Google Chrome 31.0.1650.0 \n * Google Chrome 31.0.1650.10 \n * Google Chrome 31.0.1650.11 \n * Google Chrome 31.0.1650.12 \n * Google Chrome 31.0.1650.13 \n * Google Chrome 31.0.1650.14 \n * Google Chrome 31.0.1650.15 \n * Google Chrome 31.0.1650.16 \n * Google Chrome 31.0.1650.17 \n * Google Chrome 31.0.1650.18 \n * Google Chrome 31.0.1650.19 \n * Google Chrome 31.0.1650.2 \n * Google Chrome 31.0.1650.20 \n * Google Chrome 31.0.1650.22 \n * Google Chrome 31.0.1650.23 \n * Google Chrome 31.0.1650.25 \n * Google Chrome 31.0.1650.26 \n * Google Chrome 31.0.1650.27 \n * Google Chrome 31.0.1650.28 \n * Google Chrome 31.0.1650.29 \n * Google Chrome 31.0.1650.3 \n * Google Chrome 31.0.1650.30 \n * Google Chrome 31.0.1650.31 \n * Google Chrome 31.0.1650.32 \n * Google Chrome 31.0.1650.33 \n * Google Chrome 31.0.1650.34 \n * Google Chrome 31.0.1650.35 \n * Google Chrome 31.0.1650.36 \n * Google Chrome 31.0.1650.37 \n * Google Chrome 31.0.1650.38 \n * Google Chrome 31.0.1650.39 \n * Google Chrome 31.0.1650.4 \n * Google Chrome 31.0.1650.41 \n * Google Chrome 31.0.1650.42 \n * Google Chrome 31.0.1650.43 \n * Google Chrome 31.0.1650.44 \n * Google Chrome 31.0.1650.45 \n * Google Chrome 31.0.1650.46 \n * Google Chrome 31.0.1650.47 \n * Google Chrome 31.0.1650.48 \n * Google Chrome 31.0.1650.49 \n * Google Chrome 31.0.1650.5 \n * Google Chrome 31.0.1650.50 \n * Google Chrome 31.0.1650.52 \n * Google Chrome 31.0.1650.54 \n * Google Chrome 31.0.1650.57 \n * Google Chrome 31.0.1650.58 \n * Google Chrome 31.0.1650.6 \n * Google Chrome 31.0.1650.60 \n * Google Chrome 31.0.1650.61 \n * Google Chrome 31.0.1650.62 \n * Google Chrome 31.0.1650.63 \n * Google Chrome 31.0.1650.7 \n * Google Chrome 31.0.1650.8 \n * Google Chrome 31.0.1650.9 \n * Google Chrome 32.0.1651.2 \n * Google Chrome 32.0.1652.1 \n * Google Chrome 32.0.1653.1 \n * Google Chrome 32.0.1654.0 \n * Google Chrome 32.0.1654.3 \n * Google Chrome 32.0.1655.1 \n * Google Chrome 32.0.1656.1 \n * Google Chrome 32.0.1657.0 \n * Google Chrome 32.0.1658.0 \n * Google Chrome 32.0.1658.2 \n * Google Chrome 32.0.1659.1 \n * Google Chrome 32.0.1659.3 \n * Google Chrome 32.0.1660.1 \n * Google Chrome 32.0.1661.0 \n * Google Chrome 32.0.1662.0 \n * Google Chrome 32.0.1662.2 \n * Google Chrome 32.0.1663.1 \n * Google Chrome 32.0.1663.3 \n * Google Chrome 32.0.1664.1 \n * Google Chrome 32.0.1664.3 \n * Google Chrome 32.0.1666.0 \n * Google Chrome 32.0.1667.0 \n * Google Chrome 32.0.1668.0 \n * Google Chrome 32.0.1668.2 \n * Google Chrome 32.0.1668.4 \n * Google Chrome 32.0.1668.6 \n * Google Chrome 32.0.1669.1 \n * Google Chrome 32.0.1669.3 \n * Google Chrome 32.0.1670.1 \n * Google Chrome 32.0.1670.3 \n * Google Chrome 32.0.1670.5 \n * Google Chrome 32.0.1671.2 \n * Google Chrome 32.0.1671.4 \n * Google Chrome 32.0.1671.8 \n * Google Chrome 32.0.1672.2 \n * Google Chrome 32.0.1673.2 \n * Google Chrome 32.0.1673.4 \n * Google Chrome 32.0.1674.1 \n * Google Chrome 32.0.1675.0 \n * Google Chrome 32.0.1675.2 \n * Google Chrome 32.0.1676.0 \n * Google Chrome 32.0.1676.2 \n * Google Chrome 32.0.1677.1 \n * Google Chrome 32.0.1678.1 \n * Google Chrome 32.0.1679.0 \n * Google Chrome 32.0.1680.0 \n * Google Chrome 32.0.1681.0 \n * Google Chrome 32.0.1681.3 \n * Google Chrome 32.0.1682.3 \n * Google Chrome 32.0.1682.5 \n * Google Chrome 32.0.1683.1 \n * Google Chrome 32.0.1684.0 \n * Google Chrome 32.0.1684.2 \n * Google Chrome 32.0.1685.0 \n * Google Chrome 32.0.1685.2 \n * Google Chrome 32.0.1686.0 \n * Google Chrome 32.0.1687.0 \n * Google Chrome 32.0.1688.0 \n * Google Chrome 32.0.1689.0 \n * Google Chrome 32.0.1689.2 \n * Google Chrome 32.0.1690.0 \n * Google Chrome 32.0.1700.0 \n * Google Chrome 32.0.1700.100 \n * Google Chrome 32.0.1700.102 \n * Google Chrome 32.0.1700.103 \n * Google Chrome 32.0.1700.107 \n * Google Chrome 32.0.1700.11 \n * Google Chrome 32.0.1700.13 \n * Google Chrome 32.0.1700.15 \n * Google Chrome 32.0.1700.17 \n * Google Chrome 32.0.1700.19 \n * Google Chrome 32.0.1700.21 \n * Google Chrome 32.0.1700.23 \n * Google Chrome 32.0.1700.26 \n * Google Chrome 32.0.1700.28 \n * Google Chrome 32.0.1700.3 \n * Google Chrome 32.0.1700.31 \n * Google Chrome 32.0.1700.33 \n * Google Chrome 32.0.1700.35 \n * Google Chrome 32.0.1700.39 \n * Google Chrome 32.0.1700.41 \n * Google Chrome 32.0.1700.50 \n * Google Chrome 32.0.1700.52 \n * Google Chrome 32.0.1700.54 \n * Google Chrome 32.0.1700.56 \n * Google Chrome 32.0.1700.58 \n * Google Chrome 32.0.1700.6 \n * Google Chrome 32.0.1700.63 \n * Google Chrome 32.0.1700.65 \n * Google Chrome 32.0.1700.67 \n * Google Chrome 32.0.1700.69 \n * Google Chrome 32.0.1700.70 \n * Google Chrome 32.0.1700.74 \n * Google Chrome 32.0.1700.76 \n * Google Chrome 32.0.1700.77 \n * Google Chrome 32.0.1700.9 \n * Google Chrome 32.0.1700.95 \n * Google Chrome 32.0.1700.97 \n * Google Chrome 32.0.1700.98 \n * Google Chrome 33.0.1750.0 \n * Google Chrome 33.0.1750.10 \n * Google Chrome 33.0.1750.106 \n * Google Chrome 33.0.1750.108 \n * Google Chrome 33.0.1750.11 \n * Google Chrome 33.0.1750.111 \n * Google Chrome 33.0.1750.113 \n * Google Chrome 33.0.1750.116 \n * Google Chrome 33.0.1750.117 \n * Google Chrome 33.0.1750.124 \n * Google Chrome 33.0.1750.125 \n * Google Chrome 33.0.1750.13 \n * Google Chrome 33.0.1750.132 \n * Google Chrome 33.0.1750.135 \n * Google Chrome 33.0.1750.14 \n * Google Chrome 33.0.1750.144 \n * Google Chrome 33.0.1750.146 \n * Google Chrome 33.0.1750.149 \n * Google Chrome 33.0.1750.151 \n * Google Chrome 33.0.1750.152 \n * Google Chrome 33.0.1750.154 \n * Google Chrome 33.0.1750.16 \n * Google Chrome 33.0.1750.166 \n * Google Chrome 33.0.1750.168 \n * Google Chrome 33.0.1750.19 \n * Google Chrome 33.0.1750.20 \n * Google Chrome 33.0.1750.22 \n * Google Chrome 33.0.1750.24 \n * Google Chrome 33.0.1750.26 \n * Google Chrome 33.0.1750.28 \n * Google Chrome 33.0.1750.3 \n * Google Chrome 33.0.1750.31 \n * Google Chrome 33.0.1750.35 \n * Google Chrome 33.0.1750.37 \n * Google Chrome 33.0.1750.39 \n * Google Chrome 33.0.1750.40 \n * Google Chrome 33.0.1750.42 \n * Google Chrome 33.0.1750.44 \n * Google Chrome 33.0.1750.46 \n * Google Chrome 33.0.1750.48 \n * Google Chrome 33.0.1750.5 \n * Google Chrome 33.0.1750.51 \n * Google Chrome 33.0.1750.53 \n * Google Chrome 33.0.1750.55 \n * Google Chrome 33.0.1750.57 \n * Google Chrome 33.0.1750.59 \n * Google Chrome 33.0.1750.60 \n * Google Chrome 33.0.1750.62 \n * Google Chrome 33.0.1750.64 \n * Google Chrome 33.0.1750.66 \n * Google Chrome 33.0.1750.68 \n * Google Chrome 33.0.1750.7 \n * Google Chrome 33.0.1750.71 \n * Google Chrome 33.0.1750.74 \n * Google Chrome 33.0.1750.76 \n * Google Chrome 33.0.1750.79 \n * Google Chrome 33.0.1750.80 \n * Google Chrome 33.0.1750.82 \n * Google Chrome 33.0.1750.85 \n * Google Chrome 33.0.1750.89 \n * Google Chrome 33.0.1750.90 \n * Google Chrome 33.0.1750.92 \n * Google Chrome 34.0.1847.0 \n * Google Chrome 34.0.1847.10 \n * Google Chrome 34.0.1847.101 \n * Google Chrome 34.0.1847.103 \n * Google Chrome 34.0.1847.109 \n * Google Chrome 34.0.1847.112 \n * Google Chrome 34.0.1847.114 \n * Google Chrome 34.0.1847.116 \n * Google Chrome 34.0.1847.118 \n * Google Chrome 34.0.1847.120 \n * Google Chrome 34.0.1847.130 \n * Google Chrome 34.0.1847.131 \n * Google Chrome 34.0.1847.132 \n * Google Chrome 34.0.1847.134 \n * Google Chrome 34.0.1847.136 \n * Google Chrome 34.0.1847.137 \n * Google Chrome 34.0.1847.15 \n * Google Chrome 34.0.1847.23 \n * Google Chrome 34.0.1847.25 \n * Google Chrome 34.0.1847.36 \n * Google Chrome 34.0.1847.38 \n * Google Chrome 34.0.1847.4 \n * Google Chrome 34.0.1847.42 \n * Google Chrome 34.0.1847.44 \n * Google Chrome 34.0.1847.46 \n * Google Chrome 34.0.1847.48 \n * Google Chrome 34.0.1847.5 \n * Google Chrome 34.0.1847.51 \n * Google Chrome 34.0.1847.53 \n * Google Chrome 34.0.1847.55 \n * Google Chrome 34.0.1847.57 \n * Google Chrome 34.0.1847.59 \n * Google Chrome 34.0.1847.60 \n * Google Chrome 34.0.1847.62 \n * Google Chrome 34.0.1847.64 \n * Google Chrome 34.0.1847.66 \n * Google Chrome 34.0.1847.68 \n * Google Chrome 34.0.1847.7 \n * Google Chrome 34.0.1847.72 \n * Google Chrome 34.0.1847.74 \n * Google Chrome 34.0.1847.76 \n * Google Chrome 34.0.1847.78 \n * Google Chrome 34.0.1847.8 \n * Google Chrome 34.0.1847.81 \n * Google Chrome 34.0.1847.83 \n * Google Chrome 34.0.1847.86 \n * Google Chrome 34.0.1847.9 \n * Google Chrome 34.0.1847.92 \n * Google Chrome 34.0.1847.97 \n * Google Chrome 34.0.1847.99 \n * Google Chrome 35.0.1916.0 \n * Google Chrome 35.0.1916.10 \n * Google Chrome 35.0.1916.103 \n * Google Chrome 35.0.1916.105 \n * Google Chrome 35.0.1916.107 \n * Google Chrome 35.0.1916.109 \n * Google Chrome 35.0.1916.110 \n * Google Chrome 35.0.1916.112 \n * Google Chrome 35.0.1916.114 \n * Google Chrome 35.0.1916.13 \n * Google Chrome 35.0.1916.15 \n * Google Chrome 35.0.1916.153 \n * Google Chrome 35.0.1916.18 \n * Google Chrome 35.0.1916.2 \n * Google Chrome 35.0.1916.21 \n * Google Chrome 35.0.1916.23 \n * Google Chrome 35.0.1916.3 \n * Google Chrome 35.0.1916.32 \n * Google Chrome 35.0.1916.34 \n * Google Chrome 35.0.1916.36 \n * Google Chrome 35.0.1916.38 \n * Google Chrome 35.0.1916.4 \n * Google Chrome 35.0.1916.41 \n * Google Chrome 35.0.1916.43 \n * Google Chrome 35.0.1916.45 \n * Google Chrome 35.0.1916.47 \n * Google Chrome 35.0.1916.49 \n * Google Chrome 35.0.1916.51 \n * Google Chrome 35.0.1916.54 \n * Google Chrome 35.0.1916.57 \n * Google Chrome 35.0.1916.6 \n * Google Chrome 35.0.1916.68 \n * Google Chrome 35.0.1916.7 \n * Google Chrome 35.0.1916.72 \n * Google Chrome 35.0.1916.77 \n * Google Chrome 35.0.1916.80 \n * Google Chrome 35.0.1916.84 \n * Google Chrome 35.0.1916.86 \n * Google Chrome 35.0.1916.9 \n * Google Chrome 35.0.1916.92 \n * Google Chrome 35.0.1916.95 \n * Google Chrome 35.0.1916.98 \n * Google Chrome 36.0.1985.122 \n * Google Chrome 36.0.1985.143 \n * Google Chrome 37.0.2062.0 \n * Google Chrome 37.0.2062.10 \n * Google Chrome 37.0.2062.12 \n * Google Chrome 37.0.2062.120 \n * Google Chrome 37.0.2062.124 \n * Google Chrome 37.0.2062.14 \n * Google Chrome 37.0.2062.16 \n * Google Chrome 37.0.2062.18 \n * Google Chrome 37.0.2062.2 \n * Google Chrome 37.0.2062.21 \n * Google Chrome 37.0.2062.23 \n * Google Chrome 37.0.2062.25 \n * Google Chrome 37.0.2062.27 \n * Google Chrome 37.0.2062.29 \n * Google Chrome 37.0.2062.30 \n * Google Chrome 37.0.2062.32 \n * Google Chrome 37.0.2062.34 \n * Google Chrome 37.0.2062.36 \n * Google Chrome 37.0.2062.39 \n * Google Chrome 37.0.2062.43 \n * Google Chrome 37.0.2062.45 \n * Google Chrome 37.0.2062.47 \n * Google Chrome 37.0.2062.49 \n * Google Chrome 37.0.2062.50 \n * Google Chrome 37.0.2062.52 \n * Google Chrome 37.0.2062.54 \n * Google Chrome 37.0.2062.56 \n * Google Chrome 37.0.2062.58 \n * Google Chrome 37.0.2062.6 \n * Google Chrome 37.0.2062.61 \n * Google Chrome 37.0.2062.63 \n * Google Chrome 37.0.2062.65 \n * Google Chrome 37.0.2062.67 \n * Google Chrome 37.0.2062.69 \n * Google Chrome 37.0.2062.70 \n * Google Chrome 37.0.2062.72 \n * Google Chrome 37.0.2062.74 \n * Google Chrome 37.0.2062.76 \n * Google Chrome 37.0.2062.78 \n * Google Chrome 37.0.2062.80 \n * Google Chrome 37.0.2062.89 \n * Google Chrome 37.0.2062.90 \n * Google Chrome 37.0.2062.92 \n * Google Chrome 37.0.2062.94 \n * Google Chrome 37.0.2062.95 \n * Google Chrome 37.0.2062.97 \n * Google Chrome 38.0.2125.101 \n * Google Chrome 38.0.2125.101 ~~~Android~~ \n * Google Chrome 38.0.2125.122 \n * Google Chrome 39.0.2171.63 \n * Google Chrome 39.0.2171.65 \n * Google Chrome 4 \n * Google Chrome 4.0.211.0 \n * Google Chrome 4.0.212.0 \n * Google Chrome 4.0.212.1 \n * Google Chrome 4.0.221.8 \n * Google Chrome 4.0.222.0 \n * Google Chrome 4.0.222.1 \n * Google Chrome 4.0.222.12 \n * Google Chrome 4.0.222.5 \n * Google Chrome 4.0.223.0 \n * Google Chrome 4.0.223.1 \n * Google Chrome 4.0.223.2 \n * Google Chrome 4.0.223.4 \n * Google Chrome 4.0.223.5 \n * Google Chrome 4.0.223.7 \n * Google Chrome 4.0.223.8 \n * Google Chrome 4.0.224.0 \n * Google Chrome 4.0.229.1 \n * Google Chrome 4.0.235.0 \n * Google Chrome 4.0.236.0 \n * Google Chrome 4.0.237.0 \n * Google Chrome 4.0.237.1 \n * Google Chrome 4.0.239.0 \n * Google Chrome 4.0.240.0 \n * Google Chrome 4.0.241.0 \n * Google Chrome 4.0.242.0 \n * Google Chrome 4.0.243.0 \n * Google Chrome 4.0.244.0 \n * Google Chrome 4.0.245.0 \n * Google Chrome 4.0.246.0 \n * Google Chrome 4.0.247.0 \n * Google Chrome 4.0.248.0 \n * Google Chrome 4.0.249.0 \n * Google Chrome 4.0.249.1 \n * Google Chrome 4.0.249.10 \n * Google Chrome 4.0.249.11 \n * Google Chrome 4.0.249.12 \n * Google Chrome 4.0.249.14 \n * Google Chrome 4.0.249.16 \n * Google Chrome 4.0.249.17 \n * Google Chrome 4.0.249.18 \n * Google Chrome 4.0.249.19 \n * Google Chrome 4.0.249.2 \n * Google Chrome 4.0.249.20 \n * Google Chrome 4.0.249.21 \n * Google Chrome 4.0.249.22 \n * Google Chrome 4.0.249.23 \n * Google Chrome 4.0.249.24 \n * Google Chrome 4.0.249.25 \n * Google Chrome 4.0.249.26 \n * Google Chrome 4.0.249.27 \n * Google Chrome 4.0.249.28 \n * Google Chrome 4.0.249.29 \n * Google Chrome 4.0.249.3 \n * Google Chrome 4.0.249.30 \n * Google Chrome 4.0.249.31 \n * Google Chrome 4.0.249.32 \n * Google Chrome 4.0.249.33 \n * Google Chrome 4.0.249.34 \n * Google Chrome 4.0.249.35 \n * Google Chrome 4.0.249.36 \n * Google Chrome 4.0.249.37 \n * Google Chrome 4.0.249.38 \n * Google Chrome 4.0.249.39 \n * Google Chrome 4.0.249.4 \n * Google Chrome 4.0.249.40 \n * Google Chrome 4.0.249.41 \n * Google Chrome 4.0.249.42 \n * Google Chrome 4.0.249.43 \n * Google Chrome 4.0.249.44 \n * Google Chrome 4.0.249.45 \n * Google Chrome 4.0.249.46 \n * Google Chrome 4.0.249.47 \n * Google Chrome 4.0.249.48 \n * Google Chrome 4.0.249.49 \n * Google Chrome 4.0.249.5 \n * Google Chrome 4.0.249.50 \n * Google Chrome 4.0.249.51 \n * Google Chrome 4.0.249.52 \n * Google Chrome 4.0.249.53 \n * Google Chrome 4.0.249.54 \n * Google Chrome 4.0.249.55 \n * Google Chrome 4.0.249.56 \n * Google Chrome 4.0.249.57 \n * Google Chrome 4.0.249.58 \n * Google Chrome 4.0.249.59 \n * Google Chrome 4.0.249.6 \n * Google Chrome 4.0.249.60 \n * Google Chrome 4.0.249.61 \n * Google Chrome 4.0.249.62 \n * Google Chrome 4.0.249.63 \n * Google Chrome 4.0.249.64 \n * Google Chrome 4.0.249.65 \n * Google Chrome 4.0.249.66 \n * Google Chrome 4.0.249.67 \n * Google Chrome 4.0.249.68 \n * Google Chrome 4.0.249.69 \n * Google Chrome 4.0.249.7 \n * Google Chrome 4.0.249.70 \n * Google Chrome 4.0.249.71 \n * Google Chrome 4.0.249.72 \n * Google Chrome 4.0.249.73 \n * Google Chrome 4.0.249.74 \n * Google Chrome 4.0.249.75 \n * Google Chrome 4.0.249.76 \n * Google Chrome 4.0.249.77 \n * Google Chrome 4.0.249.78 \n * Google Chrome 4.0.249.78 Beta \n * Google Chrome 4.0.249.79 \n * Google Chrome 4.0.249.8 \n * Google Chrome 4.0.249.80 \n * Google Chrome 4.0.249.81 \n * Google Chrome 4.0.249.82 \n * Google Chrome 4.0.249.89 \n * Google Chrome 4.0.249.9 \n * Google Chrome 4.0.250.0 \n * Google Chrome 4.0.250.2 \n * Google Chrome 4.0.251.0 \n * Google Chrome 4.0.252.0 \n * Google Chrome 4.0.254.0 \n * Google Chrome 4.0.255.0 \n * Google Chrome 4.0.256.0 \n * Google Chrome 4.0.257.0 \n * Google Chrome 4.0.258.0 \n * Google Chrome 4.0.259.0 \n * Google Chrome 4.0.260.0 \n * Google Chrome 4.0.261.0 \n * Google Chrome 4.0.262.0 \n * Google Chrome 4.0.263.0 \n * Google Chrome 4.0.264.0 \n * Google Chrome 4.0.265.0 \n * Google Chrome 4.0.266.0 \n * Google Chrome 4.0.267.0 \n * Google Chrome 4.0.268.0 \n * Google Chrome 4.0.269.0 \n * Google Chrome 4.0.271.0 \n * Google Chrome 4.0.272.0 \n * Google Chrome 4.0.275.0 \n * Google Chrome 4.0.275.1 \n * Google Chrome 4.0.276.0 \n * Google Chrome 4.0.277.0 \n * Google Chrome 4.0.278.0 \n * Google Chrome 4.0.286.0 \n * Google Chrome 4.0.287.0 \n * Google Chrome 4.0.288.0 \n * Google Chrome 4.0.288.1 \n * Google Chrome 4.0.289.0 \n * Google Chrome 4.0.290.0 \n * Google Chrome 4.0.292.0 \n * Google Chrome 4.0.294.0 \n * Google Chrome 4.0.295.0 \n * Google Chrome 4.0.296.0 \n * Google Chrome 4.0.299.0 \n * Google Chrome 4.0.300.0 \n * Google Chrome 4.0.301.0 \n * Google Chrome 4.0.302.0 \n * Google Chrome 4.0.302.1 \n * Google Chrome 4.0.302.2 \n * Google Chrome 4.0.302.3 \n * Google Chrome 4.0.303.0 \n * Google Chrome 4.0.304.0 \n * Google Chrome 4.0.305.0 \n * Google Chrome 4.1 Beta \n * Google Chrome 4.1.249.0 \n * Google Chrome 4.1.249.1001 \n * Google Chrome 4.1.249.1004 \n * Google Chrome 4.1.249.1006 \n * Google Chrome 4.1.249.1007 \n * Google Chrome 4.1.249.1008 \n * Google Chrome 4.1.249.1009 \n * Google Chrome 4.1.249.1010 \n * Google Chrome 4.1.249.1011 \n * Google Chrome 4.1.249.1012 \n * Google Chrome 4.1.249.1013 \n * Google Chrome 4.1.249.1014 \n * Google Chrome 4.1.249.1015 \n * Google Chrome 4.1.249.1016 \n * Google Chrome 4.1.249.1017 \n * Google Chrome 4.1.249.1018 \n * Google Chrome 4.1.249.1019 \n * Google Chrome 4.1.249.1020 \n * Google Chrome 4.1.249.1021 \n * Google Chrome 4.1.249.1022 \n * Google Chrome 4.1.249.1023 \n * Google Chrome 4.1.249.1024 \n * Google Chrome 4.1.249.1025 \n * Google Chrome 4.1.249.1026 \n * Google Chrome 4.1.249.1027 \n * Google Chrome 4.1.249.1028 \n * Google Chrome 4.1.249.1029 \n * Google Chrome 4.1.249.1030 \n * Google Chrome 4.1.249.1031 \n * Google Chrome 4.1.249.1032 \n * Google Chrome 4.1.249.1033 \n * Google Chrome 4.1.249.1034 \n * Google Chrome 4.1.249.1035 \n * Google Chrome 4.1.249.1036 \n * Google Chrome 4.1.249.1037 \n * Google Chrome 4.1.249.1038 \n * Google Chrome 4.1.249.1039 \n * Google Chrome 4.1.249.1040 \n * Google Chrome 4.1.249.1041 \n * Google Chrome 4.1.249.1042 \n * Google Chrome 4.1.249.1043 \n * Google Chrome 4.1.249.1044 \n * Google Chrome 4.1.249.1045 \n * Google Chrome 4.1.249.1046 \n * Google Chrome 4.1.249.1047 \n * Google Chrome 4.1.249.1048 \n * Google Chrome 4.1.249.1049 \n * Google Chrome 4.1.249.1050 \n * Google Chrome 4.1.249.1051 \n * Google Chrome 4.1.249.1052 \n * Google Chrome 4.1.249.1053 \n * Google Chrome 4.1.249.1054 \n * Google Chrome 4.1.249.1055 \n * Google Chrome 4.1.249.1056 \n * Google Chrome 4.1.249.1057 \n * Google Chrome 4.1.249.1058 \n * Google Chrome 4.1.249.1059 \n * Google Chrome 4.1.249.1060 \n * Google Chrome 4.1.249.1061 \n * Google Chrome 4.1.249.1062 \n * Google Chrome 4.1.249.1063 \n * Google Chrome 4.1.249.1064 \n * Google Chrome 40.0.2214.111 \n * Google Chrome 40.0.2214.115 \n * Google Chrome 40.0.2214.85 \n * Google Chrome 40.0.2214.89 ~~~Android~~ \n * Google Chrome 40.0.2214.91 \n * Google Chrome 41.0.2272 \n * Google Chrome 41.0.2272.118 \n * Google Chrome 41.0.2272.76 \n * Google Chrome 42.0.2311 \n * Google Chrome 42.0.2311.135 \n * Google Chrome 42.0.2311.90 \n * Google Chrome 43.0.2357 \n * Google Chrome 43.0.2357.130 \n * Google Chrome 43.0.2357.65 \n * Google Chrome 44.0.2403 \n * Google Chrome 44.0.2403.157 \n * Google Chrome 44.0.2403.89 \n * Google Chrome 45.0.2454 \n * Google Chrome 45.0.2454.101 \n * Google Chrome 45.0.2454.85 \n * Google Chrome 46.0.2490 \n * Google Chrome 46.0.2490.71 \n * Google Chrome 46.0.2490.76 \n * Google Chrome 46.0.2490.86 \n * Google Chrome 47.0 \n * Google Chrome 47.0.2526.106 \n * Google Chrome 47.0.2526.73 \n * Google Chrome 47.0.2526.80 \n * Google Chrome 48.0.2564.109 \n * Google Chrome 48.0.2564.116 \n * Google Chrome 48.0.2564.82 \n * Google Chrome 49.0.2566.0 \n * Google Chrome 49.0.2623.108 \n * Google Chrome 49.0.2623.75 \n * Google Chrome 49.0.2623.87 \n * Google Chrome 5.0.306.0 \n * Google Chrome 5.0.306.1 \n * Google Chrome 5.0.307.1 \n * Google Chrome 5.0.307.10 \n * Google Chrome 5.0.307.11 \n * Google Chrome 5.0.307.3 \n * Google Chrome 5.0.307.4 \n * Google Chrome 5.0.307.5 \n * Google Chrome 5.0.307.6 \n * Google Chrome 5.0.307.7 \n * Google Chrome 5.0.307.8 \n * Google Chrome 5.0.307.9 \n * Google Chrome 5.0.308.0 \n * Google Chrome 5.0.309.0 \n * Google Chrome 5.0.313.0 \n * Google Chrome 5.0.314.0 \n * Google Chrome 5.0.314.1 \n * Google Chrome 5.0.315.0 \n * Google Chrome 5.0.316.0 \n * Google Chrome 5.0.317.0 \n * Google Chrome 5.0.317.1 \n * Google Chrome 5.0.317.2 \n * Google Chrome 5.0.318.0 \n * Google Chrome 5.0.319.0 \n * Google Chrome 5.0.320.0 \n * Google Chrome 5.0.321.0 \n * Google Chrome 5.0.322.0 \n * Google Chrome 5.0.322.1 \n * Google Chrome 5.0.322.2 \n * Google Chrome 5.0.323.0 \n * Google Chrome 5.0.324.0 \n * Google Chrome 5.0.325.0 \n * Google Chrome 5.0.326.0 \n * Google Chrome 5.0.327.0 \n * Google Chrome 5.0.328.0 \n * Google Chrome 5.0.329.0 \n * Google Chrome 5.0.330.0 \n * Google Chrome 5.0.332.0 \n * Google Chrome 5.0.333.0 \n * Google Chrome 5.0.334.0 \n * Google Chrome 5.0.335.0 \n * Google Chrome 5.0.335.1 \n * Google Chrome 5.0.335.2 \n * Google Chrome 5.0.335.3 \n * Google Chrome 5.0.335.4 \n * Google Chrome 5.0.336.0 \n * Google Chrome 5.0.337.0 \n * Google Chrome 5.0.338.0 \n * Google Chrome 5.0.339.0 \n * Google Chrome 5.0.340.0 \n * Google Chrome 5.0.341.0 \n * Google Chrome 5.0.342.0 \n * Google Chrome 5.0.342.1 \n * Google Chrome 5.0.342.2 \n * Google Chrome 5.0.342.3 \n * Google Chrome 5.0.342.4 \n * Google Chrome 5.0.342.5 \n * Google Chrome 5.0.342.6 \n * Google Chrome 5.0.342.7 \n * Google Chrome 5.0.342.7 Beta Mac \n * Google Chrome 5.0.342.8 \n * Google Chrome 5.0.342.9 \n * Google Chrome 5.0.343.0 \n * Google Chrome 5.0.344.0 \n * Google Chrome 5.0.345.0 \n * Google Chrome 5.0.346.0 \n * Google Chrome 5.0.347.0 \n * Google Chrome 5.0.348.0 \n * Google Chrome 5.0.349.0 \n * Google Chrome 5.0.350.0 \n * Google Chrome 5.0.350.1 \n * Google Chrome 5.0.351.0 \n * Google Chrome 5.0.353.0 \n * Google Chrome 5.0.354.0 \n * Google Chrome 5.0.354.1 \n * Google Chrome 5.0.355.0 \n * Google Chrome 5.0.356.0 \n * Google Chrome 5.0.356.1 \n * Google Chrome 5.0.356.2 \n * Google Chrome 5.0.357.0 \n * Google Chrome 5.0.358.0 \n * Google Chrome 5.0.359.0 \n * Google Chrome 5.0.360.0 \n * Google Chrome 5.0.360.3 \n * Google Chrome 5.0.360.4 \n * Google Chrome 5.0.360.5 \n * Google Chrome 5.0.361.0 \n * Google Chrome 5.0.362.0 \n * Google Chrome 5.0.363.0 \n * Google Chrome 5.0.364.0 \n * Google Chrome 5.0.365.0 \n * Google Chrome 5.0.366.0 \n * Google Chrome 5.0.366.1 \n * Google Chrome 5.0.366.2 \n * Google Chrome 5.0.366.3 \n * Google Chrome 5.0.366.4 \n * Google Chrome 5.0.367.0 \n * Google Chrome 5.0.368.0 \n * Google Chrome 5.0.369.0 \n * Google Chrome 5.0.369.1 \n * Google Chrome 5.0.369.2 \n * Google Chrome 5.0.370.0 \n * Google Chrome 5.0.371.0 \n * Google Chrome 5.0.372.0 \n * Google Chrome 5.0.373.0 \n * Google Chrome 5.0.374.0 \n * Google Chrome 5.0.375.0 \n * Google Chrome 5.0.375.1 \n * Google Chrome 5.0.375.10 \n * Google Chrome 5.0.375.11 \n * Google Chrome 5.0.375.12 \n * Google Chrome 5.0.375.125 \n * Google Chrome 5.0.375.126 \n * Google Chrome 5.0.375.127 \n * Google Chrome 5.0.375.13 \n * Google Chrome 5.0.375.14 \n * Google Chrome 5.0.375.15 \n * Google Chrome 5.0.375.16 \n * Google Chrome 5.0.375.17 \n * Google Chrome 5.0.375.18 \n * Google Chrome 5.0.375.19 \n * Google Chrome 5.0.375.2 \n * Google Chrome 5.0.375.20 \n * Google Chrome 5.0.375.21 \n * Google Chrome 5.0.375.22 \n * Google Chrome 5.0.375.23 \n * Google Chrome 5.0.375.25 \n * Google Chrome 5.0.375.26 \n * Google Chrome 5.0.375.27 \n * Google Chrome 5.0.375.28 \n * Google Chrome 5.0.375.29 \n * Google Chrome 5.0.375.3 \n * Google Chrome 5.0.375.30 \n * Google Chrome 5.0.375.31 \n * Google Chrome 5.0.375.32 \n * Google Chrome 5.0.375.33 \n * Google Chrome 5.0.375.34 \n * Google Chrome 5.0.375.35 \n * Google Chrome 5.0.375.36 \n * Google Chrome 5.0.375.37 \n * Google Chrome 5.0.375.38 \n * Google Chrome 5.0.375.39 \n * Google Chrome 5.0.375.4 \n * Google Chrome 5.0.375.40 \n * Google Chrome 5.0.375.41 \n * Google Chrome 5.0.375.42 \n * Google Chrome 5.0.375.43 \n * Google Chrome 5.0.375.44 \n * Google Chrome 5.0.375.45 \n * Google Chrome 5.0.375.46 \n * Google Chrome 5.0.375.47 \n * Google Chrome 5.0.375.48 \n * Google Chrome 5.0.375.49 \n * Google Chrome 5.0.375.5 \n * Google Chrome 5.0.375.50 \n * Google Chrome 5.0.375.51 \n * Google Chrome 5.0.375.52 \n * Google Chrome 5.0.375.53 \n * Google Chrome 5.0.375.54 \n * Google Chrome 5.0.375.55 \n * Google Chrome 5.0.375.56 \n * Google Chrome 5.0.375.57 \n * Google Chrome 5.0.375.58 \n * Google Chrome 5.0.375.59 \n * Google Chrome 5.0.375.6 \n * Google Chrome 5.0.375.60 \n * Google Chrome 5.0.375.61 \n * Google Chrome 5.0.375.62 \n * Google Chrome 5.0.375.63 \n * Google Chrome 5.0.375.64 \n * Google Chrome 5.0.375.65 \n * Google Chrome 5.0.375.66 \n * Google Chrome 5.0.375.67 \n * Google Chrome 5.0.375.68 \n * Google Chrome 5.0.375.69 \n * Google Chrome 5.0.375.7 \n * Google Chrome 5.0.375.70 \n * Google Chrome 5.0.375.71 \n * Google Chrome 5.0.375.72 \n * Google Chrome 5.0.375.73 \n * Google Chrome 5.0.375.74 \n * Google Chrome 5.0.375.75 \n * Google Chrome 5.0.375.76 \n * Google Chrome 5.0.375.77 \n * Google Chrome 5.0.375.78 \n * Google Chrome 5.0.375.79 \n * Google Chrome 5.0.375.8 \n * Google Chrome 5.0.375.80 \n * Google Chrome 5.0.375.81 \n * Google Chrome 5.0.375.82 \n * Google Chrome 5.0.375.83 \n * Google Chrome 5.0.375.84 \n * Google Chrome 5.0.375.85 \n * Google Chrome 5.0.375.86 \n * Google Chrome 5.0.375.87 \n * Google Chrome 5.0.375.88 \n * Google Chrome 5.0.375.89 \n * Google Chrome 5.0.375.9 \n * Google Chrome 5.0.375.90 \n * Google Chrome 5.0.375.91 \n * Google Chrome 5.0.375.92 \n * Google Chrome 5.0.375.93 \n * Google Chrome 5.0.375.94 \n * Google Chrome 5.0.375.95 \n * Google Chrome 5.0.375.96 \n * Google Chrome 5.0.375.97 \n * Google Chrome 5.0.375.98 \n * Google Chrome 5.0.375.99 \n * Google Chrome 5.0.376.0 \n * Google Chrome 5.0.378.0 \n * Google Chrome 5.0.379.0 \n * Google Chrome 5.0.380.0 \n * Google Chrome 5.0.381.0 \n * Google Chrome 5.0.382.0 \n * Google Chrome 5.0.382.3 \n * Google Chrome 5.0.383.0 \n * Google Chrome 5.0.384.0 \n * Google Chrome 5.0.385.0 \n * Google Chrome 5.0.386.0 \n * Google Chrome 5.0.387.0 \n * Google Chrome 5.0.390.0 \n * Google Chrome 5.0.391.0 \n * Google Chrome 5.0.392.0 \n * Google Chrome 5.0.393.0 \n * Google Chrome 5.0.394.0 \n * Google Chrome 5.0.395.0 \n * Google Chrome 5.0.396.0 \n * Google Chrome 50.0.2661.102 \n * Google Chrome 50.0.2661.75 \n * Google Chrome 50.0.2661.94 \n * Google Chrome 51.0.2704.103 \n * Google Chrome 51.0.2704.63 \n * Google Chrome 51.0.2704.79 \n * Google Chrome 52.0.2743.116 \n * Google Chrome 52.0.2743.82 \n * Google Chrome 53.0.2785.113 \n * Google Chrome 53.0.2785.143 \n * Google Chrome 53.0.2785.89 \n * Google Chrome 54.0.2840.59 \n * Google Chrome 54.0.2840.85 \n * Google Chrome 54.0.2840.87 \n * Google Chrome 54.0.2840.90 \n * Google Chrome 54.0.2840.98 \n * Google Chrome 54.0.2840.99 \n * Google Chrome 55.0.2883.75 \n * Google Chrome 56.0.2924.76 \n * Google Chrome 57.0.2987.133 \n * Google Chrome 57.0.2987.98 \n * Google Chrome 58.0.3029.81 \n * Google Chrome 58.0.3029.96 \n * Google Chrome 59.0.3071.104 \n * Google Chrome 59.0.3071.115 \n * Google Chrome 59.0.3071.86 \n * Google Chrome 6.0.397.0 \n * Google Chrome 6.0.398.0 \n * Google Chrome 6.0.399.0 \n * Google Chrome 6.0.400.0 \n * Google Chrome 6.0.401.0 \n * Google Chrome 6.0.401.1 \n * Google Chrome 6.0.403.0 \n * Google Chrome 6.0.404.0 \n * Google Chrome 6.0.404.1 \n * Google Chrome 6.0.404.2 \n * Google Chrome 6.0.405.0 \n * Google Chrome 6.0.406.0 \n * Google Chrome 6.0.407.0 \n * Google Chrome 6.0.408.0 \n * Google Chrome 6.0.408.1 \n * Google Chrome 6.0.408.10 \n * Google Chrome 6.0.408.2 \n * Google Chrome 6.0.408.3 \n * Google Chrome 6.0.408.4 \n * Google Chrome 6.0.408.5 \n * Google Chrome 6.0.408.6 \n * Google Chrome 6.0.408.7 \n * Google Chrome 6.0.408.8 \n * Google Chrome 6.0.408.9 \n * Google Chrome 6.0.409.0 \n * Google Chrome 6.0.410.0 \n * Google Chrome 6.0.411.0 \n * Google Chrome 6.0.412.0 \n * Google Chrome 6.0.413.0 \n * Google Chrome 6.0.414.0 \n * Google Chrome 6.0.415.0 \n * Google Chrome 6.0.415.1 \n * Google Chrome 6.0.416.0 \n * Google Chrome 6.0.416.1 \n * Google Chrome 6.0.417.0 \n * Google Chrome 6.0.418.0 \n * Google Chrome 6.0.418.1 \n * Google Chrome 6.0.418.2 \n * Google Chrome 6.0.418.3 \n * Google Chrome 6.0.418.4 \n * Google Chrome 6.0.418.5 \n * Google Chrome 6.0.418.6 \n * Google Chrome 6.0.418.7 \n * Google Chrome 6.0.418.8 \n * Google Chrome 6.0.418.9 \n * Google Chrome 6.0.419.0 \n * Google Chrome 6.0.421.0 \n * Google Chrome 6.0.422.0 \n * Google Chrome 6.0.423.0 \n * Google Chrome 6.0.424.0 \n * Google Chrome 6.0.425.0 \n * Google Chrome 6.0.426.0 \n * Google Chrome 6.0.427.0 \n * Google Chrome 6.0.428.0 \n * Google Chrome 6.0.430.0 \n * Google Chrome 6.0.431.0 \n * Google Chrome 6.0.432.0 \n * Google Chrome 6.0.433.0 \n * Google Chrome 6.0.434.0 \n * Google Chrome 6.0.435.0 \n * Google Chrome 6.0.436.0 \n * Google Chrome 6.0.437.0 \n * Google Chrome 6.0.437.1 \n * Google Chrome 6.0.437.2 \n * Google Chrome 6.0.437.3 \n * Google Chrome 6.0.438.0 \n * Google Chrome 6.0.440.0 \n * Google Chrome 6.0.441.0 \n * Google Chrome 6.0.443.0 \n * Google Chrome 6.0.444.0 \n * Google Chrome 6.0.445.0 \n * Google Chrome 6.0.445.1 \n * Google Chrome 6.0.446.0 \n * Google Chrome 6.0.447.0 \n * Google Chrome 6.0.447.1 \n * Google Chrome 6.0.447.2 \n * Google Chrome 6.0.449.0 \n * Google Chrome 6.0.450.0 \n * Google Chrome 6.0.450.1 \n * Google Chrome 6.0.450.2 \n * Google Chrome 6.0.450.3 \n * Google Chrome 6.0.450.4 \n * Google Chrome 6.0.451.0 \n * Google Chrome 6.0.452.0 \n * Google Chrome 6.0.452.1 \n * Google Chrome 6.0.453.0 \n * Google Chrome 6.0.453.1 \n * Google Chrome 6.0.454.0 \n * Google Chrome 6.0.455.0 \n * Google Chrome 6.0.456.0 \n * Google Chrome 6.0.457.0 \n * Google Chrome 6.0.458.0 \n * Google Chrome 6.0.458.1 \n * Google Chrome 6.0.458.2 \n * Google Chrome 6.0.459.0 \n * Google Chrome 6.0.460.0 \n * Google Chrome 6.0.461.0 \n * Google Chrome 6.0.462.0 \n * Google Chrome 6.0.464.1 \n * Google Chrome 6.0.465.1 \n * Google Chrome 6.0.465.2 \n * Google Chrome 6.0.466.0 \n * Google Chrome 6.0.466.1 \n * Google Chrome 6.0.466.2 \n * Google Chrome 6.0.466.3 \n * Google Chrome 6.0.466.4 \n * Google Chrome 6.0.466.5 \n * Google Chrome 6.0.466.6 \n * Google Chrome 6.0.467.0 \n * Google Chrome 6.0.469.0 \n * Google Chrome 6.0.470.0 \n * Google Chrome 6.0.471.0 \n * Google Chrome 6.0.472.0 \n * Google Chrome 6.0.472.1 \n * Google Chrome 6.0.472.10 \n * Google Chrome 6.0.472.11 \n * Google Chrome 6.0.472.12 \n * Google Chrome 6.0.472.13 \n * Google Chrome 6.0.472.14 \n * Google Chrome 6.0.472.15 \n * Google Chrome 6.0.472.16 \n * Google Chrome 6.0.472.17 \n * Google Chrome 6.0.472.18 \n * Google Chrome 6.0.472.19 \n * Google Chrome 6.0.472.2 \n * Google Chrome 6.0.472.20 \n * Google Chrome 6.0.472.21 \n * Google Chrome 6.0.472.22 \n * Google Chrome 6.0.472.23 \n * Google Chrome 6.0.472.24 \n * Google Chrome 6.0.472.25 \n * Google Chrome 6.0.472.26 \n * Google Chrome 6.0.472.27 \n * Google Chrome 6.0.472.28 \n * Google Chrome 6.0.472.29 \n * Google Chrome 6.0.472.3 \n * Google Chrome 6.0.472.30 \n * Google Chrome 6.0.472.31 \n * Google Chrome 6.0.472.32 \n * Google Chrome 6.0.472.33 \n * Google Chrome 6.0.472.34 \n * Google Chrome 6.0.472.35 \n * Google Chrome 6.0.472.36 \n * Google Chrome 6.0.472.37 \n * Google Chrome 6.0.472.38 \n * Google Chrome 6.0.472.39 \n * Google Chrome 6.0.472.4 \n * Google Chrome 6.0.472.40 \n * Google Chrome 6.0.472.41 \n * Google Chrome 6.0.472.42 \n * Google Chrome 6.0.472.43 \n * Google Chrome 6.0.472.44 \n * Google Chrome 6.0.472.45 \n * Google Chrome 6.0.472.46 \n * Google Chrome 6.0.472.47 \n * Google Chrome 6.0.472.48 \n * Google Chrome 6.0.472.49 \n * Google Chrome 6.0.472.5 \n * Google Chrome 6.0.472.50 \n * Google Chrome 6.0.472.51 \n * Google Chrome 6.0.472.52 \n * Google Chrome 6.0.472.53 \n * Google Chrome 6.0.472.54 \n * Google Chrome 6.0.472.55 \n * Google Chrome 6.0.472.56 \n * Google Chrome 6.0.472.57 \n * Google Chrome 6.0.472.58 \n * Google Chrome 6.0.472.59 \n * Google Chrome 6.0.472.6 \n * Google Chrome 6.0.472.60 \n * Google Chrome 6.0.472.61 \n * Google Chrome 6.0.472.62 \n * Google Chrome 6.0.472.63 \n * Google Chrome 6.0.472.7 \n * Google Chrome 6.0.472.8 \n * Google Chrome 6.0.472.9 \n * Google Chrome 6.0.473.0 \n * Google Chrome 6.0.474.0 \n * Google Chrome 6.0.475.0 \n * Google Chrome 6.0.476.0 \n * Google Chrome 6.0.477.0 \n * Google Chrome 6.0.478.0 \n * Google Chrome 6.0.479.0 \n * Google Chrome 6.0.480.0 \n * Google Chrome 6.0.481.0 \n * Google Chrome 6.0.482.0 \n * Google Chrome 6.0.483.0 \n * Google Chrome 6.0.484.0 \n * Google Chrome 6.0.485.0 \n * Google Chrome 6.0.486.0 \n * Google Chrome 6.0.487.0 \n * Google Chrome 6.0.488.0 \n * Google Chrome 6.0.489.0 \n * Google Chrome 6.0.490.0 \n * Google Chrome 6.0.490.1 \n * Google Chrome 6.0.491.0 \n * Google Chrome 6.0.492.0 \n * Google Chrome 6.0.493.0 \n * Google Chrome 6.0.494.0 \n * Google Chrome 6.0.495.0 \n * Google Chrome 6.0.495.1 \n * Google Chrome 6.0.496.0 \n * Google Chrome 60.0.3080.5 \n * Google Chrome 60.0.3112.78 \n * Google Chrome 60.0.3112.80 \n * Google Chrome 61.0.3163.100 \n * Google Chrome 61.0.3163.79 \n * Google Chrome 62.0.3202.62 \n * Google Chrome 62.0.3202.75 \n * Google Chrome 62.0.3202.89 \n * Google Chrome 64 \n * Google Chrome 65 \n * Google Chrome 65.72 \n * Google Chrome 7.0.497.0 \n * Google Chrome 7.0.498.0 \n * Google Chrome 7.0.499.0 \n * Google Chrome 7.0.499.1 \n * Google Chrome 7.0.500.0 \n * Google Chrome 7.0.500.1 \n * Google Chrome 7.0.503.0 \n * Google Chrome 7.0.503.1 \n * Google Chrome 7.0.504.0 \n * Google Chrome 7.0.505.0 \n * Google Chrome 7.0.506.0 \n * Google Chrome 7.0.507.0 \n * Google Chrome 7.0.507.1 \n * Google Chrome 7.0.507.2 \n * Google Chrome 7.0.507.3 \n * Google Chrome 7.0.509.0 \n * Google Chrome 7.0.510.0 \n * Google Chrome 7.0.511.1 \n * Google Chrome 7.0.511.2 \n * Google Chrome 7.0.511.4 \n * Google Chrome 7.0.512.0 \n * Google Chrome 7.0.513.0 \n * Google Chrome 7.0.514.0 \n * Google Chrome 7.0.514.1 \n * Google Chrome 7.0.515.0 \n * Google Chrome 7.0.516.0 \n * Google Chrome 7.0.517.0 \n * Google Chrome 7.0.517.10 \n * Google Chrome 7.0.517.11 \n * Google Chrome 7.0.517.12 \n * Google Chrome 7.0.517.13 \n * Google Chrome 7.0.517.14 \n * Google Chrome 7.0.517.16 \n * Google Chrome 7.0.517.17 \n * Google Chrome 7.0.517.18 \n * Google Chrome 7.0.517.19 \n * Google Chrome 7.0.517.2 \n * Google Chrome 7.0.517.20 \n * Google Chrome 7.0.517.21 \n * Google Chrome 7.0.517.22 \n * Google Chrome 7.0.517.23 \n * Google Chrome 7.0.517.24 \n * Google Chrome 7.0.517.25 \n * Google Chrome 7.0.517.26 \n * Google Chrome 7.0.517.27 \n * Google Chrome 7.0.517.28 \n * Google Chrome 7.0.517.29 \n * Google Chrome 7.0.517.30 \n * Google Chrome 7.0.517.31 \n * Google Chrome 7.0.517.32 \n * Google Chrome 7.0.517.33 \n * Google Chrome 7.0.517.34 \n * Google Chrome 7.0.517.35 \n * Google Chrome 7.0.517.36 \n * Google Chrome 7.0.517.37 \n * Google Chrome 7.0.517.38 \n * Google Chrome 7.0.517.39 \n * Google Chrome 7.0.517.4 \n * Google Chrome 7.0.517.40 \n * Google Chrome 7.0.517.41 \n * Google Chrome 7.0.517.42 \n * Google Chrome 7.0.517.43 \n * Google Chrome 7.0.517.44 \n * Google Chrome 7.0.517.5 \n * Google Chrome 7.0.517.6 \n * Google Chrome 7.0.517.7 \n * Google Chrome 7.0.517.8 \n * Google Chrome 7.0.517.9 \n * Google Chrome 7.0.518.0 \n * Google Chrome 7.0.519.0 \n * Google Chrome 7.0.520.0 \n * Google Chrome 7.0.521.0 \n * Google Chrome 7.0.522.0 \n * Google Chrome 7.0.524.0 \n * Google Chrome 7.0.525.0 \n * Google Chrome 7.0.526.0 \n * Google Chrome 7.0.528.0 \n * Google Chrome 7.0.529.0 \n * Google Chrome 7.0.529.1 \n * Google Chrome 7.0.529.2 \n * Google Chrome 7.0.530.0 \n * Google Chrome 7.0.531.0 \n * Google Chrome 7.0.531.1 \n * Google Chrome 7.0.531.2 \n * Google Chrome 7.0.535.1 \n * Google Chrome 7.0.535.2 \n * Google Chrome 7.0.536.0 \n * Google Chrome 7.0.536.1 \n * Google Chrome 7.0.536.2 \n * Google Chrome 7.0.536.3 \n * Google Chrome 7.0.536.4 \n * Google Chrome 7.0.537.0 \n * Google Chrome 7.0.538.0 \n * Google Chrome 7.0.539.0 \n * Google Chrome 7.0.540.0 \n * Google Chrome 7.0.541.0 \n * Google Chrome 7.0.542.0 \n * Google Chrome 7.0.544.0 \n * Google Chrome 7.0.547.0 \n * Google Chrome 7.0.547.1 \n * Google Chrome 7.0.548.0 \n * Google Chrome 8.0.549.0 \n * Google Chrome 8.0.550.0 \n * Google Chrome 8.0.551.0 \n * Google Chrome 8.0.551.1 \n * Google Chrome 8.0.552.0 \n * Google Chrome 8.0.552.1 \n * Google Chrome 8.0.552.10 \n * Google Chrome 8.0.552.100 \n * Google Chrome 8.0.552.101 \n * Google Chrome 8.0.552.102 \n * Google Chrome 8.0.552.103 \n * Google Chrome 8.0.552.104 \n * Google Chrome 8.0.552.105 \n * Google Chrome 8.0.552.11 \n * Google Chrome 8.0.552.12 \n * Google Chrome 8.0.552.13 \n * Google Chrome 8.0.552.14 \n * Google Chrome 8.0.552.15 \n * Google Chrome 8.0.552.16 \n * Google Chrome 8.0.552.17 \n * Google Chrome 8.0.552.18 \n * Google Chrome 8.0.552.19 \n * Google Chrome 8.0.552.2 \n * Google Chrome 8.0.552.20 \n * Google Chrome 8.0.552.200 \n * Google Chrome 8.0.552.201 \n * Google Chrome 8.0.552.202 \n * Google Chrome 8.0.552.203 \n * Google Chrome 8.0.552.204 \n * Google Chrome 8.0.552.205 \n * Google Chrome 8.0.552.206 \n * Google Chrome 8.0.552.207 \n * Google Chrome 8.0.552.208 \n * Google Chrome 8.0.552.209 \n * Google Chrome 8.0.552.21 \n * Google Chrome 8.0.552.210 \n * Google Chrome 8.0.552.211 \n * Google Chrome 8.0.552.212 \n * Google Chrome 8.0.552.213 \n * Google Chrome 8.0.552.214 \n * Google Chrome 8.0.552.215 \n * Google Chrome 8.0.552.216 \n * Google Chrome 8.0.552.217 \n * Google Chrome 8.0.552.218 \n * Google Chrome 8.0.552.219 \n * Google Chrome 8.0.552.220 \n * Google Chrome 8.0.552.221 \n * Google Chrome 8.0.552.222 \n * Google Chrome 8.0.552.223 \n * Google Chrome 8.0.552.224 \n * Google Chrome 8.0.552.225 \n * Google Chrome 8.0.552.226 \n * Google Chrome 8.0.552.227 \n * Google Chrome 8.0.552.228 \n * Google Chrome 8.0.552.229 \n * Google Chrome 8.0.552.23 \n * Google Chrome 8.0.552.230 \n * Google Chrome 8.0.552.231 \n * Google Chrome 8.0.552.232 \n * Google Chrome 8.0.552.233 \n * Google Chrome 8.0.552.234 \n * Google Chrome 8.0.552.235 \n * Google Chrome 8.0.552.237 \n * Google Chrome 8.0.552.24 \n * Google Chrome 8.0.552.25 \n * Google Chrome 8.0.552.26 \n * Google Chrome 8.0.552.27 \n * Google Chrome 8.0.552.28 \n * Google Chrome 8.0.552.29 \n * Google Chrome 8.0.552.300 \n * Google Chrome 8.0.552.301 \n * Google Chrome 8.0.552.302 \n * Google Chrome 8.0.552.303 \n * Google Chrome 8.0.552.304 \n * Google Chrome 8.0.552.305 \n * Google Chrome 8.0.552.306 \n * Google Chrome 8.0.552.307 \n * Google Chrome 8.0.552.308 \n * Google Chrome 8.0.552.309 \n * Google Chrome 8.0.552.310 \n * Google Chrome 8.0.552.311 \n * Google Chrome 8.0.552.312 \n * Google Chrome 8.0.552.313 \n * Google Chrome 8.0.552.315 \n * Google Chrome 8.0.552.316 \n * Google Chrome 8.0.552.317 \n * Google Chrome 8.0.552.318 \n * Google Chrome 8.0.552.319 \n * Google Chrome 8.0.552.320 \n * Google Chrome 8.0.552.321 \n * Google Chrome 8.0.552.322 \n * Google Chrome 8.0.552.323 \n * Google Chrome 8.0.552.324 \n * Google Chrome 8.0.552.325 \n * Google Chrome 8.0.552.326 \n * Google Chrome 8.0.552.327 \n * Google Chrome 8.0.552.328 \n * Google Chrome 8.0.552.329 \n * Google Chrome 8.0.552.330 \n * Google Chrome 8.0.552.331 \n * Google Chrome 8.0.552.332 \n * Google Chrome 8.0.552.333 \n * Google Chrome 8.0.552.334 \n * Google Chrome 8.0.552.335 \n * Google Chrome 8.0.552.336 \n * Google Chrome 8.0.552.337 \n * Google Chrome 8.0.552.338 \n * Google Chrome 8.0.552.339 \n * Google Chrome 8.0.552.340 \n * Google Chrome 8.0.552.341 \n * Google Chrome 8.0.552.342 \n * Google Chrome 8.0.552.343 \n * Google Chrome 8.0.552.344 \n * Google Chrome 8.0.552.35 \n * Google Chrome 8.0.552.4 \n * Google Chrome 8.0.552.40 \n * Google Chrome 8.0.552.41 \n * Google Chrome 8.0.552.42 \n * Google Chrome 8.0.552.43 \n * Google Chrome 8.0.552.44 \n * Google Chrome 8.0.552.45 \n * Google Chrome 8.0.552.47 \n * Google Chrome 8.0.552.48 \n * Google Chrome 8.0.552.49 \n * Google Chrome 8.0.552.5 \n * Google Chrome 8.0.552.50 \n * Google Chrome 8.0.552.51 \n * Google Chrome 8.0.552.52 \n * Google Chrome 8.0.552.6 \n * Google Chrome 8.0.552.7 \n * Google Chrome 8.0.552.8 \n * Google Chrome 8.0.552.9 \n * Google Chrome 8.0.553.0 \n * Google Chrome 8.0.554.0 \n * Google Chrome 8.0.556.0 \n * Google Chrome 8.0.557.0 \n * Google Chrome 8.0.558.0 \n * Google Chrome 8.0.559.0 \n * Google Chrome 8.0.560.0 \n * Google Chrome 8.0.561.0 \n * Google Chrome 9 \n * Google Chrome 9.0.562.0 \n * Google Chrome 9.0.563.0 \n * Google Chrome 9.0.564.0 \n * Google Chrome 9.0.565.0 \n * Google Chrome 9.0.566.0 \n * Google Chrome 9.0.567.0 \n * Google Chrome 9.0.568.0 \n * Google Chrome 9.0.569.0 \n * Google Chrome 9.0.570.0 \n * Google Chrome 9.0.570.1 \n * Google Chrome 9.0.571.0 \n * Google Chrome 9.0.572.0 \n * Google Chrome 9.0.572.1 \n * Google Chrome 9.0.573.0 \n * Google Chrome 9.0.574.0 \n * Google Chrome 9.0.575.0 \n * Google Chrome 9.0.576.0 \n * Google Chrome 9.0.577.0 \n * Google Chrome 9.0.578.0 \n * Google Chrome 9.0.579.0 \n * Google Chrome 9.0.580.0 \n * Google Chrome 9.0.581.0 \n * Google Chrome 9.0.582.0 \n * Google Chrome 9.0.583.0 \n * Google Chrome 9.0.584.0 \n * Google Chrome 9.0.585.0 \n * Google Chrome 9.0.586.0 \n * Google Chrome 9.0.587.0 \n * Google Chrome 9.0.587.1 \n * Google Chrome 9.0.588.0 \n * Google Chrome 9.0.589.0 \n * Google Chrome 9.0.590.0 \n * Google Chrome 9.0.591.0 \n * Google Chrome 9.0.592.0 \n * Google Chrome 9.0.593.0 \n * Google Chrome 9.0.594.0 \n * Google Chrome 9.0.595.0 \n * Google Chrome 9.0.596.0 \n * Google Chrome 9.0.597.0 \n * Google Chrome 9.0.597.1 \n * Google Chrome 9.0.597.10 \n * Google Chrome 9.0.597.100 \n * Google Chrome 9.0.597.101 \n * Google Chrome 9.0.597.102 \n * Google Chrome 9.0.597.106 \n * Google Chrome 9.0.597.107 \n * Google Chrome 9.0.597.11 \n * Google Chrome 9.0.597.12 \n * Google Chrome 9.0.597.14 \n * Google Chrome 9.0.597.15 \n * Google Chrome 9.0.597.16 \n * Google Chrome 9.0.597.17 \n * Google Chrome 9.0.597.18 \n * Google Chrome 9.0.597.19 \n * Google Chrome 9.0.597.2 \n * Google Chrome 9.0.597.20 \n * Google Chrome 9.0.597.21 \n * Google Chrome 9.0.597.22 \n * Google Chrome 9.0.597.23 \n * Google Chrome 9.0.597.24 \n * Google Chrome 9.0.597.25 \n * Google Chrome 9.0.597.26 \n * Google Chrome 9.0.597.27 \n * Google Chrome 9.0.597.28 \n * Google Chrome 9.0.597.29 \n * Google Chrome 9.0.597.30 \n * Google Chrome 9.0.597.31 \n * Google Chrome 9.0.597.32 \n * Google Chrome 9.0.597.33 \n * Google Chrome 9.0.597.34 \n * Google Chrome 9.0.597.35 \n * Google Chrome 9.0.597.36 \n * Google Chrome 9.0.597.37 \n * Google Chrome 9.0.597.38 \n * Google Chrome 9.0.597.39 \n * Google Chrome 9.0.597.4 \n * Google Chrome 9.0.597.40 \n * Google Chrome 9.0.597.41 \n * Google Chrome 9.0.597.42 \n * Google Chrome 9.0.597.44 \n * Google Chrome 9.0.597.45 \n * Google Chrome 9.0.597.46 \n * Google Chrome 9.0.597.47 \n * Google Chrome 9.0.597.5 \n * Google Chrome 9.0.597.54 \n * Google Chrome 9.0.597.55 \n * Google Chrome 9.0.597.56 \n * Google Chrome 9.0.597.57 \n * Google Chrome 9.0.597.58 \n * Google Chrome 9.0.597.59 \n * Google Chrome 9.0.597.60 \n * Google Chrome 9.0.597.62 \n * Google Chrome 9.0.597.63 \n * Google Chrome 9.0.597.64 \n * Google Chrome 9.0.597.65 \n * Google Chrome 9.0.597.66 \n * Google Chrome 9.0.597.67 \n * Google Chrome 9.0.597.68 \n * Google Chrome 9.0.597.69 \n * Google Chrome 9.0.597.7 \n * Google Chrome 9.0.597.70 \n * Google Chrome 9.0.597.71 \n * Google Chrome 9.0.597.72 \n * Google Chrome 9.0.597.73 \n * Google Chrome 9.0.597.74 \n * Google Chrome 9.0.597.75 \n * Google Chrome 9.0.597.76 \n * Google Chrome 9.0.597.77 \n * Google Chrome 9.0.597.78 \n * Google Chrome 9.0.597.79 \n * Google Chrome 9.0.597.96 \n * Google Chrome 9.0.597.97 \n * Google Chrome 9.0.597.98 \n * Google Chrome 9.0.597.99 \n * Google Chrome 9.0.598.0 \n * Google Chrome 9.0.599.0 \n * Google Chrome 9.0.600.0 \n * Google Chrome OS 0.10.140.0 \n * Google Chrome OS 0.9.110.6 \n * Google Chrome OS 0.9.126.0 \n * Google Chrome OS 0.9.128.3 \n * Google Chrome OS 0.9.130.14 Beta \n * Google Chrome OS 0.9.131.0 \n * Google Chrome OS 0.9.134.14 \n * Google Chrome OS 20.0.1132.0 \n * Google Chrome OS 20.0.1132.1 \n * Google Chrome OS 20.0.1132.10 \n * Google Chrome OS 20.0.1132.11 \n * Google Chrome OS 20.0.1132.12 \n * Google Chrome OS 20.0.1132.13 \n * Google Chrome OS 20.0.1132.14 \n * Google Chrome OS 20.0.1132.15 \n * Google Chrome OS 20.0.1132.16 \n * Google Chrome OS 20.0.1132.17 \n * Google Chrome OS 20.0.1132.18 \n * Google Chrome OS 20.0.1132.19 \n * Google Chrome OS 20.0.1132.2 \n * Google Chrome OS 20.0.1132.20 \n * Google Chrome OS 20.0.1132.21 \n * Google Chrome OS 20.0.1132.3 \n * Google Chrome OS 20.0.1132.4 \n * Google Chrome OS 20.0.1132.5 \n * Google Chrome OS 20.0.1132.6 \n * Google Chrome OS 20.0.1132.7 \n * Google Chrome OS 20.0.1132.8 \n * Google Chrome OS 20.0.1132.9 \n * Google Chrome OS 21.0.1180.0 \n * Google Chrome OS 21.0.1180.1 \n * Google Chrome OS 21.0.1180.10 \n * Google Chrome OS 21.0.1180.11 \n * Google Chrome OS 21.0.1180.13 \n * Google Chrome OS 21.0.1180.14 \n * Google Chrome OS 21.0.1180.15 \n * Google Chrome OS 21.0.1180.17 \n * Google Chrome OS 21.0.1180.18 \n * Google Chrome OS 21.0.1180.2 \n * Google Chrome OS 21.0.1180.3 \n * Google Chrome OS 21.0.1180.31 \n * Google Chrome OS 21.0.1180.32 \n * Google Chrome OS 21.0.1180.33 \n * Google Chrome OS 21.0.1180.34 \n * Google Chrome OS 21.0.1180.35 \n * Google Chrome OS 21.0.1180.36 \n * Google Chrome OS 21.0.1180.37 \n * Google Chrome OS 21.0.1180.38 \n * Google Chrome OS 21.0.1180.39 \n * Google Chrome OS 21.0.1180.4 \n * Google Chrome OS 21.0.1180.41 \n * Google Chrome OS 21.0.1180.46 \n * Google Chrome OS 21.0.1180.47 \n * Google Chrome OS 21.0.1180.48 \n * Google Chrome OS 21.0.1180.49 \n * Google Chrome OS 21.0.1180.5 \n * Google Chrome OS 21.0.1180.50 \n * Google Chrome OS 21.0.1180.51 \n * Google Chrome OS 21.0.1180.52 \n * Google Chrome OS 21.0.1180.53 \n * Google Chrome OS 21.0.1180.54 \n * Google Chrome OS 21.0.1180.55 \n * Google Chrome OS 21.0.1180.56 \n * Google Chrome OS 21.0.1180.57 \n * Google Chrome OS 21.0.1180.6 \n * Google Chrome OS 21.0.1180.7 \n * Google Chrome OS 21.0.1180.79 \n * Google Chrome OS 21.0.1180.8 \n * Google Chrome OS 21.0.1180.81 \n * Google Chrome OS 21.0.1180.9 \n * Google Chrome OS 21.0.1183.0 \n * Google Chrome OS 23.0.1271.94 \n * Google Chrome OS 25.0.1364.0 \n * Google Chrome OS 25.0.1364.1 \n * Google Chrome OS 25.0.1364.10 \n * Google Chrome OS 25.0.1364.108 \n * Google Chrome OS 25.0.1364.11 \n * Google Chrome OS 25.0.1364.110 \n * Google Chrome OS 25.0.1364.112 \n * Google Chrome OS 25.0.1364.113 \n * Google Chrome OS 25.0.1364.114 \n * Google Chrome OS 25.0.1364.115 \n * Google Chrome OS 25.0.1364.116 \n * Google Chrome OS 25.0.1364.117 \n * Google Chrome OS 25.0.1364.118 \n * Google Chrome OS 25.0.1364.119 \n * Google Chrome OS 25.0.1364.12 \n * Google Chrome OS 25.0.1364.120 \n * Google Chrome OS 25.0.1364.121 \n * Google Chrome OS 25.0.1364.122 \n * Google Chrome OS 25.0.1364.123 \n * Google Chrome OS 25.0.1364.124 \n * Google Chrome OS 25.0.1364.125 \n * Google Chrome OS 25.0.1364.126 \n * Google Chrome OS 25.0.1364.13 \n * Google Chrome OS 25.0.1364.14 \n * Google Chrome OS 25.0.1364.15 \n * Google Chrome OS 25.0.1364.152 \n * Google Chrome OS 25.0.1364.154 \n * Google Chrome OS 25.0.1364.155 \n * Google Chrome OS 25.0.1364.156 \n * Google Chrome OS 25.0.1364.159 \n * Google Chrome OS 25.0.1364.16 \n * Google Chrome OS 25.0.1364.160 \n * Google Chrome OS 25.0.1364.161 \n * Google Chrome OS 25.0.1364.168 \n * Google Chrome OS 25.0.1364.169 \n * Google Chrome OS 25.0.1364.17 \n * Google Chrome OS 25.0.1364.170 \n * Google Chrome OS 25.0.1364.171 \n * Google Chrome OS 25.0.1364.172 \n * Google Chrome OS 25.0.1364.173 \n * Google Chrome OS 25.0.1364.18 \n * Google Chrome OS 25.0.1364.19 \n * Google Chrome OS 25.0.1364.2 \n * Google Chrome OS 25.0.1364.20 \n * Google Chrome OS 25.0.1364.21 \n * Google Chrome OS 25.0.1364.22 \n * Google Chrome OS 25.0.1364.23 \n * Google Chrome OS 25.0.1364.24 \n * Google Chrome OS 25.0.1364.25 \n * Google Chrome OS 25.0.1364.26 \n * Google Chrome OS 25.0.1364.27 \n * Google Chrome OS 25.0.1364.28 \n * Google Chrome OS 25.0.1364.29 \n * Google Chrome OS 25.0.1364.3 \n * Google Chrome OS 25.0.1364.30 \n * Google Chrome OS 25.0.1364.31 \n * Google Chrome OS 25.0.1364.32 \n * Google Chrome OS 25.0.1364.33 \n * Google Chrome OS 25.0.1364.34 \n * Google Chrome OS 25.0.1364.35 \n * Google Chrome OS 25.0.1364.36 \n * Google Chrome OS 25.0.1364.37 \n * Google Chrome OS 25.0.1364.38 \n * Google Chrome OS 25.0.1364.39 \n * Google Chrome OS 25.0.1364.40 \n * Google Chrome OS 25.0.1364.41 \n * Google Chrome OS 25.0.1364.42 \n * Google Chrome OS 25.0.1364.43 \n * Google Chrome OS 25.0.1364.44 \n * Google Chrome OS 25.0.1364.45 \n * Google Chrome OS 25.0.1364.46 \n * Google Chrome OS 25.0.1364.47 \n * Google Chrome OS 25.0.1364.48 \n * Google Chrome OS 25.0.1364.49 \n * Google Chrome OS 25.0.1364.5 \n * Google Chrome OS 25.0.1364.50 \n * Google Chrome OS 25.0.1364.51 \n * Google Chrome OS 25.0.1364.52 \n * Google Chrome OS 25.0.1364.53 \n * Google Chrome OS 25.0.1364.54 \n * Google Chrome OS 25.0.1364.55 \n * Google Chrome OS 25.0.1364.56 \n * Google Chrome OS 25.0.1364.57 \n * Google Chrome OS 25.0.1364.58 \n * Google Chrome OS 25.0.1364.61 \n * Google Chrome OS 25.0.1364.62 \n * Google Chrome OS 25.0.1364.63 \n * Google Chrome OS 25.0.1364.65 \n * Google Chrome OS 25.0.1364.66 \n * Google Chrome OS 25.0.1364.67 \n * Google Chrome OS 25.0.1364.68 \n * Google Chrome OS 25.0.1364.7 \n * Google Chrome OS 25.0.1364.70 \n * Google Chrome OS 25.0.1364.72 \n * Google Chrome OS 25.0.1364.73 \n * Google Chrome OS 25.0.1364.74 \n * Google Chrome OS 25.0.1364.75 \n * Google Chrome OS 25.0.1364.76 \n * Google Chrome OS 25.0.1364.77 \n * Google Chrome OS 25.0.1364.78 \n * Google Chrome OS 25.0.1364.79 \n * Google Chrome OS 25.0.1364.8 \n * Google Chrome OS 25.0.1364.80 \n * Google Chrome OS 25.0.1364.81 \n * Google Chrome OS 25.0.1364.82 \n * Google Chrome OS 25.0.1364.84 \n * Google Chrome OS 25.0.1364.85 \n * Google Chrome OS 25.0.1364.86 \n * Google Chrome OS 25.0.1364.87 \n * Google Chrome OS 25.0.1364.88 \n * Google Chrome OS 25.0.1364.89 \n * Google Chrome OS 25.0.1364.9 \n * Google Chrome OS 25.0.1364.90 \n * Google Chrome OS 25.0.1364.91 \n * Google Chrome OS 25.0.1364.92 \n * Google Chrome OS 25.0.1364.93 \n * Google Chrome OS 25.0.1364.95 \n * Google Chrome OS 25.0.1364.98 \n * Google Chrome OS 25.0.1364.99 \n * Google Chrome OS 26.0.1410.0 \n * Google Chrome OS 26.0.1410.1 \n * Google Chrome OS 26.0.1410.10 \n * Google Chrome OS 26.0.1410.11 \n * Google Chrome OS 26.0.1410.12 \n * Google Chrome OS 26.0.1410.14 \n * Google Chrome OS 26.0.1410.15 \n * Google Chrome OS 26.0.1410.16 \n * Google Chrome OS 26.0.1410.17 \n * Google Chrome OS 26.0.1410.18 \n * Google Chrome OS 26.0.1410.19 \n * Google Chrome OS 26.0.1410.20 \n * Google Chrome OS 26.0.1410.21 \n * Google Chrome OS 26.0.1410.22 \n * Google Chrome OS 26.0.1410.23 \n * Google Chrome OS 26.0.1410.24 \n * Google Chrome OS 26.0.1410.25 \n * Google Chrome OS 26.0.1410.26 \n * Google Chrome OS 26.0.1410.27 \n * Google Chrome OS 26.0.1410.28 \n * Google Chrome OS 26.0.1410.29 \n * Google Chrome OS 26.0.1410.3 \n * Google Chrome OS 26.0.1410.30 \n * Google Chrome OS 26.0.1410.31 \n * Google Chrome OS 26.0.1410.32 \n * Google Chrome OS 26.0.1410.33 \n * Google Chrome OS 26.0.1410.34 \n * Google Chrome OS 26.0.1410.35 \n * Google Chrome OS 26.0.1410.36 \n * Google Chrome OS 26.0.1410.37 \n * Google Chrome OS 26.0.1410.38 \n * Google Chrome OS 26.0.1410.39 \n * Google Chrome OS 26.0.1410.4 \n * Google Chrome OS 26.0.1410.40 \n * Google Chrome OS 26.0.1410.41 \n * Google Chrome OS 26.0.1410.42 \n * Google Chrome OS 26.0.1410.43 \n * Google Chrome OS 26.0.1410.44 \n * Google Chrome OS 26.0.1410.45 \n * Google Chrome OS 26.0.1410.46 \n * Google Chrome OS 26.0.1410.47 \n * Google Chrome OS 26.0.1410.48 \n * Google Chrome OS 26.0.1410.49 \n * Google Chrome OS 26.0.1410.5 \n * Google Chrome OS 26.0.1410.50 \n * Google Chrome OS 26.0.1410.51 \n * Google Chrome OS 26.0.1410.52 \n * Google Chrome OS 26.0.1410.54 \n * Google Chrome OS 26.0.1410.55 \n * Google Chrome OS 26.0.1410.56 \n * Google Chrome OS 26.0.1410.57 \n * Google Chrome OS 26.0.1410.6 \n * Google Chrome OS 26.0.1410.7 \n * Google Chrome OS 26.0.1410.8 \n * Google Chrome OS 26.0.1410.9 \n * Google Chrome OS 28.0.1500.71 \n * Google Chrome OS 28.0.1500.95 \n * Google Chrome OS 32.0.1700.95 \n * Google Chrome OS 33.0.1750.152 \n * Google Chrome OS 35.0.1916.155 \n * Google Chrome OS 37.0.2062.119 \n * Google Chrome OS 40.0.2214.114 \n * Google Chrome OS 48.0.2564.116 \n * Google Chrome OS 48.0.2564.92 \n * Google Chrome OS 52.0.2743.85 \n * Google Chrome OS 53.0.2785.103 \n * Google Chrome OS 53.0.2785.144 \n * Google Chrome OS 54.0.2840.79 \n * Google Chrome OS 57.0.2987.137 \n * Google Chrome OS 58.0.3029.89 \n * Google Chrome OS 59.0.3071.91 \n * Google Chrome OS 59.0.3071.92 \n * Google Chrome OS 60.0.3112.114 \n * Google Chrome OS 61.0.3163.113 \n * Google Chrome OS 62.0.3202.97 \n * Google Chrome OS 8.0.552.342 \n * Google Chrome OS 8.0.552.343 \n * Google Chrome OS 8.0.552.344 \n * Google Nexus 5X \n * Google Nexus 6P \n * Google Pixel 2 XL \n * Google Pixel C \n * Google Pixel XL \n * Google V8 \n * HP ProLiant DL385 Gen10 Server 1.02 \n * IBM AIX 5.3 \n * IBM AIX 6.1 \n * IBM AIX 7.1 \n * IBM Aix 7.2 \n * IBM Vios 2.2.0 \n * Intel Xeon CPU E5-1650 v3 \n * Linux kernel 4.14.7 \n * Linux kernel 4.9.74 \n * Microsoft Edge \n * Microsoft Internet Explorer 11 \n * Microsoft SQL Server 2008 R2 for 32-bit Systems Service Pack 3 \n * Microsoft SQL Server 2008 R2 for x64-based Systems Service Pack 3 \n * Microsoft SQL Server 2008 for 32-bit Systems Service Pack 4 \n * Microsoft SQL Server 2008 for x64-based Systems Service Pack 4 \n * Microsoft SQL Server 2012 for 32-bit Systems Service Pack 3 \n * Microsoft SQL Server 2012 for 32-bit Systems Service Pack 4 \n * Microsoft SQL Server 2012 for x64-based Systems Service Pack 3 \n * Microsoft SQL Server 2012 for x64-based Systems Service Pack 4 \n * Microsoft SQL Server 2014 for 32-bit Systems Service Pack 2 \n * Microsoft SQL Server 2014 for x64-based Systems Service Pack 2 \n * Microsoft SQL Server 2016 for x64-based Systems \n * Microsoft SQL Server 2016 for x64-based Systems Service Pack 1 \n * Microsoft SQL Server 2017 for x64-based Systems \n * Microsoft Windows 10 Version 1607 for 32-bit Systems \n * Microsoft Windows 10 Version 1607 for x64-based Systems \n * Microsoft Windows 10 for 32-bit Systems \n * Microsoft Windows 10 for x64-based Systems \n * Microsoft Windows 10 version 1511 for 32-bit Systems \n * Microsoft Windows 10 version 1511 for x64-based Systems \n * Microsoft Windows 10 version 1703 for 32-bit Systems \n * Microsoft Windows 10 version 1703 for x64-based Systems \n * Microsoft Windows 10 version 1709 for 32-bit Systems \n * Microsoft Windows 7 for 32-bit Systems SP1 \n * Microsoft Windows 7 for x64-based Systems SP1 \n * Microsoft Windows 8.1 for 32-bit Systems \n * Microsoft Windows 8.1 for x64-based Systems \n * Microsoft Windows Server 2008 R2 for Itanium-based Systems SP1 \n * Microsoft Windows Server 2008 R2 for x64-based Systems SP1 \n * Microsoft Windows Server 2012 \n * Microsoft Windows Server 2012 R2 \n * Microsoft Windows Server 2016 \n * Oracle VM VirtualBox 5.0 \n * Oracle VM VirtualBox 5.0.10 \n * Oracle VM VirtualBox 5.0.11 \n * Oracle VM VirtualBox 5.0.12 \n * Oracle VM VirtualBox 5.0.13 \n * Oracle VM VirtualBox 5.0.14 \n * Oracle VM VirtualBox 5.0.16 \n * Oracle VM VirtualBox 5.0.18 \n * Oracle VM VirtualBox 5.0.22 \n * Oracle VM VirtualBox 5.0.26 \n * Oracle VM VirtualBox 5.0.28 \n * Oracle VM VirtualBox 5.0.32 \n * Oracle VM VirtualBox 5.0.34 \n * Oracle VM VirtualBox 5.0.38 \n * Oracle VM VirtualBox 5.0.8 \n * Oracle VM VirtualBox 5.0.9 \n * Oracle VM VirtualBox 5.1.10 \n * Oracle VM VirtualBox 5.1.14 \n * Oracle VM VirtualBox 5.1.16 \n * Oracle VM VirtualBox 5.1.20 \n * Oracle VM VirtualBox 5.1.24 \n * Oracle VM VirtualBox 5.1.30 \n * Oracle VM VirtualBox 5.1.8 \n * Oracle VM VirtualBox 5.2.0 \n * Oracle VM VirtualBox 5.2.2 \n * Oracle VM VirtualBox 5.2.4 \n * Oracle X86 Servers SW 1.0 \n * Oracle X86 Servers SW 2.0 \n * Redhat Enterprise Linux 5 \n * Redhat Enterprise Linux 6 \n * Redhat Enterprise Linux 7 \n * Redhat Enterprise Linux Desktop 6 \n * Redhat Enterprise Linux Desktop 7 \n * Redhat Enterprise Linux EUS Compute Node 6.7 \n * Redhat Enterprise Linux EUS Compute Node 7.3 \n * Redhat Enterprise Linux EUS Compute Node 7.4 \n * Redhat Enterprise Linux Server (for IBM Power LE) - 4 Year Extended Upd 7.3 \n * Redhat Enterprise Linux Server (for IBM Power LE) - 4 Year Extended Update Support 7.4 \n * Redhat Enterprise Linux Server - 4 Year Extended Update Support 7.2 \n * Redhat Enterprise Linux Server - 4 Year Extended Update Support 7.3 \n * Redhat Enterprise Linux Server - 4 Year Extended Update Support 7.4 \n * Redhat Enterprise Linux Server - AUS 6.6 \n * Redhat Enterprise Linux Server - AUS 7.2 \n * Redhat Enterprise Linux Server - AUS 7.3 \n * Redhat Enterprise Linux Server - AUS 7.4 \n * Redhat Enterprise Linux Server - Extended Update Support 6.7 \n * Redhat Enterprise Linux Server - Extended Update Support 7.3 \n * Redhat Enterprise Linux Server - Extended Update Support 7.4 \n * Redhat Enterprise Linux Server - TUS 6.6 \n * Redhat Enterprise Linux Server - TUS 7.2 \n * Redhat Enterprise Linux Server - TUS 7.3 \n * Redhat Enterprise Linux Server - TUS 7.4 \n * Redhat Enterprise Linux Server 6 \n * Redhat Enterprise Linux Server 7 \n * Redhat Enterprise Linux Workstation 6 \n * Redhat Enterprise Linux Workstation 7 \n * Redhat Enterprise Linux for IBM z Systems - Extended Update Support 6.7 \n * Redhat Enterprise Linux for IBM z Systems - Extended Update Support 7.4 \n * Redhat Enterprise Linux for IBM z Systems 6 \n * Redhat Enterprise Linux for IBM z Systems 7 \n * Redhat Enterprise Linux for Power, big endian - Extended Update Support 6.7 \n * Redhat Enterprise Linux for Power, big endian - Extended Update Support 7.3 \n * Redhat Enterprise Linux for Power, big endian - Extended Update Support 7.4 \n * Redhat Enterprise Linux for Power, big endian 6 \n * Redhat Enterprise Linux for Power, big endian 7 \n * Redhat Enterprise Linux for Power, little endian - Extended Update Supp 7.3 \n * Redhat Enterprise Linux for Power, little endian - Extended Update Supp 7.4 \n * Redhat Enterprise Linux for Power, little endian 7 \n * Redhat Enterprise Linux for Real Time 7 \n * Redhat Enterprise Linux for Real Time for NFV 7 \n * Redhat Enterprise Linux for Scientific Computing 6 \n * Redhat Enterprise Linux for Scientific Computing 7 \n * Redhat Enterprise Mrg 2 \n * Redhat Virtualization Host 4 \n * VMWare ESXi 5.5 \n * VMWare Esxi 6.0 \n * VMWare Esxi 6.5 \n * VMWare Fusion 8.0 \n * VMWare Fusion 8.0.1 \n * VMWare Fusion 8.0.2 \n * VMWare Fusion 8.1.0 \n * VMWare Fusion 8.1.1 \n * VMWare Fusion 8.5 \n * VMWare Fusion 8.5.2 \n * VMWare Fusion 8.5.4 \n * VMWare Fusion 8.5.5 \n * VMWare Fusion 8.5.6 \n * VMWare Fusion 8.5.8 \n * VMWare Identity Manager 2.0 \n * VMWare Identity Manager 2.7 \n * VMWare Identity Manager 2.7.1 \n * VMWare Identity Manager 3.0 \n * VMWare Workstation 12.0 \n * VMWare Workstation 12.5.3 \n * VMWare Workstation 12.5.5 \n * VMWare Workstation 12.5.7 \n * VMWare vCenter Server 6.0 \n * VMWare vCenter Server 6.5 \n * VMWare vCloud Usage Meter 3.0 \n * VMWare vCloud Usage Meter 3.3 \n * VMWare vCloud Usage Meter 3.3.3 \n * VMWare vRealize Automation 6.0 \n * VMWare vRealize Automation 6.1 \n * VMWare vRealize Automation 6.2 \n * VMWare vRealize Automation 6.2.4 \n * VMWare vRealize Automation 6.2.4.1 \n * VMWare vRealize Automation 6.2.5 \n * VMWare vRealize Automation 7.0 \n * VMWare vRealize Automation 7.1 \n * VMWare vRealize Automation 7.2.0 \n * VMWare vRealize Automation 7.3.0 \n * VMWare vSphere Data Protection 6.0 \n * VMWare vSphere Data Protection 6.0.0 \n * VMWare vSphere Data Protection 6.0.5 \n * VMWare vSphere Data Protection 6.0.6 \n * VMWare vSphere Data Protection 6.0.7 \n * VMWare vSphere Data Protection 6.1 \n * VMWare vSphere Data Protection 6.1.0 \n * VMWare vSphere Data Protection 6.1.4 \n * VMWare vSphere Data Protection 6.1.5 \n * VMWare vSphere Data Protection 6.1.6 \n * VMWare vSphere Integrated Containers 1.0 \n * VMWare vSphere Integrated Containers 1.1 \n * VMWare vSphere Integrated Containers 1.2 \n * VMWare vSphere Integrated Containers 1.3 \n * Xen Xen \n\n### Recommendations\n\n**Permit local access for trusted individuals only. Where possible, use restricted environments and restricted shells.** \nGiven the local nature of this issue, grant only trusted and accountable individuals access to affected computers. \n\nUpdates are available. Please see the references or vendor advisory for more information.\n", "modified": "2018-01-03T00:00:00", "published": "2018-01-03T00:00:00", "id": "SMNTC-102378", "href": "https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/102378", "type": "symantec", "title": "Multiple CPU Hardware CVE-2017-5754 Information Disclosure Vulnerability", "cvss": {"score": 4.7, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:COMPLETE/I:NONE/A:NONE/"}}, {"lastseen": "2020-12-24T10:40:37", "bulletinFamily": "software", "cvelist": ["CVE-2017-5715", "CVE-2017-5753", "CVE-2017-5754"], "description": "### SUMMARY\n\nSymantec Network Protection products, which run on an affected CPU chipset and execute arbitrary code from external sources, are susceptible to several information disclosure vulnerabilities (aka Meltdown and Spectre attacks). A remote attacker, with the ability to execute arbitrary code locally on the target, can obtain sensitive information from the memory spaces of the same userspace application, other userspace applications, the operating system, or a VM hypervisor. \n \n\n\n### AFFECTED PRODUCTS\n\nThe following products are vulnerable. **All hardware platforms are affected unless specified otherwise**:\n\n**Content Analysis (CA)** \n--- \n**CVE** | **Affected Version(s)** | **Remediation** \nAll CVEs | 2.4 | Not vulnerable, fixed in 2.4.1.1. Please update all Windows iVM profiles with the latest Windows patches. \n2.1, 2.2, 2.3 | Upgrade to later release with fixes. \n \n \n\n**Malware Analysis (MA)** \n--- \n**CVE** | **Affected Version(s)** | **Remediation** \nAll CVEs | 4.2 | Upgrade to a version of Content Analysis with fixes. \n \n \n\n**Security Analytics** \n--- \n**CVE** | **Affected Version(s)** | **Remediation** \nAll CVEs | 8.0 | Not vulnerable, fixed in 8.0.1. \n7.3 | Upgrade to 7.3.3. \n7.1, 7.2 | Upgrade to later release with fixes. \n \n \n\n**X-Series XOS** \n--- \n**CVE** | **Affected Version(s)** | **Remediation** \nAll CVEs | 11.0 | Not available at this time \n10.0 | Upgrade to later release with fixes. \n9.7 | Upgrade to later release with fixes. \n \n \n\n### ADDITIONAL PRODUCT INFORMATION \n\nContent Analysis (CA) is only vulnerable when configured with on-box sandboxing. Only the Windows iVM profiles are vulnerable. Starting with CA 2.4, updating all Windows iVM profiles to include the Spectre/Meltdown patches remediates these vulnerabilities.\n\nSecurity Analytics is only vulnerable when an administrator user executes malicious code on the appliance.\n\nX-Series XOS is only vulnerable when an administrator user accesses the XOS diagnostics functionality and executes malicious code on the appliance. The NPM-8620 (standalone and in X20 chassis), NPM-8650, and NPM-9600 platforms are not affected.\n\nThe following products use affected CPU chipsets, but do not allow administrators to execute arbitrary code and are not vulnerable to known vectors of attack: \n**Advanced Secure Gateway \nCacheFlow **(CF5000-CX and CF5000-MX platforms are not affected by Meltdown) \n**Content Analysis 1.3 \nDirector \nMail Threat Defense \nManagement Center \nNorman Shark Industrial Control System Protection \nPacketShaper \nPacketShaper S-Series \nPolicyCenter S-Series \nProxyAV \nProxySG **(SG300, SG600, and SG9000 platforms are not affected by Meltdown) \n**Reporter 10.1 \nSSL Visibility**\n\nThe following products run as userspace applications on customer-provided hardware platforms and operating systems. The vulnerabilities addressed in this security advisory are not present in our applications, but these applications can be targeted by an attacker if the underlying hardware platforms and operating systems are vulnerable: \n**Android Mobile Agent \nAuthConnector \nBCAAA \nClient Connector \nCloud Data Protection for Salesforce \nCloud Data Protection for Salesforce Analytics \nCloud Data Protection for ServiceNow \nCloud Data Protection for Oracle CRM On Demand \nCloud Data Protection for Oracle Field Service Cloud \nCloud Data Protection for Oracle Sales Cloud \nCloud Data Protection Integration Server \nCloud Data Protection Communication Server \nCloud Data Protection Policy Builder \nGeneral Auth Connector Login Application \nHSM Agent for the Luna SP \nIntelligenceCenter \nIntelligenceCenter Data Collector \nK9 \n**PolicyCenter** \nProxyClient \nProxyAV ConLog and ConLogXP \nReporter 9.5 \nUnified Agent**\n\nThe following products are not vulnerable:\n\n**Web Isolation \n \n**\n\n### ISSUES \n\n**CVE-2017-5715 (Spectre variant 2)** \n--- \n**Severity / CVSSv2** | Medium / 4.7 (AV:L/AC:M/Au:N/C:C/I:N/A:N) \n**References** | SecurityFocus: [BID 102376](<http://www.securityfocus.com/bid/102376>) / NVD: [CVE-2017-5715](<https://nvd.nist.gov/vuln/detail/CVE-2017-5715>) \n**Impact** | Information disclosure \n**Description** | Spectre variant 2 exploits an information disclosure vulnerability in CPU chipsets that support speculative execution through branch prediction. A malicious userspace application can obtain unauthorized access to sensitive data from the memory space of the same or a different userspace application by accessing data left uncleared in the CPU cache after speculatively executed CPU instructions loaded due to a mispredicted branch target. The attack may also allow malicious code running as a guest in a virtual machine to obtain unauthorized access to sensitive data from the VM hypervisor memory. \n \n \n\n**CVE-2017-5753 (Spectre variant 1)** \n--- \n**Severity / CVSSv2** | Medium / 4.7 (AV:L/AC:M/Au:N/C:C/I:N/A:N) \n**References** | SecurityFocus: [BID 102371](<http://www.securityfocus.com/bid/102371>) / NVD: [CVE-2017-5753](<https://nvd.nist.gov/vuln/detail/CVE-2017-5753>) \n**Impact** | Information disclosure \n**Description** | Spectre variant 1 exploits an information disclosure vulnerability in CPU chipsets that support speculative execution through branch prediction. A malicious userspace application can obtain unauthorized access to sensitive data from the memory space of the same or a different userspace application by accessing data left uncleared in the CPU cache after speculatively executed CPU instructions loaded due to an incorrect brant prediction. \n \n \n\n**CVE-2017-5754 (Meltdown)** \n--- \n**Severity / CVSSv2** | Medium / 4.7 (AV:L/AC:M/Au:N/C:C/I:N/A:N) \n**References** | SecurityFocus: [BID 102378](<http://www.securityfocus.com/bid/102378>) / NVD: [CVE-2017-5754](<https://nvd.nist.gov/vuln/detail/CVE-2017-5754>) \n**Impact** | Information disclosure \n**Description** | The Meltdown attack exploits an information disclosure vulnerability in CPU chipsets that support out-of-order execution. It allows a malicious userspace application to access sensitive information from the kernel memory spaces or from the memory spaces of another userspace application. If a userspace application attempts to access a memory location reserved for the operating system, the system triggers an exception. A CPU chipset supporting out-of-order execution may fetch sensitive data and store it in the CPU cache before detecting the exception. The data remains uncleared in the CPU cache, where a malicious userspace application can access it via side-channel analysis. \n \n \n\n### REFERENCES\n\nMeltdown and Spectre - <https://meltdownattack.com/> \nCERT Vulnerability Note VU#584653 - <https://www.kb.cert.org/vuls/id/584653> \n \n\n\n### REVISION\n\n2020-04-30 Advisory status changed to Closed. \n2020-01-19 A fix will not be provided for Malware Analysis. Please upgrade to a version of Content Analysis with the vulnerability fixes. \n2019-10-02 Web Isolation is not vulnerable. \n2019-08-17 CA 2.4 is not vulnerable because a fix is available in CA 2.4. Customers need to update all Windows iVM profiles with the latest Windows patches. \n2019-01-21 A fix for Security Analytics 7.3 is available in 7.3.3. Security Analytics 8.0 is not vulnerable because a fix is available in 8.0.1. \n2018-04-25 A fix for XOS 9.7 will not be provided. Please upgrade to a later version with the vulnerability fixes. \n2018-04-22 CA 2.3 is vulnerable. \n2018-04-01 All hardware platforms are affected unless specified otherwise in the Affected Products section. \n2018-01-09 PolicyCenter (non S-Series) and Reporter 9.5 run as userspace applications on customer-provided hardware platforms and operating systems. The vulnerabilities addressed in this security advisory are not present in these applications, but they can be targeted by an attacker if the underlying hardware platforms and operating systems are vulnerable. \n2018-01-08 initial public release\n", "modified": "2020-05-01T04:08:21", "published": "2018-01-08T08:00:00", "id": "SMNTC-1426", "href": "", "type": "symantec", "title": "SA161: Local Information Disclosure Due to Meltdown and Spectre Attacks", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}], "cve": [{"lastseen": "2021-03-03T14:01:38", "description": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "edition": 13, "cvss3": {"exploitabilityScore": 1.1, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "CHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.6, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 4.0}, "published": "2018-01-04T13:29:00", "title": "CVE-2017-5753", "type": "cve", "cwe": ["CWE-200"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.7, "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-5753"], "modified": "2021-03-02T15:45:00", "cpe": ["cpe:/h:intel:core_i3:4330t", "cpe:/o:phoenixcontact:bl2_bpc_1000_firmware:-", "cpe:/h:intel:core_i7:840qm", "cpe:/h:intel:core_i3:530", "cpe:/h:intel:celeron_n:n4000", "cpe:/h:intel:core_i5:4200u", "cpe:/h:intel:core_i5:2405s", "cpe:/h:intel:xeon_e3_1225_v3:-", "cpe:/h:intel:core_i7:4710hq", "cpe:/h:intel:xeon_phi:7230f", "cpe:/h:intel:xeon_e5:2680", "cpe:/h:intel:xeon:e5520", "cpe:/h:intel:xeon_e5_2407_v2:-", "cpe:/h:intel:pentium_n:n3520", "cpe:/h:intel:core_i7:875k", "cpe:/h:intel:atom_z:z3735e", "cpe:/h:intel:core_i3:6098p", "cpe:/o:phoenixcontact:el_ppc_1000\\/m_firmware:-", "cpe:/h:intel:xeon_e5_2448l:-", "cpe:/h:intel:core_i7:870s", "cpe:/h:intel:core_i7:4610m", "cpe:/o:synology:vs360hd_firmware:-", "cpe:/h:intel:core_i7:2675qm", "cpe:/h:intel:core_i7:4702ec", "cpe:/h:intel:xeon_e5:4648_v3", "cpe:/h:intel:xeon_e5_2620_v2:-", "cpe:/h:intel:xeon_e3_1240_v2:-", "cpe:/h:intel:xeon_gold:6138", "cpe:/h:intel:core_i5:480m", "cpe:/h:intel:xeon_e5_2637:-", "cpe:/h:intel:xeon_e5_2618l_v3:-", "cpe:/h:intel:atom_z:z3736g", "cpe:/h:intel:xeon_e5_1660_v3:-", "cpe:/h:intel:xeon_e5_2650l_v3:-", "cpe:/h:intel:xeon_silver:4116t", "cpe:/h:intel:xeon_gold:6144", "cpe:/h:intel:xeon_phi:7250f", "cpe:/h:intel:atom_x3:c3230rk", "cpe:/h:intel:xeon_e3_1270:-", "cpe:/h:intel:xeon_platinum:8176f", "cpe:/o:phoenixcontact:el_ppc_1000\\/wt_firmware:-", "cpe:/h:intel:core_i3:2330e", "cpe:/h:intel:core_i5:4410e", "cpe:/h:intel:core_i7:4700hq", "cpe:/h:intel:core_i7:610e", "cpe:/h:intel:celeron_n:n2808", "cpe:/h:intel:core_i3:2340ue", "cpe:/h:intel:core_i7:4800mq", "cpe:/o:phoenixcontact:vl2_ppc_2000_firmware:-", "cpe:/h:intel:xeon_gold:6126t", "cpe:/h:intel:xeon_e5:4603_v2", "cpe:/o:phoenixcontact:vl2_ppc_1000_firmware:-", "cpe:/h:intel:core_m:5y31", "cpe:/h:intel:xeon_e5:4620", "cpe:/h:intel:core_i7:2620m", "cpe:/h:intel:xeon_e5_1428l_v3:-", "cpe:/h:intel:xeon:w5580", "cpe:/h:intel:atom_z:z2460", "cpe:/h:intel:core_i5:3550", "cpe:/h:intel:xeon_e7:8867_v4", "cpe:/h:intel:xeon_gold:6138t", "cpe:/h:intel:atom_c:c2358", "cpe:/h:intel:core_i3:2120", "cpe:/h:intel:xeon_e3_1501l_v6:-", "cpe:/h:intel:xeon:lc5518", "cpe:/h:intel:core_i5:6400t", "cpe:/h:intel:xeon_e3_1230l_v3:-", "cpe:/h:intel:xeon_e5:4650_v4", "cpe:/h:intel:core_i3:350m", "cpe:/h:intel:core_i7:3615qm", "cpe:/h:intel:core_i3:3227u", "cpe:/h:intel:xeon_e5:2687w", "cpe:/h:intel:xeon_e5_2623_v4:-", "cpe:/h:intel:core_i5:4200y", "cpe:/h:intel:core_i3:2357m", "cpe:/h:intel:core_i7:4750hq", "cpe:/h:intel:atom_c:c3858", "cpe:/h:intel:core_i3:2377m", "cpe:/h:intel:core_m:5y10", "cpe:/h:intel:core_i7:3537u", "cpe:/h:intel:xeon_e3_1245:-", "cpe:/h:intel:xeon_e5_2470_v2:-", "cpe:/h:intel:xeon_e5_2408l_v3:-", "cpe:/o:phoenixcontact:vl2_ppc12_1000_firmware:-", "cpe:/h:intel:core_i5:4422e", "cpe:/h:intel:xeon_e3_1246_v3:-", "cpe:/h:intel:xeon_e5_2623_v3:-", "cpe:/o:phoenixcontact:bl_ppc_7000_firmware:-", "cpe:/h:intel:atom_x3:c3295rk", "cpe:/h:intel:xeon:w5590", "cpe:/h:intel:atom_c:c3955", "cpe:/h:intel:xeon:lc5528", "cpe:/h:intel:atom_c:c2730", "cpe:/h:intel:atom_c:c2518", "cpe:/h:intel:xeon_e5_2640_v2:-", "cpe:/h:intel:core_i5:6200u", "cpe:/h:intel:core_i3:6100h", "cpe:/h:intel:atom_x3:c3265rk", "cpe:/h:intel:xeon_platinum:8160m", "cpe:/h:intel:xeon_e3_1265l_v3:-", "cpe:/h:intel:core_i5:4670r", "cpe:/h:intel:core_i7:4770te", "cpe:/o:canonical:ubuntu_linux:17.10", "cpe:/h:intel:xeon_gold:6126f", "cpe:/h:intel:celeron_j:j3355", "cpe:/h:intel:xeon_e7:4830_v3", "cpe:/h:intel:xeon_e5_1428l_v2:-", "cpe:/h:intel:xeon_e3:1545m_v5", "cpe:/h:intel:xeon_e5:2660_v3", "cpe:/h:intel:core_i5:4300y", "cpe:/h:intel:atom_c:c3808", "cpe:/h:intel:core_i5:3610me", "cpe:/h:intel:core_i5:4250u", "cpe:/h:intel:core_i5:3475s", "cpe:/h:intel:xeon_e5:2695_v2", "cpe:/h:intel:core_i7:3517ue", "cpe:/h:intel:xeon_e5:4650_v2", "cpe:/h:intel:core_i7:4500u", "cpe:/h:intel:core_i5:4430s", "cpe:/h:intel:core_i3:2365m", "cpe:/h:intel:core_i7:2920xm", "cpe:/h:intel:core_i3:330m", "cpe:/h:intel:xeon_e5:4640", "cpe:/h:intel:xeon_e5:2667_v3", "cpe:/h:intel:core_i7:3612qm", "cpe:/h:intel:core_i7:4900mq", "cpe:/h:intel:core_i5:4258u", "cpe:/h:intel:core_i3:4160", "cpe:/h:intel:core_i5:4590", "cpe:/o:phoenixcontact:dl_ppc21.5m_7000_firmware:-", "cpe:/h:intel:xeon_e5:2683_v4", "cpe:/h:intel:xeon_e5_2440:-", "cpe:/h:intel:core_i7:980x", "cpe:/h:intel:core_i7:5750hq", "cpe:/h:intel:xeon_e3_1505l_v6:-", "cpe:/o:phoenixcontact:vl2_ppc_9000_firmware:-", "cpe:/h:intel:xeon:l3406", "cpe:/h:intel:atom_e:e3825", "cpe:/h:intel:atom_c:c3538", "cpe:/h:intel:core_i5:3470t", "cpe:/h:intel:xeon_e5_1620:-", "cpe:/h:intel:atom_c:c2738", "cpe:/h:intel:xeon_e5_2630l_v4:-", "cpe:/h:intel:xeon:e5507", "cpe:/h:intel:core_i5:2500", "cpe:/h:intel:xeon_e5:2667", "cpe:/h:intel:core_i3:3120me", "cpe:/h:intel:core_i5:4400e", "cpe:/h:intel:core_i3:8100", "cpe:/h:intel:core_i5:2450m", "cpe:/h:intel:xeon_e5:2687w_v4", "cpe:/h:intel:core_i5:2300", "cpe:/h:intel:xeon_e3:1535m_v5", "cpe:/h:intel:atom_z:z3740", "cpe:/h:intel:xeon_e5:2680_v3", "cpe:/h:intel:xeon_e7:8857_v2", "cpe:/h:intel:core_i5:4670", "cpe:/h:intel:core_i5:4300m", "cpe:/h:intel:core_i3:6167u", "cpe:/h:intel:core_i3:3220t", "cpe:/h:intel:core_i7:2617m", "cpe:/h:intel:pentium_n:n3540", "cpe:/h:intel:xeon_e5_2628l_v4:-", "cpe:/o:phoenixcontact:vl_bpc_2000_firmware:-", "cpe:/h:intel:core_i7:3540m", "cpe:/h:intel:xeon_e5_1660_v2:-", "cpe:/h:intel:xeon_gold:5120", "cpe:/h:intel:xeon_e5:4610_v3", "cpe:/h:intel:core_i5:3427u", "cpe:/h:intel:core_i7:3610qm", "cpe:/h:intel:core_m:5y10c", "cpe:/h:intel:core_i7:3770", "cpe:/h:intel:xeon_e3:1585_v5", "cpe:/h:intel:xeon_e3_1225_v6:-", "cpe:/h:intel:xeon_e3_1275_v5:-", "cpe:/h:intel:xeon_e5:2658", "cpe:/h:intel:core_i5:3450", "cpe:/h:intel:core_i7:620lm", "cpe:/h:intel:xeon_e3_1280_v2:-", "cpe:/h:intel:core_i5:5675r", "cpe:/h:intel:xeon_e5_2608l_v3:-", "cpe:/h:intel:core_m:5y10a", "cpe:/h:intel:xeon:e6540", "cpe:/o:phoenixcontact:bl2_bpc_7000_firmware:-", "cpe:/h:intel:core_i7:4712hq", "cpe:/o:suse:suse_linux_enterprise_server:12", "cpe:/h:intel:core_i7:7560u", "cpe:/h:intel:core_i3:3229y", "cpe:/h:intel:atom_e:e3826", "cpe:/h:intel:core_i7:2610ue", "cpe:/h:intel:core_i7:975", "cpe:/h:intel:core_i5:2435m", "cpe:/h:intel:core_i3:2310m", "cpe:/h:intel:core_i5:4570", "cpe:/h:intel:core_i3:4030y", "cpe:/h:intel:core_i3:380um", "cpe:/h:intel:core_i5:4690s", "cpe:/h:intel:xeon_e5_1660:-", "cpe:/h:intel:xeon_gold:5122", "cpe:/h:intel:xeon_platinum:8170", "cpe:/h:intel:xeon_e5:2697_v4", "cpe:/h:intel:xeon:x5660", "cpe:/h:intel:core_m5:6y54", "cpe:/h:intel:xeon_e3_1220_v2:-", "cpe:/h:intel:core_i7:3612qe", "cpe:/h:intel:xeon_e5:4640_v2", "cpe:/h:intel:xeon_e5_1620_v4:-", "cpe:/h:intel:xeon_e5:4620_v4", "cpe:/h:intel:xeon_e3_1285l_v3:-", "cpe:/h:intel:core_i5:5350u", "cpe:/h:intel:xeon_e5_2450:-", "cpe:/h:intel:xeon_e5_2640_v4:-", "cpe:/h:intel:core_i3:4012y", "cpe:/h:intel:xeon_e3_1271_v3:-", "cpe:/h:intel:xeon_e5:4610_v4", "cpe:/h:intel:core_i7:4700mq", "cpe:/h:intel:xeon_e7:8870_v3", "cpe:/h:intel:xeon_e5_2430l_v2:-", "cpe:/h:intel:xeon_e5:2660_v2", "cpe:/h:intel:core_i5:3437u", "cpe:/h:intel:core_i7:4870hq", "cpe:/h:intel:xeon_gold:6134m", "cpe:/h:intel:atom_z:z3460", "cpe:/h:intel:core_i7:7700", "cpe:/h:intel:core_i3:2328m", "cpe:/h:intel:xeon_e5_2430:-", "cpe:/h:intel:core_i7:2670qm", "cpe:/h:intel:xeon_e5:2687w_v3", "cpe:/h:intel:atom_c:c3750", "cpe:/h:intel:xeon_phi:7235", "cpe:/h:intel:atom_z:z2580", "cpe:/h:intel:xeon_e7:4820", "cpe:/h:intel:xeon_e5:2680_v4", "cpe:/h:intel:core_i5:680", "cpe:/h:intel:xeon_e5_2643:-", "cpe:/h:intel:celeron_j:j1900", "cpe:/h:intel:xeon_gold:6130", "cpe:/h:intel:core_i5:2537m", "cpe:/h:intel:xeon_silver:4114t", "cpe:/h:intel:xeon_e7:8850_v2", "cpe:/h:intel:xeon_silver:4108", "cpe:/h:intel:xeon_e5_1650_v3:-", "cpe:/h:intel:celeron_j:j3160", "cpe:/h:intel:core_i7:3632qm", "cpe:/h:intel:xeon_e3:1535m_v6", "cpe:/h:intel:celeron_j:j3455", "cpe:/h:intel:core_i3:2100t", "cpe:/h:intel:xeon_silver:4112", "cpe:/o:phoenixcontact:vl_bpc_3000_firmware:-", "cpe:/h:intel:core_i7:4770", "cpe:/h:intel:xeon_e3_1281_v3:-", "cpe:/h:intel:xeon_e3_1280_v3:-", "cpe:/h:intel:core_i3:4100m", "cpe:/h:intel:celeron_n:n3450", "cpe:/o:phoenixcontact:vl2_ppc_3000_firmware:-", "cpe:/h:intel:xeon_e7:2820", "cpe:/o:phoenixcontact:bl2_ppc_1000_firmware:-", "cpe:/h:intel:core_i3:4370t", "cpe:/h:intel:core_i3:4150", "cpe:/h:intel:xeon_e7:8880l_v2", "cpe:/h:intel:xeon_e3_1225_v5:-", "cpe:/h:intel:xeon_e5:2697a_v4", "cpe:/h:intel:core_i3:6100e", "cpe:/h:intel:xeon_e5_2618l_v2:-", "cpe:/h:intel:xeon_e5:4657l_v2", "cpe:/o:phoenixcontact:bl2_ppc_2000_firmware:-", "cpe:/h:intel:core_i5:470um", "cpe:/h:intel:xeon_e5_2630_v3:-", "cpe:/a:netapp:hci:-", "cpe:/h:intel:xeon_e7:8890_v4", "cpe:/h:intel:atom_z:z3795", "cpe:/h:intel:core_i5:4220y", "cpe:/h:intel:xeon_e5_2428l:-", "cpe:/h:intel:core_i3:4102e", "cpe:/h:intel:core_i3:2370m", "cpe:/h:intel:xeon_phi:7250", "cpe:/h:intel:xeon_gold:6130t", "cpe:/h:intel:core_i7:4960hq", "cpe:/h:intel:celeron_n:n3150", "cpe:/h:intel:xeon_e5:2698_v4", "cpe:/h:intel:core_i7:860", "cpe:/h:intel:core_i3:2375m", "cpe:/o:arm:cortex-r_firmware:-", "cpe:/h:intel:core_i3:4158u", "cpe:/o:phoenixcontact:bl_ppc17_1000_firmware:-", "cpe:/o:debian:debian_linux:8.0", "cpe:/h:intel:atom_z:z2420", "cpe:/h:intel:xeon:x5687", "cpe:/h:intel:core_i7:4710mq", "cpe:/h:intel:core_i5:4460s", "cpe:/h:intel:xeon_e3:1585l_v5", "cpe:/h:intel:xeon:l5618", "cpe:/h:intel:xeon_e5_2650l:-", "cpe:/h:intel:xeon:e5640", "cpe:/h:intel:core_i7:4702mq", "cpe:/h:intel:xeon_gold:6128", "cpe:/h:intel:core_i7:4771", "cpe:/h:intel:core_i7:5850eq", "cpe:/h:intel:xeon_e3_1276_v3:-", "cpe:/h:intel:xeon:l7555", "cpe:/h:intel:core_i3:390m", "cpe:/h:intel:xeon_e7:4850", "cpe:/h:intel:core_m3:7y30", "cpe:/h:intel:xeon_e7:8850", "cpe:/h:intel:xeon:e5502", "cpe:/o:arm:cortex-a_firmware:-", "cpe:/h:intel:core_i3:4170t", "cpe:/h:intel:xeon_e5_2620_v4:-", "cpe:/h:intel:xeon_e5:4660_v3", "cpe:/h:intel:core_i5:4340m", "cpe:/h:intel:core_i5:6300hq", "cpe:/h:intel:celeron_n:n3000", "cpe:/h:intel:core_i3:5010u", "cpe:/h:intel:core_i5:4278u", "cpe:/h:intel:core_i7:4722hq", "cpe:/h:intel:core_i5:6500te", "cpe:/h:intel:core_i7:3770t", "cpe:/h:intel:xeon_e7:8891_v2", "cpe:/h:intel:xeon_e5:4660_v4", "cpe:/o:phoenixcontact:bl_bpc_2001_firmware:-", "cpe:/h:intel:core_i5:4440", "cpe:/h:intel:core_i5:5257u", "cpe:/h:intel:core_i7:4600m", "cpe:/h:intel:xeon_e7:4860", "cpe:/h:intel:core_i5:3570", "cpe:/h:intel:xeon_e5_2630:-", "cpe:/h:intel:core_i7:620m", "cpe:/h:intel:core_i5:3230m", "cpe:/h:intel:xeon_e5_2440_v2:-", "cpe:/h:intel:xeon_e3_12201_v2:-", "cpe:/h:intel:xeon_e3_1270_v3:-", "cpe:/o:canonical:ubuntu_linux:12.04", "cpe:/h:intel:core_i7:7820hq", "cpe:/h:intel:xeon_e3_1231_v3:-", "cpe:/h:intel:core_i7:880", "cpe:/h:intel:xeon:e5645", "cpe:/h:intel:xeon:e5649", "cpe:/h:intel:xeon_gold:6148", "cpe:/h:intel:xeon_e7:8880_v2", "cpe:/h:intel:xeon_e5:4610", "cpe:/h:intel:xeon_gold:6146", "cpe:/o:synology:vs960hd_firmware:-", "cpe:/h:intel:xeon_e3_1275:-", "cpe:/h:intel:xeon_e5_2630l_v3:-", "cpe:/h:intel:xeon_e5_1660_v4:-", "cpe:/h:intel:core_i5:4690", "cpe:/h:intel:core_i7:4510u", "cpe:/h:intel:core_i3:2130", "cpe:/h:intel:core_i5:6350hq", "cpe:/h:intel:xeon_e5_2630l_v2:-", "cpe:/h:intel:core_i5:4690t", "cpe:/h:intel:xeon:e6510", "cpe:/h:intel:xeon_gold:6142f", "cpe:/h:intel:xeon:l5508", "cpe:/h:intel:core_i7:4720hq", "cpe:/h:intel:xeon_e7:4880_v2", "cpe:/h:intel:core_i3:4160t", "cpe:/h:intel:core_i5:2500k", "cpe:/h:intel:core_i5:520m", "cpe:/h:intel:celeron_n:n2820", "cpe:/h:intel:xeon_e5_2628l_v3:-", "cpe:/h:intel:atom_c:c2530", "cpe:/h:intel:core_i3:2120t", "cpe:/h:intel:atom_c:c2750", "cpe:/h:intel:core_i5:6600", "cpe:/h:intel:xeon_e3_1501m_v6:-", "cpe:/o:phoenixcontact:dl_ppc15m_7000_firmware:-", "cpe:/h:intel:core_i5:2500t", "cpe:/h:intel:xeon_e5:4620_v2", "cpe:/h:intel:xeon_e7:4870_v2", "cpe:/h:intel:core_i7:3840qm", "cpe:/h:intel:core_i3:560", "cpe:/h:intel:atom_c:c2350", "cpe:/h:intel:core_i7:3770k", "cpe:/h:intel:core_i7:5950hq", "cpe:/h:intel:pentium_j:j4205", "cpe:/h:intel:xeon_e3:1505m_v6", "cpe:/h:intel:xeon_e3_1235:-", "cpe:/h:intel:core_i5:2320", "cpe:/o:canonical:ubuntu_linux:17.04", "cpe:/h:intel:xeon_e7:4890_v2", "cpe:/h:intel:core_i5:2515e", "cpe:/h:intel:core_i7:950", "cpe:/h:intel:core_i3:4120u", "cpe:/h:intel:core_i5:540um", "cpe:/h:intel:xeon_e7:8870_v4", "cpe:/h:intel:core_i5:4330m", "cpe:/h:intel:core_i5:5350h", "cpe:/h:intel:xeon_e3_1240:-", "cpe:/o:phoenixcontact:vl2_bpc_2000_firmware:-", "cpe:/h:intel:xeon_e3_1230_v3:-", "cpe:/h:intel:xeon:e5540", "cpe:/h:intel:core_i5:6685r", "cpe:/h:intel:atom_z:z3735f", "cpe:/h:intel:core_i7:7820hk", "cpe:/h:intel:core_i3:2312m", "cpe:/h:intel:core_i5:2557m", "cpe:/h:intel:core_i7:4790k", "cpe:/h:intel:core_i5:4200h", "cpe:/h:intel:core_i5:3340s", "cpe:/h:intel:core_i3:3130m", "cpe:/h:intel:core_i7:8650u", "cpe:/h:intel:core_i3:5015u", "cpe:/h:intel:core_i5:2540m", "cpe:/h:intel:atom_x3:c3205rk", "cpe:/o:phoenixcontact:bl_ppc15_7000_firmware:-", "cpe:/h:intel:core_i7:4790s", "cpe:/h:intel:xeon_e3_1275_v6:-", "cpe:/h:intel:core_i5:6400", "cpe:/h:intel:atom_c:c3830", "cpe:/h:intel:core_i5:2390t", "cpe:/o:canonical:ubuntu_linux:16.04", "cpe:/h:intel:core_i3:3220", "cpe:/h:intel:xeon:w3690", "cpe:/h:intel:xeon_e5_2420_v2:-", "cpe:/h:intel:xeon_e3_1268l_v5:-", "cpe:/h:intel:xeon_e3_1270_v6:-", "cpe:/o:opensuse:leap:42.3", "cpe:/h:intel:xeon:x3430", "cpe:/h:intel:xeon_e5_2609_v4:-", "cpe:/h:intel:core_i5:580m", "cpe:/h:intel:core_i7:5550u", "cpe:/h:intel:core_i5:3320m", "cpe:/h:intel:atom_x3:c3405", "cpe:/h:intel:core_i3:4025u", "cpe:/h:intel:core_i3:4010y", "cpe:/h:intel:core_i3:2330m", "cpe:/h:intel:xeon_platinum:8164", "cpe:/h:intel:xeon_e7:2803", "cpe:/h:intel:core_i5:660", "cpe:/h:intel:core_i5:6440eq", "cpe:/h:intel:core_i5:5200u", "cpe:/h:intel:xeon_platinum:8156", "cpe:/h:intel:xeon_e5_2620:-", "cpe:/h:intel:xeon_e5_2648l:-", "cpe:/h:intel:core_i7:2860qm", "cpe:/h:intel:core_i7:3615qe", "cpe:/h:intel:core_i5:6500", "cpe:/h:intel:core_i5:2430m", "cpe:/h:intel:atom_e:e3805", "cpe:/h:intel:xeon_e3_1245_v5:-", "cpe:/h:intel:core_i5:3330s", "cpe:/h:intel:xeon_e3_1270_v5:-", "cpe:/h:intel:core_i3:8350k", "cpe:/h:intel:xeon_platinum:8168", "cpe:/h:intel:xeon:x5560", "cpe:/h:intel:core_i7:4578u", "cpe:/h:intel:xeon_gold:6126", "cpe:/h:intel:core_i3:4150t", "cpe:/h:intel:core_i3:3225", "cpe:/h:intel:xeon_e7:2850", "cpe:/h:intel:xeon_e3_1290_v2:-", "cpe:/h:intel:core_i7:2715qe", "cpe:/h:intel:core_i3:6300", "cpe:/h:intel:xeon_e7:2850_v2", "cpe:/h:intel:xeon_e5_2448l_v2:-", "cpe:/o:phoenixcontact:vl2_bpc_3000_firmware:-", "cpe:/h:intel:xeon_gold:6140m", "cpe:/o:vmware:esxi:6.5", "cpe:/h:intel:core_i5:760", "cpe:/h:intel:xeon_e5_2470:-", "cpe:/o:phoenixcontact:vl2_ppc9_1000_firmware:-", "cpe:/h:intel:xeon:e5606", "cpe:/h:intel:celeron_j:j3060", "cpe:/h:intel:atom_c:c3708", "cpe:/h:intel:xeon_e5_2640_v3:-", "cpe:/h:intel:celeron_n:n3160", "cpe:/h:intel:xeon:x5680", "cpe:/h:intel:celeron_n:n2807", "cpe:/h:intel:xeon_e5_2650_v2:-", "cpe:/h:intel:xeon:l5630", "cpe:/h:intel:xeon_e5:2687w_v2", "cpe:/h:intel:core_i5:3439y", "cpe:/h:intel:core_i5:540m", "cpe:/h:intel:xeon_e7:8860_v4", "cpe:/h:intel:core_i7:640um", "cpe:/h:intel:xeon_gold:6142m", "cpe:/h:intel:core_m3:7y32", "cpe:/h:intel:atom_z:z3745d", "cpe:/h:intel:atom_c:c3958", "cpe:/h:intel:core_i7:3555le", "cpe:/h:intel:core_i7:2655le", "cpe:/h:intel:core_i3:3217u", "cpe:/h:intel:xeon_e7:4850_v4", "cpe:/h:intel:core_i3:6100u", "cpe:/h:intel:pentium_n:n4200", "cpe:/h:intel:core_m7:6y75", "cpe:/h:intel:core_i7:940", "cpe:/h:intel:celeron_n:n3010", "cpe:/h:intel:xeon:x5675", "cpe:/h:intel:xeon_e5_1630_v3:-", "cpe:/o:vmware:esxi:6.0", "cpe:/o:phoenixcontact:vl2_ppc7_1000_firmware:-", "cpe:/h:intel:xeon_gold:6138f", "cpe:/h:intel:core_i5:6600t", "cpe:/h:intel:xeon_e3_1285_v4:-", "cpe:/h:intel:core_i7:640lm", "cpe:/h:intel:core_i3:5005u", "cpe:/h:intel:core_i5:2467m", "cpe:/o:pepperl-fuchs:btc14_firmware:-", "cpe:/h:intel:core_i5:4308u", "cpe:/h:intel:core_i7:660ue", "cpe:/h:intel:core_i5:3380m", "cpe:/h:intel:xeon_e5_2609_v2:-", "cpe:/h:intel:xeon_e5_2648l_v2:-", "cpe:/h:intel:xeon_e7:8880_v3", "cpe:/h:intel:atom_x3:c3130", "cpe:/h:intel:xeon_e7:8837", "cpe:/h:intel:core_i7:980", "cpe:/h:intel:xeon_e5_2407:-", "cpe:/h:intel:xeon:e7530", "cpe:/h:intel:xeon:x3460", "cpe:/h:intel:xeon_e7:8870_v2", "cpe:/h:intel:core_i5:4210h", "cpe:/h:intel:core_i7:990x", "cpe:/h:intel:core_i7:660lm", "cpe:/h:intel:core_i5:2380p", "cpe:/h:intel:core_i7:7500u", "cpe:/h:intel:core_i5:4570t", "cpe:/h:intel:core_i3:4020y", "cpe:/h:intel:core_i3:330um", "cpe:/h:intel:core_i5:4360u", "cpe:/h:intel:xeon_e5:2658_v3", "cpe:/h:intel:core_i5:3360m", "cpe:/h:intel:atom_z:z3740d", "cpe:/h:intel:xeon_phi:7290", "cpe:/h:intel:xeon_gold:5120t", "cpe:/o:phoenixcontact:vl_ppc_2000_firmware:-", "cpe:/h:intel:xeon_e3_1260l:-", "cpe:/h:intel:xeon_e3:1515m_v5", "cpe:/o:suse:suse_linux_enterprise_software_development_kit:12", "cpe:/h:intel:xeon_e5_2620_v3:-", "cpe:/h:intel:xeon_e5_2650_v3:-", "cpe:/h:intel:core_i3:6320", "cpe:/o:siemens:simatic_winac_rtx_\\(f\\)_2010_firmware:2010", "cpe:/h:intel:core_i7:3689y", "cpe:/h:intel:pentium_j:j2900", "cpe:/h:intel:core_i7:4600u", "cpe:/h:intel:xeon_e5:4667_v4", "cpe:/h:intel:core_i7:820qm", "cpe:/h:intel:xeon_e5_2637_v2:-", "cpe:/h:intel:xeon_e5_2603_v2:-", "cpe:/h:intel:xeon_e5_2637_v3:-", "cpe:/h:intel:xeon:e7540", "cpe:/h:intel:xeon:e5530", "cpe:/h:intel:core_i3:3250", "cpe:/h:intel:core_i3:4360t", "cpe:/h:intel:xeon_e5:4617", "cpe:/h:intel:core_i5:4350u", "cpe:/h:intel:core_i7:4790t", "cpe:/h:intel:xeon_e5_2603_v3:-", "cpe:/h:intel:core_i3:4112e", "cpe:/h:intel:core_i5:460m", "cpe:/h:intel:xeon_e3_1270_v2:-", "cpe:/h:intel:xeon_e7:8830", "cpe:/h:intel:xeon_e5_2403:-", "cpe:/h:intel:core_i7:3635qm", "cpe:/h:intel:xeon_e5_2428l_v2:-", "cpe:/h:intel:xeon_e3_1226_v3:-", "cpe:/o:phoenixcontact:bl2_bpc_2000_firmware:-", "cpe:/h:intel:xeon_e7:8867_v3", "cpe:/h:intel:xeon_e7:4830", "cpe:/h:intel:xeon_e5:4603", "cpe:/h:intel:atom_c:c3308", "cpe:/h:intel:xeon_e3_1286l_v3:-", "cpe:/h:intel:xeon_e3_1280:-", "cpe:/h:intel:xeon_e5:2683_v3", "cpe:/h:intel:xeon_e7:8880_v4", "cpe:/o:phoenixcontact:vl_ipc_p7000_firmware:-", "cpe:/h:intel:core_i7:4558u", "cpe:/h:intel:core_i5:4690k", "cpe:/h:intel:core_i5:2410m", "cpe:/h:intel:core_i7:740qm", "cpe:/h:intel:core_i5:6500t", "cpe:/h:intel:xeon_e5:2658_v2", "cpe:/h:intel:xeon_gold:6134", "cpe:/h:intel:core_i5:3350p", "cpe:/h:intel:xeon_e7:8890_v2", "cpe:/h:intel:celeron_j:j1750", "cpe:/h:intel:xeon_e5_1650_v4:-", "cpe:/h:intel:celeron_j:j4005", "cpe:/h:intel:core_i3:3110m", "cpe:/h:intel:xeon_e3_1240_v6:-", "cpe:/h:intel:core_i7:920xm", "cpe:/h:intel:core_i5:4402e", "cpe:/h:intel:core_i3:4340te", "cpe:/h:intel:core_i7:4770s", "cpe:/a:netapp:solidfire:-", "cpe:/h:intel:celeron_n:n2805", "cpe:/h:intel:celeron_n:n3060", "cpe:/h:intel:xeon_e7:4820_v3", "cpe:/h:intel:xeon_e3_1240l_v3:-", "cpe:/h:intel:core_i3:3120m", "cpe:/h:intel:core_i7:4950hq", "cpe:/h:intel:core_i5:8350u", "cpe:/h:intel:xeon_e5:2699a_v4", "cpe:/h:intel:xeon_e3_1505l_v5:-", "cpe:/h:intel:xeon_e3_1225_v2:-", "cpe:/o:phoenixcontact:dl_ppc18.5m_7000_firmware:-", "cpe:/h:intel:xeon_platinum:8176m", "cpe:/h:intel:xeon:l7545", "cpe:/h:intel:core_i7:620um", "cpe:/h:intel:xeon_e3_1240_v3:-", "cpe:/h:intel:xeon_e3:1558l_v5", "cpe:/h:intel:xeon_e5_2418l:-", "cpe:/h:intel:xeon_e3_1290:-", "cpe:/h:intel:xeon_e5_2603_v4:-", "cpe:/h:intel:xeon_e3_1240_v5:-", "cpe:/h:intel:xeon:w3670", "cpe:/h:intel:core_i7:5700eq", "cpe:/h:intel:core_i7:940xm", "cpe:/h:intel:xeon_phi:7210f", "cpe:/h:intel:xeon:x7560", "cpe:/h:intel:core_i7:5775r", "cpe:/h:intel:pentium_n:n3530", "cpe:/h:intel:core_i3:3217ue", "cpe:/h:intel:xeon_e5:4627_v2", "cpe:/h:intel:xeon_e5_2403_v2:-", "cpe:/h:intel:xeon_e3_1230_v2:-", "cpe:/h:intel:xeon:e5620", "cpe:/h:intel:core_i7:3770s", "cpe:/h:intel:core_i3:3210", "cpe:/h:intel:core_i7:2635qm", "cpe:/h:intel:core_i7:660um", "cpe:/h:intel:xeon_e5:2658_v4", "cpe:/h:intel:core_i7:2710qe", "cpe:/h:intel:xeon_e5_2643_v2:-", "cpe:/h:intel:core_i5:2400", "cpe:/a:oracle:local_service_management_system:13.3", "cpe:/h:intel:core_m5:6y57", "cpe:/h:intel:xeon_e5:2650l_v4", "cpe:/h:intel:core_i5:3570s", "cpe:/h:intel:core_i7:7820eq", "cpe:/h:intel:celeron_n:n2830", "cpe:/h:intel:atom_c:c2316", "cpe:/h:intel:core_i7:4610y", "cpe:/h:intel:xeon_e5:2697_v3", "cpe:/h:intel:core_i3:3245", "cpe:/o:pepperl-fuchs:btc12_firmware:-", "cpe:/h:intel:core_i3:4130t", "cpe:/h:intel:xeon_e7:8891_v4", "cpe:/h:intel:xeon_e5_2650:-", "cpe:/h:intel:xeon_e3_1260l_v5:-", "cpe:/h:intel:xeon_e3_1275l_v3:-", "cpe:/h:intel:core_i5:2520m", "cpe:/h:intel:xeon_e5:2660", "cpe:/h:intel:xeon:x7542", "cpe:/h:intel:celeron_n:n2930", "cpe:/h:intel:core_i7:860s", "cpe:/h:intel:core_i5:6267u", "cpe:/h:intel:atom_z:z3560", "cpe:/h:intel:core_i5:6402p", "cpe:/h:intel:xeon_e3_1220:-", "cpe:/h:intel:xeon:x5677", "cpe:/h:intel:xeon:l5638", "cpe:/h:intel:xeon_e7:8867l", "cpe:/o:phoenixcontact:el_ppc_1000_firmware:-", "cpe:/h:intel:atom_c:c3758", "cpe:/h:intel:xeon:x5672", "cpe:/o:suse:suse_linux_enterprise_desktop:12", "cpe:/h:intel:core_i5:4460", "cpe:/h:intel:celeron_n:n2840", "cpe:/h:intel:pentium_n:n3510", "cpe:/h:intel:xeon_e7:8880l_v3", "cpe:/h:intel:xeon_gold:6132", "cpe:/h:intel:xeon_e5_2420:-", "cpe:/h:intel:xeon_e5:4627_v4", "cpe:/h:intel:xeon_e7:2830", "cpe:/h:intel:core_i7:620ue", "cpe:/h:intel:core_i7:3517u", "cpe:/h:intel:xeon_e3_1105c_v2:-", "cpe:/h:intel:core_i3:4110m", "cpe:/h:intel:core_i5:4430", "cpe:/h:intel:celeron_j:j4105", "cpe:/h:intel:atom_c:c3508", "cpe:/h:intel:xeon_e5_2450l:-", "cpe:/h:intel:core_i5:430m", "cpe:/h:intel:celeron_j:j1800", "cpe:/h:intel:core_i5:5287u", "cpe:/h:intel:xeon_e5_2430l:-", "cpe:/h:intel:core_i5:5300u", "cpe:/h:intel:xeon_e5_2630l:-", "cpe:/h:intel:xeon_e5_2630_v4:-", "cpe:/h:intel:atom_z:z3580", "cpe:/h:intel:core_i3:2115c", "cpe:/h:intel:core_i3:4110e", "cpe:/h:intel:core_i3:4005u", "cpe:/h:intel:core_i5:430um", "cpe:/h:intel:xeon:x5650", "cpe:/h:intel:xeon_e5:4667_v3", "cpe:/o:phoenixcontact:vl2_bpc_7000_firmware:-", "cpe:/h:intel:xeon:x3470", "cpe:/h:intel:xeon_e3_1285_v6:-", "cpe:/h:intel:core_i7:640m", "cpe:/h:intel:xeon:e5503", "cpe:/h:intel:core_i7:965", "cpe:/h:intel:atom_z:z3770d", "cpe:/h:intel:atom_z:z2560", "cpe:/h:intel:xeon:x5667", "cpe:/h:intel:core_i5:3317u", "cpe:/h:intel:xeon:x5570", "cpe:/h:intel:xeon_gold:6152", "cpe:/h:intel:core_i3:5157u", "cpe:/h:intel:core_i7:2600", "cpe:/h:intel:core_i5:3470", "cpe:/h:intel:xeon_e5:4650l", "cpe:/h:intel:core_i5:8400", "cpe:/h:intel:xeon_e5:2690_v4", "cpe:/h:intel:xeon_e3_1230_v5:-", "cpe:/h:intel:xeon_e7:8894_v4", "cpe:/h:intel:core_i3:4340", "cpe:/h:intel:core_i5:4200m", "cpe:/h:intel:core_i5:4570r", "cpe:/h:intel:xeon_e7:4820_v2", "cpe:/h:intel:core_i7:970", "cpe:/h:intel:atom_x3:c3445", "cpe:/o:phoenixcontact:bl_bpc_7001_firmware:-", "cpe:/h:intel:core_m3:6y30", "cpe:/h:intel:xeon_e7:4860_v2", "cpe:/h:intel:atom_c:c2308", "cpe:/h:intel:core_i5:3470s", "cpe:/h:intel:xeon_e5:2680_v2", "cpe:/h:intel:xeon_gold:6130f", "cpe:/h:intel:xeon_e5:4624l_v2", "cpe:/h:intel:core_i5:6287u", "cpe:/o:phoenixcontact:bl_rackmount_4u_firmware:-", "cpe:/h:intel:xeon_e7:4830_v2", "cpe:/h:intel:core_i7:5650u", "cpe:/h:intel:xeon:l5506", "cpe:/h:intel:atom_c:c2558", "cpe:/h:intel:xeon:e5603", "cpe:/h:intel:core_i3:540", "cpe:/h:intel:atom_c:c2718", "cpe:/h:intel:xeon_gold:5118", "cpe:/h:intel:xeon_e5:4655_v3", "cpe:/o:phoenixcontact:bl_bpc_3001_firmware:-", "cpe:/h:intel:xeon_e5_1650:-", "cpe:/h:intel:core_i7:2640m", "cpe:/h:intel:core_i3:4100u", "cpe:/h:intel:xeon_gold:6142", "cpe:/h:intel:core_i7:4702hq", "cpe:/h:intel:xeon_e5:2667_v2", "cpe:/h:intel:core_i7:2677m", "cpe:/h:intel:core_i5:4590t", "cpe:/h:intel:xeon:e5504", "cpe:/h:intel:core_i5:3570t", "cpe:/h:intel:core_i5:4670t", "cpe:/h:intel:core_i3:4000m", "cpe:/h:intel:xeon:l5518", "cpe:/h:intel:xeon_e5:4627_v3", "cpe:/h:intel:xeon_e5:4610_v2", "cpe:/h:intel:atom_z:z3480", "cpe:/h:intel:core_i7:4850hq", "cpe:/h:intel:core_i7:4810mq", "cpe:/o:suse:suse_linux_enterprise_software_development_kit:11", "cpe:/h:intel:atom_z:z3590", "cpe:/h:intel:core_i7:4860hq", "cpe:/h:intel:core_i7:8700k", "cpe:/o:phoenixcontact:bl_rackmount_2u_firmware:-", "cpe:/h:intel:core_i3:3250t", "cpe:/h:intel:xeon_e7:2880_v2", "cpe:/h:intel:core_i7:3630qm", "cpe:/h:intel:celeron_n:n2940", "cpe:/h:intel:xeon:ec5549", "cpe:/h:intel:xeon_e5_2428l_v3:-", "cpe:/o:phoenixcontact:bl_ppc15_1000_firmware:-", "cpe:/h:intel:core_m:5y70", "cpe:/h:intel:xeon_e7:8893_v2", "cpe:/h:intel:atom_z:z3775d", "cpe:/h:intel:xeon_e3_1220l_v3:-", "cpe:/h:intel:core_i5:2400s", "cpe:/h:intel:xeon_e5:4640_v3", "cpe:/h:intel:xeon_platinum:8160", "cpe:/h:intel:core_i5:5250u", "cpe:/h:intel:xeon:x5670", "cpe:/h:intel:core_i3:4170", "cpe:/h:intel:xeon_gold:6154", "cpe:/h:intel:xeon_e3_1235l_v5:-", "cpe:/h:intel:core_i3:5020u", "cpe:/h:intel:xeon_e7:4830_v4", "cpe:/h:intel:atom_z:z3745", "cpe:/h:intel:core_i5:6585r", "cpe:/h:intel:xeon_bronze_3104:-", "cpe:/h:intel:core_i3:4360", "cpe:/h:intel:xeon_e7:4870", "cpe:/h:intel:xeon_platinum:8153", "cpe:/h:intel:core_i7:2600k", "cpe:/h:intel:core_i3:3240", "cpe:/h:intel:core_i5:3340", "cpe:/h:intel:xeon_e5_2438l_v3:-", "cpe:/h:intel:core_i5:520um", "cpe:/h:intel:xeon_e3_1225:-", "cpe:/o:phoenixcontact:bl_bpc_7000_firmware:-", "cpe:/h:intel:pentium_n:n3710", "cpe:/h:intel:xeon_e7:2870", "cpe:/h:intel:xeon_e3_1230_v6:-", "cpe:/h:intel:core_i5:3450s", "cpe:/h:intel:xeon_e5_2643_v4:-", "cpe:/o:phoenixcontact:vl_bpc_1000_firmware:-", "cpe:/h:intel:core_i5:750", "cpe:/h:intel:xeon_e5_2637_v4:-", "cpe:/h:intel:core_i5:6360u", "cpe:/h:intel:core_i7:720qm", "cpe:/h:intel:xeon_e3_1230:-", "cpe:/h:intel:xeon_platinum:8170m", "cpe:/h:intel:core_i5:3340m", "cpe:/h:intel:xeon_e5:4628l_v4", "cpe:/h:intel:xeon_e5:4620_v3", "cpe:/h:intel:atom_c:c2538", "cpe:/h:intel:xeon_e7:8891_v3", "cpe:/h:intel:xeon_e5_2450_v2:-", "cpe:/h:intel:xeon_e5_1620_v3:-", "cpe:/h:intel:core_i5:4440s", "cpe:/h:intel:atom_z:z2480", "cpe:/h:intel:xeon_e3_1286_v3:-", "cpe:/h:intel:core_i7:4770t", "cpe:/h:intel:xeon_phi:7295", "cpe:/h:intel:xeon_e5_1620_v2:-", "cpe:/h:intel:xeon_e7:4850_v3", "cpe:/h:intel:atom_e:e3827", "cpe:/h:intel:xeon_platinum:8160f", "cpe:/h:intel:core_i5:6300u", "cpe:/h:intel:core_i5:6440hq", "cpe:/h:intel:xeon:x7550", "cpe:/h:intel:core_i7:5600u", "cpe:/h:intel:xeon_e7:2870_v2", "cpe:/h:intel:core_i7:4770k", "cpe:/h:intel:core_i3:6100te", "cpe:/h:intel:xeon_e7:4820_v4", "cpe:/h:intel:xeon_e5:2697_v2", "cpe:/a:oracle:local_service_management_system:13.2", "cpe:/h:intel:xeon_e5_2418l_v2:-", "cpe:/h:intel:xeon_e5:2670_v2", "cpe:/h:intel:xeon:x6550", "cpe:/h:intel:xeon_gold:6148f", "cpe:/h:intel:core_i5:520e", "cpe:/h:intel:xeon_e5:2670", "cpe:/h:intel:xeon_e3_1220_v3:-", "cpe:/h:intel:xeon_platinum:8180", "cpe:/h:intel:celeron_n:n2910", "cpe:/h:intel:xeon_e5_2430_v2:-", "cpe:/h:intel:core_i5:3570k", "cpe:/h:intel:xeon_e5:2695_v4", "cpe:/h:intel:core_i3:330e", "cpe:/h:intel:core_i5:655k", "cpe:/h:intel:xeon_platinum:8160t", "cpe:/h:intel:atom_z:z3570", "cpe:/h:intel:xeon_e3_1278l_v4:-", "cpe:/h:intel:core_i5:6260u", "cpe:/h:intel:core_i5:4210y", "cpe:/h:intel:xeon_e7:8870", "cpe:/h:intel:core_i7:3667u", "cpe:/h:intel:core_i3:4100e", "cpe:/h:intel:core_i7:7920hq", "cpe:/h:intel:core_i7:4650u", "cpe:/h:intel:pentium_j:j2850", "cpe:/h:intel:xeon_e3_1125c:-", "cpe:/h:intel:core_i5:4670s", "cpe:/o:phoenixcontact:vl2_bpc_1000_firmware:-", "cpe:/h:intel:xeon_e5:2699_v3", "cpe:/h:intel:celeron_j:j1850", "cpe:/h:intel:core_i7:4770hq", "cpe:/h:intel:core_i7:4550u", "cpe:/h:intel:core_i5:4210u", "cpe:/h:intel:core_i5:3339y", "cpe:/h:intel:xeon_e7:4809_v2", "cpe:/h:intel:xeon_e3_1285_v3:-", "cpe:/h:intel:core_i5:650", "cpe:/h:intel:xeon_e3_1280_v5:-", "cpe:/h:intel:core_i5:3210m", "cpe:/h:intel:core_i7:3740qm", "cpe:/h:intel:core_i3:2367m", "cpe:/h:intel:core_i3:6300t", "cpe:/h:intel:xeon:x5647", "cpe:/h:intel:xeon_e7:2860", "cpe:/h:intel:core_i7:4910mq", "cpe:/h:intel:celeron_n:n3350", "cpe:/o:phoenixcontact:vl_ppc_3000_firmware:-", "cpe:/h:intel:core_i5:8250u", "cpe:/h:intel:xeon_e5:2698_v3", "cpe:/h:intel:xeon_e5_2650l_v2:-", "cpe:/h:intel:core_i7:2700k", "cpe:/h:intel:core_i7:620le", "cpe:/h:intel:core_i3:4350", "cpe:/h:intel:xeon_e3_1505m_v5:-", "cpe:/h:intel:xeon_e5:4650", "cpe:/h:intel:atom_e:e3815", "cpe:/h:intel:core_i7:3610qe", "cpe:/h:intel:core_i5:560um", "cpe:/h:intel:xeon_e5_2648l_v3:-", "cpe:/h:intel:core_i5:4402ec", "cpe:/h:intel:atom_z:z3775", "cpe:/h:intel:xeon_e3_12201:-", "cpe:/h:intel:xeon_e5_1630_v4:-", "cpe:/h:intel:core_i5:2510e", "cpe:/h:intel:celeron_n:n2810", "cpe:/h:intel:core_i7:5557u", "cpe:/h:intel:core_i7:4700eq", "cpe:/h:intel:xeon_phi:7210", "cpe:/h:intel:xeon_e7:4850_v2", "cpe:/h:intel:atom_z:z3735d", "cpe:/h:intel:core_i5:3337u", "cpe:/h:intel:core_i5:4590s", "cpe:/h:intel:core_i7:2600s", "cpe:/h:intel:core_m:5y71", "cpe:/h:intel:core_i3:4130", "cpe:/h:intel:xeon_e7:4809_v4", "cpe:/h:intel:xeon_e5_2418l_v3:-", "cpe:/h:intel:atom_z:z3735g", "cpe:/h:intel:core_i7:7700t", "cpe:/h:intel:xeon_silver:4116", "cpe:/h:intel:core_i7:7y75", "cpe:/o:oracle:solaris:10", "cpe:/h:intel:xeon:e5506", "cpe:/h:intel:atom_c:c2508", "cpe:/h:intel:xeon_e7:8890_v3", "cpe:/o:phoenixcontact:bl_bpc_3000_firmware:-", "cpe:/o:phoenixcontact:bl_ppc17_3000_firmware:-", "cpe:/h:intel:core_i7:680um", "cpe:/h:intel:xeon_e3_1240l_v5:-", "cpe:/h:intel:xeon_gold:6140", "cpe:/h:intel:core_i7:2630qm", "cpe:/h:intel:xeon_e5_2450l_v2:-", "cpe:/h:intel:xeon_phi:7230", "cpe:/h:intel:core_i3:4330", "cpe:/h:intel:core_i5:670", "cpe:/h:intel:xeon:l5640", "cpe:/h:intel:xeon_phi:7285", "cpe:/h:intel:xeon_phi:7290f", "cpe:/h:intel:core_i7:2649m", "cpe:/h:intel:atom_x3:c3200rk", "cpe:/h:intel:xeon_e5:4640_v4", "cpe:/h:intel:xeon_e5_2618l_v4:-", "cpe:/h:intel:xeon_e5_2609_v3:-", "cpe:/h:intel:core_i5:5675c", "cpe:/h:intel:core_i5:4570te", "cpe:/h:intel:core_i3:2105", "cpe:/h:intel:core_i3:2348m", "cpe:/h:intel:atom_z:z2760", "cpe:/h:intel:core_i3:2310e", "cpe:/h:intel:core_i5:5575r", "cpe:/o:vmware:esxi:5.5.0", "cpe:/h:intel:xeon_e3_1245_v2:-", "cpe:/h:intel:xeon_e7:8893_v3", "cpe:/h:intel:core_i5:560m", "cpe:/h:intel:core_i5:4670k", "cpe:/h:intel:core_i5:6442eq", "cpe:/h:intel:core_i7:5775c", "cpe:/h:intel:core_i3:380m", "cpe:/h:intel:core_i3:2100", "cpe:/h:intel:core_i7:4770r", "cpe:/h:intel:xeon_e3_1268l_v3:-", "cpe:/h:intel:core_i5:4202y", "cpe:/h:intel:xeon_e5:2699r_v4", "cpe:/h:intel:core_i5:661", "cpe:/h:intel:core_i7:2637m", "cpe:/h:intel:xeon_e3_1285l_v4:-", "cpe:/h:intel:xeon_e5:2699_v4", "cpe:/h:intel:core_i7:4790", "cpe:/h:intel:xeon_e3_1245_v3:-", "cpe:/h:intel:xeon_e3_1125c_v2:-", "cpe:/h:intel:xeon_e5_2640:-", "cpe:/h:intel:core_i3:370m", "cpe:/h:intel:xeon_silver:4114", "cpe:/h:intel:celeron_n:n2920", "cpe:/h:intel:xeon_gold:5119t", "cpe:/h:intel:xeon_e5_2648l_v4:-", "cpe:/h:intel:core_i5:450m", "cpe:/h:intel:celeron_n:n4100", "cpe:/h:intel:xeon_e3_1265l_v2:-", "cpe:/h:intel:atom_c:c3338", "cpe:/h:intel:core_i7:2960xm", "cpe:/h:intel:core_i5:2500s", "cpe:/h:intel:core_i7:3720qm", "cpe:/h:intel:core_i7:960", "cpe:/h:intel:core_i5:4260u", "cpe:/h:intel:core_i7:7700k", "cpe:/h:intel:xeon_e5:4655_v4", "cpe:/h:intel:xeon_e5_2608l_v4:-", "cpe:/h:intel:xeon_e7:2890_v2", "cpe:/h:intel:core_i3:6102e", "cpe:/h:intel:core_i5:4310m", "cpe:/h:intel:xeon_e5:4607", "cpe:/h:intel:xeon_e3:1578l_v5", "cpe:/h:intel:core_i5:8600k", "cpe:/h:intel:xeon:l5520", "cpe:/h:intel:core_i7:4980hq", "cpe:/h:intel:xeon_e7:4809_v3", "cpe:/h:intel:xeon_e5:2665", "cpe:/h:intel:core_i5:6600k", "cpe:/o:opensuse:leap:42.2", "cpe:/h:intel:xeon_e5_1650_v2:-", "cpe:/h:intel:xeon_e5_2603:-", "cpe:/h:intel:xeon_e3_1265l_v4:-", "cpe:/h:intel:xeon:ec5539", "cpe:/h:intel:core_i3:3240t", "cpe:/h:intel:core_i5:4310u", "cpe:/h:intel:core_i5:3330", "cpe:/h:intel:core_i7:3687u", "cpe:/h:intel:xeon_e5:4607_v2", "cpe:/h:intel:atom_e:e3845", "cpe:/h:intel:core_i7:4760hq", "cpe:/h:intel:atom_c:c3850", "cpe:/h:intel:core_i3:2125", "cpe:/h:intel:pentium_j:j3710", "cpe:/h:intel:xeon:x5550", "cpe:/h:intel:xeon_e-1105c:-", "cpe:/h:intel:xeon_e3_1220_v5:-", "cpe:/h:intel:atom_c:c2516", "cpe:/h:intel:core_i7:930", "cpe:/h:intel:core_i7:5850hq", "cpe:/h:intel:xeon_e7:8860_v3", "cpe:/h:intel:core_i3:550", "cpe:/o:phoenixcontact:dl_ppc15_1000_firmware:-", "cpe:/h:intel:core_i5:2450p", "cpe:/a:synology:skynas:-", "cpe:/h:intel:core_i7:4712mq", "cpe:/h:intel:core_i5:4460t", "cpe:/o:phoenixcontact:bl_ppc12_1000_firmware:-", "cpe:/h:intel:core_i7:5700hq", "cpe:/h:intel:xeon_e5_1680_v3:-", "cpe:/h:intel:core_i7:2820qm", "cpe:/h:intel:atom_z:z3530", "cpe:/h:intel:xeon_e3_1220_v6:-", "cpe:/h:intel:xeon_gold:5115", "cpe:/h:intel:xeon_e5_2630_v2:-", "cpe:/h:intel:atom_c:c3558", "cpe:/h:intel:xeon_e5:2690", "cpe:/h:intel:core_i7:8700", "cpe:/h:intel:core_i7:7567u", "cpe:/h:intel:xeon_gold:6150", "cpe:/h:intel:xeon_e3_1258l_v4:-", "cpe:/h:intel:xeon_e5_2628l_v2:-", "cpe:/h:intel:xeon_e5:4669_v4", "cpe:/h:intel:core_i7:2657m", "cpe:/h:intel:core_i7:7600u", "cpe:/h:intel:atom_z:z3770", "cpe:/h:intel:xeon_e5:2690_v3", "cpe:/h:intel:core_i7:2629m", "cpe:/h:intel:core_i7:3520m", "cpe:/h:intel:core_i7:4785t", "cpe:/h:intel:xeon:x5690", "cpe:/h:intel:atom_c:c2550", "cpe:/h:intel:core_i3:6006u", "cpe:/h:intel:core_m:5y51", "cpe:/h:intel:core_i7:2760qm", "cpe:/o:suse:suse_linux_enterprise_server:11", "cpe:/h:intel:xeon_silver:4109t", "cpe:/h:intel:core_i3:6157u", "cpe:/h:intel:xeon_e5_1680_v4:-", "cpe:/o:phoenixcontact:bl2_ppc_7000_firmware:-", "cpe:/h:intel:xeon_gold:6136", "cpe:/h:intel:xeon_e5:2667_v4", "cpe:/h:intel:xeon_e7:8860", "cpe:/h:intel:celeron_n:n2815", "cpe:/h:intel:xeon:e7520", "cpe:/a:pepperl-fuchs:visunet_rm_shell:-", "cpe:/h:intel:xeon_e5_1428l:-", "cpe:/h:intel:core_i3:2350m", "cpe:/h:intel:xeon_e3:1575m_v5", "cpe:/h:intel:xeon_e5:2658a_v3", "cpe:/h:intel:xeon:x3480", "cpe:/a:oracle:local_service_management_system:13.1", "cpe:/h:intel:xeon_e5:2670_v3", "cpe:/h:intel:atom_z:z3736f", "cpe:/h:intel:core_i3:4350t", "cpe:/h:intel:xeon_e5_2650_v4:-", "cpe:/h:intel:atom_c:c2758", "cpe:/h:intel:pentium_n:n3700", "cpe:/h:intel:xeon:x3440", "cpe:/h:intel:core_i7:870", "cpe:/h:intel:core_i5:4288u", "cpe:/h:intel:xeon_e5:2690_v2", "cpe:/o:phoenixcontact:bl_bpc_2000_firmware:-", "cpe:/h:intel:core_i7:7700hq", "cpe:/o:phoenixcontact:vl2_bpc_9000_firmware:-", "cpe:/h:intel:xeon_silver:4110", "cpe:/h:intel:atom_z:z2520", "cpe:/h:intel:xeon:e5607", "cpe:/h:intel:core_i5:4302y", "cpe:/o:oracle:solaris:11.3", "cpe:/h:intel:xeon_platinum:8176", "cpe:/h:intel:core_i3:4330te", "cpe:/h:intel:core_i3:3115c", "cpe:/o:phoenixcontact:valueline_ipc_firmware:-", "cpe:/h:intel:core_i7:3820qm", "cpe:/h:intel:xeon_e3_1280_v6:-", "cpe:/h:intel:core_i3:4370", "cpe:/h:intel:xeon_e3:1565l_v5", "cpe:/h:intel:core_i7:4700ec", "cpe:/h:intel:xeon:x3450", "cpe:/h:intel:xeon:e5630", "cpe:/h:intel:xeon_e3_1275_v3:-", "cpe:/h:intel:xeon_bronze_3106:-", "cpe:/h:intel:core_i3:2102", "cpe:/h:intel:core_i5:3550s", "cpe:/h:intel:xeon:l5609", "cpe:/o:phoenixcontact:bl_ppc17_7000_firmware:-", "cpe:/h:intel:xeon_e3_1241_v3:-", "cpe:/h:intel:atom_z:z3785", "cpe:/h:intel:xeon_e5_2643_v3:-", "cpe:/h:intel:celeron_n:n2806", "cpe:/h:intel:xeon_e3_1275_v2:-", "cpe:/h:intel:core_i7:5500u", "cpe:/h:intel:core_i5:4300u", "cpe:/h:intel:core_i5:4570s", "cpe:/h:intel:core_i7:2720qm", "cpe:/h:intel:celeron_n:n3050", "cpe:/h:intel:xeon_platinum:8158", "cpe:/h:intel:xeon:w3680", "cpe:/h:intel:xeon_e5:2660_v4", "cpe:/h:intel:core_i7:920", "cpe:/h:intel:core_i3:4010u", "cpe:/h:intel:core_i3:4030u", "cpe:/h:intel:core_i7:8550u", "cpe:/h:intel:xeon_e5:4650_v3", "cpe:/h:intel:atom_c:c2338", "cpe:/h:intel:core_i3:6100", "cpe:/h:intel:xeon:l5530", "cpe:/h:intel:xeon_e7:8893_v4", "cpe:/h:intel:core_i3:6100t", "cpe:/h:intel:core_i5:4210m", "cpe:/h:intel:atom_c:c3950", "cpe:/o:phoenixcontact:bl_ppc_1000_firmware:-", "cpe:/h:intel:core_i7:7660u", "cpe:/h:intel:atom_x3:c3235rk", "cpe:/h:intel:xeon_e5:4669_v3", "cpe:/h:intel:xeon:ec5509", "cpe:/h:intel:core_i5:750s", "cpe:/h:intel:xeon_e7:4807", "cpe:/h:intel:xeon_e3_1245_v6:-", "cpe:/o:phoenixcontact:bl_ppc15_3000_firmware:-", "cpe:/o:canonical:ubuntu_linux:14.04", "cpe:/o:debian:debian_linux:9.0", "cpe:/h:intel:core_i7:4765t", "cpe:/h:intel:xeon_e5_2609:-", "cpe:/h:intel:xeon_e5:2695_v3", "cpe:/h:intel:core_i5:2550k", "cpe:/o:phoenixcontact:vl2_ppc_7000_firmware:-", "cpe:/h:intel:core_i5:2310", "cpe:/h:intel:xeon:l3426"], "id": "CVE-2017-5753", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5753", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}, "cpe23": ["cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2603:-:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201603202:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6126:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201608401:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x3450:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2518:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:vl2_bpc_7000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:arm:cortex-a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201609401:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5630:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4657l_v2:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201509101:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201702202:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1680_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6148:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201609403:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4640_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:1585l_v5:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6126f:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201702211:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1285_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:vl2_bpc_9000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1231_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m5:6y57:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8880l_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201702207:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8860_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2618l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4603:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j:j3060:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2695_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4610:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2350:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2650l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2648l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6138t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201702102:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2430l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6142f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n3000:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4650_v2:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201509206:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4669_v4:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:-:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n2910:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201603101:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1241_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201706103:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4628l_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4669_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2680_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2530:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1268l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:1515m_v5:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2643_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1660:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:5120t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1125c_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201407101:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:bl2_bpc_7000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4620_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8867_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:2850_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8880l_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6130t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_phi:7230f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1620_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3450:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201509210:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201409203:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_phi:7210:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:2860:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201403201:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5502:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201403211:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2428l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4820_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1246_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8890_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x5560:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:local_service_management_system:13.1:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8860:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2658a_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x5675:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2603_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1270_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201603201:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4610_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1240_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2609_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_12201:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:dl_ppc15_1000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201612101:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2640_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8830:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2450l:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:vl_ipc_p7000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1280_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2670_v3:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201702204:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n2810:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_phi:7250:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201608403:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4610_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:l3426:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2690:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1225_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3785:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2630l:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:vl_bpc_3000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:bl_ppc15_3000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:pepperl-fuchs:btc12_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201501403:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201512102:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2695_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:l5638:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m:5y71:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_x3:c3265rk:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4850:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4650l:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201601401:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201403205:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1220_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4624l_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8880_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2699r_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x7542:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2695_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8870_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8850_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m:5y10:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201409206:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4620:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:1575m_v5:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_x3:c3445:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2438l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4603_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:bl_bpc_3001_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201501101:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2620_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*", "cpe:2.3:o:synology:vs960hd_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n4100:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:vl2_ppc_3000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5504:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:2820:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e7520:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8867l:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:vl_ppc_2000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:1578l_v5:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201507401:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1225:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2450_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201505404:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2448l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8880_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e7540:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8893_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201507101:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8893_v2:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201608405:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:bl_rackmount_2u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201509207:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6150:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3775d:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2670_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x5650:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4627_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2628l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201601102:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2730:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201509208:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201709103:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201509203:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201702209:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6126t:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201702208:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2640:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:bl_ppc17_1000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201608405:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4890_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2660_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2407:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x5647:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2687w_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1275_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2697a_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2620:-:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2448l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1230:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x5660:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201509209:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201612402:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8857_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8891_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n3160:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201601405:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:el_ppc_1000\\/m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x5680:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201501401:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201609101:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:vl2_ppc_2000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n4000:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201403203:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1285l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:2830:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2418l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4809_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:l5640:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6140m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1275l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201409202:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201509205:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201706101:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_desktop:12:sp3:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2623_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5645:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-1105c:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1280:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1286l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:bl_ppc_1000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2683_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2603_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2630_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2658_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2699_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2643_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201507407:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:l5530:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2630l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_phi:7230:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201410403:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4607:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3775:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201410405:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2430_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2660:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2630l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n2830:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2650_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5603:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1630_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2680_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201603205:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:vl2_ppc_1000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201602401:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2637_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1240_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2643_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201507402:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2698_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1620_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:el_ppc_1000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2648l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x3430:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_j:j3710:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:2890_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2640_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5503:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:bl2_ppc_2000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_n:n3530:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n2930:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1290_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201512403:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:l5518:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2630_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2650:-:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201601402:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1240l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2358:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5607:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201608404:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201706401:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2403:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4627_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1230_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201509102:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:vl2_bpc_3000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201710301:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201709401:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:bl_ppc15_7000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2637:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m5:6y54:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8860_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1281_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_n:n3520:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201501404:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:vl_bpc_2000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n3350:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2687w_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m:5y51:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2667_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4870_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2316:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1620:-:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201505401:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2428l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e7530:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:bl_ppc17_7000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4880_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1230_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:5120:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201706402:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201507406:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2650l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_x3:c3295rk:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2470_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4655_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201602401:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201406401:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x5677:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201509212:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201504201:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1660_v2:-:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:local_service_management_system:13.3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201403204:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2608l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1505m_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2690_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:bl_rackmount_4u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n2815:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201505101:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2418l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:l5618:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201603203:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:1505m_v6:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201709402:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4850_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201404403:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4655_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1230l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5649:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6134:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6140:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1245_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201507404:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2660_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201512401:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1220:-:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m:5y10a:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x5687:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n3060:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_n:n3700:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2680:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1278l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4640:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2697_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:-:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_phi:7295:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:vl_bpc_1000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2637_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_x3:c3205rk:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201702205:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1650_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201706403:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_x3:c3235rk:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201407402:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201403202:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n2808:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:vl2_ppc_7000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:1535m_v5:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x5550:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2338:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:l5506:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2550:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:vl2_ppc9_1000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2620_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4809_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1240:-:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201507405:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1235:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:dl_ppc15m_7000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6128:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2450l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:bl2_bpc_2000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8891_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4820_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:ec5549:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201509204:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:5119t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m3:7y30:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:vl_ppc_3000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201608404:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2650_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8870:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201608401:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4640_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1265l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4807:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2650l_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:dl_ppc18.5m_7000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201702101:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201407102:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8837:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2697_v2:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201603207:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1620_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:l5520:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2687w:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3770d:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_x3:c3200rk:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4650:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4660_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5540:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201403102:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1275_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201702212:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1285_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2618l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201512404:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_j:j2850:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:5122:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4830:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201403209:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201404402:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4830_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_software_development_kit:12:sp3:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:1558l_v5:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201501405:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4870:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2618l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:ec5539:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2516:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:hci:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1276_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201312102:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201505402:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201703401:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4640_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4610_v4:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201608101:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x3470:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2609_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2650_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_x3:c3130:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201507102:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:1565l_v5:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:w3680:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:bl_bpc_2000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1270_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j:j1850:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201409201:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1125c:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1270:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n2940:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1660_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201403210:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:l7555:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201403206:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2650l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1505l_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201509201:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4820:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6134m:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201608403:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201709101:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201410401:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201702201:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_x3:c3405:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1271_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:w3670:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201703401:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:vl2_ppc12_1000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8850:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2690_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201407401:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4650_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8867_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp2:*:*:*:*:raspberry_pi:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201312401:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:bl_ppc_7000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:bl_ppc15_1000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4830_v4:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201608402:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:2870:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201504401:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2508:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6138:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2648l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1428l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j:j3355:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2620_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4620_v4:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201505401:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2630:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2690_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5640:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201404401:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:1535m_v6:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8893_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:2850:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x5670:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_j:j4205:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1226_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2758:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4850_v3:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp2:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2418l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1501l_v6:-:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201601101:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201509207:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:bl_bpc_7001_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201509202:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n2806:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m:5y10c:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_n:n4200:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201611403:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2630l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n2805:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201509204:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1245:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2623_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m:5y31:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e6510:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2718:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201501402:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x5672:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4667_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1290:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:l5609:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n3010:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:bl_bpc_2001_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp3:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2699_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8890_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201410402:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m:5y70:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:1545m_v5:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201702210:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2699a_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201509101:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x3480:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201608402:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:w5590:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:l5630:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:2880_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6142:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2630_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2407_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2603_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2420:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8891_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2687w_v2:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201509211:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2658_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1245_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j:j1750:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:vl2_ppc_9000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4809_v4:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201409205:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1630_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1650_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x6550:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201509206:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_phi:7285:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8890_v4:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_winac_rtx_\\(f\\)_2010_firmware:2010:-:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:bl_bpc_3000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*", "cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201410101:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:l7545:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2698_v4:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201709102:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n2920:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4820_v2:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201702203:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x7560:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201409207:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_n:n3510:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1225_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6152:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:valueline_ipc_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:local_service_management_system:13.2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201509209:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_n:n3540:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:vl2_bpc_2000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x3440:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_phi:7290:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp4:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2680_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201507403:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201409204:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201509202:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201603102:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4860_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201609402:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1428l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201612401:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2558:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201403101:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1258l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2440:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x3460:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6138f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6132:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201612102:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5606:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:bl_bpc_7000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n2807:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201608101:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2470:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5530:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201407404:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1660_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_desktop:12:sp2:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201610410:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201706102:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j:j3160:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2430:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1275:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6142m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8870_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2609_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1280_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6130f:*:*:*:*:*:*:*", "cpe:2.3:o:arm:cortex-r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:l5508:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4850_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201611401:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4660_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1501m_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:1585_v5:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201512402:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201601403:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1428l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2683_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2628l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_winac_rtx_\\(f\\)_2010_firmware:2010:sp1:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201512101:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6136:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2665:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201404420:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5507:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_phi:7250f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2538:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4607_v2:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201509203:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_12201_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1220_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_phi:7290f:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201603208:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201410406:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201608102:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2450:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:bl2_bpc_1000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2648l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2658_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:vl2_bpc_1000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201510401:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201702206:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5520:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2738:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2440_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:5118:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201601401:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201509102:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1680_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_phi:7235:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201502401:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2658:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2640_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_j:j2900:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:w3690:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8870_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:2803:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201605401:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201510401:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:el_ppc_1000\\/wt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201410404:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_x3:c3230rk:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1650_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:w5580:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:vl2_ppc7_1000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x5570:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2667:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2430l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2667_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6144:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1105c_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5506:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4648_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_n:n3710:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6154:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j:j1900:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e6540:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201603206:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201403208:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:bl2_ppc_7000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2428l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4650_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2408l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4620_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201609102:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x7550:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201509213:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1286_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201505403:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1650:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n2840:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2609:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201601404:*:*:*:*:*:*", "cpe:2.3:o:pepperl-fuchs:btc14_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5620:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201611402:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2637_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m7:6y75:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:bl_ppc12_1000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_software_development_kit:12:sp2:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2608l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4627_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1505l_v5:-:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201407403:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n3150:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4617:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8880_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2420_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3795:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201403207:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201603204:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n3050:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_phi:7210f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201509201:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2628l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:l3406:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6130:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m3:6y30:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:bl2_ppc_1000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2660_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1285l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x5667:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8894_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1260l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:bl_ppc17_3000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:lc5528:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201409101:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*", "cpe:2.3:o:synology:vs360hd_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:dl_ppc21.5m_7000_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2750:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x5690:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m3:7y32:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1265l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201509208:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:ec5509:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2643:-:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201709403:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2697_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201312101:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*", "cpe:2.3:a:pepperl-fuchs:visunet_rm_shell:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1220l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_winac_rtx_\\(f\\)_2010_firmware:2010:sp2:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201509205:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:lc5518:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6148f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201509210:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.0:600-201511401:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2403_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6146:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2670:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201312402:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:5.5.0:550-201407405:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n2820:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2667_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4667_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j:j1800:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4830_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:2870_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1265l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4860:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:36:47", "description": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "edition": 13, "cvss3": {"exploitabilityScore": 1.1, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "CHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.6, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 4.0}, "published": "2018-01-04T13:29:00", "title": "CVE-2017-5715", "type": "cve", "cwe": ["CWE-200"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.7, "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-5715"], "modified": "2020-05-05T11:31:00", "cpe": ["cpe:/h:intel:core_i3:4330t", "cpe:/h:intel:core_i7:840qm", "cpe:/h:intel:core_i3:530", "cpe:/h:intel:celeron_n:n4000", "cpe:/h:intel:core_i5:4200u", "cpe:/h:intel:core_i5:2405s", "cpe:/h:intel:xeon_e3_1225_v3:-", "cpe:/h:intel:core_i7:4710hq", "cpe:/h:intel:xeon_phi:7230f", "cpe:/h:intel:xeon_e5:2680", "cpe:/h:intel:xeon:e5520", "cpe:/h:intel:xeon_e5_2407_v2:-", "cpe:/h:intel:pentium_n:n3520", "cpe:/h:intel:core_i7:875k", "cpe:/h:intel:atom_z:z3735e", "cpe:/h:intel:core_i3:6098p", "cpe:/h:intel:xeon_e5_2448l:-", "cpe:/h:intel:core_i7:870s", "cpe:/h:intel:core_i7:4610m", "cpe:/h:intel:core_i7:2675qm", "cpe:/h:intel:core_i7:4702ec", "cpe:/h:intel:xeon_e5:4648_v3", "cpe:/h:intel:xeon_e5_2620_v2:-", "cpe:/h:intel:xeon_e3_1240_v2:-", "cpe:/h:intel:xeon_gold:6138", "cpe:/h:intel:core_i5:480m", "cpe:/h:intel:xeon_e5_2637:-", "cpe:/h:intel:xeon_e5_2618l_v3:-", "cpe:/h:intel:atom_z:z3736g", "cpe:/h:intel:xeon_e5_1660_v3:-", "cpe:/h:intel:xeon_e5_2650l_v3:-", "cpe:/h:intel:xeon_silver:4116t", "cpe:/h:intel:xeon_gold:6144", "cpe:/h:intel:xeon_phi:7250f", "cpe:/h:intel:atom_x3:c3230rk", "cpe:/h:intel:xeon_e3_1270:-", "cpe:/h:intel:xeon_platinum:8176f", "cpe:/h:intel:core_i3:2330e", "cpe:/h:intel:core_i5:4410e", "cpe:/h:intel:core_i7:4700hq", "cpe:/h:intel:core_i7:610e", "cpe:/h:intel:celeron_n:n2808", "cpe:/h:intel:core_i3:2340ue", "cpe:/h:intel:core_i7:4800mq", "cpe:/h:intel:xeon_gold:6126t", "cpe:/h:intel:xeon_e5:4603_v2", "cpe:/h:intel:core_m:5y31", "cpe:/h:intel:xeon_e5:4620", "cpe:/h:intel:core_i7:2620m", "cpe:/h:intel:xeon_e5_1428l_v3:-", "cpe:/h:intel:xeon:w5580", "cpe:/h:intel:atom_z:z2460", "cpe:/h:intel:core_i5:3550", "cpe:/h:intel:xeon_e7:8867_v4", "cpe:/h:intel:xeon_gold:6138t", "cpe:/h:intel:atom_c:c2358", "cpe:/h:intel:core_i3:2120", "cpe:/h:intel:xeon_e3_1501l_v6:-", "cpe:/h:intel:xeon:lc5518", "cpe:/h:intel:core_i5:6400t", "cpe:/h:intel:xeon_e3_1230l_v3:-", "cpe:/h:intel:xeon_e5:4650_v4", "cpe:/h:intel:core_i3:350m", "cpe:/h:intel:core_i7:3615qm", "cpe:/h:intel:core_i3:3227u", "cpe:/h:intel:xeon_e5:2687w", "cpe:/h:intel:xeon_e5_2623_v4:-", "cpe:/h:intel:core_i5:4200y", "cpe:/h:intel:core_i3:2357m", "cpe:/h:intel:core_i7:4750hq", "cpe:/h:intel:atom_c:c3858", "cpe:/h:intel:core_i3:2377m", "cpe:/h:intel:core_m:5y10", "cpe:/h:intel:core_i7:3537u", "cpe:/h:intel:xeon_e3_1245:-", "cpe:/h:intel:xeon_e5_2470_v2:-", "cpe:/h:intel:xeon_e5_2408l_v3:-", "cpe:/h:intel:core_i5:4422e", "cpe:/h:intel:xeon_e3_1246_v3:-", "cpe:/h:intel:xeon_e5_2623_v3:-", "cpe:/h:intel:atom_x3:c3295rk", "cpe:/h:intel:xeon:w5590", "cpe:/h:intel:atom_c:c3955", "cpe:/h:intel:xeon:lc5528", "cpe:/h:arm:cortex-a:73", "cpe:/h:intel:atom_c:c2730", "cpe:/h:intel:atom_c:c2518", "cpe:/h:intel:xeon_e5_2640_v2:-", "cpe:/h:intel:core_i5:6200u", "cpe:/h:intel:core_i3:6100h", "cpe:/h:intel:atom_x3:c3265rk", "cpe:/h:intel:xeon_platinum:8160m", "cpe:/h:intel:xeon_e3_1265l_v3:-", "cpe:/h:intel:core_i5:4670r", "cpe:/h:intel:core_i7:4770te", "cpe:/h:intel:xeon_gold:6126f", "cpe:/h:intel:celeron_j:j3355", "cpe:/h:intel:xeon_e7:4830_v3", "cpe:/h:intel:xeon_e5_1428l_v2:-", "cpe:/h:intel:xeon_e3:1545m_v5", "cpe:/h:intel:xeon_e5:2660_v3", "cpe:/h:intel:core_i5:4300y", "cpe:/h:intel:atom_c:c3808", "cpe:/h:intel:core_i5:3610me", "cpe:/h:intel:core_i5:4250u", "cpe:/h:intel:core_i5:3475s", "cpe:/h:intel:xeon_e5:2695_v2", "cpe:/h:intel:core_i7:3517ue", "cpe:/h:intel:xeon_e5:4650_v2", "cpe:/h:intel:core_i7:4500u", "cpe:/h:intel:core_i5:4430s", "cpe:/h:intel:core_i3:2365m", "cpe:/h:intel:core_i7:2920xm", "cpe:/h:intel:core_i3:330m", "cpe:/h:intel:xeon_e5:4640", "cpe:/h:intel:xeon_e5:2667_v3", "cpe:/h:intel:core_i7:3612qm", "cpe:/h:intel:core_i7:4900mq", "cpe:/h:intel:core_i5:4258u", "cpe:/h:intel:core_i3:4160", "cpe:/h:intel:core_i5:4590", "cpe:/h:intel:xeon_e5:2683_v4", "cpe:/h:intel:xeon_e5_2440:-", "cpe:/h:intel:core_i7:980x", "cpe:/h:intel:core_i7:5750hq", "cpe:/h:intel:xeon_e3_1505l_v6:-", "cpe:/h:intel:xeon:l3406", "cpe:/h:intel:atom_e:e3825", "cpe:/h:intel:atom_c:c3538", "cpe:/h:intel:core_i5:3470t", "cpe:/h:intel:xeon_e5_1620:-", "cpe:/h:intel:atom_c:c2738", "cpe:/h:intel:xeon_e5_2630l_v4:-", "cpe:/h:intel:xeon:e5507", "cpe:/h:intel:core_i5:2500", "cpe:/h:intel:xeon_e5:2667", "cpe:/h:intel:core_i3:3120me", "cpe:/h:intel:core_i5:4400e", "cpe:/h:intel:core_i3:8100", "cpe:/h:intel:core_i5:2450m", "cpe:/h:arm:cortex-a:72", "cpe:/h:intel:xeon_e5:2687w_v4", "cpe:/h:intel:core_i5:2300", "cpe:/h:intel:xeon_e3:1535m_v5", "cpe:/h:intel:atom_z:z3740", "cpe:/h:intel:xeon_e5:2680_v3", "cpe:/h:intel:xeon_e7:8857_v2", "cpe:/h:intel:core_i5:4670", "cpe:/h:intel:core_i5:4300m", "cpe:/h:intel:core_i3:6167u", "cpe:/h:intel:core_i3:3220t", "cpe:/h:intel:core_i7:2617m", "cpe:/h:intel:pentium_n:n3540", "cpe:/h:intel:xeon_e5_2628l_v4:-", "cpe:/h:intel:core_i7:3540m", "cpe:/h:intel:xeon_e5_1660_v2:-", "cpe:/h:intel:xeon_gold:5120", "cpe:/h:intel:xeon_e5:4610_v3", "cpe:/h:intel:core_i5:3427u", "cpe:/h:intel:core_i7:3610qm", "cpe:/h:intel:core_m:5y10c", "cpe:/h:intel:core_i7:3770", "cpe:/h:intel:xeon_e3:1585_v5", "cpe:/h:intel:xeon_e3_1225_v6:-", "cpe:/h:intel:xeon_e3_1275_v5:-", "cpe:/h:intel:xeon_e5:2658", "cpe:/h:intel:core_i5:3450", "cpe:/h:intel:core_i7:620lm", "cpe:/h:intel:xeon_e3_1280_v2:-", "cpe:/h:intel:core_i5:5675r", "cpe:/h:intel:xeon_e5_2608l_v3:-", "cpe:/h:intel:core_m:5y10a", "cpe:/h:intel:xeon:e6540", "cpe:/h:intel:core_i7:4712hq", "cpe:/h:intel:core_i7:7560u", "cpe:/h:intel:core_i3:3229y", "cpe:/h:intel:atom_e:e3826", "cpe:/h:intel:core_i7:2610ue", "cpe:/h:intel:core_i7:975", "cpe:/h:intel:core_i5:2435m", "cpe:/h:intel:core_i3:2310m", "cpe:/h:intel:core_i5:4570", "cpe:/h:intel:core_i3:4030y", "cpe:/h:intel:core_i3:380um", "cpe:/h:intel:core_i5:4690s", "cpe:/h:intel:xeon_e5_1660:-", "cpe:/h:intel:xeon_gold:5122", "cpe:/h:intel:xeon_platinum:8170", "cpe:/h:intel:xeon_e5:2697_v4", "cpe:/h:intel:xeon:x5660", "cpe:/h:intel:core_m5:6y54", "cpe:/h:intel:xeon_e3_1220_v2:-", "cpe:/h:intel:core_i7:3612qe", "cpe:/h:intel:xeon_e5:4640_v2", "cpe:/h:intel:xeon_e5_1620_v4:-", "cpe:/h:intel:xeon_e5:4620_v4", "cpe:/h:intel:xeon_e3_1285l_v3:-", "cpe:/h:intel:core_i5:5350u", "cpe:/h:intel:xeon_e5_2450:-", "cpe:/h:intel:xeon_e5_2640_v4:-", "cpe:/h:intel:core_i3:4012y", "cpe:/h:intel:xeon_e3_1271_v3:-", "cpe:/h:intel:xeon_e5:4610_v4", "cpe:/h:intel:core_i7:4700mq", "cpe:/h:intel:xeon_e7:8870_v3", "cpe:/h:intel:xeon_e5_2430l_v2:-", "cpe:/h:intel:xeon_e5:2660_v2", "cpe:/h:intel:core_i5:3437u", "cpe:/h:intel:core_i7:4870hq", "cpe:/h:intel:xeon_gold:6134m", "cpe:/h:intel:atom_z:z3460", "cpe:/h:intel:core_i7:7700", "cpe:/h:intel:core_i3:2328m", "cpe:/h:intel:xeon_e5_2430:-", "cpe:/h:intel:core_i7:2670qm", "cpe:/h:intel:xeon_e5:2687w_v3", "cpe:/h:intel:atom_c:c3750", "cpe:/h:intel:xeon_phi:7235", "cpe:/h:intel:atom_z:z2580", "cpe:/h:intel:xeon_e7:4820", "cpe:/h:intel:xeon_e5:2680_v4", "cpe:/h:intel:core_i5:680", "cpe:/h:intel:xeon_e5_2643:-", "cpe:/h:intel:celeron_j:j1900", "cpe:/h:intel:xeon_gold:6130", "cpe:/h:intel:core_i5:2537m", "cpe:/h:intel:xeon_silver:4114t", "cpe:/h:intel:xeon_e7:8850_v2", "cpe:/h:intel:xeon_silver:4108", "cpe:/h:intel:xeon_e5_1650_v3:-", "cpe:/h:intel:celeron_j:j3160", "cpe:/h:intel:core_i7:3632qm", "cpe:/h:intel:xeon_e3:1535m_v6", "cpe:/h:intel:celeron_j:j3455", "cpe:/h:intel:core_i3:2100t", "cpe:/h:intel:xeon_silver:4112", "cpe:/h:intel:core_i7:4770", "cpe:/h:intel:xeon_e3_1281_v3:-", "cpe:/h:intel:xeon_e3_1280_v3:-", "cpe:/h:intel:core_i3:4100m", "cpe:/h:intel:celeron_n:n3450", "cpe:/h:intel:xeon_e7:2820", "cpe:/h:intel:core_i3:4370t", "cpe:/h:intel:core_i3:4150", "cpe:/h:intel:xeon_e7:8880l_v2", "cpe:/h:intel:xeon_e3_1225_v5:-", "cpe:/h:intel:xeon_e5:2697a_v4", "cpe:/h:intel:core_i3:6100e", "cpe:/h:intel:xeon_e5_2618l_v2:-", "cpe:/h:intel:xeon_e5:4657l_v2", "cpe:/h:intel:core_i5:470um", "cpe:/h:intel:xeon_e5_2630_v3:-", "cpe:/h:intel:xeon_e7:8890_v4", "cpe:/h:intel:atom_z:z3795", "cpe:/h:intel:core_i5:4220y", "cpe:/h:intel:xeon_e5_2428l:-", "cpe:/h:arm:cortex-a:17", "cpe:/h:intel:core_i3:4102e", "cpe:/h:intel:core_i3:2370m", "cpe:/h:intel:xeon_phi:7250", "cpe:/h:intel:xeon_gold:6130t", "cpe:/h:intel:core_i7:4960hq", "cpe:/h:intel:celeron_n:n3150", "cpe:/h:intel:xeon_e5:2698_v4", "cpe:/h:intel:core_i7:860", "cpe:/h:intel:core_i3:2375m", "cpe:/h:intel:core_i3:4158u", "cpe:/h:intel:atom_z:z2420", "cpe:/h:intel:xeon:x5687", "cpe:/h:intel:core_i7:4710mq", "cpe:/h:intel:core_i5:4460s", "cpe:/h:intel:xeon_e3:1585l_v5", "cpe:/h:intel:xeon:l5618", "cpe:/h:intel:xeon_e5_2650l:-", "cpe:/h:intel:xeon:e5640", "cpe:/h:intel:core_i7:4702mq", "cpe:/h:intel:xeon_gold:6128", "cpe:/h:intel:core_i7:4771", "cpe:/h:intel:core_i7:5850eq", "cpe:/h:intel:xeon_e3_1276_v3:-", "cpe:/h:intel:xeon:l7555", "cpe:/h:intel:core_i3:390m", "cpe:/h:intel:xeon_e7:4850", "cpe:/h:intel:core_m3:7y30", "cpe:/h:intel:xeon_e7:8850", "cpe:/h:intel:xeon:e5502", "cpe:/h:intel:core_i3:4170t", "cpe:/h:intel:xeon_e5_2620_v4:-", "cpe:/h:intel:xeon_e5:4660_v3", "cpe:/h:intel:core_i5:4340m", "cpe:/h:intel:core_i5:6300hq", "cpe:/h:intel:celeron_n:n3000", "cpe:/h:intel:core_i3:5010u", "cpe:/h:intel:core_i5:4278u", "cpe:/h:intel:core_i7:4722hq", "cpe:/h:intel:core_i5:6500te", "cpe:/h:intel:core_i7:3770t", "cpe:/h:intel:xeon_e7:8891_v2", "cpe:/h:intel:xeon_e5:4660_v4", "cpe:/h:intel:core_i5:4440", "cpe:/h:intel:core_i5:5257u", "cpe:/h:intel:core_i7:4600m", "cpe:/h:intel:xeon_e7:4860", "cpe:/h:intel:core_i5:3570", "cpe:/h:intel:xeon_e5_2630:-", "cpe:/h:intel:core_i7:620m", "cpe:/h:intel:core_i5:3230m", "cpe:/h:intel:xeon_e5_2440_v2:-", "cpe:/h:intel:xeon_e3_12201_v2:-", "cpe:/h:intel:xeon_e3_1270_v3:-", "cpe:/h:intel:core_i7:7820hq", "cpe:/h:intel:xeon_e3_1231_v3:-", "cpe:/h:intel:core_i7:880", "cpe:/h:intel:xeon:e5645", "cpe:/h:intel:xeon:e5649", "cpe:/h:intel:xeon_gold:6148", "cpe:/h:intel:xeon_e7:8880_v2", "cpe:/h:intel:xeon_e5:4610", "cpe:/h:intel:xeon_gold:6146", "cpe:/h:intel:xeon_e3_1275:-", "cpe:/h:intel:xeon_e5_2630l_v3:-", "cpe:/h:intel:xeon_e5_1660_v4:-", "cpe:/h:intel:core_i5:4690", "cpe:/h:intel:core_i7:4510u", "cpe:/h:intel:core_i3:2130", "cpe:/h:intel:core_i5:6350hq", "cpe:/h:intel:xeon_e5_2630l_v2:-", "cpe:/h:intel:core_i5:4690t", "cpe:/h:arm:cortex-a:57", "cpe:/h:intel:xeon:e6510", "cpe:/h:intel:xeon_gold:6142f", "cpe:/h:intel:xeon:l5508", "cpe:/h:intel:core_i7:4720hq", "cpe:/h:intel:xeon_e7:4880_v2", "cpe:/h:intel:core_i3:4160t", "cpe:/h:intel:core_i5:2500k", "cpe:/h:intel:core_i5:520m", "cpe:/h:intel:celeron_n:n2820", "cpe:/h:intel:xeon_e5_2628l_v3:-", "cpe:/h:intel:atom_c:c2530", "cpe:/h:intel:core_i3:2120t", "cpe:/h:intel:atom_c:c2750", "cpe:/h:intel:core_i5:6600", "cpe:/h:intel:xeon_e3_1501m_v6:-", "cpe:/h:intel:core_i5:2500t", "cpe:/h:intel:xeon_e5:4620_v2", "cpe:/h:intel:xeon_e7:4870_v2", "cpe:/h:intel:core_i7:3840qm", "cpe:/h:intel:core_i3:560", "cpe:/h:intel:atom_c:c2350", "cpe:/h:intel:core_i7:3770k", "cpe:/h:intel:core_i7:5950hq", "cpe:/h:intel:pentium_j:j4205", "cpe:/h:intel:xeon_e3:1505m_v6", "cpe:/h:intel:xeon_e3_1235:-", "cpe:/h:intel:core_i5:2320", "cpe:/h:intel:xeon_e7:4890_v2", "cpe:/h:intel:core_i5:2515e", "cpe:/h:intel:core_i7:950", "cpe:/h:intel:core_i3:4120u", "cpe:/h:intel:core_i5:540um", "cpe:/h:intel:xeon_e7:8870_v4", "cpe:/h:intel:core_i5:4330m", "cpe:/h:intel:core_i5:5350h", "cpe:/h:intel:xeon_e3_1240:-", "cpe:/h:intel:xeon_e3_1230_v3:-", "cpe:/h:intel:xeon:e5540", "cpe:/h:intel:core_i5:6685r", "cpe:/h:intel:atom_z:z3735f", "cpe:/h:intel:core_i7:7820hk", "cpe:/h:intel:core_i3:2312m", "cpe:/h:intel:core_i5:2557m", "cpe:/h:intel:core_i7:4790k", "cpe:/h:intel:core_i5:4200h", "cpe:/h:intel:core_i5:3340s", "cpe:/h:intel:core_i3:3130m", "cpe:/h:intel:core_i7:8650u", "cpe:/h:intel:core_i3:5015u", "cpe:/h:intel:core_i5:2540m", "cpe:/h:intel:atom_x3:c3205rk", "cpe:/h:intel:core_i7:4790s", "cpe:/h:intel:xeon_e3_1275_v6:-", "cpe:/h:intel:core_i5:6400", "cpe:/h:intel:atom_c:c3830", "cpe:/h:intel:core_i5:2390t", "cpe:/h:intel:core_i3:3220", "cpe:/h:intel:xeon:w3690", "cpe:/h:intel:xeon_e5_2420_v2:-", "cpe:/h:intel:xeon_e3_1268l_v5:-", "cpe:/h:intel:xeon_e3_1270_v6:-", "cpe:/h:intel:xeon:x3430", "cpe:/h:intel:xeon_e5_2609_v4:-", "cpe:/h:intel:core_i5:580m", "cpe:/h:intel:core_i7:5550u", "cpe:/h:intel:core_i5:3320m", "cpe:/h:intel:atom_x3:c3405", "cpe:/h:intel:core_i3:4025u", "cpe:/h:intel:core_i3:4010y", "cpe:/h:intel:core_i3:2330m", "cpe:/h:intel:xeon_platinum:8164", "cpe:/h:intel:xeon_e7:2803", "cpe:/h:intel:core_i5:660", "cpe:/h:intel:core_i5:6440eq", "cpe:/h:intel:core_i5:5200u", "cpe:/h:intel:xeon_platinum:8156", "cpe:/h:intel:xeon_e5_2620:-", "cpe:/h:intel:xeon_e5_2648l:-", "cpe:/h:intel:core_i7:2860qm", "cpe:/h:intel:core_i7:3615qe", "cpe:/h:intel:core_i5:6500", "cpe:/h:intel:core_i5:2430m", "cpe:/h:intel:atom_e:e3805", "cpe:/h:intel:xeon_e3_1245_v5:-", "cpe:/h:intel:core_i5:3330s", "cpe:/h:intel:xeon_e3_1270_v5:-", "cpe:/h:intel:core_i3:8350k", "cpe:/h:intel:xeon_platinum:8168", "cpe:/h:intel:xeon:x5560", "cpe:/h:intel:core_i7:4578u", "cpe:/h:intel:xeon_gold:6126", "cpe:/h:intel:core_i3:4150t", "cpe:/h:intel:core_i3:3225", "cpe:/h:intel:xeon_e7:2850", "cpe:/h:intel:xeon_e3_1290_v2:-", "cpe:/h:intel:core_i7:2715qe", "cpe:/h:intel:core_i3:6300", "cpe:/h:intel:xeon_e7:2850_v2", "cpe:/h:intel:xeon_e5_2448l_v2:-", "cpe:/h:intel:xeon_gold:6140m", "cpe:/h:intel:core_i5:760", "cpe:/h:intel:xeon_e5_2470:-", "cpe:/h:intel:xeon:e5606", "cpe:/h:intel:celeron_j:j3060", "cpe:/h:intel:atom_c:c3708", "cpe:/h:intel:xeon_e5_2640_v3:-", "cpe:/h:intel:celeron_n:n3160", "cpe:/h:intel:xeon:x5680", "cpe:/h:intel:celeron_n:n2807", "cpe:/h:intel:xeon_e5_2650_v2:-", "cpe:/h:intel:xeon:l5630", "cpe:/h:intel:xeon_e5:2687w_v2", "cpe:/h:intel:core_i5:3439y", "cpe:/h:intel:core_i5:540m", "cpe:/h:intel:xeon_e7:8860_v4", "cpe:/h:intel:core_i7:640um", "cpe:/h:intel:xeon_gold:6142m", "cpe:/h:intel:core_m3:7y32", "cpe:/h:intel:atom_z:z3745d", "cpe:/h:intel:atom_c:c3958", "cpe:/h:intel:core_i7:3555le", "cpe:/h:intel:core_i7:2655le", "cpe:/h:intel:core_i3:3217u", "cpe:/h:intel:xeon_e7:4850_v4", "cpe:/h:intel:core_i3:6100u", "cpe:/h:intel:pentium_n:n4200", "cpe:/h:intel:core_m7:6y75", "cpe:/h:intel:core_i7:940", "cpe:/h:intel:celeron_n:n3010", "cpe:/h:intel:xeon:x5675", "cpe:/h:intel:xeon_e5_1630_v3:-", "cpe:/h:intel:xeon_gold:6138f", "cpe:/h:intel:core_i5:6600t", "cpe:/h:intel:xeon_e3_1285_v4:-", "cpe:/h:intel:core_i7:640lm", "cpe:/h:intel:core_i3:5005u", "cpe:/h:intel:core_i5:2467m", "cpe:/h:intel:core_i5:4308u", "cpe:/h:intel:core_i7:660ue", "cpe:/h:intel:core_i5:3380m", "cpe:/h:intel:xeon_e5_2609_v2:-", "cpe:/h:intel:xeon_e5_2648l_v2:-", "cpe:/h:intel:xeon_e7:8880_v3", "cpe:/h:intel:atom_x3:c3130", "cpe:/h:intel:xeon_e7:8837", "cpe:/h:intel:core_i7:980", "cpe:/h:intel:xeon_e5_2407:-", "cpe:/h:intel:xeon:e7530", "cpe:/h:intel:xeon:x3460", "cpe:/h:intel:xeon_e7:8870_v2", "cpe:/h:intel:core_i5:4210h", "cpe:/h:intel:core_i7:990x", "cpe:/h:intel:core_i7:660lm", "cpe:/h:intel:core_i5:2380p", "cpe:/h:intel:core_i7:7500u", "cpe:/h:intel:core_i5:4570t", "cpe:/h:intel:core_i3:4020y", "cpe:/h:intel:core_i3:330um", "cpe:/h:intel:core_i5:4360u", "cpe:/h:intel:xeon_e5:2658_v3", "cpe:/h:intel:core_i5:3360m", "cpe:/h:intel:atom_z:z3740d", "cpe:/h:intel:xeon_phi:7290", "cpe:/h:arm:cortex-a:9", "cpe:/h:intel:xeon_gold:5120t", "cpe:/h:intel:xeon_e3_1260l:-", "cpe:/h:intel:xeon_e3:1515m_v5", "cpe:/h:intel:xeon_e5_2620_v3:-", "cpe:/h:intel:xeon_e5_2650_v3:-", "cpe:/h:intel:core_i3:6320", "cpe:/h:intel:core_i7:3689y", "cpe:/h:intel:pentium_j:j2900", "cpe:/h:intel:core_i7:4600u", "cpe:/h:intel:xeon_e5:4667_v4", "cpe:/h:intel:core_i7:820qm", "cpe:/h:intel:xeon_e5_2637_v2:-", "cpe:/h:intel:xeon_e5_2603_v2:-", "cpe:/h:intel:xeon_e5_2637_v3:-", "cpe:/h:intel:xeon:e7540", "cpe:/h:intel:xeon:e5530", "cpe:/h:intel:core_i3:3250", "cpe:/h:intel:core_i3:4360t", "cpe:/h:intel:xeon_e5:4617", "cpe:/h:intel:core_i5:4350u", "cpe:/h:intel:core_i7:4790t", "cpe:/h:intel:xeon_e5_2603_v3:-", "cpe:/h:intel:core_i3:4112e", "cpe:/h:intel:core_i5:460m", "cpe:/h:intel:xeon_e3_1270_v2:-", "cpe:/h:intel:xeon_e7:8830", "cpe:/h:intel:xeon_e5_2403:-", "cpe:/h:intel:core_i7:3635qm", "cpe:/h:intel:xeon_e5_2428l_v2:-", "cpe:/h:intel:xeon_e3_1226_v3:-", "cpe:/h:intel:xeon_e7:8867_v3", "cpe:/h:intel:xeon_e7:4830", "cpe:/h:intel:xeon_e5:4603", "cpe:/h:intel:atom_c:c3308", "cpe:/h:intel:xeon_e3_1286l_v3:-", "cpe:/h:intel:xeon_e3_1280:-", "cpe:/h:intel:xeon_e5:2683_v3", "cpe:/h:arm:cortex-a:15", "cpe:/h:intel:xeon_e7:8880_v4", "cpe:/h:intel:core_i7:4558u", "cpe:/h:intel:core_i5:4690k", "cpe:/h:intel:core_i5:2410m", "cpe:/h:intel:core_i7:740qm", "cpe:/h:intel:core_i5:6500t", "cpe:/h:intel:xeon_e5:2658_v2", "cpe:/h:intel:xeon_gold:6134", "cpe:/h:intel:core_i5:3350p", "cpe:/h:intel:xeon_e7:8890_v2", "cpe:/h:intel:celeron_j:j1750", "cpe:/h:intel:xeon_e5_1650_v4:-", "cpe:/h:intel:celeron_j:j4005", "cpe:/h:intel:core_i3:3110m", "cpe:/h:intel:xeon_e3_1240_v6:-", "cpe:/h:intel:core_i7:920xm", "cpe:/h:intel:core_i5:4402e", "cpe:/h:intel:core_i3:4340te", "cpe:/h:intel:core_i7:4770s", "cpe:/h:intel:celeron_n:n2805", "cpe:/h:intel:celeron_n:n3060", "cpe:/h:intel:xeon_e7:4820_v3", "cpe:/h:intel:xeon_e3_1240l_v3:-", "cpe:/h:intel:core_i3:3120m", "cpe:/h:intel:core_i7:4950hq", "cpe:/h:intel:core_i5:8350u", "cpe:/h:intel:xeon_e5:2699a_v4", "cpe:/h:intel:xeon_e3_1505l_v5:-", "cpe:/h:intel:xeon_e3_1225_v2:-", "cpe:/h:intel:xeon_platinum:8176m", "cpe:/h:intel:xeon:l7545", "cpe:/h:intel:core_i7:620um", "cpe:/h:intel:xeon_e3_1240_v3:-", "cpe:/h:intel:xeon_e3:1558l_v5", "cpe:/h:intel:xeon_e5_2418l:-", "cpe:/h:intel:xeon_e3_1290:-", "cpe:/h:intel:xeon_e5_2603_v4:-", "cpe:/h:intel:xeon_e3_1240_v5:-", "cpe:/h:intel:xeon:w3670", "cpe:/h:intel:core_i7:5700eq", "cpe:/h:intel:core_i7:940xm", "cpe:/h:intel:xeon_phi:7210f", "cpe:/h:intel:xeon:x7560", "cpe:/h:intel:core_i7:5775r", "cpe:/h:intel:pentium_n:n3530", "cpe:/h:intel:core_i3:3217ue", "cpe:/h:intel:xeon_e5:4627_v2", "cpe:/h:intel:xeon_e5_2403_v2:-", "cpe:/h:intel:xeon_e3_1230_v2:-", "cpe:/h:intel:xeon:e5620", "cpe:/h:intel:core_i7:3770s", "cpe:/h:intel:core_i3:3210", "cpe:/h:intel:core_i7:2635qm", "cpe:/h:intel:core_i7:660um", "cpe:/h:intel:xeon_e5:2658_v4", "cpe:/h:intel:core_i7:2710qe", "cpe:/h:intel:xeon_e5_2643_v2:-", "cpe:/h:intel:core_i5:2400", "cpe:/h:intel:core_m5:6y57", "cpe:/h:intel:xeon_e5:2650l_v4", "cpe:/h:intel:core_i5:3570s", "cpe:/h:intel:core_i7:7820eq", "cpe:/h:intel:celeron_n:n2830", "cpe:/h:intel:atom_c:c2316", "cpe:/h:intel:core_i7:4610y", "cpe:/h:intel:xeon_e5:2697_v3", "cpe:/h:intel:core_i3:3245", "cpe:/h:intel:core_i3:4130t", "cpe:/h:intel:xeon_e7:8891_v4", "cpe:/h:intel:xeon_e5_2650:-", "cpe:/h:intel:xeon_e3_1260l_v5:-", "cpe:/h:intel:xeon_e3_1275l_v3:-", "cpe:/h:intel:core_i5:2520m", "cpe:/h:intel:xeon_e5:2660", "cpe:/h:intel:xeon:x7542", "cpe:/h:intel:celeron_n:n2930", "cpe:/h:intel:core_i7:860s", "cpe:/h:intel:core_i5:6267u", "cpe:/h:intel:atom_z:z3560", "cpe:/h:intel:core_i5:6402p", "cpe:/h:intel:xeon_e3_1220:-", "cpe:/h:intel:xeon:x5677", "cpe:/h:intel:xeon:l5638", "cpe:/h:intel:xeon_e7:8867l", "cpe:/h:intel:atom_c:c3758", "cpe:/h:intel:xeon:x5672", "cpe:/h:intel:core_i5:4460", "cpe:/h:intel:celeron_n:n2840", "cpe:/h:intel:pentium_n:n3510", "cpe:/h:intel:xeon_e7:8880l_v3", "cpe:/h:intel:xeon_gold:6132", "cpe:/h:intel:xeon_e5_2420:-", "cpe:/h:intel:xeon_e5:4627_v4", "cpe:/h:intel:xeon_e7:2830", "cpe:/h:intel:core_i7:620ue", "cpe:/h:intel:core_i7:3517u", "cpe:/h:intel:xeon_e3_1105c_v2:-", "cpe:/h:intel:core_i3:4110m", "cpe:/h:intel:core_i5:4430", "cpe:/h:intel:celeron_j:j4105", "cpe:/h:intel:atom_c:c3508", "cpe:/h:intel:xeon_e5_2450l:-", "cpe:/h:intel:core_i5:430m", "cpe:/h:intel:celeron_j:j1800", "cpe:/h:intel:core_i5:5287u", "cpe:/h:intel:xeon_e5_2430l:-", "cpe:/h:intel:core_i5:5300u", "cpe:/h:intel:xeon_e5_2630l:-", "cpe:/h:intel:xeon_e5_2630_v4:-", "cpe:/h:intel:atom_z:z3580", "cpe:/h:intel:core_i3:2115c", "cpe:/h:intel:core_i3:4110e", "cpe:/h:intel:core_i3:4005u", "cpe:/h:intel:core_i5:430um", "cpe:/h:intel:xeon:x5650", "cpe:/h:intel:xeon_e5:4667_v3", "cpe:/h:intel:xeon:x3470", "cpe:/h:intel:xeon_e3_1285_v6:-", "cpe:/h:intel:core_i7:640m", "cpe:/h:intel:xeon:e5503", "cpe:/h:intel:core_i7:965", "cpe:/h:intel:atom_z:z3770d", "cpe:/h:intel:atom_z:z2560", "cpe:/h:intel:xeon:x5667", "cpe:/h:intel:core_i5:3317u", "cpe:/h:intel:xeon:x5570", "cpe:/h:intel:xeon_gold:6152", "cpe:/h:intel:core_i3:5157u", "cpe:/h:intel:core_i7:2600", "cpe:/h:intel:core_i5:3470", "cpe:/h:intel:xeon_e5:4650l", "cpe:/h:intel:core_i5:8400", "cpe:/h:intel:xeon_e5:2690_v4", "cpe:/h:intel:xeon_e3_1230_v5:-", "cpe:/h:intel:xeon_e7:8894_v4", "cpe:/h:intel:core_i3:4340", "cpe:/h:intel:core_i5:4200m", "cpe:/h:intel:core_i5:4570r", "cpe:/h:intel:xeon_e7:4820_v2", "cpe:/h:intel:core_i7:970", "cpe:/h:intel:atom_x3:c3445", "cpe:/h:intel:core_m3:6y30", "cpe:/h:intel:xeon_e7:4860_v2", "cpe:/h:intel:atom_c:c2308", "cpe:/h:intel:core_i5:3470s", "cpe:/h:intel:xeon_e5:2680_v2", "cpe:/h:intel:xeon_gold:6130f", "cpe:/h:intel:xeon_e5:4624l_v2", "cpe:/h:intel:core_i5:6287u", "cpe:/h:intel:xeon_e7:4830_v2", "cpe:/h:intel:core_i7:5650u", "cpe:/h:intel:xeon:l5506", "cpe:/h:intel:atom_c:c2558", "cpe:/h:intel:xeon:e5603", "cpe:/h:intel:core_i3:540", "cpe:/h:intel:atom_c:c2718", "cpe:/h:intel:xeon_gold:5118", "cpe:/h:intel:xeon_e5:4655_v3", "cpe:/h:intel:xeon_e5_1650:-", "cpe:/h:intel:core_i7:2640m", "cpe:/h:intel:core_i3:4100u", "cpe:/h:intel:xeon_gold:6142", "cpe:/h:intel:core_i7:4702hq", "cpe:/h:intel:xeon_e5:2667_v2", "cpe:/h:intel:core_i7:2677m", "cpe:/h:intel:core_i5:4590t", "cpe:/h:intel:xeon:e5504", "cpe:/h:intel:core_i5:3570t", "cpe:/h:intel:core_i5:4670t", "cpe:/h:intel:core_i3:4000m", "cpe:/h:intel:xeon:l5518", "cpe:/h:intel:xeon_e5:4627_v3", "cpe:/h:intel:xeon_e5:4610_v2", "cpe:/h:intel:atom_z:z3480", "cpe:/h:intel:core_i7:4850hq", "cpe:/h:intel:core_i7:4810mq", "cpe:/h:intel:atom_z:z3590", "cpe:/h:intel:core_i7:4860hq", "cpe:/h:intel:core_i7:8700k", "cpe:/h:intel:core_i3:3250t", "cpe:/h:intel:xeon_e7:2880_v2", "cpe:/h:intel:core_i7:3630qm", "cpe:/h:intel:celeron_n:n2940", "cpe:/h:intel:xeon:ec5549", "cpe:/h:intel:xeon_e5_2428l_v3:-", "cpe:/h:intel:core_m:5y70", "cpe:/h:intel:xeon_e7:8893_v2", "cpe:/h:intel:atom_z:z3775d", "cpe:/h:intel:xeon_e3_1220l_v3:-", "cpe:/h:intel:core_i5:2400s", "cpe:/h:intel:xeon_e5:4640_v3", "cpe:/h:intel:xeon_platinum:8160", "cpe:/h:intel:core_i5:5250u", "cpe:/h:intel:xeon:x5670", "cpe:/h:intel:core_i3:4170", "cpe:/h:intel:xeon_gold:6154", "cpe:/h:intel:xeon_e3_1235l_v5:-", "cpe:/h:intel:core_i3:5020u", "cpe:/h:intel:xeon_e7:4830_v4", "cpe:/h:intel:atom_z:z3745", "cpe:/h:intel:core_i5:6585r", "cpe:/h:intel:xeon_bronze_3104:-", "cpe:/h:intel:core_i3:4360", "cpe:/h:intel:xeon_e7:4870", "cpe:/h:intel:xeon_platinum:8153", "cpe:/h:arm:cortex-a:75", "cpe:/h:intel:core_i7:2600k", "cpe:/h:intel:core_i3:3240", "cpe:/h:intel:core_i5:3340", "cpe:/h:intel:xeon_e5_2438l_v3:-", "cpe:/h:intel:core_i5:520um", "cpe:/h:intel:xeon_e3_1225:-", "cpe:/h:intel:pentium_n:n3710", "cpe:/h:intel:xeon_e7:2870", "cpe:/h:intel:xeon_e3_1230_v6:-", "cpe:/h:intel:core_i5:3450s", "cpe:/h:intel:xeon_e5_2643_v4:-", "cpe:/h:intel:core_i5:750", "cpe:/h:intel:xeon_e5_2637_v4:-", "cpe:/h:intel:core_i5:6360u", "cpe:/h:intel:core_i7:720qm", "cpe:/h:intel:xeon_e3_1230:-", "cpe:/h:intel:xeon_platinum:8170m", "cpe:/h:intel:core_i5:3340m", "cpe:/h:intel:xeon_e5:4628l_v4", "cpe:/h:intel:xeon_e5:4620_v3", "cpe:/h:intel:atom_c:c2538", "cpe:/h:intel:xeon_e7:8891_v3", "cpe:/h:intel:xeon_e5_2450_v2:-", "cpe:/h:intel:xeon_e5_1620_v3:-", "cpe:/h:intel:core_i5:4440s", "cpe:/h:intel:atom_z:z2480", "cpe:/h:intel:xeon_e3_1286_v3:-", "cpe:/h:intel:core_i7:4770t", "cpe:/h:intel:xeon_phi:7295", "cpe:/h:intel:xeon_e5_1620_v2:-", "cpe:/h:intel:xeon_e7:4850_v3", "cpe:/h:intel:atom_e:e3827", "cpe:/h:intel:xeon_platinum:8160f", "cpe:/h:intel:core_i5:6300u", "cpe:/h:intel:core_i5:6440hq", "cpe:/h:intel:xeon:x7550", "cpe:/h:intel:core_i7:5600u", "cpe:/h:intel:xeon_e7:2870_v2", "cpe:/h:intel:core_i7:4770k", "cpe:/h:intel:core_i3:6100te", "cpe:/h:intel:xeon_e7:4820_v4", "cpe:/h:intel:xeon_e5:2697_v2", "cpe:/h:intel:xeon_e5_2418l_v2:-", "cpe:/h:intel:xeon_e5:2670_v2", "cpe:/h:intel:xeon:x6550", "cpe:/h:intel:xeon_gold:6148f", "cpe:/h:intel:core_i5:520e", "cpe:/h:intel:xeon_e5:2670", "cpe:/h:intel:xeon_e3_1220_v3:-", "cpe:/h:intel:xeon_platinum:8180", "cpe:/h:intel:celeron_n:n2910", "cpe:/h:intel:xeon_e5_2430_v2:-", "cpe:/h:intel:core_i5:3570k", "cpe:/h:intel:xeon_e5:2695_v4", "cpe:/h:intel:core_i3:330e", "cpe:/h:intel:core_i5:655k", "cpe:/h:intel:xeon_platinum:8160t", "cpe:/h:intel:atom_z:z3570", "cpe:/h:intel:xeon_e3_1278l_v4:-", "cpe:/h:intel:core_i5:6260u", "cpe:/h:intel:core_i5:4210y", "cpe:/h:intel:xeon_e7:8870", "cpe:/h:intel:core_i7:3667u", "cpe:/h:intel:core_i3:4100e", "cpe:/h:intel:core_i7:7920hq", "cpe:/h:intel:core_i7:4650u", "cpe:/h:intel:pentium_j:j2850", "cpe:/h:intel:xeon_e3_1125c:-", "cpe:/h:intel:core_i5:4670s", "cpe:/h:intel:xeon_e5:2699_v3", "cpe:/h:intel:celeron_j:j1850", "cpe:/h:intel:core_i7:4770hq", "cpe:/h:intel:core_i7:4550u", "cpe:/h:intel:core_i5:4210u", "cpe:/h:intel:core_i5:3339y", "cpe:/h:intel:xeon_e7:4809_v2", "cpe:/h:intel:xeon_e3_1285_v3:-", "cpe:/h:intel:core_i5:650", "cpe:/h:intel:xeon_e3_1280_v5:-", "cpe:/h:intel:core_i5:3210m", "cpe:/h:intel:core_i7:3740qm", "cpe:/h:intel:core_i3:2367m", "cpe:/h:intel:core_i3:6300t", "cpe:/h:intel:xeon:x5647", "cpe:/h:intel:xeon_e7:2860", "cpe:/h:intel:core_i7:4910mq", "cpe:/h:intel:celeron_n:n3350", "cpe:/h:intel:core_i5:8250u", "cpe:/h:intel:xeon_e5:2698_v3", "cpe:/h:intel:xeon_e5_2650l_v2:-", "cpe:/h:intel:core_i7:2700k", "cpe:/h:intel:core_i7:620le", "cpe:/h:intel:core_i3:4350", "cpe:/h:intel:xeon_e3_1505m_v5:-", "cpe:/h:intel:xeon_e5:4650", "cpe:/h:intel:atom_e:e3815", "cpe:/h:intel:core_i7:3610qe", "cpe:/h:intel:core_i5:560um", "cpe:/h:intel:xeon_e5_2648l_v3:-", "cpe:/h:intel:core_i5:4402ec", "cpe:/h:intel:atom_z:z3775", "cpe:/h:intel:xeon_e3_12201:-", "cpe:/h:intel:xeon_e5_1630_v4:-", "cpe:/h:intel:core_i5:2510e", "cpe:/h:intel:celeron_n:n2810", "cpe:/h:intel:core_i7:5557u", "cpe:/h:intel:core_i7:4700eq", "cpe:/h:intel:xeon_phi:7210", "cpe:/h:intel:xeon_e7:4850_v2", "cpe:/h:intel:atom_z:z3735d", "cpe:/h:intel:core_i5:3337u", "cpe:/h:intel:core_i5:4590s", "cpe:/h:intel:core_i7:2600s", "cpe:/h:intel:core_m:5y71", "cpe:/h:intel:core_i3:4130", "cpe:/h:intel:xeon_e7:4809_v4", "cpe:/h:intel:xeon_e5_2418l_v3:-", "cpe:/h:intel:atom_z:z3735g", "cpe:/h:intel:core_i7:7700t", "cpe:/h:intel:xeon_silver:4116", "cpe:/h:intel:core_i7:7y75", "cpe:/h:intel:xeon:e5506", "cpe:/h:intel:atom_c:c2508", "cpe:/h:intel:xeon_e7:8890_v3", "cpe:/h:intel:core_i7:680um", "cpe:/h:intel:xeon_e3_1240l_v5:-", "cpe:/h:intel:xeon_gold:6140", "cpe:/h:intel:core_i7:2630qm", "cpe:/h:intel:xeon_e5_2450l_v2:-", "cpe:/h:intel:xeon_phi:7230", "cpe:/h:intel:core_i3:4330", "cpe:/h:intel:core_i5:670", "cpe:/h:intel:xeon:l5640", "cpe:/h:intel:xeon_phi:7285", "cpe:/h:intel:xeon_phi:7290f", "cpe:/h:intel:core_i7:2649m", "cpe:/h:intel:atom_x3:c3200rk", "cpe:/h:intel:xeon_e5:4640_v4", "cpe:/h:intel:xeon_e5_2618l_v4:-", "cpe:/h:intel:xeon_e5_2609_v3:-", "cpe:/h:intel:core_i5:5675c", "cpe:/h:intel:core_i5:4570te", "cpe:/h:intel:core_i3:2105", "cpe:/h:intel:core_i3:2348m", "cpe:/h:intel:atom_z:z2760", "cpe:/h:intel:core_i3:2310e", "cpe:/h:intel:core_i5:5575r", "cpe:/h:intel:xeon_e3_1245_v2:-", "cpe:/h:intel:xeon_e7:8893_v3", "cpe:/h:intel:core_i5:560m", "cpe:/h:intel:core_i5:4670k", "cpe:/h:intel:core_i5:6442eq", "cpe:/h:intel:core_i7:5775c", "cpe:/h:intel:core_i3:380m", "cpe:/h:intel:core_i3:2100", "cpe:/h:intel:core_i7:4770r", "cpe:/h:intel:xeon_e3_1268l_v3:-", "cpe:/h:intel:core_i5:4202y", "cpe:/h:intel:xeon_e5:2699r_v4", "cpe:/h:intel:core_i5:661", "cpe:/h:intel:core_i7:2637m", "cpe:/h:intel:xeon_e3_1285l_v4:-", "cpe:/h:intel:xeon_e5:2699_v4", "cpe:/h:intel:core_i7:4790", "cpe:/h:intel:xeon_e3_1245_v3:-", "cpe:/h:intel:xeon_e3_1125c_v2:-", "cpe:/h:intel:xeon_e5_2640:-", "cpe:/h:intel:core_i3:370m", "cpe:/h:intel:xeon_silver:4114", "cpe:/h:intel:celeron_n:n2920", "cpe:/h:intel:xeon_gold:5119t", "cpe:/h:intel:xeon_e5_2648l_v4:-", "cpe:/h:intel:core_i5:450m", "cpe:/h:intel:celeron_n:n4100", "cpe:/h:intel:xeon_e3_1265l_v2:-", "cpe:/h:intel:atom_c:c3338", "cpe:/h:intel:core_i7:2960xm", "cpe:/h:intel:core_i5:2500s", "cpe:/h:intel:core_i7:3720qm", "cpe:/h:intel:core_i7:960", "cpe:/h:intel:core_i5:4260u", "cpe:/h:intel:core_i7:7700k", "cpe:/h:intel:xeon_e5:4655_v4", "cpe:/h:intel:xeon_e5_2608l_v4:-", "cpe:/h:intel:xeon_e7:2890_v2", "cpe:/h:intel:core_i3:6102e", "cpe:/h:intel:core_i5:4310m", "cpe:/h:intel:xeon_e5:4607", "cpe:/h:intel:xeon_e3:1578l_v5", "cpe:/h:intel:core_i5:8600k", "cpe:/h:intel:xeon:l5520", "cpe:/h:intel:core_i7:4980hq", "cpe:/h:intel:xeon_e7:4809_v3", "cpe:/h:intel:xeon_e5:2665", "cpe:/h:intel:core_i5:6600k", "cpe:/h:intel:xeon_e5_1650_v2:-", "cpe:/h:intel:xeon_e5_2603:-", "cpe:/h:intel:xeon_e3_1265l_v4:-", "cpe:/h:intel:xeon:ec5539", "cpe:/h:intel:core_i3:3240t", "cpe:/h:intel:core_i5:4310u", "cpe:/h:intel:core_i5:3330", "cpe:/h:intel:core_i7:3687u", "cpe:/h:intel:xeon_e5:4607_v2", "cpe:/h:intel:atom_e:e3845", "cpe:/h:intel:core_i7:4760hq", "cpe:/h:intel:atom_c:c3850", "cpe:/h:intel:core_i3:2125", "cpe:/h:intel:pentium_j:j3710", "cpe:/h:intel:xeon:x5550", "cpe:/h:intel:xeon_e-1105c:-", "cpe:/h:intel:xeon_e3_1220_v5:-", "cpe:/h:intel:atom_c:c2516", "cpe:/h:intel:core_i7:930", "cpe:/h:intel:core_i7:5850hq", "cpe:/h:intel:xeon_e7:8860_v3", "cpe:/h:intel:core_i3:550", "cpe:/h:intel:core_i5:2450p", "cpe:/h:intel:core_i7:4712mq", "cpe:/h:intel:core_i5:4460t", "cpe:/h:intel:core_i7:5700hq", "cpe:/h:intel:xeon_e5_1680_v3:-", "cpe:/h:intel:core_i7:2820qm", "cpe:/h:intel:atom_z:z3530", "cpe:/h:intel:xeon_e3_1220_v6:-", "cpe:/h:intel:xeon_gold:5115", "cpe:/h:intel:xeon_e5_2630_v2:-", "cpe:/h:intel:atom_c:c3558", "cpe:/h:intel:xeon_e5:2690", "cpe:/h:intel:core_i7:8700", "cpe:/h:intel:core_i7:7567u", "cpe:/h:intel:xeon_gold:6150", "cpe:/h:intel:xeon_e3_1258l_v4:-", "cpe:/h:intel:xeon_e5_2628l_v2:-", "cpe:/h:intel:xeon_e5:4669_v4", "cpe:/h:intel:core_i7:2657m", "cpe:/h:intel:core_i7:7600u", "cpe:/h:intel:atom_z:z3770", "cpe:/h:intel:xeon_e5:2690_v3", "cpe:/h:intel:core_i7:2629m", "cpe:/h:intel:core_i7:3520m", "cpe:/h:intel:core_i7:4785t", "cpe:/h:intel:xeon:x5690", "cpe:/h:intel:atom_c:c2550", "cpe:/h:intel:core_i3:6006u", "cpe:/h:intel:core_m:5y51", "cpe:/h:intel:core_i7:2760qm", "cpe:/h:intel:xeon_silver:4109t", "cpe:/h:intel:core_i3:6157u", "cpe:/h:intel:xeon_e5_1680_v4:-", "cpe:/h:intel:xeon_gold:6136", "cpe:/h:intel:xeon_e5:2667_v4", "cpe:/h:intel:xeon_e7:8860", "cpe:/h:intel:celeron_n:n2815", "cpe:/h:intel:xeon:e7520", "cpe:/h:intel:xeon_e5_1428l:-", "cpe:/h:intel:core_i3:2350m", "cpe:/h:intel:xeon_e3:1575m_v5", "cpe:/h:intel:xeon_e5:2658a_v3", "cpe:/h:intel:xeon:x3480", "cpe:/h:intel:xeon_e5:2670_v3", "cpe:/h:intel:atom_z:z3736f", "cpe:/h:intel:core_i3:4350t", "cpe:/h:intel:xeon_e5_2650_v4:-", "cpe:/h:intel:atom_c:c2758", "cpe:/h:intel:pentium_n:n3700", "cpe:/h:intel:xeon:x3440", "cpe:/h:intel:core_i7:870", "cpe:/h:intel:core_i5:4288u", "cpe:/h:intel:xeon_e5:2690_v2", "cpe:/h:intel:core_i7:7700hq", "cpe:/h:intel:xeon_silver:4110", "cpe:/h:intel:atom_z:z2520", "cpe:/h:intel:xeon:e5607", "cpe:/h:intel:core_i5:4302y", "cpe:/h:intel:xeon_platinum:8176", "cpe:/h:intel:core_i3:4330te", "cpe:/h:intel:core_i3:3115c", "cpe:/h:intel:core_i7:3820qm", "cpe:/h:intel:xeon_e3_1280_v6:-", "cpe:/h:intel:core_i3:4370", "cpe:/h:intel:xeon_e3:1565l_v5", "cpe:/h:intel:core_i7:4700ec", "cpe:/h:intel:xeon:x3450", "cpe:/h:intel:xeon:e5630", "cpe:/h:intel:xeon_e3_1275_v3:-", "cpe:/h:intel:xeon_bronze_3106:-", "cpe:/h:intel:core_i3:2102", "cpe:/h:intel:core_i5:3550s", "cpe:/h:intel:xeon:l5609", "cpe:/h:intel:xeon_e3_1241_v3:-", "cpe:/h:intel:atom_z:z3785", "cpe:/h:intel:xeon_e5_2643_v3:-", "cpe:/h:intel:celeron_n:n2806", "cpe:/h:intel:xeon_e3_1275_v2:-", "cpe:/h:intel:core_i7:5500u", "cpe:/h:intel:core_i5:4300u", "cpe:/h:intel:core_i5:4570s", "cpe:/h:intel:core_i7:2720qm", "cpe:/h:intel:celeron_n:n3050", "cpe:/h:intel:xeon_platinum:8158", "cpe:/h:intel:xeon:w3680", "cpe:/h:intel:xeon_e5:2660_v4", "cpe:/h:intel:core_i7:920", "cpe:/h:intel:core_i3:4010u", "cpe:/h:intel:core_i3:4030u", "cpe:/h:intel:core_i7:8550u", "cpe:/h:intel:xeon_e5:4650_v3", "cpe:/h:intel:atom_c:c2338", "cpe:/h:intel:core_i3:6100", "cpe:/h:intel:xeon:l5530", "cpe:/h:intel:xeon_e7:8893_v4", "cpe:/h:intel:core_i3:6100t", "cpe:/h:intel:core_i5:4210m", "cpe:/h:intel:atom_c:c3950", "cpe:/h:intel:core_i7:7660u", "cpe:/h:intel:atom_x3:c3235rk", "cpe:/h:intel:xeon_e5:4669_v3", "cpe:/h:intel:xeon:ec5509", "cpe:/h:intel:core_i5:750s", "cpe:/h:intel:xeon_e7:4807", "cpe:/h:intel:xeon_e3_1245_v6:-", "cpe:/h:intel:core_i7:4765t", "cpe:/h:intel:xeon_e5_2609:-", "cpe:/h:intel:xeon_e5:2695_v3", "cpe:/h:intel:core_i5:2550k", "cpe:/h:intel:core_i5:2310", "cpe:/h:intel:xeon:l3426"], "id": "CVE-2017-5715", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5715", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}, "cpe23": ["cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2603:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6126:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x3450:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2518:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5630:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4657l_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1680_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6148:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4640_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:1585l_v5:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6126f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1285_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1231_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m5:6y57:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8880l_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8860_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2618l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4603:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j:j3060:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2695_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4610:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2350:*:*:*:*:*:*:*", "cpe:2.3:h:arm:cortex-a:17:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2650l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2648l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6138t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2430l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6142f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n3000:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4650_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4669_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n2910:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1241_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4628l_v4:*:*:*:*:*:*:*", "cpe:2.3:h:arm:cortex-a:75:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4669_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2680_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2530:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1268l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:1515m_v5:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2643_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1660:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:5120t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1125c_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4620_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8867_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:2850_v2:*:*:*:*:*:*:*", "cpe:2.3:h:arm:cortex-a:9:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8880l_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6130t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_phi:7230f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1620_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3450:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_phi:7210:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:2860:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5502:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2428l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4820_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1246_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8890_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x5560:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8860:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2658a_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x5675:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2603_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1270_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4610_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1240_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2609_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_12201:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2640_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8830:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2450l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1280_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2670_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n2810:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_phi:7250:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4610_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:l3426:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2690:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1225_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3785:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2630l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2695_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:l5638:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m:5y71:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_x3:c3265rk:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4850:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4650l:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1220_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4624l_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8880_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2699r_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x7542:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2695_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8870_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8850_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m:5y10:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4620:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:1575m_v5:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_x3:c3445:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2438l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4603_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2620_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n4100:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5504:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:2820:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e7520:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8867l:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:1578l_v5:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1225:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2450_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2448l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8880_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e7540:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8893_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8893_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6150:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3775d:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2670_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x5650:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4627_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2628l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2730:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6126t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2640:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4890_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2660_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2407:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x5647:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2687w_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1275_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2697a_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2620:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2448l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1230:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x5660:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8857_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8891_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n3160:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x5680:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n4000:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1285l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:2830:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2418l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4809_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:l5640:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6140m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1275l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*", "cpe:2.3:h:arm:cortex-a:73:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2623_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5645:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-1105c:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1280:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1286l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2683_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2603_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2630_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2658_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2699_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2643_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:l5530:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2630l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_phi:7230:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4607:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3775:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2430_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2660:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2630l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n2830:*:*:*:*:*:*:*", "cpe:2.3:h:arm:cortex-a:57:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2650_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5603:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1630_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2680_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2637_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1240_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2643_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2698_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1620_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2648l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x3430:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_j:j3710:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:2890_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2640_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5503:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_n:n3530:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n2930:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1290_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:l5518:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2630_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2650:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1240l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2358:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5607:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2403:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4627_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1230_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2637:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m5:6y54:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8860_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1281_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_n:n3520:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n3350:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2687w_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m:5y51:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2667_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4870_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2316:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1620:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2428l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e7530:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4880_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1230_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:5120:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2650l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_x3:c3295rk:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2470_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4655_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x5677:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1660_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2608l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1505m_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2690_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n2815:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2418l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:l5618:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:1505m_v6:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4850_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4655_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1230l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5649:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6134:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6140:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1245_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2660_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1220:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m:5y10a:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x5687:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n3060:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_n:n3700:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2680:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1278l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4640:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2697_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_phi:7295:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2637_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_x3:c3205rk:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1650_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_x3:c3235rk:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n2808:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:1535m_v5:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x5550:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2338:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:l5506:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2550:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2620_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4809_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1240:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1235:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6128:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2450l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8891_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4820_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:ec5549:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:5119t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m3:7y30:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2650_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8870:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4640_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1265l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4807:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2650l_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8837:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2697_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1620_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:l5520:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2687w:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3770d:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_x3:c3200rk:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4650:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4660_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5540:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1275_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1285_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2618l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_j:j2850:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:5122:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4830:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4830_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:1558l_v5:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4870:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2618l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:ec5539:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2516:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1276_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4640_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4610_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x3470:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2609_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2650_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_x3:c3130:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:1565l_v5:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:w3680:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1270_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j:j1850:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1125c:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1270:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n2940:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1660_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:l7555:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2650l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1505l_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4820:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6134m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_x3:c3405:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1271_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:w3670:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8850:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2690_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4650_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8867_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4830_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:2870:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2508:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6138:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2648l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1428l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j:j3355:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2620_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4620_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2630:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2690_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5640:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:1535m_v6:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8893_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:2850:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x5670:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_j:j4205:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1226_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2758:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4850_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2418l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1501l_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n2806:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m:5y10c:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_n:n4200:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2630l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n2805:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1245:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2623_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m:5y31:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e6510:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*", "cpe:2.3:h:arm:cortex-a:72:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2718:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x5672:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4667_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1290:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:l5609:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n3010:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2699_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8890_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m:5y70:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:1545m_v5:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2699a_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x3480:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:w5590:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:l5630:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:2880_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6142:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2630_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2407_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2603_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2420:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8891_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2687w_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2658_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1245_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j:j1750:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4809_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1630_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1650_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x6550:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_phi:7285:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8890_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:l7545:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2698_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n2920:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4820_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x7560:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_n:n3510:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1225_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6152:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_n:n3540:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x3440:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_phi:7290:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2680_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4860_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1428l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2558:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1258l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2440:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x3460:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6138f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6132:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5606:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n2807:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2470:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5530:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1660_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j:j3160:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2430:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1275:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6142m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8870_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2609_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1280_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6130f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:l5508:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4850_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4660_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1501m_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:1585_v5:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1428l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2683_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2628l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6136:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2665:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5507:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_phi:7250f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2538:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4607_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_12201_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1220_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_phi:7290f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2450:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2648l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2658_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5520:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2738:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2440_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:5118:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1680_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_phi:7235:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2658:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2640_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_j:j2900:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:w3690:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8870_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:2803:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_x3:c3230rk:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1650_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:w5580:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x5570:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2667:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2430l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2667_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6144:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1105c_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5506:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4648_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_n:n3710:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6154:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j:j1900:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e6540:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2428l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4650_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2408l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4620_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x7550:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1286_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1650:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n2840:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2609:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5620:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2637_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m7:6y75:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2608l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4627_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1505l_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n3150:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4617:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8880_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2420_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3795:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n3050:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_phi:7210f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2628l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:l3406:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6130:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m3:6y30:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2660_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1285l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x5667:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8894_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1260l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:lc5528:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2750:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x5690:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m3:7y32:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1265l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:ec5509:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2643:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2697_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1220l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:lc5518:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6148f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2403_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6146:*:*:*:*:*:*:*", "cpe:2.3:h:arm:cortex-a:15:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2670:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n2820:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2667_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4667_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j:j1800:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4830_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:2870_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1265l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4860:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:36:47", "description": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.", "edition": 9, "cvss3": {"exploitabilityScore": 1.1, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "CHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.6, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 4.0}, "published": "2018-01-04T13:29:00", "title": "CVE-2017-5754", "type": "cve", "cwe": ["CWE-200"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.7, "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-5754"], "modified": "2020-05-05T11:31:00", "cpe": ["cpe:/h:intel:core_i3:4330t", "cpe:/h:intel:core_i7:840qm", "cpe:/h:intel:core_i3:530", "cpe:/h:intel:celeron_n:n4000", "cpe:/h:intel:core_i5:4200u", "cpe:/h:intel:core_i5:2405s", "cpe:/h:intel:xeon_e3_1225_v3:-", "cpe:/h:intel:core_i7:4710hq", "cpe:/h:intel:xeon_phi:7230f", "cpe:/h:intel:xeon_e5:2680", "cpe:/h:intel:xeon:e5520", "cpe:/h:intel:xeon_e5_2407_v2:-", "cpe:/h:intel:pentium_n:n3520", "cpe:/h:intel:core_i7:875k", "cpe:/h:intel:atom_z:z3735e", "cpe:/h:intel:core_i3:6098p", "cpe:/h:intel:xeon_e5_2448l:-", "cpe:/h:intel:core_i7:870s", "cpe:/h:intel:core_i7:4610m", "cpe:/h:intel:core_i7:2675qm", "cpe:/h:intel:core_i7:4702ec", "cpe:/h:intel:xeon_e5:4648_v3", "cpe:/h:intel:xeon_e5_2620_v2:-", "cpe:/h:intel:xeon_e3_1240_v2:-", "cpe:/h:intel:xeon_gold:6138", "cpe:/h:intel:core_i5:480m", "cpe:/h:intel:xeon_e5_2637:-", "cpe:/h:intel:xeon_e5_2618l_v3:-", "cpe:/h:intel:atom_z:z3736g", "cpe:/h:intel:xeon_e5_1660_v3:-", "cpe:/h:intel:xeon_e5_2650l_v3:-", "cpe:/h:intel:xeon_silver:4116t", "cpe:/h:intel:xeon_gold:6144", "cpe:/h:intel:xeon_phi:7250f", "cpe:/h:intel:atom_x3:c3230rk", "cpe:/h:intel:xeon_e3_1270:-", "cpe:/h:intel:xeon_platinum:8176f", "cpe:/h:intel:core_i3:2330e", "cpe:/h:intel:core_i5:4410e", "cpe:/h:intel:core_i7:4700hq", "cpe:/h:intel:core_i7:610e", "cpe:/h:intel:celeron_n:n2808", "cpe:/h:intel:core_i3:2340ue", "cpe:/h:intel:core_i7:4800mq", "cpe:/h:intel:xeon_gold:6126t", "cpe:/h:intel:xeon_e5:4603_v2", "cpe:/h:intel:core_m:5y31", "cpe:/h:intel:xeon_e5:4620", "cpe:/h:intel:core_i7:2620m", "cpe:/h:intel:xeon_e5_1428l_v3:-", "cpe:/h:intel:xeon:w5580", "cpe:/h:intel:atom_z:z2460", "cpe:/h:intel:core_i5:3550", "cpe:/h:intel:xeon_e7:8867_v4", "cpe:/h:intel:xeon_gold:6138t", "cpe:/h:intel:atom_c:c2358", "cpe:/h:intel:core_i3:2120", "cpe:/h:intel:xeon_e3_1501l_v6:-", "cpe:/h:intel:xeon:lc5518", "cpe:/h:intel:core_i5:6400t", "cpe:/h:intel:xeon_e3_1230l_v3:-", "cpe:/h:intel:xeon_e5:4650_v4", "cpe:/h:intel:core_i3:350m", "cpe:/h:intel:core_i7:3615qm", "cpe:/h:intel:core_i3:3227u", "cpe:/h:intel:xeon_e5:2687w", "cpe:/h:intel:xeon_e5_2623_v4:-", "cpe:/h:intel:core_i5:4200y", "cpe:/h:intel:core_i3:2357m", "cpe:/h:intel:core_i7:4750hq", "cpe:/h:intel:atom_c:c3858", "cpe:/h:intel:core_i3:2377m", "cpe:/h:intel:core_m:5y10", "cpe:/h:intel:core_i7:3537u", "cpe:/h:intel:xeon_e3_1245:-", "cpe:/h:intel:xeon_e5_2470_v2:-", "cpe:/h:intel:xeon_e5_2408l_v3:-", "cpe:/h:intel:core_i5:4422e", "cpe:/h:intel:xeon_e3_1246_v3:-", "cpe:/h:intel:xeon_e5_2623_v3:-", "cpe:/h:intel:atom_x3:c3295rk", "cpe:/h:intel:xeon:w5590", "cpe:/h:intel:atom_c:c3955", "cpe:/h:intel:xeon:lc5528", "cpe:/h:intel:atom_c:c2730", "cpe:/h:intel:atom_c:c2518", "cpe:/h:intel:xeon_e5_2640_v2:-", "cpe:/h:intel:core_i5:6200u", "cpe:/h:intel:core_i3:6100h", "cpe:/h:intel:atom_x3:c3265rk", "cpe:/h:intel:xeon_platinum:8160m", "cpe:/h:intel:xeon_e3_1265l_v3:-", "cpe:/h:intel:core_i5:4670r", "cpe:/h:intel:core_i7:4770te", "cpe:/h:intel:xeon_gold:6126f", "cpe:/h:intel:celeron_j:j3355", "cpe:/h:intel:xeon_e7:4830_v3", "cpe:/h:intel:xeon_e5_1428l_v2:-", "cpe:/h:intel:xeon_e3:1545m_v5", "cpe:/h:intel:xeon_e5:2660_v3", "cpe:/h:intel:core_i5:4300y", "cpe:/h:intel:atom_c:c3808", "cpe:/h:intel:core_i5:3610me", "cpe:/h:intel:core_i5:4250u", "cpe:/h:intel:core_i5:3475s", "cpe:/h:intel:xeon_e5:2695_v2", "cpe:/h:intel:core_i7:3517ue", "cpe:/h:intel:xeon_e5:4650_v2", "cpe:/h:intel:core_i7:4500u", "cpe:/h:intel:core_i5:4430s", "cpe:/h:intel:core_i3:2365m", "cpe:/h:intel:core_i7:2920xm", "cpe:/h:intel:core_i3:330m", "cpe:/h:intel:xeon_e5:4640", "cpe:/h:intel:xeon_e5:2667_v3", "cpe:/h:intel:core_i7:3612qm", "cpe:/h:intel:core_i7:4900mq", "cpe:/h:intel:core_i5:4258u", "cpe:/h:intel:core_i3:4160", "cpe:/h:intel:core_i5:4590", "cpe:/h:intel:xeon_e5:2683_v4", "cpe:/h:intel:xeon_e5_2440:-", "cpe:/h:intel:core_i7:980x", "cpe:/h:intel:core_i7:5750hq", "cpe:/h:intel:xeon_e3_1505l_v6:-", "cpe:/h:intel:xeon:l3406", "cpe:/h:intel:atom_e:e3825", "cpe:/h:intel:atom_c:c3538", "cpe:/h:intel:core_i5:3470t", "cpe:/h:intel:xeon_e5_1620:-", "cpe:/h:intel:atom_c:c2738", "cpe:/h:intel:xeon_e5_2630l_v4:-", "cpe:/h:intel:xeon:e5507", "cpe:/h:intel:core_i5:2500", "cpe:/h:intel:xeon_e5:2667", "cpe:/h:intel:core_i3:3120me", "cpe:/h:intel:core_i5:4400e", "cpe:/h:intel:core_i3:8100", "cpe:/h:intel:core_i5:2450m", "cpe:/h:intel:xeon_e5:2687w_v4", "cpe:/h:intel:core_i5:2300", "cpe:/h:intel:xeon_e3:1535m_v5", "cpe:/h:intel:atom_z:z3740", "cpe:/h:intel:xeon_e5:2680_v3", "cpe:/h:intel:xeon_e7:8857_v2", "cpe:/h:intel:core_i5:4670", "cpe:/h:intel:core_i5:4300m", "cpe:/h:intel:core_i3:6167u", "cpe:/h:intel:core_i3:3220t", "cpe:/h:intel:core_i7:2617m", "cpe:/h:intel:pentium_n:n3540", "cpe:/h:intel:xeon_e5_2628l_v4:-", "cpe:/h:intel:core_i7:3540m", "cpe:/h:intel:xeon_e5_1660_v2:-", "cpe:/h:intel:xeon_gold:5120", "cpe:/h:intel:xeon_e5:4610_v3", "cpe:/h:intel:core_i5:3427u", "cpe:/h:intel:core_i7:3610qm", "cpe:/h:intel:core_m:5y10c", "cpe:/h:intel:core_i7:3770", "cpe:/h:intel:xeon_e3:1585_v5", "cpe:/h:intel:xeon_e3_1225_v6:-", "cpe:/h:intel:xeon_e3_1275_v5:-", "cpe:/h:intel:xeon_e5:2658", "cpe:/h:intel:core_i5:3450", "cpe:/h:intel:core_i7:620lm", "cpe:/h:intel:xeon_e3_1280_v2:-", "cpe:/h:intel:core_i5:5675r", "cpe:/h:intel:xeon_e5_2608l_v3:-", "cpe:/h:intel:core_m:5y10a", "cpe:/h:intel:xeon:e6540", "cpe:/h:intel:core_i7:4712hq", "cpe:/h:intel:core_i7:7560u", "cpe:/h:intel:core_i3:3229y", "cpe:/h:intel:atom_e:e3826", "cpe:/h:intel:core_i7:2610ue", "cpe:/h:intel:core_i7:975", "cpe:/h:intel:core_i5:2435m", "cpe:/h:intel:core_i3:2310m", "cpe:/h:intel:core_i5:4570", "cpe:/h:intel:core_i3:4030y", "cpe:/h:intel:core_i3:380um", "cpe:/h:intel:core_i5:4690s", "cpe:/h:intel:xeon_e5_1660:-", "cpe:/h:intel:xeon_gold:5122", "cpe:/h:intel:xeon_platinum:8170", "cpe:/h:intel:xeon_e5:2697_v4", "cpe:/h:intel:xeon:x5660", "cpe:/h:intel:core_m5:6y54", "cpe:/h:intel:xeon_e3_1220_v2:-", "cpe:/h:intel:core_i7:3612qe", "cpe:/h:intel:xeon_e5:4640_v2", "cpe:/h:intel:xeon_e5_1620_v4:-", "cpe:/h:intel:xeon_e5:4620_v4", "cpe:/h:intel:xeon_e3_1285l_v3:-", "cpe:/h:intel:core_i5:5350u", "cpe:/h:intel:xeon_e5_2450:-", "cpe:/h:intel:xeon_e5_2640_v4:-", "cpe:/h:intel:core_i3:4012y", "cpe:/h:intel:xeon_e3_1271_v3:-", "cpe:/h:intel:xeon_e5:4610_v4", "cpe:/h:intel:core_i7:4700mq", "cpe:/h:intel:xeon_e7:8870_v3", "cpe:/h:intel:xeon_e5_2430l_v2:-", "cpe:/h:intel:xeon_e5:2660_v2", "cpe:/h:intel:core_i5:3437u", "cpe:/h:intel:core_i7:4870hq", "cpe:/h:intel:xeon_gold:6134m", "cpe:/h:intel:atom_z:z3460", "cpe:/h:intel:core_i7:7700", "cpe:/h:intel:core_i3:2328m", "cpe:/h:intel:xeon_e5_2430:-", "cpe:/h:intel:core_i7:2670qm", "cpe:/h:intel:xeon_e5:2687w_v3", "cpe:/h:intel:atom_c:c3750", "cpe:/h:intel:xeon_phi:7235", "cpe:/h:intel:atom_z:z2580", "cpe:/h:intel:xeon_e7:4820", "cpe:/h:intel:xeon_e5:2680_v4", "cpe:/h:intel:core_i5:680", "cpe:/h:intel:xeon_e5_2643:-", "cpe:/h:intel:celeron_j:j1900", "cpe:/h:intel:xeon_gold:6130", "cpe:/h:intel:core_i5:2537m", "cpe:/h:intel:xeon_silver:4114t", "cpe:/h:intel:xeon_e7:8850_v2", "cpe:/h:intel:xeon_silver:4108", "cpe:/h:intel:xeon_e5_1650_v3:-", "cpe:/h:intel:celeron_j:j3160", "cpe:/h:intel:core_i7:3632qm", "cpe:/h:intel:xeon_e3:1535m_v6", "cpe:/h:intel:celeron_j:j3455", "cpe:/h:intel:core_i3:2100t", "cpe:/h:intel:xeon_silver:4112", "cpe:/h:intel:core_i7:4770", "cpe:/h:intel:xeon_e3_1281_v3:-", "cpe:/h:intel:xeon_e3_1280_v3:-", "cpe:/h:intel:core_i3:4100m", "cpe:/h:intel:celeron_n:n3450", "cpe:/h:intel:xeon_e7:2820", "cpe:/h:intel:core_i3:4370t", "cpe:/h:intel:core_i3:4150", "cpe:/h:intel:xeon_e7:8880l_v2", "cpe:/h:intel:xeon_e3_1225_v5:-", "cpe:/h:intel:xeon_e5:2697a_v4", "cpe:/h:intel:core_i3:6100e", "cpe:/h:intel:xeon_e5_2618l_v2:-", "cpe:/h:intel:xeon_e5:4657l_v2", "cpe:/h:intel:core_i5:470um", "cpe:/h:intel:xeon_e5_2630_v3:-", "cpe:/h:intel:xeon_e7:8890_v4", "cpe:/h:intel:atom_z:z3795", "cpe:/h:intel:core_i5:4220y", "cpe:/h:intel:xeon_e5_2428l:-", "cpe:/h:intel:core_i3:4102e", "cpe:/h:intel:core_i3:2370m", "cpe:/h:intel:xeon_phi:7250", "cpe:/h:intel:xeon_gold:6130t", "cpe:/h:intel:core_i7:4960hq", "cpe:/h:intel:celeron_n:n3150", "cpe:/h:intel:xeon_e5:2698_v4", "cpe:/h:intel:core_i7:860", "cpe:/h:intel:core_i3:2375m", "cpe:/h:intel:core_i3:4158u", "cpe:/h:intel:atom_z:z2420", "cpe:/h:intel:xeon:x5687", "cpe:/h:intel:core_i7:4710mq", "cpe:/h:intel:core_i5:4460s", "cpe:/h:intel:xeon_e3:1585l_v5", "cpe:/h:intel:xeon:l5618", "cpe:/h:intel:xeon_e5_2650l:-", "cpe:/h:intel:xeon:e5640", "cpe:/h:intel:core_i7:4702mq", "cpe:/h:intel:xeon_gold:6128", "cpe:/h:intel:core_i7:4771", "cpe:/h:intel:core_i7:5850eq", "cpe:/h:intel:xeon_e3_1276_v3:-", "cpe:/h:intel:xeon:l7555", "cpe:/h:intel:core_i3:390m", "cpe:/h:intel:xeon_e7:4850", "cpe:/h:intel:core_m3:7y30", "cpe:/h:intel:xeon_e7:8850", "cpe:/h:intel:xeon:e5502", "cpe:/h:intel:core_i3:4170t", "cpe:/h:intel:xeon_e5_2620_v4:-", "cpe:/h:intel:xeon_e5:4660_v3", "cpe:/h:intel:core_i5:4340m", "cpe:/h:intel:core_i5:6300hq", "cpe:/h:intel:celeron_n:n3000", "cpe:/h:intel:core_i3:5010u", "cpe:/h:intel:core_i5:4278u", "cpe:/h:intel:core_i7:4722hq", "cpe:/h:intel:core_i5:6500te", "cpe:/h:intel:core_i7:3770t", "cpe:/h:intel:xeon_e7:8891_v2", "cpe:/h:intel:xeon_e5:4660_v4", "cpe:/h:intel:core_i5:4440", "cpe:/h:intel:core_i5:5257u", "cpe:/h:intel:core_i7:4600m", "cpe:/h:intel:xeon_e7:4860", "cpe:/h:intel:core_i5:3570", "cpe:/h:intel:xeon_e5_2630:-", "cpe:/h:intel:core_i7:620m", "cpe:/h:intel:core_i5:3230m", "cpe:/h:intel:xeon_e5_2440_v2:-", "cpe:/h:intel:xeon_e3_12201_v2:-", "cpe:/h:intel:xeon_e3_1270_v3:-", "cpe:/h:intel:core_i7:7820hq", "cpe:/h:intel:xeon_e3_1231_v3:-", "cpe:/h:intel:core_i7:880", "cpe:/h:intel:xeon:e5645", "cpe:/h:intel:xeon:e5649", "cpe:/h:intel:xeon_gold:6148", "cpe:/h:intel:xeon_e7:8880_v2", "cpe:/h:intel:xeon_e5:4610", "cpe:/h:intel:xeon_gold:6146", "cpe:/h:intel:xeon_e3_1275:-", "cpe:/h:intel:xeon_e5_2630l_v3:-", "cpe:/h:intel:xeon_e5_1660_v4:-", "cpe:/h:intel:core_i5:4690", "cpe:/h:intel:core_i7:4510u", "cpe:/h:intel:core_i3:2130", "cpe:/h:intel:core_i5:6350hq", "cpe:/h:intel:xeon_e5_2630l_v2:-", "cpe:/h:intel:core_i5:4690t", "cpe:/h:intel:xeon:e6510", "cpe:/h:intel:xeon_gold:6142f", "cpe:/h:intel:xeon:l5508", "cpe:/h:intel:core_i7:4720hq", "cpe:/h:intel:xeon_e7:4880_v2", "cpe:/h:intel:core_i3:4160t", "cpe:/h:intel:core_i5:2500k", "cpe:/h:intel:core_i5:520m", "cpe:/h:intel:celeron_n:n2820", "cpe:/h:intel:xeon_e5_2628l_v3:-", "cpe:/h:intel:atom_c:c2530", "cpe:/h:intel:core_i3:2120t", "cpe:/h:intel:atom_c:c2750", "cpe:/h:intel:core_i5:6600", "cpe:/h:intel:xeon_e3_1501m_v6:-", "cpe:/h:intel:core_i5:2500t", "cpe:/h:intel:xeon_e5:4620_v2", "cpe:/h:intel:xeon_e7:4870_v2", "cpe:/h:intel:core_i7:3840qm", "cpe:/h:intel:core_i3:560", "cpe:/h:intel:atom_c:c2350", "cpe:/h:intel:core_i7:3770k", "cpe:/h:intel:core_i7:5950hq", "cpe:/h:intel:pentium_j:j4205", "cpe:/h:intel:xeon_e3:1505m_v6", "cpe:/h:intel:xeon_e3_1235:-", "cpe:/h:intel:core_i5:2320", "cpe:/h:intel:xeon_e7:4890_v2", "cpe:/h:intel:core_i5:2515e", "cpe:/h:intel:core_i7:950", "cpe:/h:intel:core_i3:4120u", "cpe:/h:intel:core_i5:540um", "cpe:/h:intel:xeon_e7:8870_v4", "cpe:/h:intel:core_i5:4330m", "cpe:/h:intel:core_i5:5350h", "cpe:/h:intel:xeon_e3_1240:-", "cpe:/h:intel:xeon_e3_1230_v3:-", "cpe:/h:intel:xeon:e5540", "cpe:/h:intel:core_i5:6685r", "cpe:/h:intel:atom_z:z3735f", "cpe:/h:intel:core_i7:7820hk", "cpe:/h:intel:core_i3:2312m", "cpe:/h:intel:core_i5:2557m", "cpe:/h:intel:core_i7:4790k", "cpe:/h:intel:core_i5:4200h", "cpe:/h:intel:core_i5:3340s", "cpe:/h:intel:core_i3:3130m", "cpe:/h:intel:core_i7:8650u", "cpe:/h:intel:core_i3:5015u", "cpe:/h:intel:core_i5:2540m", "cpe:/h:intel:atom_x3:c3205rk", "cpe:/h:intel:core_i7:4790s", "cpe:/h:intel:xeon_e3_1275_v6:-", "cpe:/h:intel:core_i5:6400", "cpe:/h:intel:atom_c:c3830", "cpe:/h:intel:core_i5:2390t", "cpe:/h:intel:core_i3:3220", "cpe:/h:intel:xeon:w3690", "cpe:/h:intel:xeon_e5_2420_v2:-", "cpe:/h:intel:xeon_e3_1268l_v5:-", "cpe:/h:intel:xeon_e3_1270_v6:-", "cpe:/h:intel:xeon:x3430", "cpe:/h:intel:xeon_e5_2609_v4:-", "cpe:/h:intel:core_i5:580m", "cpe:/h:intel:core_i7:5550u", "cpe:/h:intel:core_i5:3320m", "cpe:/h:intel:atom_x3:c3405", "cpe:/h:intel:core_i3:4025u", "cpe:/h:intel:core_i3:4010y", "cpe:/h:intel:core_i3:2330m", "cpe:/h:intel:xeon_platinum:8164", "cpe:/h:intel:xeon_e7:2803", "cpe:/h:intel:core_i5:660", "cpe:/h:intel:core_i5:6440eq", "cpe:/h:intel:core_i5:5200u", "cpe:/h:intel:xeon_platinum:8156", "cpe:/h:intel:xeon_e5_2620:-", "cpe:/h:intel:xeon_e5_2648l:-", "cpe:/h:intel:core_i7:2860qm", "cpe:/h:intel:core_i7:3615qe", "cpe:/h:intel:core_i5:6500", "cpe:/h:intel:core_i5:2430m", "cpe:/h:intel:atom_e:e3805", "cpe:/h:intel:xeon_e3_1245_v5:-", "cpe:/h:intel:core_i5:3330s", "cpe:/h:intel:xeon_e3_1270_v5:-", "cpe:/h:intel:core_i3:8350k", "cpe:/h:intel:xeon_platinum:8168", "cpe:/h:intel:xeon:x5560", "cpe:/h:intel:core_i7:4578u", "cpe:/h:intel:xeon_gold:6126", "cpe:/h:intel:core_i3:4150t", "cpe:/h:intel:core_i3:3225", "cpe:/h:intel:xeon_e7:2850", "cpe:/h:intel:xeon_e3_1290_v2:-", "cpe:/h:intel:core_i7:2715qe", "cpe:/h:intel:core_i3:6300", "cpe:/h:intel:xeon_e7:2850_v2", "cpe:/h:intel:xeon_e5_2448l_v2:-", "cpe:/h:intel:xeon_gold:6140m", "cpe:/h:intel:core_i5:760", "cpe:/h:intel:xeon_e5_2470:-", "cpe:/h:intel:xeon:e5606", "cpe:/h:intel:celeron_j:j3060", "cpe:/h:intel:atom_c:c3708", "cpe:/h:intel:xeon_e5_2640_v3:-", "cpe:/h:intel:celeron_n:n3160", "cpe:/h:intel:xeon:x5680", "cpe:/h:intel:celeron_n:n2807", "cpe:/h:intel:xeon_e5_2650_v2:-", "cpe:/h:intel:xeon:l5630", "cpe:/h:intel:xeon_e5:2687w_v2", "cpe:/h:intel:core_i5:3439y", "cpe:/h:intel:core_i5:540m", "cpe:/h:intel:xeon_e7:8860_v4", "cpe:/h:intel:core_i7:640um", "cpe:/h:intel:xeon_gold:6142m", "cpe:/h:intel:core_m3:7y32", "cpe:/h:intel:atom_z:z3745d", "cpe:/h:intel:atom_c:c3958", "cpe:/h:intel:core_i7:3555le", "cpe:/h:intel:core_i7:2655le", "cpe:/h:intel:core_i3:3217u", "cpe:/h:intel:xeon_e7:4850_v4", "cpe:/h:intel:core_i3:6100u", "cpe:/h:intel:pentium_n:n4200", "cpe:/h:intel:core_m7:6y75", "cpe:/h:intel:core_i7:940", "cpe:/h:intel:celeron_n:n3010", "cpe:/h:intel:xeon:x5675", "cpe:/h:intel:xeon_e5_1630_v3:-", "cpe:/h:intel:xeon_gold:6138f", "cpe:/h:intel:core_i5:6600t", "cpe:/h:intel:xeon_e3_1285_v4:-", "cpe:/h:intel:core_i7:640lm", "cpe:/h:intel:core_i3:5005u", "cpe:/h:intel:core_i5:2467m", "cpe:/h:intel:core_i5:4308u", "cpe:/h:intel:core_i7:660ue", "cpe:/h:intel:core_i5:3380m", "cpe:/h:intel:xeon_e5_2609_v2:-", "cpe:/h:intel:xeon_e5_2648l_v2:-", "cpe:/h:intel:xeon_e7:8880_v3", "cpe:/h:intel:atom_x3:c3130", "cpe:/h:intel:xeon_e7:8837", "cpe:/h:intel:core_i7:980", "cpe:/h:intel:xeon_e5_2407:-", "cpe:/h:intel:xeon:e7530", "cpe:/h:intel:xeon:x3460", "cpe:/h:intel:xeon_e7:8870_v2", "cpe:/h:intel:core_i5:4210h", "cpe:/h:intel:core_i7:990x", "cpe:/h:intel:core_i7:660lm", "cpe:/h:intel:core_i5:2380p", "cpe:/h:intel:core_i7:7500u", "cpe:/h:intel:core_i5:4570t", "cpe:/h:intel:core_i3:4020y", "cpe:/h:intel:core_i3:330um", "cpe:/h:intel:core_i5:4360u", "cpe:/h:intel:xeon_e5:2658_v3", "cpe:/h:intel:core_i5:3360m", "cpe:/h:intel:atom_z:z3740d", "cpe:/h:intel:xeon_phi:7290", "cpe:/h:intel:xeon_gold:5120t", "cpe:/h:intel:xeon_e3_1260l:-", "cpe:/h:intel:xeon_e3:1515m_v5", "cpe:/h:intel:xeon_e5_2620_v3:-", "cpe:/h:intel:xeon_e5_2650_v3:-", "cpe:/h:intel:core_i3:6320", "cpe:/h:intel:core_i7:3689y", "cpe:/h:intel:pentium_j:j2900", "cpe:/h:intel:core_i7:4600u", "cpe:/h:intel:xeon_e5:4667_v4", "cpe:/h:intel:core_i7:820qm", "cpe:/h:intel:xeon_e5_2637_v2:-", "cpe:/h:intel:xeon_e5_2603_v2:-", "cpe:/h:intel:xeon_e5_2637_v3:-", "cpe:/h:intel:xeon:e7540", "cpe:/h:intel:xeon:e5530", "cpe:/h:intel:core_i3:3250", "cpe:/h:intel:core_i3:4360t", "cpe:/h:intel:xeon_e5:4617", "cpe:/h:intel:core_i5:4350u", "cpe:/h:intel:core_i7:4790t", "cpe:/h:intel:xeon_e5_2603_v3:-", "cpe:/h:intel:core_i3:4112e", "cpe:/h:intel:core_i5:460m", "cpe:/h:intel:xeon_e3_1270_v2:-", "cpe:/h:intel:xeon_e7:8830", "cpe:/h:intel:xeon_e5_2403:-", "cpe:/h:intel:core_i7:3635qm", "cpe:/h:intel:xeon_e5_2428l_v2:-", "cpe:/h:intel:xeon_e3_1226_v3:-", "cpe:/h:intel:xeon_e7:8867_v3", "cpe:/h:intel:xeon_e7:4830", "cpe:/h:intel:xeon_e5:4603", "cpe:/h:intel:atom_c:c3308", "cpe:/h:intel:xeon_e3_1286l_v3:-", "cpe:/h:intel:xeon_e3_1280:-", "cpe:/h:intel:xeon_e5:2683_v3", "cpe:/h:intel:xeon_e7:8880_v4", "cpe:/h:intel:core_i7:4558u", "cpe:/h:intel:core_i5:4690k", "cpe:/h:intel:core_i5:2410m", "cpe:/h:intel:core_i7:740qm", "cpe:/h:intel:core_i5:6500t", "cpe:/h:intel:xeon_e5:2658_v2", "cpe:/h:intel:xeon_gold:6134", "cpe:/h:intel:core_i5:3350p", "cpe:/h:intel:xeon_e7:8890_v2", "cpe:/h:intel:celeron_j:j1750", "cpe:/h:intel:xeon_e5_1650_v4:-", "cpe:/h:intel:celeron_j:j4005", "cpe:/h:intel:core_i3:3110m", "cpe:/h:intel:xeon_e3_1240_v6:-", "cpe:/h:intel:core_i7:920xm", "cpe:/h:intel:core_i5:4402e", "cpe:/h:intel:core_i3:4340te", "cpe:/h:intel:core_i7:4770s", "cpe:/h:intel:celeron_n:n2805", "cpe:/h:intel:celeron_n:n3060", "cpe:/h:intel:xeon_e7:4820_v3", "cpe:/h:intel:xeon_e3_1240l_v3:-", "cpe:/h:intel:core_i3:3120m", "cpe:/h:intel:core_i7:4950hq", "cpe:/h:intel:core_i5:8350u", "cpe:/h:intel:xeon_e5:2699a_v4", "cpe:/h:intel:xeon_e3_1505l_v5:-", "cpe:/h:intel:xeon_e3_1225_v2:-", "cpe:/h:intel:xeon_platinum:8176m", "cpe:/h:intel:xeon:l7545", "cpe:/h:intel:core_i7:620um", "cpe:/h:intel:xeon_e3_1240_v3:-", "cpe:/h:intel:xeon_e3:1558l_v5", "cpe:/h:intel:xeon_e5_2418l:-", "cpe:/h:intel:xeon_e3_1290:-", "cpe:/h:intel:xeon_e5_2603_v4:-", "cpe:/h:intel:xeon_e3_1240_v5:-", "cpe:/h:intel:xeon:w3670", "cpe:/h:intel:core_i7:5700eq", "cpe:/h:intel:core_i7:940xm", "cpe:/h:intel:xeon_phi:7210f", "cpe:/h:intel:xeon:x7560", "cpe:/h:intel:core_i7:5775r", "cpe:/h:intel:pentium_n:n3530", "cpe:/h:intel:core_i3:3217ue", "cpe:/h:intel:xeon_e5:4627_v2", "cpe:/h:intel:xeon_e5_2403_v2:-", "cpe:/h:intel:xeon_e3_1230_v2:-", "cpe:/h:intel:xeon:e5620", "cpe:/h:intel:core_i7:3770s", "cpe:/h:intel:core_i3:3210", "cpe:/h:intel:core_i7:2635qm", "cpe:/h:intel:core_i7:660um", "cpe:/h:intel:xeon_e5:2658_v4", "cpe:/h:intel:core_i7:2710qe", "cpe:/h:intel:xeon_e5_2643_v2:-", "cpe:/h:intel:core_i5:2400", "cpe:/h:intel:core_m5:6y57", "cpe:/h:intel:xeon_e5:2650l_v4", "cpe:/h:intel:core_i5:3570s", "cpe:/h:intel:core_i7:7820eq", "cpe:/h:intel:celeron_n:n2830", "cpe:/h:intel:atom_c:c2316", "cpe:/h:intel:core_i7:4610y", "cpe:/h:intel:xeon_e5:2697_v3", "cpe:/h:intel:core_i3:3245", "cpe:/h:intel:core_i3:4130t", "cpe:/h:intel:xeon_e7:8891_v4", "cpe:/h:intel:xeon_e5_2650:-", "cpe:/h:intel:xeon_e3_1260l_v5:-", "cpe:/h:intel:xeon_e3_1275l_v3:-", "cpe:/h:intel:core_i5:2520m", "cpe:/h:intel:xeon_e5:2660", "cpe:/h:intel:xeon:x7542", "cpe:/h:intel:celeron_n:n2930", "cpe:/h:intel:core_i7:860s", "cpe:/h:intel:core_i5:6267u", "cpe:/h:intel:atom_z:z3560", "cpe:/h:intel:core_i5:6402p", "cpe:/h:intel:xeon_e3_1220:-", "cpe:/h:intel:xeon:x5677", "cpe:/h:intel:xeon:l5638", "cpe:/h:intel:xeon_e7:8867l", "cpe:/h:intel:atom_c:c3758", "cpe:/h:intel:xeon:x5672", "cpe:/h:intel:core_i5:4460", "cpe:/h:intel:celeron_n:n2840", "cpe:/h:intel:pentium_n:n3510", "cpe:/h:intel:xeon_e7:8880l_v3", "cpe:/h:intel:xeon_gold:6132", "cpe:/h:intel:xeon_e5_2420:-", "cpe:/h:intel:xeon_e5:4627_v4", "cpe:/h:intel:xeon_e7:2830", "cpe:/h:intel:core_i7:620ue", "cpe:/h:intel:core_i7:3517u", "cpe:/h:intel:xeon_e3_1105c_v2:-", "cpe:/h:intel:core_i3:4110m", "cpe:/h:intel:core_i5:4430", "cpe:/h:intel:celeron_j:j4105", "cpe:/h:intel:atom_c:c3508", "cpe:/h:intel:xeon_e5_2450l:-", "cpe:/h:intel:core_i5:430m", "cpe:/h:intel:celeron_j:j1800", "cpe:/h:intel:core_i5:5287u", "cpe:/h:intel:xeon_e5_2430l:-", "cpe:/h:intel:core_i5:5300u", "cpe:/h:intel:xeon_e5_2630l:-", "cpe:/h:intel:xeon_e5_2630_v4:-", "cpe:/h:intel:atom_z:z3580", "cpe:/h:intel:core_i3:2115c", "cpe:/h:intel:core_i3:4110e", "cpe:/h:intel:core_i3:4005u", "cpe:/h:intel:core_i5:430um", "cpe:/h:intel:xeon:x5650", "cpe:/h:intel:xeon_e5:4667_v3", "cpe:/h:intel:xeon:x3470", "cpe:/h:intel:xeon_e3_1285_v6:-", "cpe:/h:intel:core_i7:640m", "cpe:/h:intel:xeon:e5503", "cpe:/h:intel:core_i7:965", "cpe:/h:intel:atom_z:z3770d", "cpe:/h:intel:atom_z:z2560", "cpe:/h:intel:xeon:x5667", "cpe:/h:intel:core_i5:3317u", "cpe:/h:intel:xeon:x5570", "cpe:/h:intel:xeon_gold:6152", "cpe:/h:intel:core_i3:5157u", "cpe:/h:intel:core_i7:2600", "cpe:/h:intel:core_i5:3470", "cpe:/h:intel:xeon_e5:4650l", "cpe:/h:intel:core_i5:8400", "cpe:/h:intel:xeon_e5:2690_v4", "cpe:/h:intel:xeon_e3_1230_v5:-", "cpe:/h:intel:xeon_e7:8894_v4", "cpe:/h:intel:core_i3:4340", "cpe:/h:intel:core_i5:4200m", "cpe:/h:intel:core_i5:4570r", "cpe:/h:intel:xeon_e7:4820_v2", "cpe:/h:intel:core_i7:970", "cpe:/h:intel:atom_x3:c3445", "cpe:/h:intel:core_m3:6y30", "cpe:/h:intel:xeon_e7:4860_v2", "cpe:/h:intel:atom_c:c2308", "cpe:/h:intel:core_i5:3470s", "cpe:/h:intel:xeon_e5:2680_v2", "cpe:/h:intel:xeon_gold:6130f", "cpe:/h:intel:xeon_e5:4624l_v2", "cpe:/h:intel:core_i5:6287u", "cpe:/h:intel:xeon_e7:4830_v2", "cpe:/h:intel:core_i7:5650u", "cpe:/h:intel:xeon:l5506", "cpe:/h:intel:atom_c:c2558", "cpe:/h:intel:xeon:e5603", "cpe:/h:intel:core_i3:540", "cpe:/h:intel:atom_c:c2718", "cpe:/h:intel:xeon_gold:5118", "cpe:/h:intel:xeon_e5:4655_v3", "cpe:/h:intel:xeon_e5_1650:-", "cpe:/h:intel:core_i7:2640m", "cpe:/h:intel:core_i3:4100u", "cpe:/h:intel:xeon_gold:6142", "cpe:/h:intel:core_i7:4702hq", "cpe:/h:intel:xeon_e5:2667_v2", "cpe:/h:intel:core_i7:2677m", "cpe:/h:intel:core_i5:4590t", "cpe:/h:intel:xeon:e5504", "cpe:/h:intel:core_i5:3570t", "cpe:/h:intel:core_i5:4670t", "cpe:/h:intel:core_i3:4000m", "cpe:/h:intel:xeon:l5518", "cpe:/h:intel:xeon_e5:4627_v3", "cpe:/h:intel:xeon_e5:4610_v2", "cpe:/h:intel:atom_z:z3480", "cpe:/h:intel:core_i7:4850hq", "cpe:/h:intel:core_i7:4810mq", "cpe:/h:intel:atom_z:z3590", "cpe:/h:intel:core_i7:4860hq", "cpe:/h:intel:core_i7:8700k", "cpe:/h:intel:core_i3:3250t", "cpe:/h:intel:xeon_e7:2880_v2", "cpe:/h:intel:core_i7:3630qm", "cpe:/h:intel:celeron_n:n2940", "cpe:/h:intel:xeon:ec5549", "cpe:/h:intel:xeon_e5_2428l_v3:-", "cpe:/h:intel:core_m:5y70", "cpe:/h:intel:xeon_e7:8893_v2", "cpe:/h:intel:atom_z:z3775d", "cpe:/h:intel:xeon_e3_1220l_v3:-", "cpe:/h:intel:core_i5:2400s", "cpe:/h:intel:xeon_e5:4640_v3", "cpe:/h:intel:xeon_platinum:8160", "cpe:/h:intel:core_i5:5250u", "cpe:/h:intel:xeon:x5670", "cpe:/h:intel:core_i3:4170", "cpe:/h:intel:xeon_gold:6154", "cpe:/h:intel:xeon_e3_1235l_v5:-", "cpe:/h:intel:core_i3:5020u", "cpe:/h:intel:xeon_e7:4830_v4", "cpe:/h:intel:atom_z:z3745", "cpe:/h:intel:core_i5:6585r", "cpe:/h:intel:xeon_bronze_3104:-", "cpe:/h:intel:core_i3:4360", "cpe:/h:intel:xeon_e7:4870", "cpe:/h:intel:xeon_platinum:8153", "cpe:/h:arm:cortex-a:75", "cpe:/h:intel:core_i7:2600k", "cpe:/h:intel:core_i3:3240", "cpe:/h:intel:core_i5:3340", "cpe:/h:intel:xeon_e5_2438l_v3:-", "cpe:/h:intel:core_i5:520um", "cpe:/h:intel:xeon_e3_1225:-", "cpe:/h:intel:pentium_n:n3710", "cpe:/h:intel:xeon_e7:2870", "cpe:/h:intel:xeon_e3_1230_v6:-", "cpe:/h:intel:core_i5:3450s", "cpe:/h:intel:xeon_e5_2643_v4:-", "cpe:/h:intel:core_i5:750", "cpe:/h:intel:xeon_e5_2637_v4:-", "cpe:/h:intel:core_i5:6360u", "cpe:/h:intel:core_i7:720qm", "cpe:/h:intel:xeon_e3_1230:-", "cpe:/h:intel:xeon_platinum:8170m", "cpe:/h:intel:core_i5:3340m", "cpe:/h:intel:xeon_e5:4628l_v4", "cpe:/h:intel:xeon_e5:4620_v3", "cpe:/h:intel:atom_c:c2538", "cpe:/h:intel:xeon_e7:8891_v3", "cpe:/h:intel:xeon_e5_2450_v2:-", "cpe:/h:intel:xeon_e5_1620_v3:-", "cpe:/h:intel:core_i5:4440s", "cpe:/h:intel:atom_z:z2480", "cpe:/h:intel:xeon_e3_1286_v3:-", "cpe:/h:intel:core_i7:4770t", "cpe:/h:intel:xeon_phi:7295", "cpe:/h:intel:xeon_e5_1620_v2:-", "cpe:/h:intel:xeon_e7:4850_v3", "cpe:/h:intel:atom_e:e3827", "cpe:/h:intel:xeon_platinum:8160f", "cpe:/h:intel:core_i5:6300u", "cpe:/h:intel:core_i5:6440hq", "cpe:/h:intel:xeon:x7550", "cpe:/h:intel:core_i7:5600u", "cpe:/h:intel:xeon_e7:2870_v2", "cpe:/h:intel:core_i7:4770k", "cpe:/h:intel:core_i3:6100te", "cpe:/h:intel:xeon_e7:4820_v4", "cpe:/h:intel:xeon_e5:2697_v2", "cpe:/h:intel:xeon_e5_2418l_v2:-", "cpe:/h:intel:xeon_e5:2670_v2", "cpe:/h:intel:xeon:x6550", "cpe:/h:intel:xeon_gold:6148f", "cpe:/h:intel:core_i5:520e", "cpe:/h:intel:xeon_e5:2670", "cpe:/h:intel:xeon_e3_1220_v3:-", "cpe:/h:intel:xeon_platinum:8180", "cpe:/h:intel:celeron_n:n2910", "cpe:/h:intel:xeon_e5_2430_v2:-", "cpe:/h:intel:core_i5:3570k", "cpe:/h:intel:xeon_e5:2695_v4", "cpe:/h:intel:core_i3:330e", "cpe:/h:intel:core_i5:655k", "cpe:/h:intel:xeon_platinum:8160t", "cpe:/h:intel:atom_z:z3570", "cpe:/h:intel:xeon_e3_1278l_v4:-", "cpe:/h:intel:core_i5:6260u", "cpe:/h:intel:core_i5:4210y", "cpe:/h:intel:xeon_e7:8870", "cpe:/h:intel:core_i7:3667u", "cpe:/h:intel:core_i3:4100e", "cpe:/h:intel:core_i7:7920hq", "cpe:/h:intel:core_i7:4650u", "cpe:/h:intel:pentium_j:j2850", "cpe:/h:intel:xeon_e3_1125c:-", "cpe:/h:intel:core_i5:4670s", "cpe:/h:intel:xeon_e5:2699_v3", "cpe:/h:intel:celeron_j:j1850", "cpe:/h:intel:core_i7:4770hq", "cpe:/h:intel:core_i7:4550u", "cpe:/h:intel:core_i5:4210u", "cpe:/h:intel:core_i5:3339y", "cpe:/h:intel:xeon_e7:4809_v2", "cpe:/h:intel:xeon_e3_1285_v3:-", "cpe:/h:intel:core_i5:650", "cpe:/h:intel:xeon_e3_1280_v5:-", "cpe:/h:intel:core_i5:3210m", "cpe:/h:intel:core_i7:3740qm", "cpe:/h:intel:core_i3:2367m", "cpe:/h:intel:core_i3:6300t", "cpe:/h:intel:xeon:x5647", "cpe:/h:intel:xeon_e7:2860", "cpe:/h:intel:core_i7:4910mq", "cpe:/h:intel:celeron_n:n3350", "cpe:/h:intel:core_i5:8250u", "cpe:/h:intel:xeon_e5:2698_v3", "cpe:/h:intel:xeon_e5_2650l_v2:-", "cpe:/h:intel:core_i7:2700k", "cpe:/h:intel:core_i7:620le", "cpe:/h:intel:core_i3:4350", "cpe:/h:intel:xeon_e3_1505m_v5:-", "cpe:/h:intel:xeon_e5:4650", "cpe:/h:intel:atom_e:e3815", "cpe:/h:intel:core_i7:3610qe", "cpe:/h:intel:core_i5:560um", "cpe:/h:intel:xeon_e5_2648l_v3:-", "cpe:/h:intel:core_i5:4402ec", "cpe:/h:intel:atom_z:z3775", "cpe:/h:intel:xeon_e3_12201:-", "cpe:/h:intel:xeon_e5_1630_v4:-", "cpe:/h:intel:core_i5:2510e", "cpe:/h:intel:celeron_n:n2810", "cpe:/h:intel:core_i7:5557u", "cpe:/h:intel:core_i7:4700eq", "cpe:/h:intel:xeon_phi:7210", "cpe:/h:intel:xeon_e7:4850_v2", "cpe:/h:intel:atom_z:z3735d", "cpe:/h:intel:core_i5:3337u", "cpe:/h:intel:core_i5:4590s", "cpe:/h:intel:core_i7:2600s", "cpe:/h:intel:core_m:5y71", "cpe:/h:intel:core_i3:4130", "cpe:/h:intel:xeon_e7:4809_v4", "cpe:/h:intel:xeon_e5_2418l_v3:-", "cpe:/h:intel:atom_z:z3735g", "cpe:/h:intel:core_i7:7700t", "cpe:/h:intel:xeon_silver:4116", "cpe:/h:intel:core_i7:7y75", "cpe:/h:intel:xeon:e5506", "cpe:/h:intel:atom_c:c2508", "cpe:/h:intel:xeon_e7:8890_v3", "cpe:/h:intel:core_i7:680um", "cpe:/h:intel:xeon_e3_1240l_v5:-", "cpe:/h:intel:xeon_gold:6140", "cpe:/h:intel:core_i7:2630qm", "cpe:/h:intel:xeon_e5_2450l_v2:-", "cpe:/h:intel:xeon_phi:7230", "cpe:/h:intel:core_i3:4330", "cpe:/h:intel:core_i5:670", "cpe:/h:intel:xeon:l5640", "cpe:/h:intel:xeon_phi:7285", "cpe:/h:intel:xeon_phi:7290f", "cpe:/h:intel:core_i7:2649m", "cpe:/h:intel:atom_x3:c3200rk", "cpe:/h:intel:xeon_e5:4640_v4", "cpe:/h:intel:xeon_e5_2618l_v4:-", "cpe:/h:intel:xeon_e5_2609_v3:-", "cpe:/h:intel:core_i5:5675c", "cpe:/h:intel:core_i5:4570te", "cpe:/h:intel:core_i3:2105", "cpe:/h:intel:core_i3:2348m", "cpe:/h:intel:atom_z:z2760", "cpe:/h:intel:core_i3:2310e", "cpe:/h:intel:core_i5:5575r", "cpe:/h:intel:xeon_e3_1245_v2:-", "cpe:/h:intel:xeon_e7:8893_v3", "cpe:/h:intel:core_i5:560m", "cpe:/h:intel:core_i5:4670k", "cpe:/h:intel:core_i5:6442eq", "cpe:/h:intel:core_i7:5775c", "cpe:/h:intel:core_i3:380m", "cpe:/h:intel:core_i3:2100", "cpe:/h:intel:core_i7:4770r", "cpe:/h:intel:xeon_e3_1268l_v3:-", "cpe:/h:intel:core_i5:4202y", "cpe:/h:intel:xeon_e5:2699r_v4", "cpe:/h:intel:core_i5:661", "cpe:/h:intel:core_i7:2637m", "cpe:/h:intel:xeon_e3_1285l_v4:-", "cpe:/h:intel:xeon_e5:2699_v4", "cpe:/h:intel:core_i7:4790", "cpe:/h:intel:xeon_e3_1245_v3:-", "cpe:/h:intel:xeon_e3_1125c_v2:-", "cpe:/h:intel:xeon_e5_2640:-", "cpe:/h:intel:core_i3:370m", "cpe:/h:intel:xeon_silver:4114", "cpe:/h:intel:celeron_n:n2920", "cpe:/h:intel:xeon_gold:5119t", "cpe:/h:intel:xeon_e5_2648l_v4:-", "cpe:/h:intel:core_i5:450m", "cpe:/h:intel:celeron_n:n4100", "cpe:/h:intel:xeon_e3_1265l_v2:-", "cpe:/h:intel:atom_c:c3338", "cpe:/h:intel:core_i7:2960xm", "cpe:/h:intel:core_i5:2500s", "cpe:/h:intel:core_i7:3720qm", "cpe:/h:intel:core_i7:960", "cpe:/h:intel:core_i5:4260u", "cpe:/h:intel:core_i7:7700k", "cpe:/h:intel:xeon_e5:4655_v4", "cpe:/h:intel:xeon_e5_2608l_v4:-", "cpe:/h:intel:xeon_e7:2890_v2", "cpe:/h:intel:core_i3:6102e", "cpe:/h:intel:core_i5:4310m", "cpe:/h:intel:xeon_e5:4607", "cpe:/h:intel:xeon_e3:1578l_v5", "cpe:/h:intel:core_i5:8600k", "cpe:/h:intel:xeon:l5520", "cpe:/h:intel:core_i7:4980hq", "cpe:/h:intel:xeon_e7:4809_v3", "cpe:/h:intel:xeon_e5:2665", "cpe:/h:intel:core_i5:6600k", "cpe:/h:intel:xeon_e5_1650_v2:-", "cpe:/h:intel:xeon_e5_2603:-", "cpe:/h:intel:xeon_e3_1265l_v4:-", "cpe:/h:intel:xeon:ec5539", "cpe:/h:intel:core_i3:3240t", "cpe:/h:intel:core_i5:4310u", "cpe:/h:intel:core_i5:3330", "cpe:/h:intel:core_i7:3687u", "cpe:/h:intel:xeon_e5:4607_v2", "cpe:/h:intel:atom_e:e3845", "cpe:/h:intel:core_i7:4760hq", "cpe:/h:intel:atom_c:c3850", "cpe:/h:intel:core_i3:2125", "cpe:/h:intel:pentium_j:j3710", "cpe:/h:intel:xeon:x5550", "cpe:/h:intel:xeon_e-1105c:-", "cpe:/h:intel:xeon_e3_1220_v5:-", "cpe:/h:intel:atom_c:c2516", "cpe:/h:intel:core_i7:930", "cpe:/h:intel:core_i7:5850hq", "cpe:/h:intel:xeon_e7:8860_v3", "cpe:/h:intel:core_i3:550", "cpe:/h:intel:core_i5:2450p", "cpe:/h:intel:core_i7:4712mq", "cpe:/h:intel:core_i5:4460t", "cpe:/h:intel:core_i7:5700hq", "cpe:/h:intel:xeon_e5_1680_v3:-", "cpe:/h:intel:core_i7:2820qm", "cpe:/h:intel:atom_z:z3530", "cpe:/h:intel:xeon_e3_1220_v6:-", "cpe:/h:intel:xeon_gold:5115", "cpe:/h:intel:xeon_e5_2630_v2:-", "cpe:/h:intel:atom_c:c3558", "cpe:/h:intel:xeon_e5:2690", "cpe:/h:intel:core_i7:8700", "cpe:/h:intel:core_i7:7567u", "cpe:/h:intel:xeon_gold:6150", "cpe:/h:intel:xeon_e3_1258l_v4:-", "cpe:/h:intel:xeon_e5_2628l_v2:-", "cpe:/h:intel:xeon_e5:4669_v4", "cpe:/h:intel:core_i7:2657m", "cpe:/h:intel:core_i7:7600u", "cpe:/h:intel:atom_z:z3770", "cpe:/h:intel:xeon_e5:2690_v3", "cpe:/h:intel:core_i7:2629m", "cpe:/h:intel:core_i7:3520m", "cpe:/h:intel:core_i7:4785t", "cpe:/h:intel:xeon:x5690", "cpe:/h:intel:atom_c:c2550", "cpe:/h:intel:core_i3:6006u", "cpe:/h:intel:core_m:5y51", "cpe:/h:intel:core_i7:2760qm", "cpe:/h:intel:xeon_silver:4109t", "cpe:/h:intel:core_i3:6157u", "cpe:/h:intel:xeon_e5_1680_v4:-", "cpe:/h:intel:xeon_gold:6136", "cpe:/h:intel:xeon_e5:2667_v4", "cpe:/h:intel:xeon_e7:8860", "cpe:/h:intel:celeron_n:n2815", "cpe:/h:intel:xeon:e7520", "cpe:/h:intel:xeon_e5_1428l:-", "cpe:/h:intel:core_i3:2350m", "cpe:/h:intel:xeon_e3:1575m_v5", "cpe:/h:intel:xeon_e5:2658a_v3", "cpe:/h:intel:xeon:x3480", "cpe:/h:intel:xeon_e5:2670_v3", "cpe:/h:intel:atom_z:z3736f", "cpe:/h:intel:core_i3:4350t", "cpe:/h:intel:xeon_e5_2650_v4:-", "cpe:/h:intel:atom_c:c2758", "cpe:/h:intel:pentium_n:n3700", "cpe:/h:intel:xeon:x3440", "cpe:/h:intel:core_i7:870", "cpe:/h:intel:core_i5:4288u", "cpe:/h:intel:xeon_e5:2690_v2", "cpe:/h:intel:core_i7:7700hq", "cpe:/h:intel:xeon_silver:4110", "cpe:/h:intel:atom_z:z2520", "cpe:/h:intel:xeon:e5607", "cpe:/h:intel:core_i5:4302y", "cpe:/h:intel:xeon_platinum:8176", "cpe:/h:intel:core_i3:4330te", "cpe:/h:intel:core_i3:3115c", "cpe:/h:intel:core_i7:3820qm", "cpe:/h:intel:xeon_e3_1280_v6:-", "cpe:/h:intel:core_i3:4370", "cpe:/h:intel:xeon_e3:1565l_v5", "cpe:/h:intel:core_i7:4700ec", "cpe:/h:intel:xeon:x3450", "cpe:/h:intel:xeon:e5630", "cpe:/h:intel:xeon_e3_1275_v3:-", "cpe:/h:intel:xeon_bronze_3106:-", "cpe:/h:intel:core_i3:2102", "cpe:/h:intel:core_i5:3550s", "cpe:/h:intel:xeon:l5609", "cpe:/h:intel:xeon_e3_1241_v3:-", "cpe:/h:intel:atom_z:z3785", "cpe:/h:intel:xeon_e5_2643_v3:-", "cpe:/h:intel:celeron_n:n2806", "cpe:/h:intel:xeon_e3_1275_v2:-", "cpe:/h:intel:core_i7:5500u", "cpe:/h:intel:core_i5:4300u", "cpe:/h:intel:core_i5:4570s", "cpe:/h:intel:core_i7:2720qm", "cpe:/h:intel:celeron_n:n3050", "cpe:/h:intel:xeon_platinum:8158", "cpe:/h:intel:xeon:w3680", "cpe:/h:intel:xeon_e5:2660_v4", "cpe:/h:intel:core_i7:920", "cpe:/h:intel:core_i3:4010u", "cpe:/h:intel:core_i3:4030u", "cpe:/h:intel:core_i7:8550u", "cpe:/h:intel:xeon_e5:4650_v3", "cpe:/h:intel:atom_c:c2338", "cpe:/h:intel:core_i3:6100", "cpe:/h:intel:xeon:l5530", "cpe:/h:intel:xeon_e7:8893_v4", "cpe:/h:intel:core_i3:6100t", "cpe:/h:intel:core_i5:4210m", "cpe:/h:intel:atom_c:c3950", "cpe:/h:intel:core_i7:7660u", "cpe:/h:intel:atom_x3:c3235rk", "cpe:/h:intel:xeon_e5:4669_v3", "cpe:/h:intel:xeon:ec5509", "cpe:/h:intel:core_i5:750s", "cpe:/h:intel:xeon_e7:4807", "cpe:/h:intel:xeon_e3_1245_v6:-", "cpe:/h:intel:core_i7:4765t", "cpe:/h:intel:xeon_e5_2609:-", "cpe:/h:intel:xeon_e5:2695_v3", "cpe:/h:intel:core_i5:2550k", "cpe:/h:intel:core_i5:2310", "cpe:/h:intel:xeon:l3426"], "id": "CVE-2017-5754", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5754", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}, "cpe23": ["cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2603:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6126:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x3450:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2518:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5630:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4657l_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1680_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6148:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4640_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:1585l_v5:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6126f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1285_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1231_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m5:6y57:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8880l_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8860_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2618l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4603:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j:j3060:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2695_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4610:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2350:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2650l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2648l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6138t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2430l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6142f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n3000:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4650_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4669_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n2910:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1241_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4628l_v4:*:*:*:*:*:*:*", "cpe:2.3:h:arm:cortex-a:75:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4669_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2680_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2530:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1268l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:1515m_v5:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2643_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1660:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:5120t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1125c_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4620_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8867_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:2850_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8880l_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6130t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_phi:7230f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1620_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3450:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_phi:7210:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:2860:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5502:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2428l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4820_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1246_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8890_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x5560:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8860:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2658a_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x5675:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2603_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1270_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4610_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1240_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2609_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_12201:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2640_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8830:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2450l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1280_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2670_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n2810:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_phi:7250:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4610_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:l3426:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2690:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1225_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3785:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2630l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2695_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:l5638:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m:5y71:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_x3:c3265rk:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4850:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4650l:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1220_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4624l_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8880_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2699r_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x7542:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2695_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8870_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8850_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m:5y10:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4620:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:1575m_v5:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_x3:c3445:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2438l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4603_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2620_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n4100:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5504:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:2820:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e7520:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8867l:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:1578l_v5:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1225:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2450_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2448l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8880_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e7540:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8893_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8893_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6150:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3775d:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2670_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x5650:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4627_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2628l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2730:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6126t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2640:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4890_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2660_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2407:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x5647:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2687w_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1275_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2697a_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2620:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2448l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1230:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x5660:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8857_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8891_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n3160:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x5680:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n4000:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1285l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:2830:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2418l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4809_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:l5640:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6140m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1275l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2623_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5645:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-1105c:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1280:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1286l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2683_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2603_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2630_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2658_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2699_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2643_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:l5530:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2630l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_phi:7230:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4607:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3775:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2430_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2660:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2630l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n2830:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2650_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5603:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1630_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2680_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2637_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1240_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2643_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2698_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1620_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2648l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x3430:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_j:j3710:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:2890_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2640_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5503:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_n:n3530:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n2930:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1290_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:l5518:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2630_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2650:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1240l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2358:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5607:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2403:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4627_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1230_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2637:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m5:6y54:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8860_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1281_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_n:n3520:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n3350:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2687w_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m:5y51:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2667_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4870_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2316:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1620:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2428l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e7530:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4880_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1230_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:5120:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2650l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_x3:c3295rk:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2470_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4655_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x5677:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1660_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2608l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1505m_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2690_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n2815:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2418l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:l5618:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:1505m_v6:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4850_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4655_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1230l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5649:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6134:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6140:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1245_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2660_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1220:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m:5y10a:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x5687:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n3060:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_n:n3700:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2680:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1278l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4640:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2697_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_phi:7295:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2637_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_x3:c3205rk:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1650_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_x3:c3235rk:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n2808:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:1535m_v5:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x5550:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2338:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:l5506:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2550:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2620_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4809_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1240:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1235:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6128:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2450l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8891_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4820_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:ec5549:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:5119t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m3:7y30:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2650_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8870:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4640_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1265l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4807:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2650l_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8837:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2697_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1620_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:l5520:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2687w:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3770d:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_x3:c3200rk:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4650:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4660_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5540:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1275_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1285_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2618l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_j:j2850:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:5122:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4830:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4830_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:1558l_v5:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4870:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2618l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:ec5539:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2516:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1276_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4640_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4610_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x3470:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2609_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2650_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_x3:c3130:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:1565l_v5:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:w3680:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1270_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j:j1850:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1125c:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1270:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n2940:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1660_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:l7555:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2650l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1505l_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4820:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6134m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_x3:c3405:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1271_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:w3670:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8850:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2690_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4650_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8867_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4830_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:2870:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2508:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6138:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2648l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1428l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j:j3355:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2620_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4620_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2630:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2690_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5640:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:1535m_v6:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8893_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:2850:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x5670:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_j:j4205:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1226_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2758:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4850_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2418l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1501l_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n2806:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m:5y10c:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_n:n4200:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2630l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n2805:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1245:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2623_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m:5y31:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e6510:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2718:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x5672:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4667_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1290:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:l5609:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n3010:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2699_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8890_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m:5y70:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:1545m_v5:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2699a_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x3480:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:w5590:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:l5630:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:2880_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6142:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2630_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2407_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2603_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2420:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8891_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2687w_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2658_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1245_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j:j1750:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4809_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1630_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1650_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x6550:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_phi:7285:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8890_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:l7545:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2698_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n2920:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4820_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x7560:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_n:n3510:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1225_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6152:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_n:n3540:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x3440:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_phi:7290:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2680_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4860_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1428l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2558:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1258l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2440:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x3460:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6138f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6132:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5606:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n2807:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2470:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5530:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1660_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j:j3160:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2430:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1275:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6142m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8870_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2609_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1280_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6130f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:l5508:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4850_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4660_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1501m_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:1585_v5:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1428l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2683_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2628l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6136:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2665:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5507:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_phi:7250f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2538:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4607_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_12201_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1220_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_phi:7290f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2450:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2648l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2658_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5520:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2738:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2440_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:5118:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1680_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_phi:7235:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2658:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2640_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_j:j2900:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:w3690:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8870_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:2803:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_x3:c3230rk:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1650_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:w5580:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x5570:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2667:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2430l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2667_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6144:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1105c_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5506:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4648_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_n:n3710:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6154:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j:j1900:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e6540:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2428l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4650_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2408l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4620_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x7550:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1286_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1650:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n2840:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2609:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:e5620:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2637_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m7:6y75:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2608l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4627_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1505l_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n3150:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4617:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8880_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2420_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3795:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n3050:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_phi:7210f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2628l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:l3406:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6130:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m3:6y30:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2660_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1285l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x5667:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8894_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1260l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:lc5528:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2750:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:x5690:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m3:7y32:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1265l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:ec5509:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2643:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2697_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1220l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon:lc5518:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6148f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2403_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:6146:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2670:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n2820:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2667_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4667_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j:j1800:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4830_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:2870_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1265l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4860:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*"]}], "attackerkb": [{"lastseen": "2021-03-03T18:15:17", "bulletinFamily": "info", "cvelist": ["CVE-2017-2015", "CVE-2017-5715"], "description": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.\n\n \n**Recent assessments:** \n \n**pwsh** at March 03, 2021 3:34pm UTC reported:\n\nI am submitting this information to AttackerKB based on recent news and activity about a cracked version of CANVAS v7.26 being distributed that can exploit CVE-2017-2015. As this vulnerability has recently passed 3 years since release with only some PoCs published, the recent activity is worth noting. The expectation is that an exploit will be in the wild in the near future.\n\nThere is a good writeup of the recent activity at <https://therecord.media/first-fully-weaponized-spectre-exploit-discovered-online/>\n\nVirusTotal hash is live at <https://www.virustotal.com/gui/file/ecc0f2aa29b102bf8d67b7d7173e8698c0341ddfdf9757be17595460fbf1791a/detection>\n\nAssessed Attacker Value: 3 \nAssessed Attacker Value: 1\n", "modified": "2020-07-23T00:00:00", "published": "2018-01-04T00:00:00", "id": "AKB:A377493B-6A40-4BB0-BF25-4E62943A3C0C", "href": "https://attackerkb.com/topics/L0FFpq2vsw/cve-2017-5715", "type": "attackerkb", "title": "CVE-2017-5715", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}], "nessus": [{"lastseen": "2021-03-01T01:35:17", "description": "An update for kernel is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\n[Updated 23rd January 2019] The text has been updated to correct the\nlist of architectures addressed by the CVE-2017-5753 mitigation. No\nchanges have been made to the packages.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity Fix(es) :\n\nAn industry-wide issue was found in the way many modern microprocessor\ndesigns have implemented speculative execution of instructions (a\ncommonly used performance optimization). There are three primary\nvariants of the issue which differ in the way the speculative\nexecution can be exploited.\n\nNote: This issue is present in hardware and cannot be fully fixed via\nsoftware update. The updated kernel packages provide software\nmitigation for this hardware issue at a cost of potential performance\npenalty. Please refer to References section for further information\nabout this issue and the performance impact.\n\nIn this update, mitigations for x86 (CVE-2017-5753) and x86-64\n(CVE-2017-5753, CVE-2017-5715, and CVE-2017-5754) architectures are\nprovided.\n\nVariant CVE-2017-5753 triggers the speculative execution by performing\na bounds-check bypass. It relies on the presence of a\nprecisely-defined instruction sequence in the privileged code as well\nas the fact that memory accesses may cause allocation into the\nmicroprocessor's data cache even for speculatively executed\ninstructions that never actually commit (retire). As a result, an\nunprivileged attacker could use this flaw to cross the syscall\nboundary and read privileged memory by conducting targeted cache\nside-channel attacks. (CVE-2017-5753, Important)\n\nVariant CVE-2017-5715 triggers the speculative execution by utilizing\nbranch target injection. It relies on the presence of a\nprecisely-defined instruction sequence in the privileged code as well\nas the fact that memory accesses may cause allocation into the\nmicroprocessor's data cache even for speculatively executed\ninstructions that never actually commit (retire). As a result, an\nunprivileged attacker could use this flaw to cross the syscall and\nguest/host boundaries and read privileged memory by conducting\ntargeted cache side-channel attacks. (CVE-2017-5715, Important)\n\nVariant CVE-2017-5754 relies on the fact that, on impacted\nmicroprocessors, during speculative execution of instruction\npermission faults, exception generation triggered by a faulting access\nis suppressed until the retirement of the whole instruction block. In\na combination with the fact that memory accesses may populate the\ncache even when the block is being dropped and never committed\n(executed), an unprivileged local attacker could use this flaw to read\nprivileged (kernel space) memory by conducting targeted cache\nside-channel attacks. (CVE-2017-5754, Important)\n\nNote: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64\nmicroprocessors are not affected by this issue.\n\nRed Hat would like to thank Google Project Zero for reporting these\nissues.", "edition": 37, "cvss3": {"score": 5.6, "vector": "AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}, "published": "2018-01-05T00:00:00", "title": "CentOS 6 : kernel (CESA-2018:0008) (Meltdown) (Spectre)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-5753", "CVE-2017-5754", "CVE-2017-5715"], "modified": "2021-03-02T00:00:00", "cpe": ["cpe:/o:centos:centos:6", "p-cpe:/a:centos:centos:perf", "p-cpe:/a:centos:centos:python-perf", "p-cpe:/a:centos:centos:kernel-doc", "p-cpe:/a:centos:centos:kernel-devel", "p-cpe:/a:centos:centos:kernel", "p-cpe:/a:centos:centos:kernel-debug", "p-cpe:/a:centos:centos:kernel-headers", "p-cpe:/a:centos:centos:kernel-firmware", "p-cpe:/a:centos:centos:kernel-abi-whitelists", "p-cpe:/a:centos:centos:kernel-debug-devel"], "id": "CENTOS_RHSA-2018-0008.NASL", "href": "https://www.tenable.com/plugins/nessus/105589", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2018:0008 and \n# CentOS Errata and Security Advisory 2018:0008 respectively.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(105589);\n script_version(\"3.15\");\n script_cvs_date(\"Date: 2019/12/31\");\n\n script_cve_id(\"CVE-2017-5715\", \"CVE-2017-5753\", \"CVE-2017-5754\");\n script_xref(name:\"RHSA\", value:\"2018:0008\");\n script_xref(name:\"IAVA\", value:\"2018-A-0019\");\n script_xref(name:\"IAVA\", value:\"2018-A-0020\");\n\n script_name(english:\"CentOS 6 : kernel (CESA-2018:0008) (Meltdown) (Spectre)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An update for kernel is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\n[Updated 23rd January 2019] The text has been updated to correct the\nlist of architectures addressed by the CVE-2017-5753 mitigation. No\nchanges have been made to the packages.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity Fix(es) :\n\nAn industry-wide issue was found in the way many modern microprocessor\ndesigns have implemented speculative execution of instructions (a\ncommonly used performance optimization). There are three primary\nvariants of the issue which differ in the way the speculative\nexecution can be exploited.\n\nNote: This issue is present in hardware and cannot be fully fixed via\nsoftware update. The updated kernel packages provide software\nmitigation for this hardware issue at a cost of potential performance\npenalty. Please refer to References section for further information\nabout this issue and the performance impact.\n\nIn this update, mitigations for x86 (CVE-2017-5753) and x86-64\n(CVE-2017-5753, CVE-2017-5715, and CVE-2017-5754) architectures are\nprovided.\n\nVariant CVE-2017-5753 triggers the speculative execution by performing\na bounds-check bypass. It relies on the presence of a\nprecisely-defined instruction sequence in the privileged code as well\nas the fact that memory accesses may cause allocation into the\nmicroprocessor's data cache even for speculatively executed\ninstructions that never actually commit (retire). As a result, an\nunprivileged attacker could use this flaw to cross the syscall\nboundary and read privileged memory by conducting targeted cache\nside-channel attacks. (CVE-2017-5753, Important)\n\nVariant CVE-2017-5715 triggers the speculative execution by utilizing\nbranch target injection. It relies on the presence of a\nprecisely-defined instruction sequence in the privileged code as well\nas the fact that memory accesses may cause allocation into the\nmicroprocessor's data cache even for speculatively executed\ninstructions that never actually commit (retire). As a result, an\nunprivileged attacker could use this flaw to cross the syscall and\nguest/host boundaries and read privileged memory by conducting\ntargeted cache side-channel attacks. (CVE-2017-5715, Important)\n\nVariant CVE-2017-5754 relies on the fact that, on impacted\nmicroprocessors, during speculative execution of instruction\npermission faults, exception generation triggered by a faulting access\nis suppressed until the retirement of the whole instruction block. In\na combination with the fact that memory accesses may populate the\ncache even when the block is being dropped and never committed\n(executed), an unprivileged local attacker could use this flaw to read\nprivileged (kernel space) memory by conducting targeted cache\nside-channel attacks. (CVE-2017-5754, Important)\n\nNote: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64\nmicroprocessors are not affected by this issue.\n\nRed Hat would like to thank Google Project Zero for reporting these\nissues.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2018-January/022701.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?fb3faecb\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:C/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2017-5715\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'CANVAS');\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-abi-whitelists\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-firmware\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/01/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/01/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/01/05\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 6.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-6\", reference:\"kernel-2.6.32-696.18.7.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"kernel-abi-whitelists-2.6.32-696.18.7.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"kernel-debug-2.6.32-696.18.7.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"kernel-debug-devel-2.6.32-696.18.7.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"kernel-devel-2.6.32-696.18.7.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"kernel-doc-2.6.32-696.18.7.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"kernel-firmware-2.6.32-696.18.7.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"kernel-headers-2.6.32-696.18.7.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"perf-2.6.32-696.18.7.el6\")) flag++;\nif (rpm_check(release:\"CentOS-6\", reference:\"python-perf-2.6.32-696.18.7.el6\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-abi-whitelists / kernel-debug / kernel-debug-devel / etc\");\n}\n", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2021-01-07T08:58:22", "description": "According to the versions of the kernel packages installed, the\nEulerOS Virtualization installation on the remote host is affected by\nthe following vulnerabilities :\n\n - The recent speculative execution CVEs address three\n potential attacks across a wide variety of\n architectures and hardware platforms.\n\n - Note: This issue is present in hardware and cannot be\n fully fixed via software update. The nature of these\n vulnerabilities and their fixes introduces the\n possibility of reduced performance on patched systems.\n The performance impact depends on the hardware and the\n applications in place.\n\n - The first two variants abuse speculative execution to\n perform bounds-check bypass (CVE-2017-5753), or by\n utilizing branch target injection (CVE-2017-5715) to\n cause kernel code at an address under attacker control\n to execute speculatively. Collectively these are known\n as 'Spectre'.\n\n - Variant CVE-2017-5715 fixes require CPU microcode to\n update.And advise to contact hardware vendors to\n receive the appropriate microcode for your processor.\n\n - The third variant (CVE-2017-5754) relies on the fact\n that, on impacted microprocessors, during speculative\n execution of instruction permission faults, exception\n generation triggered by a faulting access is suppressed\n until the retirement of the whole instruction block.\n Researchers have called this exploit 'Meltdown'.\n\n - Note1: Upgrade and performance specifications,please\n see\n http://developer.huawei.com/ict/en/performance_update\n\n - Note2i1/4sDescription of microcode and security\n patchesaEURtm switches,please see\n https://developer.huawei.com/ict/en/site-euleros/articl\n e/switch\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 10, "cvss3": {"score": 5.6, "vector": "AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}, "published": "2019-06-07T00:00:00", "title": "EulerOS Virtualization 2.5.1 : kernel (EulerOS-SA-2019-1638)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-5753", "CVE-2017-5754", "CVE-2017-5715"], "modified": "2019-06-07T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:kernel-tools", "p-cpe:/a:huawei:euleros:kernel", "p-cpe:/a:huawei:euleros:kernel-tools-libs-devel", "p-cpe:/a:huawei:euleros:perf", "p-cpe:/a:huawei:euleros:kernel-headers", "p-cpe:/a:huawei:euleros:kernel-devel", "p-cpe:/a:huawei:euleros:python-perf", "cpe:/o:huawei:euleros:uvp:2.5.1", "p-cpe:/a:huawei:euleros:kernel-tools-libs"], "id": "EULEROS_SA-2019-1638.NASL", "href": "https://www.tenable.com/plugins/nessus/125753", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(125753);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\n \"CVE-2017-5715\",\n \"CVE-2017-5753\",\n \"CVE-2017-5754\"\n );\n\n script_name(english:\"EulerOS Virtualization 2.5.1 : kernel (EulerOS-SA-2019-1638)\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS Virtualization host is missing multiple security\nupdates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the kernel packages installed, the\nEulerOS Virtualization installation on the remote host is affected by\nthe following vulnerabilities :\n\n - The recent speculative execution CVEs address three\n potential attacks across a wide variety of\n architectures and hardware platforms.\n\n - Note: This issue is present in hardware and cannot be\n fully fixed via software update. The nature of these\n vulnerabilities and their fixes introduces the\n possibility of reduced performance on patched systems.\n The performance impact depends on the hardware and the\n applications in place.\n\n - The first two variants abuse speculative execution to\n perform bounds-check bypass (CVE-2017-5753), or by\n utilizing branch target injection (CVE-2017-5715) to\n cause kernel code at an address under attacker control\n to execute speculatively. Collectively these are known\n as 'Spectre'.\n\n - Variant CVE-2017-5715 fixes require CPU microcode to\n update.And advise to contact hardware vendors to\n receive the appropriate microcode for your processor.\n\n - The third variant (CVE-2017-5754) relies on the fact\n that, on impacted microprocessors, during speculative\n execution of instruction permission faults, exception\n generation triggered by a faulting access is suppressed\n until the retirement of the whole instruction block.\n Researchers have called this exploit 'Meltdown'.\n\n - Note1: Upgrade and performance specifications,please\n see\n http://developer.huawei.com/ict/en/performance_update\n\n - Note2i1/4sDescription of microcode and security\n patchesaEURtm switches,please see\n https://developer.huawei.com/ict/en/site-euleros/articl\n e/switch\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-1638\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?35f9534c\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected kernel packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:C/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'CANVAS');\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/06/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/06/07\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools-libs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:uvp:2.5.1\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (uvp != \"2.5.1\") audit(AUDIT_OS_NOT, \"EulerOS Virtualization 2.5.1\");\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"kernel-3.10.0-514.35.4.1_39\",\n \"kernel-devel-3.10.0-514.35.4.1_39\",\n \"kernel-headers-3.10.0-514.35.4.1_39\",\n \"kernel-tools-3.10.0-514.35.4.1_39\",\n \"kernel-tools-libs-3.10.0-514.35.4.1_39\",\n \"kernel-tools-libs-devel-3.10.0-514.35.4.1_39\",\n \"perf-3.10.0-514.35.4.1_39\",\n \"python-perf-3.10.0-514.35.4.1_39\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2020-09-14T17:46:49", "description": "An update for kernel is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity Fix(es) :\n\n* hw: cpu: speculative execution branch target injection (s390-only)\n(CVE-2017-5715, Important)\n\n* hw: cpu: speculative execution bounds-check bypass (s390 and\npowerpc) (CVE-2017-5753, Important)\n\n* hw: cpu: speculative execution permission faults handling\n(powerpc-only) (CVE-2017-5754)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, acknowledgments, and other related information, refer to\nthe CVE page(s) listed in the References section.\n\nBug Fixes :\n\n* If a fibre channel (FC) switch was powered down and then powered on\nagain, the SCSI device driver stopped permanently the SCSI device's\nrequest queue. Consequently, the FC port login failed, leaving the\nport state as 'Bypassed' instead of 'Online', and users had to reboot\nthe operating system. This update fixes the driver to avoid the\npermanent stop of the request queue. As a result, SCSI device now\ncontinues working as expected after power cycling the FC switch.\n(BZ#1519857)\n\n* Previously, on final close or unlink of a file, the find_get_pages()\nfunction in the memory management sometimes found no pages even if\nthere were some pages left to save. Consequently, a kernel crash\noccurred when attempting to enter the unlink() function. This update\nfixes the find_get_pages() function in the memory management code to\nnot return 0 too early. As a result, the kernel no longer crashes due\nto this behavior.(BZ# 1527811)\n\n* Using IPsec connections under a heavy load could previously lead to\na network performance degradation, especially when using the\naesni-intel module. This update fixes the issue by making the cryptd\nqueue length configurable so that it can be increased to prevent an\noverflow and packet drop. As a result, using IPsec under a heavy load\nno longer reduces network performance. (BZ#1527802)\n\n* Previously, a deadlock in the bnx2fc driver caused all adapters to\nblock and the SCSI error handler to become unresponsive. As a result,\ndata transferring through the adapter was sometimes blocked. This\nupdate fixes bnx2fc, and data transferring through the adapter is no\nlonger blocked due to this behavior. (BZ#1523783)\n\n* If an NFSv3 client mounted a subdirectory of an exported file\nsystem, a directory entry to the mount hosting the export was\nincorrectly held even after clearing the cache. Consequently, attempts\nto unmount the subdirectory with the umount command failed with the\nEBUSY error. With this update, the underlying source code has been\nfixed, and the unmount operation now succeeds as expected in the\ndescribed situation. (BZ#1535938)\n\nUsers of kernel are advised to upgrade to these updated packages,\nwhich fix these bugs. The system must be rebooted for this update to\ntake effect.", "edition": 16, "cvss3": {"score": 5.6, "vector": "AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}, "published": "2018-03-14T00:00:00", "title": "RHEL 6 : kernel (RHSA-2018:0512) (Meltdown) (Spectre)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-5753", "CVE-2017-5754", "CVE-2017-5715"], "modified": "2018-03-14T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:python-perf-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-kdump", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-abi-whitelists", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-x86_64", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-s390x", "p-cpe:/a:redhat:enterprise_linux:kernel-firmware", "p-cpe:/a:redhat:enterprise_linux:kernel-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-debug", "p-cpe:/a:redhat:enterprise_linux:kernel-headers", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-kdump-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-kdump-devel", "p-cpe:/a:redhat:enterprise_linux:perf-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel", "p-cpe:/a:redhat:enterprise_linux:python-perf", "cpe:/o:redhat:enterprise_linux:6", "p-cpe:/a:redhat:enterprise_linux:perf", "p-cpe:/a:redhat:enterprise_linux:kernel-doc", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-i686"], "id": "REDHAT-RHSA-2018-0512.NASL", "href": "https://www.tenable.com/plugins/nessus/108329", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2018:0512. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(108329);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/05/18\");\n\n script_cve_id(\"CVE-2017-5715\", \"CVE-2017-5753\", \"CVE-2017-5754\");\n script_xref(name:\"RHSA\", value:\"2018:0512\");\n\n script_name(english:\"RHEL 6 : kernel (RHSA-2018:0512) (Meltdown) (Spectre)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An update for kernel is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity Fix(es) :\n\n* hw: cpu: speculative execution branch target injection (s390-only)\n(CVE-2017-5715, Important)\n\n* hw: cpu: speculative execution bounds-check bypass (s390 and\npowerpc) (CVE-2017-5753, Important)\n\n* hw: cpu: speculative execution permission faults handling\n(powerpc-only) (CVE-2017-5754)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, acknowledgments, and other related information, refer to\nthe CVE page(s) listed in the References section.\n\nBug Fixes :\n\n* If a fibre channel (FC) switch was powered down and then powered on\nagain, the SCSI device driver stopped permanently the SCSI device's\nrequest queue. Consequently, the FC port login failed, leaving the\nport state as 'Bypassed' instead of 'Online', and users had to reboot\nthe operating system. This update fixes the driver to avoid the\npermanent stop of the request queue. As a result, SCSI device now\ncontinues working as expected after power cycling the FC switch.\n(BZ#1519857)\n\n* Previously, on final close or unlink of a file, the find_get_pages()\nfunction in the memory management sometimes found no pages even if\nthere were some pages left to save. Consequently, a kernel crash\noccurred when attempting to enter the unlink() function. This update\nfixes the find_get_pages() function in the memory management code to\nnot return 0 too early. As a result, the kernel no longer crashes due\nto this behavior.(BZ# 1527811)\n\n* Using IPsec connections under a heavy load could previously lead to\na network performance degradation, especially when using the\naesni-intel module. This update fixes the issue by making the cryptd\nqueue length configurable so that it can be increased to prevent an\noverflow and packet drop. As a result, using IPsec under a heavy load\nno longer reduces network performance. (BZ#1527802)\n\n* Previously, a deadlock in the bnx2fc driver caused all adapters to\nblock and the SCSI error handler to become unresponsive. As a result,\ndata transferring through the adapter was sometimes blocked. This\nupdate fixes bnx2fc, and data transferring through the adapter is no\nlonger blocked due to this behavior. (BZ#1523783)\n\n* If an NFSv3 client mounted a subdirectory of an exported file\nsystem, a directory entry to the mount hosting the export was\nincorrectly held even after clearing the cache. Consequently, attempts\nto unmount the subdirectory with the umount command failed with the\nEBUSY error. With this update, the underlying source code has been\nfixed, and the unmount operation now succeeds as expected in the\ndescribed situation. (BZ#1535938)\n\nUsers of kernel are advised to upgrade to these updated packages,\nwhich fix these bugs. The system must be rebooted for this update to\ntake effect.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2018:0512\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-5715\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-5753\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-5754\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:C/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'CANVAS');\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-abi-whitelists\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-i686\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-s390x\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-x86_64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-firmware\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-kdump\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-kdump-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-kdump-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/01/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/03/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/03/14\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2017-5715\", \"CVE-2017-5753\", \"CVE-2017-5754\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for RHSA-2018:0512\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2018:0512\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"kernel-2.6.32-696.23.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"kernel-2.6.32-696.23.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-2.6.32-696.23.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", reference:\"kernel-abi-whitelists-2.6.32-696.23.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"kernel-debug-2.6.32-696.23.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"kernel-debug-2.6.32-696.23.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-debug-2.6.32-696.23.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"kernel-debug-debuginfo-2.6.32-696.23.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"kernel-debug-debuginfo-2.6.32-696.23.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-debug-debuginfo-2.6.32-696.23.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"kernel-debug-devel-2.6.32-696.23.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"kernel-debug-devel-2.6.32-696.23.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-debug-devel-2.6.32-696.23.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"kernel-debuginfo-2.6.32-696.23.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"kernel-debuginfo-2.6.32-696.23.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-debuginfo-2.6.32-696.23.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"kernel-debuginfo-common-i686-2.6.32-696.23.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"kernel-debuginfo-common-s390x-2.6.32-696.23.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-debuginfo-common-x86_64-2.6.32-696.23.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"kernel-devel-2.6.32-696.23.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"kernel-devel-2.6.32-696.23.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-devel-2.6.32-696.23.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", reference:\"kernel-doc-2.6.32-696.23.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", reference:\"kernel-firmware-2.6.32-696.23.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"kernel-headers-2.6.32-696.23.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"kernel-headers-2.6.32-696.23.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"kernel-headers-2.6.32-696.23.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"kernel-kdump-2.6.32-696.23.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"kernel-kdump-debuginfo-2.6.32-696.23.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"kernel-kdump-devel-2.6.32-696.23.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"perf-2.6.32-696.23.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"perf-2.6.32-696.23.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"perf-2.6.32-696.23.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"perf-debuginfo-2.6.32-696.23.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"perf-debuginfo-2.6.32-696.23.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"perf-debuginfo-2.6.32-696.23.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"python-perf-2.6.32-696.23.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"python-perf-2.6.32-696.23.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"python-perf-2.6.32-696.23.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"python-perf-debuginfo-2.6.32-696.23.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"python-perf-debuginfo-2.6.32-696.23.1.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"python-perf-debuginfo-2.6.32-696.23.1.el6\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-abi-whitelists / kernel-debug / etc\");\n }\n}\n", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2021-03-01T05:41:46", "description": "An update for rhev-hypervisor7 is now available for RHEV 3.X\nHypervisor and Agents for Red Hat Enterprise Linux 6 and RHEV 3.X\nHypervisor and Agents for Red Hat Enterprise Linux 7 ELS.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nThe rhev-hypervisor7 package provides a Red Hat Enterprise\nVirtualization Hypervisor ISO disk image. The Red Hat Enterprise\nVirtualization Hypervisor is a dedicated Kernel-based Virtual Machine\n(KVM) hypervisor. It includes everything necessary to run and manage\nvirtual machines: A subset of the Red Hat Enterprise Linux operating\nenvironment and the Red Hat Enterprise Virtualization Agent.\n\nSecurity Fix(es) :\n\nAn industry-wide issue was found in the way many modern microprocessor\ndesigns have implemented speculative execution of instructions (a\ncommonly used performance optimization). There are three primary\nvariants of the issue which differ in the way the speculative\nexecution can be exploited.\n\nNote: This issue is present in hardware and cannot be fully fixed via\nsoftware update. The updated kernel packages provide software\nmitigation for this hardware issue at a cost of potential performance\npenalty. Please refer to References section for further information\nabout this issue and the performance impact.\n\nVariant CVE-2017-5753 triggers the speculative execution by performing\na bounds-check bypass. It relies on the presence of a\nprecisely-defined instruction sequence in the privileged code as well\nas the fact that memory accesses may cause allocation into the\nmicroprocessor's data cache even for speculatively executed\ninstructions that never actually commit (retire). As a result, an\nunprivileged attacker could use this flaw to cross the syscall\nboundary and read privileged memory by conducting targeted cache\nside-channel attacks. (CVE-2017-5753, Important)\n\nVariant CVE-2017-5715 triggers the speculative execution by utilizing\nbranch target injection. It relies on the presence of a\nprecisely-defined instruction sequence in the privileged code as well\nas the fact that memory accesses may cause allocation into the\nmicroprocessor's data cache even for speculatively executed\ninstructions that never actually commit (retire). As a result, an\nunprivileged attacker could use this flaw to cross the syscall and\nguest/host boundaries and read privileged memory by conducting\ntargeted cache side-channel attacks. (CVE-2017-5715, Important)\n\nVariant CVE-2017-5754 relies on the fact that, on impacted\nmicroprocessors, during speculative execution of instruction\npermission faults, exception generation triggered by a faulting access\nis suppressed until the retirement of the whole instruction block. In\na combination with the fact that memory accesses may populate the\ncache even when the block is being dropped and never committed\n(executed), an unprivileged local attacker could use this flaw to read\nprivileged (kernel space) memory by conducting targeted cache\nside-channel attacks. (CVE-2017-5754, Important)\n\nNote: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64\nmicroprocessors are not affected by this issue.\n\nRed Hat would like to thank Google Project Zero for reporting these\nissues.", "edition": 34, "cvss3": {"score": 5.6, "vector": "AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}, "published": "2018-01-09T00:00:00", "title": "RHEL 6 / 7 : rhev-hypervisor7 (RHSA-2018:0046) (Meltdown) (Spectre)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-5753", "CVE-2017-5754", "CVE-2017-5715"], "modified": "2021-03-02T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:rhev-hypervisor7", "cpe:/o:redhat:enterprise_linux:7", "cpe:/o:redhat:enterprise_linux:6"], "id": "REDHAT-RHSA-2018-0046.NASL", "href": "https://www.tenable.com/plugins/nessus/105677", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2018:0046. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(105677);\n script_version(\"3.14\");\n script_cvs_date(\"Date: 2019/10/24 15:35:44\");\n\n script_cve_id(\"CVE-2017-5715\", \"CVE-2017-5753\", \"CVE-2017-5754\");\n script_xref(name:\"RHSA\", value:\"2018:0046\");\n script_xref(name:\"IAVA\", value:\"2018-A-0017\");\n script_xref(name:\"IAVA\", value:\"2018-A-0019\");\n script_xref(name:\"IAVA\", value:\"2018-A-0020\");\n\n script_name(english:\"RHEL 6 / 7 : rhev-hypervisor7 (RHSA-2018:0046) (Meltdown) (Spectre)\");\n script_summary(english:\"Checks the rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An update for rhev-hypervisor7 is now available for RHEV 3.X\nHypervisor and Agents for Red Hat Enterprise Linux 6 and RHEV 3.X\nHypervisor and Agents for Red Hat Enterprise Linux 7 ELS.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nThe rhev-hypervisor7 package provides a Red Hat Enterprise\nVirtualization Hypervisor ISO disk image. The Red Hat Enterprise\nVirtualization Hypervisor is a dedicated Kernel-based Virtual Machine\n(KVM) hypervisor. It includes everything necessary to run and manage\nvirtual machines: A subset of the Red Hat Enterprise Linux operating\nenvironment and the Red Hat Enterprise Virtualization Agent.\n\nSecurity Fix(es) :\n\nAn industry-wide issue was found in the way many modern microprocessor\ndesigns have implemented speculative execution of instructions (a\ncommonly used performance optimization). There are three primary\nvariants of the issue which differ in the way the speculative\nexecution can be exploited.\n\nNote: This issue is present in hardware and cannot be fully fixed via\nsoftware update. The updated kernel packages provide software\nmitigation for this hardware issue at a cost of potential performance\npenalty. Please refer to References section for further information\nabout this issue and the performance impact.\n\nVariant CVE-2017-5753 triggers the speculative execution by performing\na bounds-check bypass. It relies on the presence of a\nprecisely-defined instruction sequence in the privileged code as well\nas the fact that memory accesses may cause allocation into the\nmicroprocessor's data cache even for speculatively executed\ninstructions that never actually commit (retire). As a result, an\nunprivileged attacker could use this flaw to cross the syscall\nboundary and read privileged memory by conducting targeted cache\nside-channel attacks. (CVE-2017-5753, Important)\n\nVariant CVE-2017-5715 triggers the speculative execution by utilizing\nbranch target injection. It relies on the presence of a\nprecisely-defined instruction sequence in the privileged code as well\nas the fact that memory accesses may cause allocation into the\nmicroprocessor's data cache even for speculatively executed\ninstructions that never actually commit (retire). As a result, an\nunprivileged attacker could use this flaw to cross the syscall and\nguest/host boundaries and read privileged memory by conducting\ntargeted cache side-channel attacks. (CVE-2017-5715, Important)\n\nVariant CVE-2017-5754 relies on the fact that, on impacted\nmicroprocessors, during speculative execution of instruction\npermission faults, exception generation triggered by a faulting access\nis suppressed until the retirement of the whole instruction block. In\na combination with the fact that memory accesses may populate the\ncache even when the block is being dropped and never committed\n(executed), an unprivileged local attacker could use this flaw to read\nprivileged (kernel space) memory by conducting targeted cache\nside-channel attacks. (CVE-2017-5754, Important)\n\nNote: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64\nmicroprocessors are not affected by this issue.\n\nRed Hat would like to thank Google Project Zero for reporting these\nissues.\"\n );\n # https://access.redhat.com/security/vulnerabilities/speculativeexecution\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?892ef523\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/solutions/3307851\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-5753\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-5715\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-5754\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2018:0046\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected rhev-hypervisor7 package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:C/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'CANVAS');\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rhev-hypervisor7\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/01/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/01/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/01/09\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(6|7)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.x / 7.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2018:0046\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL6\", reference:\"rhev-hypervisor7-7.3-20180102.1.el6\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", reference:\"rhev-hypervisor7-7.3-20180102.1.el7\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"rhev-hypervisor7\");\n }\n}\n", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2021-03-01T05:09:05", "description": "From Red Hat Security Advisory 2018:0007 :\n\nAn update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity Fix(es) :\n\nAn industry-wide issue was found in the way many modern microprocessor\ndesigns have implemented speculative execution of instructions (a\ncommonly used performance optimization). There are three primary\nvariants of the issue which differ in the way the speculative\nexecution can be exploited.\n\nNote: This issue is present in hardware and cannot be fully fixed via\nsoftware update. The updated kernel packages provide software\nmitigation for this hardware issue at a cost of potential performance\npenalty. Please refer to References section for further information\nabout this issue and the performance impact.\n\nIn this update mitigations for x86-64 architecture are provided.\n\nVariant CVE-2017-5753 triggers the speculative execution by performing\na bounds-check bypass. It relies on the presence of a\nprecisely-defined instruction sequence in the privileged code as well\nas the fact that memory accesses may cause allocation into the\nmicroprocessor's data cache even for speculatively executed\ninstructions that never actually commit (retire). As a result, an\nunprivileged attacker could use this flaw to cross the syscall\nboundary and read privileged memory by conducting targeted cache\nside-channel attacks. (CVE-2017-5753, Important)\n\nVariant CVE-2017-5715 triggers the speculative execution by utilizing\nbranch target injection. It relies on the presence of a\nprecisely-defined instruction sequence in the privileged code as well\nas the fact that memory accesses may cause allocation into the\nmicroprocessor's data cache even for speculatively executed\ninstructions that never actually commit (retire). As a result, an\nunprivileged attacker could use this flaw to cross the syscall and\nguest/host boundaries and read privileged memory by conducting\ntargeted cache side-channel attacks. (CVE-2017-5715, Important)\n\nVariant CVE-2017-5754 relies on the fact that, on impacted\nmicroprocessors, during speculative execution of instruction\npermission faults, exception generation triggered by a faulting access\nis suppressed until the retirement of the whole instruction block. In\na combination with the fact that memory accesses may populate the\ncache even when the block is being dropped and never committed\n(executed), an unprivileged local attacker could use this flaw to read\nprivileged (kernel space) memory by conducting targeted cache\nside-channel attacks. (CVE-2017-5754, Important)\n\nNote: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64\nmicroprocessors are not affected by this issue.\n\nRed Hat would like to thank Google Project Zero for reporting these\nissues.", "edition": 35, "cvss3": {"score": 5.6, "vector": "AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}, "published": "2018-01-05T00:00:00", "title": "Oracle Linux 7 : kernel (ELSA-2018-0007) (Meltdown) (Spectre)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-5753", "CVE-2017-5754", "CVE-2017-5715"], "modified": "2021-03-02T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:kernel-debug", "p-cpe:/a:oracle:linux:kernel-devel", "p-cpe:/a:oracle:linux:kernel-doc", "p-cpe:/a:oracle:linux:kernel-tools", "p-cpe:/a:oracle:linux:perf", "p-cpe:/a:oracle:linux:kernel-debug-devel", "p-cpe:/a:oracle:linux:kernel-tools-libs", "p-cpe:/a:oracle:linux:kernel-headers", "p-cpe:/a:oracle:linux:kernel-abi-whitelists", "p-cpe:/a:oracle:linux:kernel", "cpe:/o:oracle:linux:7", "p-cpe:/a:oracle:linux:kernel-tools-libs-devel", "p-cpe:/a:oracle:linux:python-perf"], "id": "ORACLELINUX_ELSA-2018-0007.NASL", "href": "https://www.tenable.com/plugins/nessus/105598", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2018:0007 and \n# Oracle Linux Security Advisory ELSA-2018-0007 respectively.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(105598);\n script_version(\"3.15\");\n script_cvs_date(\"Date: 2019/09/27 13:00:38\");\n\n script_cve_id(\"CVE-2017-5715\", \"CVE-2017-5753\", \"CVE-2017-5754\");\n script_xref(name:\"RHSA\", value:\"2018:0007\");\n script_xref(name:\"IAVA\", value:\"2018-A-0019\");\n script_xref(name:\"IAVA\", value:\"2018-A-0020\");\n\n script_name(english:\"Oracle Linux 7 : kernel (ELSA-2018-0007) (Meltdown) (Spectre)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2018:0007 :\n\nAn update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity Fix(es) :\n\nAn industry-wide issue was found in the way many modern microprocessor\ndesigns have implemented speculative execution of instructions (a\ncommonly used performance optimization). There are three primary\nvariants of the issue which differ in the way the speculative\nexecution can be exploited.\n\nNote: This issue is present in hardware and cannot be fully fixed via\nsoftware update. The updated kernel packages provide software\nmitigation for this hardware issue at a cost of potential performance\npenalty. Please refer to References section for further information\nabout this issue and the performance impact.\n\nIn this update mitigations for x86-64 architecture are provided.\n\nVariant CVE-2017-5753 triggers the speculative execution by performing\na bounds-check bypass. It relies on the presence of a\nprecisely-defined instruction sequence in the privileged code as well\nas the fact that memory accesses may cause allocation into the\nmicroprocessor's data cache even for speculatively executed\ninstructions that never actually commit (retire). As a result, an\nunprivileged attacker could use this flaw to cross the syscall\nboundary and read privileged memory by conducting targeted cache\nside-channel attacks. (CVE-2017-5753, Important)\n\nVariant CVE-2017-5715 triggers the speculative execution by utilizing\nbranch target injection. It relies on the presence of a\nprecisely-defined instruction sequence in the privileged code as well\nas the fact that memory accesses may cause allocation into the\nmicroprocessor's data cache even for speculatively executed\ninstructions that never actually commit (retire). As a result, an\nunprivileged attacker could use this flaw to cross the syscall and\nguest/host boundaries and read privileged memory by conducting\ntargeted cache side-channel attacks. (CVE-2017-5715, Important)\n\nVariant CVE-2017-5754 relies on the fact that, on impacted\nmicroprocessors, during speculative execution of instruction\npermission faults, exception generation triggered by a faulting access\nis suppressed until the retirement of the whole instruction block. In\na combination with the fact that memory accesses may populate the\ncache even when the block is being dropped and never committed\n(executed), an unprivileged local attacker could use this flaw to read\nprivileged (kernel space) memory by conducting targeted cache\nside-channel attacks. (CVE-2017-5754, Important)\n\nNote: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64\nmicroprocessors are not affected by this issue.\n\nRed Hat would like to thank Google Project Zero for reporting these\nissues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2018-January/007434.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:C/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'CANVAS');\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-abi-whitelists\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-tools-libs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/01/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/01/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/01/05\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 7\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2017-5715\", \"CVE-2017-5753\", \"CVE-2017-5754\"); \n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for ELSA-2018-0007\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nkernel_major_minor = get_kb_item(\"Host/uname/major_minor\");\nif (empty_or_null(kernel_major_minor)) exit(1, \"Unable to determine kernel major-minor level.\");\nexpected_kernel_major_minor = \"3.10\";\nif (kernel_major_minor != expected_kernel_major_minor)\n audit(AUDIT_OS_NOT, \"running kernel level \" + expected_kernel_major_minor + \", it is running kernel level \" + kernel_major_minor);\n\nflag = 0;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-3.10.0\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-3.10.0-693.11.6.el7\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-abi-whitelists-3.10.0\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-abi-whitelists-3.10.0-693.11.6.el7\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-debug-3.10.0\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-debug-3.10.0-693.11.6.el7\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-debug-devel-3.10.0\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-debug-devel-3.10.0-693.11.6.el7\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-devel-3.10.0\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-devel-3.10.0-693.11.6.el7\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-doc-3.10.0\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-doc-3.10.0-693.11.6.el7\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-headers-3.10.0\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-headers-3.10.0-693.11.6.el7\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-tools-3.10.0\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-tools-3.10.0-693.11.6.el7\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-tools-libs-3.10.0\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-tools-libs-3.10.0-693.11.6.el7\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-tools-libs-devel-3.10.0\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-tools-libs-devel-3.10.0-693.11.6.el7\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"perf-3.10.0-693.11.6.el7\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"python-perf-3.10.0-693.11.6.el7\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"affected kernel\");\n}\n", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2021-03-01T01:17:45", "description": "Systems with microprocessors utilizing speculative execution and indirect\nbranch prediction may allow unauthorized disclosure of information to an\nattacker with local user access via a side-channel analysis.", "edition": 31, "cvss3": {"score": 5.6, "vector": "AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}, "published": "2018-01-25T00:00:00", "title": "AIX 7.1 TL 4 : spectre_meltdown (IJ03032) (Meltdown) (Spectre)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-5753", "CVE-2017-5754", "CVE-2017-5715"], "modified": "2021-03-02T00:00:00", "cpe": ["cpe:/o:ibm:aix:7.1"], "id": "AIX_IJ03032.NASL", "href": "https://www.tenable.com/plugins/nessus/106312", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The text in the description was extracted from AIX Security\n# Advisory spectre_meltdown_advisory.asc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(106312);\n script_version(\"3.12\");\n script_cvs_date(\"Date: 2019/04/05 23:25:05\");\n\n script_cve_id(\"CVE-2017-5715\", \"CVE-2017-5753\", \"CVE-2017-5754\");\n script_xref(name:\"IAVA\", value:\"2018-A-0019\");\n script_xref(name:\"IAVA\", value:\"2018-A-0020\");\n\n script_name(english:\"AIX 7.1 TL 4 : spectre_meltdown (IJ03032) (Meltdown) (Spectre)\");\n script_summary(english:\"Check for APAR IJ03032\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote AIX host is missing a security patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Systems with microprocessors utilizing speculative execution and indirect\nbranch prediction may allow unauthorized disclosure of information to an\nattacker with local user access via a side-channel analysis.\"\n );\n # http://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?0ecfba9a\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Install the appropriate interim fix.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:C/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2017-5715\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'CANVAS');\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:ibm:aix:7.1\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/01/25\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/01/25\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"former\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/01/25\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"AIX Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/AIX/lslpp\", \"Host/local_checks_enabled\", \"Host/AIX/version\");\n\n exit(0);\n}\n\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"aix.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif ( ! get_kb_item(\"Host/AIX/version\") ) audit(AUDIT_OS_NOT, \"AIX\");\nif ( ! get_kb_item(\"Host/AIX/lslpp\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nif ( get_kb_item(\"Host/AIX/emgr_failure\" ) ) exit(0, \"This iFix check is disabled because : \"+get_kb_item(\"Host/AIX/emgr_failure\") );\n\nflag = 0;\n\nif (aix_check_ifix(release:\"7.1\", ml:\"04\", sp:\"03\", patch:\"IJ03032m3a\", package:\"bos.mp64\", minfilesetver:\"7.1.4.0\", maxfilesetver:\"7.1.4.30\") < 0) flag++;\nif (aix_check_ifix(release:\"7.1\", ml:\"04\", sp:\"03\", patch:\"IJ03032m3b\", package:\"bos.mp64\", minfilesetver:\"7.1.4.31\", maxfilesetver:\"7.1.4.33\") < 0) flag++;\nif (aix_check_ifix(release:\"7.1\", ml:\"04\", sp:\"04\", patch:\"(IJ03032m4a|IJ05823m4a)\", package:\"bos.mp64\", minfilesetver:\"7.1.4.0\", maxfilesetver:\"7.1.4.33\") < 0) flag++;\nif (aix_check_ifix(release:\"7.1\", ml:\"04\", sp:\"05\", patch:\"(IJ03032m5a|IJ05823m5a)\", package:\"bos.mp64\", minfilesetver:\"7.1.4.0\", maxfilesetver:\"7.1.4.33\") < 0) flag++;\n\nif (flag)\n{\n aix_report_extra = ereg_replace(string:aix_report_get(), pattern:\"[()]\", replace:\"\");\n aix_report_extra = ereg_replace(string:aix_report_extra, pattern:\"[|]\", replace:\" or \");\n if (report_verbosity > 0) security_warning(port:0, extra:aix_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2021-03-01T05:41:47", "description": "An update for redhat-virtualization-host is now available for RHEV\n4.X, RHEV-H, and Agents for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nThe ovirt-node-ng packages provide the Red Hat Virtualization Host.\nThese packages include redhat-release-virtualization-host, ovirt-node,\nand rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed\nusing a special build of Red Hat Enterprise Linux with only the\npackages required to host virtual machines. RHVH features a Cockpit\nuser interface for monitoring the host's resources and performing\nadministrative tasks.\n\nSecurity Fix(es) :\n\nAn industry-wide issue was found in the way many modern microprocessor\ndesigns have implemented speculative execution of instructions (a\ncommonly used performance optimization). There are three primary\nvariants of the issue which differ in the way the speculative\nexecution can be exploited.\n\nNote: This issue is present in hardware and cannot be fully fixed via\nsoftware update. The updated kernel packages provide software\nmitigation for this hardware issue at a cost of potential performance\npenalty. Please refer to References section for further information\nabout this issue and the performance impact.\n\nVariant CVE-2017-5753 triggers the speculative execution by performing\na bounds-check bypass. It relies on the presence of a\nprecisely-defined instruction sequence in the privileged code as well\nas the fact that memory accesses may cause allocation into the\nmicroprocessor's data cache even for speculatively executed\ninstructions that never actually commit (retire). As a result, an\nunprivileged attacker could use this flaw to cross the syscall\nboundary and read privileged memory by conducting targeted cache\nside-channel attacks. (CVE-2017-5753, Important)\n\nVariant CVE-2017-5715 triggers the speculative execution by utilizing\nbranch target injection. It relies on the presence of a\nprecisely-defined instruction sequence in the privileged code as well\nas the fact that memory accesses may cause allocation into the\nmicroprocessor's data cache even for speculatively executed\ninstructions that never actually commit (retire). As a result, an\nunprivileged attacker could use this flaw to cross the syscall and\nguest/host boundaries and read privileged memory by conducting\ntargeted cache side-channel attacks. (CVE-2017-5715, Important)\n\nVariant CVE-2017-5754 relies on the fact that, on impacted\nmicroprocessors, during speculative execution of instruction\npermission faults, exception generation triggered by a faulting access\nis suppressed until the retirement of the whole instruction block. In\na combination with the fact that memory accesses may populate the\ncache even when the block is being dropped and never committed\n(executed), an unprivileged local attacker could use this flaw to read\nprivileged (kernel space) memory by conducting targeted cache\nside-channel attacks. (CVE-2017-5754, Important)\n\nNote: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64\nmicroprocessors are not affected by this issue.\n\nRed Hat would like to thank Google Project Zero for reporting these\nissues.", "edition": 34, "cvss3": {"score": 5.6, "vector": "AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}, "published": "2018-01-09T00:00:00", "title": "RHEL 7 : redhat-virtualization-host (RHSA-2018:0047) (Meltdown) (Spectre)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-5753", "CVE-2017-5754", "CVE-2017-5715"], "modified": "2021-03-02T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:redhat-virtualization-host-image-update", "cpe:/o:redhat:enterprise_linux:7"], "id": "REDHAT-RHSA-2018-0047.NASL", "href": "https://www.tenable.com/plugins/nessus/105678", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2018:0047. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(105678);\n script_version(\"3.14\");\n script_cvs_date(\"Date: 2019/10/24 15:35:44\");\n\n script_cve_id(\"CVE-2017-5715\", \"CVE-2017-5753\", \"CVE-2017-5754\");\n script_xref(name:\"RHSA\", value:\"2018:0047\");\n script_xref(name:\"IAVA\", value:\"2018-A-0017\");\n script_xref(name:\"IAVA\", value:\"2018-A-0019\");\n script_xref(name:\"IAVA\", value:\"2018-A-0020\");\n\n script_name(english:\"RHEL 7 : redhat-virtualization-host (RHSA-2018:0047) (Meltdown) (Spectre)\");\n script_summary(english:\"Checks the rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An update for redhat-virtualization-host is now available for RHEV\n4.X, RHEV-H, and Agents for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nThe ovirt-node-ng packages provide the Red Hat Virtualization Host.\nThese packages include redhat-release-virtualization-host, ovirt-node,\nand rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed\nusing a special build of Red Hat Enterprise Linux with only the\npackages required to host virtual machines. RHVH features a Cockpit\nuser interface for monitoring the host's resources and performing\nadministrative tasks.\n\nSecurity Fix(es) :\n\nAn industry-wide issue was found in the way many modern microprocessor\ndesigns have implemented speculative execution of instructions (a\ncommonly used performance optimization). There are three primary\nvariants of the issue which differ in the way the speculative\nexecution can be exploited.\n\nNote: This issue is present in hardware and cannot be fully fixed via\nsoftware update. The updated kernel packages provide software\nmitigation for this hardware issue at a cost of potential performance\npenalty. Please refer to References section for further information\nabout this issue and the performance impact.\n\nVariant CVE-2017-5753 triggers the speculative execution by performing\na bounds-check bypass. It relies on the presence of a\nprecisely-defined instruction sequence in the privileged code as well\nas the fact that memory accesses may cause allocation into the\nmicroprocessor's data cache even for speculatively executed\ninstructions that never actually commit (retire). As a result, an\nunprivileged attacker could use this flaw to cross the syscall\nboundary and read privileged memory by conducting targeted cache\nside-channel attacks. (CVE-2017-5753, Important)\n\nVariant CVE-2017-5715 triggers the speculative execution by utilizing\nbranch target injection. It relies on the presence of a\nprecisely-defined instruction sequence in the privileged code as well\nas the fact that memory accesses may cause allocation into the\nmicroprocessor's data cache even for speculatively executed\ninstructions that never actually commit (retire). As a result, an\nunprivileged attacker could use this flaw to cross the syscall and\nguest/host boundaries and read privileged memory by conducting\ntargeted cache side-channel attacks. (CVE-2017-5715, Important)\n\nVariant CVE-2017-5754 relies on the fact that, on impacted\nmicroprocessors, during speculative execution of instruction\npermission faults, exception generation triggered by a faulting access\nis suppressed until the retirement of the whole instruction block. In\na combination with the fact that memory accesses may populate the\ncache even when the block is being dropped and never committed\n(executed), an unprivileged local attacker could use this flaw to read\nprivileged (kernel space) memory by conducting targeted cache\nside-channel attacks. (CVE-2017-5754, Important)\n\nNote: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64\nmicroprocessors are not affected by this issue.\n\nRed Hat would like to thank Google Project Zero for reporting these\nissues.\"\n );\n # https://access.redhat.com/security/vulnerabilities/speculativeexecution\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?892ef523\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/solutions/3307851\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-5753\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-5715\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2017-5754\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2018:0047\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected redhat-virtualization-host-image-update package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:C/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'CANVAS');\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:redhat-virtualization-host-image-update\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/01/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/01/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/01/09\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 7.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2018:0047\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL7\", reference:\"redhat-virtualization-host-image-update-4.1-20180102.3.el7_4\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"redhat-virtualization-host-image-update\");\n }\n}\n", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2021-01-07T08:58:22", "description": "According to the versions of the kernel packages installed, the\nEulerOS Virtualization installation on the remote host is affected by\nthe following vulnerabilities :\n\n - The recent speculative execution CVEs address three\n potential attacks across a wide variety of\n architectures and hardware platforms.\n\n - Note: This issue is present in hardware and cannot be\n fully fixed via software update. The nature of these\n vulnerabilities and their fixes introduces the\n possibility of reduced performance on patched systems.\n The performance impact depends on the hardware and the\n applications in place.\n\n - The first two variants abuse speculative execution to\n perform bounds-check bypass (CVE-2017-5753), or by\n utilizing branch target injection (CVE-2017-5715) to\n cause kernel code at an address under attacker control\n to execute speculatively. Collectively these are known\n as 'Spectre'.\n\n - Variant CVE-2017-5715 fixes require CPU microcode to\n update.And advise to contact hardware vendors to\n receive the appropriate microcode for your processor.\n\n - The third variant (CVE-2017-5754) relies on the fact\n that, on impacted microprocessors, during speculative\n execution of instruction permission faults, exception\n generation triggered by a faulting access is suppressed\n until the retirement of the whole instruction block.\n Researchers have called this exploit 'Meltdown'.\n\n - Note1: Upgrade and performance specifications,please\n see\n http://developer.huawei.com/ict/en/performance_update\n\n - Note2i1/4sDescription of microcode and security\n patchesaEURtm switches,please see\n https://developer.huawei.com/ict/en/site-euleros/articl\n e/switch\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 10, "cvss3": {"score": 5.6, "vector": "AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}, "published": "2019-06-07T00:00:00", "title": "EulerOS Virtualization 2.5.2 : kernel (EulerOS-SA-2019-1637)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-5753", "CVE-2017-5754", "CVE-2017-5715"], "modified": "2019-06-07T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:kernel-tools", "p-cpe:/a:huawei:euleros:kernel", "p-cpe:/a:huawei:euleros:kernel-tools-libs-devel", "p-cpe:/a:huawei:euleros:perf", "cpe:/o:huawei:euleros:uvp:2.5.2", "p-cpe:/a:huawei:euleros:kernel-headers", "p-cpe:/a:huawei:euleros:kernel-devel", "p-cpe:/a:huawei:euleros:python-perf", "p-cpe:/a:huawei:euleros:kernel-tools-libs"], "id": "EULEROS_SA-2019-1637.NASL", "href": "https://www.tenable.com/plugins/nessus/125752", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(125752);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\n \"CVE-2017-5715\",\n \"CVE-2017-5753\",\n \"CVE-2017-5754\"\n );\n\n script_name(english:\"EulerOS Virtualization 2.5.2 : kernel (EulerOS-SA-2019-1637)\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS Virtualization host is missing multiple security\nupdates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the kernel packages installed, the\nEulerOS Virtualization installation on the remote host is affected by\nthe following vulnerabilities :\n\n - The recent speculative execution CVEs address three\n potential attacks across a wide variety of\n architectures and hardware platforms.\n\n - Note: This issue is present in hardware and cannot be\n fully fixed via software update. The nature of these\n vulnerabilities and their fixes introduces the\n possibility of reduced performance on patched systems.\n The performance impact depends on the hardware and the\n applications in place.\n\n - The first two variants abuse speculative execution to\n perform bounds-check bypass (CVE-2017-5753), or by\n utilizing branch target injection (CVE-2017-5715) to\n cause kernel code at an address under attacker control\n to execute speculatively. Collectively these are known\n as 'Spectre'.\n\n - Variant CVE-2017-5715 fixes require CPU microcode to\n update.And advise to contact hardware vendors to\n receive the appropriate microcode for your processor.\n\n - The third variant (CVE-2017-5754) relies on the fact\n that, on impacted microprocessors, during speculative\n execution of instruction permission faults, exception\n generation triggered by a faulting access is suppressed\n until the retirement of the whole instruction block.\n Researchers have called this exploit 'Meltdown'.\n\n - Note1: Upgrade and performance specifications,please\n see\n http://developer.huawei.com/ict/en/performance_update\n\n - Note2i1/4sDescription of microcode and security\n patchesaEURtm switches,please see\n https://developer.huawei.com/ict/en/site-euleros/articl\n e/switch\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-1637\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?09e234f4\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected kernel packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:C/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'CANVAS');\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/06/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/06/07\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools-libs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:uvp:2.5.2\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (uvp != \"2.5.2\") audit(AUDIT_OS_NOT, \"EulerOS Virtualization 2.5.2\");\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"kernel-3.10.0-514.35.4.1_39\",\n \"kernel-devel-3.10.0-514.35.4.1_39\",\n \"kernel-headers-3.10.0-514.35.4.1_39\",\n \"kernel-tools-3.10.0-514.35.4.1_39\",\n \"kernel-tools-libs-3.10.0-514.35.4.1_39\",\n \"kernel-tools-libs-devel-3.10.0-514.35.4.1_39\",\n \"perf-3.10.0-514.35.4.1_39\",\n \"python-perf-3.10.0-514.35.4.1_39\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2021-03-01T07:34:09", "description": "USN-3541-1 addressed vulnerabilities in the Linux kernel for Ubuntu\n17.10. This update provides the corresponding updates for the Linux\nHardware Enablement (HWE) kernel from Ubuntu 17.10 for Ubuntu 16.04\nLTS.\n\nJann Horn discovered that microprocessors utilizing speculative\nexecution and branch prediction may allow unauthorized memory reads\nvia sidechannel attacks. This flaw is known as Spectre. A local\nattacker could use this to expose sensitive information, including\nkernel memory. This update provides mitigations for the i386\n(CVE-2017-5753 only), amd64, ppc64el, and s390x architectures.\n(CVE-2017-5715, CVE-2017-5753)\n\nUSN-3523-2 mitigated CVE-2017-5754 (Meltdown) for the amd64\narchitecture in the Linux Hardware Enablement (HWE) kernel from Ubuntu\n17.10 for Ubuntu 16.04 LTS. This update provides the corresponding\nmitigations for the ppc64el architecture. \n\nJann Horn discovered that microprocessors utilizing speculative\nexecution and indirect branch prediction may allow unauthorized memory\nreads via sidechannel attacks. This flaw is known as Meltdown. A local\nattacker could use this to expose sensitive information, including\nkernel memory. (CVE-2017-5754).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 30, "cvss3": {"score": 5.6, "vector": "AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}, "published": "2018-01-23T00:00:00", "title": "Ubuntu 16.04 LTS : linux-hwe, linux-azure, linux-gcp, linux-oem vulnerabilities (USN-3541-2) (Meltdown) (Spectre)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-5753", "CVE-2017-5754", "CVE-2017-5715"], "modified": "2021-03-02T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:linux-image-gcp", "p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency-hwe-16.04", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.13-lowlatency", "p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-hwe-16.04", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.13-generic", "cpe:/o:canonical:ubuntu_linux:16.04", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.13-oem", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.13-azure", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.13-gcp", "p-cpe:/a:canonical:ubuntu_linux:linux-image-azure", "p-cpe:/a:canonical:ubuntu_linux:linux-image-oem", "p-cpe:/a:canonical:ubuntu_linux:linux-image-gke"], "id": "UBUNTU_USN-3541-2.NASL", "href": "https://www.tenable.com/plugins/nessus/106271", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-3541-2. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(106271);\n script_version(\"3.11\");\n script_cvs_date(\"Date: 2019/09/18 12:31:47\");\n\n script_cve_id(\"CVE-2017-5715\", \"CVE-2017-5753\", \"CVE-2017-5754\");\n script_xref(name:\"USN\", value:\"3541-2\");\n script_xref(name:\"IAVA\", value:\"2018-A-0019\");\n script_xref(name:\"IAVA\", value:\"2018-A-0020\");\n\n script_name(english:\"Ubuntu 16.04 LTS : linux-hwe, linux-azure, linux-gcp, linux-oem vulnerabilities (USN-3541-2) (Meltdown) (Spectre)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"USN-3541-1 addressed vulnerabilities in the Linux kernel for Ubuntu\n17.10. This update provides the corresponding updates for the Linux\nHardware Enablement (HWE) kernel from Ubuntu 17.10 for Ubuntu 16.04\nLTS.\n\nJann Horn discovered that microprocessors utilizing speculative\nexecution and branch prediction may allow unauthorized memory reads\nvia sidechannel attacks. This flaw is known as Spectre. A local\nattacker could use this to expose sensitive information, including\nkernel memory. This update provides mitigations for the i386\n(CVE-2017-5753 only), amd64, ppc64el, and s390x architectures.\n(CVE-2017-5715, CVE-2017-5753)\n\nUSN-3523-2 mitigated CVE-2017-5754 (Meltdown) for the amd64\narchitecture in the Linux Hardware Enablement (HWE) kernel from Ubuntu\n17.10 for Ubuntu 16.04 LTS. This update provides the corresponding\nmitigations for the ppc64el architecture. \n\nJann Horn discovered that microprocessors utilizing speculative\nexecution and indirect branch prediction may allow unauthorized memory\nreads via sidechannel attacks. This flaw is known as Meltdown. A local\nattacker could use this to expose sensitive information, including\nkernel memory. (CVE-2017-5754).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/3541-2/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:C/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'CANVAS');\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.13-azure\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.13-gcp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.13-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.13-lowlatency\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.13-oem\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-azure\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-gcp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-hwe-16.04\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-gke\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency-hwe-16.04\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-oem\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:16.04\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/01/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/01/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/01/23\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2018-2019 Canonical, Inc. / NASL script (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"ksplice.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(16\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 16.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2017-5715\", \"CVE-2017-5753\", \"CVE-2017-5754\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for USN-3541-2\");\n }\n else\n {\n _ubuntu_report = ksplice_reporting_text();\n }\n}\n\nflag = 0;\n\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-4.13.0-1006-azure\", pkgver:\"4.13.0-1006.8\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-4.13.0-1007-gcp\", pkgver:\"4.13.0-1007.10\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-4.13.0-1017-oem\", pkgver:\"4.13.0-1017.18\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-4.13.0-31-generic\", pkgver:\"4.13.0-31.34~16.04.1\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-4.13.0-31-lowlatency\", pkgver:\"4.13.0-31.34~16.04.1\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-azure\", pkgver:\"4.13.0.1006.7\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-gcp\", pkgver:\"4.13.0.1007.9\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-generic-hwe-16.04\", pkgver:\"4.13.0.31.51\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-gke\", pkgver:\"4.13.0.1007.9\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-lowlatency-hwe-16.04\", pkgver:\"4.13.0.31.51\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-oem\", pkgver:\"4.13.0.1017.21\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"linux-image-4.13-azure / linux-image-4.13-gcp / etc\");\n}\n", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2021-03-01T06:51:43", "description": "The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various\nsecurity and bugfixes. This update is only provided as a fix update\nfor IBM Z platform.\n\n - CVE-2017-5753 / 'Spectre Attack': IBM Z fixes were\n included but not enabled in the previous update. This\n update enables those fixes.\n\n - CVE-2017-5715 / 'Spectre Attack': IBM Z fixes were\n already included in the previous update. A bugfix for\n the patches has been applied on top.\n\n - CVE-2017-5754: The IBM Z architecture is not affected by\n the 'Meltdown' attack.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 32, "cvss3": {"score": 5.6, "vector": "AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}, "published": "2018-01-12T00:00:00", "title": "SUSE SLES12 Security Update : kernel (SUSE-SU-2018:0069-1) (Meltdown) (Spectre)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-5753", "CVE-2017-5754", "CVE-2017-5715"], "modified": "2021-03-02T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-default-debugsource", "cpe:/o:novell:suse_linux:12", "p-cpe:/a:novell:suse_linux:kernel-syms", "p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-base", "p-cpe:/a:novell:suse_linux:kernel-default-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-devel", "p-cpe:/a:novell:suse_linux:kernel-default-man", "p-cpe:/a:novell:suse_linux:kernel-default"], "id": "SUSE_SU-2018-0069-1.NASL", "href": "https://www.tenable.com/plugins/nessus/105765", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2018:0069-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(105765);\n script_version(\"3.10\");\n script_cvs_date(\"Date: 2019/09/10 13:51:46\");\n\n script_cve_id(\"CVE-2017-5715\", \"CVE-2017-5753\", \"CVE-2017-5754\");\n script_xref(name:\"IAVA\", value:\"2018-A-0019\");\n script_xref(name:\"IAVA\", value:\"2018-A-0020\");\n\n script_name(english:\"SUSE SLES12 Security Update : kernel (SUSE-SU-2018:0069-1) (Meltdown) (Spectre)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various\nsecurity and bugfixes. This update is only provided as a fix update\nfor IBM Z platform.\n\n - CVE-2017-5753 / 'Spectre Attack': IBM Z fixes were\n included but not enabled in the previous update. This\n update enables those fixes.\n\n - CVE-2017-5715 / 'Spectre Attack': IBM Z fixes were\n already included in the previous update. A bugfix for\n the patches has been applied on top.\n\n - CVE-2017-5754: The IBM Z architecture is not affected by\n the 'Meltdown' attack.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1068032\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-5715/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-5753/\"\n );\n # https://www.suse.com/support/update/announcement/2018/suse-su-20180069-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?fbd883d8\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"To install this SUSE Security Update use YaST online_update.\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Software Development Kit 12-SP2:zypper in -t\npatch SUSE-SLE-SDK-12-SP2-2018-48=1\n\nSUSE Linux Enterprise Server 12-SP2:zypper in -t patch\nSUSE-SLE-SERVER-12-SP2-2018-48=1\n\nSUSE Linux Enterprise High Availability 12-SP2:zypper in -t patch\nSUSE-SLE-HA-12-SP2-2018-48=1\n\nTo bring your system up-to-date, use 'zypper patch'.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:C/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'CANVAS');\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-man\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/01/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/01/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/01/12\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\nif (cpu >!< \"s390x\") audit(AUDIT_ARCH_NOT, \"s390x\", cpu);\n\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(2)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP2\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"s390x\", reference:\"kernel-default-4.4.103-92.59.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"s390x\", reference:\"kernel-default-base-4.4.103-92.59.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"s390x\", reference:\"kernel-default-base-debuginfo-4.4.103-92.59.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"s390x\", reference:\"kernel-default-debuginfo-4.4.103-92.59.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"s390x\", reference:\"kernel-default-debugsource-4.4.103-92.59.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"s390x\", reference:\"kernel-default-devel-4.4.103-92.59.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"s390x\", reference:\"kernel-default-man-4.4.103-92.59.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"s390x\", reference:\"kernel-syms-4.4.103-92.59.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}], "openvas": [{"lastseen": "2019-05-29T18:33:21", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-5753", "CVE-2017-5754", "CVE-2017-5715"], "description": "The remote host is missing an update for the ", "modified": "2019-03-13T00:00:00", "published": "2018-01-23T00:00:00", "id": "OPENVAS:1361412562310843429", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310843429", "type": "openvas", "title": "Ubuntu Update for linux-aws USN-3540-2", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_3540_2.nasl 14140 2019-03-13 12:26:09Z cfischer $\n#\n# Ubuntu Update for linux-aws USN-3540-2\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.843429\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-01-23 07:38:31 +0100 (Tue, 23 Jan 2018)\");\n script_cve_id(\"CVE-2017-5753\", \"CVE-2017-5715\", \"CVE-2017-5754\");\n script_tag(name:\"cvss_base\", value:\"4.7\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:C/I:N/A:N\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Ubuntu Update for linux-aws USN-3540-2\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux-aws'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"USN-3540-1 addressed vulnerabilities in the\n Linux kernel for Ubuntu 16.04 LTS. This update provides the corresponding\n updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 16.04 LTS for\n Ubuntu 14.04 LTS. Jann Horn discovered that microprocessors utilizing\n speculative execution and branch prediction may allow unauthorized memory reads\n via sidechannel attacks. This flaw is known as Spectre. A local attacker could\n use this to expose sensitive information, including kernel memory. This update\n provides mitigations for the i386 (CVE-2017-5753 only), amd64, ppc64el, and\n s390x architectures. (CVE-2017-5715, CVE-2017-5753) USN-3522-2 mitigated\n CVE-2017-5754 (Meltdown) for the amd64 architecture in the Linux Hardware\n Enablement (HWE) kernel from Ubuntu 16.04 LTS for Ubuntu 14.04 LTS. This update\n provides the corresponding mitigations for the ppc64el architecture. Original\n advisory details: Jann Horn discovered that microprocessors utilizing\n speculative execution and indirect branch prediction may allow unauthorized\n memory reads via sidechannel attacks. This flaw is known as Meltdown. A local\n attacker could use this to expose sensitive information, including kernel\n memory. (CVE-2017-5754)\");\n script_tag(name:\"affected\", value:\"linux-aws on Ubuntu 14.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n\n script_xref(name:\"USN\", value:\"3540-2\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-3540-2/\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU14\\.04 LTS\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU14.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.4.0-1011-aws\", ver:\"4.4.0-1011.11\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.4.0-111-generic\", ver:\"4.4.0-111.134~14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.4.0-111-lowlatency\", ver:\"4.4.0-111.134~14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.4.0-111-powerpc-e500mc\", ver:\"4.4.0-111.134~14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.4.0-111-powerpc-smp\", ver:\"4.4.0-111.134~14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.4.0-111-powerpc64-emb\", ver:\"4.4.0-111.134~14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.4.0-111-powerpc64-smp\", ver:\"4.4.0-111.134~14.04.1\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-aws\", ver:\"4.4.0.1011.11\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-generic-lts-xenial\", ver:\"4.4.0.111.95\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-lowlatency-lts-xenial\", ver:\"4.4.0.111.95\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-powerpc-e500mc-lts-xenial\", ver:\"4.4.0.111.95\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-powerpc-smp-lts-xenial\", ver:\"4.4.0.111.95\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-powerpc64-emb-lts-xenial\", ver:\"4.4.0.111.95\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-powerpc64-smp-lts-xenial\", ver:\"4.4.0.111.95\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"Please\", ver:\"note that fully mitigating CVE-2017-5715 (Spectre Variant 2)\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"in\", ver:\"virtual environments, hypervisor updates. On i386 and amd64\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kernel\", ver:\"mitigations. Ubuntu is working with Intel and AMD to provide\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"contact\", ver:\"the vendor to identify necessary firmware updates. Ubuntu\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"self-hosted\", ver:\"virtual environments in coordination with upstream QEMU.\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"CPU\", ver:\"features to virtual machines.\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-05-29T18:33:22", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-5753", "CVE-2017-5754", "CVE-2017-5715"], "description": "The remote host is missing an update for the ", "modified": "2019-03-13T00:00:00", "published": "2018-03-15T00:00:00", "id": "OPENVAS:1361412562310843473", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310843473", "type": "openvas", "title": "Ubuntu Update for linux USN-3597-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_3597_1.nasl 14140 2019-03-13 12:26:09Z cfischer $\n#\n# Ubuntu Update for linux USN-3597-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.843473\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-03-15 08:47:33 +0100 (Thu, 15 Mar 2018)\");\n script_cve_id(\"CVE-2017-5715\", \"CVE-2017-5753\", \"CVE-2017-5754\");\n script_tag(name:\"cvss_base\", value:\"4.7\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:C/I:N/A:N\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Ubuntu Update for linux USN-3597-1\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"USNS 3541-1 and 3523-1 provided mitigations\n for Spectre and Meltdown (CVE-2017-5715, CVE-2017-5753, CVE-2017-5754) for the\n i386, amd64, and ppc64el architectures in Ubuntu 17.10. This update provides the\n corresponding mitigations for the arm64 architecture. Original advisory details:\n Jann Horn discovered that microprocessors utilizing speculative execution and\n indirect branch prediction may allow unauthorized memory reads via sidechannel\n attacks. This flaw is known as Meltdown. A local attacker could use this to\n expose sensitive information, including kernel memory. (CVE-2017-5754) Jann Horn\n discovered that microprocessors utilizing speculative execution and branch\n prediction may allow unauthorized memory reads via sidechannel attacks. This\n flaw is known as Spectre. A local attacker could use this to expose sensitive\n information, including kernel memory. (CVE-2017-5715, CVE-2017-5753)\");\n script_tag(name:\"affected\", value:\"linux on Ubuntu 17.10\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n\n script_xref(name:\"USN\", value:\"3597-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-3597-1/\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU17\\.10\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU17.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.13.0-1015-raspi2\", ver:\"4.13.0-1015.16\", rls:\"UBUNTU17.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.13.0-37-generic\", ver:\"4.13.0-37.42\", rls:\"UBUNTU17.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.13.0-37-generic-lpae\", ver:\"4.13.0-37.42\", rls:\"UBUNTU17.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.13.0-37-lowlatency\", ver:\"4.13.0-37.42\", rls:\"UBUNTU17.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-generic\", ver:\"4.13.0.37.40\", rls:\"UBUNTU17.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-generic-lpae\", ver:\"4.13.0.37.40\", rls:\"UBUNTU17.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-lowlatency\", ver:\"4.13.0.37.40\", rls:\"UBUNTU17.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-raspi2\", ver:\"4.13.0.1015.13\", rls:\"UBUNTU17.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-07-19T21:59:01", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-5753", "CVE-2017-5754", "CVE-2017-5715"], "description": "This host is installed with\n Mozilla Firefox and is prone to multiple vulnerabilities.", "modified": "2019-07-17T00:00:00", "published": "2018-01-05T00:00:00", "id": "OPENVAS:1361412562310812296", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310812296", "type": "openvas", "title": "Mozilla Firefox Security Updates(mfsa_2018-01_2018-01)-MAC OS X", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mozilla Firefox Security Updates(mfsa_2018-01_2018-01)-MAC OS X\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:mozilla:firefox\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.812296\");\n script_version(\"2019-07-17T11:14:11+0000\");\n script_cve_id(\"CVE-2017-5753\", \"CVE-2017-5715\", \"CVE-2017-5754\");\n script_tag(name:\"cvss_base\", value:\"4.7\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:C/I:N/A:N\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 11:14:11 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2018-01-05 14:36:34 +0530 (Fri, 05 Jan 2018)\");\n script_name(\"Mozilla Firefox Security Updates(mfsa_2018-01_2018-01)-MAC OS X\");\n\n script_tag(name:\"summary\", value:\"This host is installed with\n Mozilla Firefox and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The multiple flaws exists due to\n multiple errors leading to 'speculative execution side-channel attacks'\n that affect many modern processors, operating systems and browser\n JavaScript engines.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation of these\n vulnerabilities will allow code on a malicious web page to read data from\n other web sites (violating the same-origin policy) or private data from the\n browser itself.\");\n\n script_tag(name:\"affected\", value:\"Mozilla Firefox version before 57.0.4 on MAC OS X.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Mozilla Firefox version 57.0.4\n or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://www.mozilla.org/en-US/security/advisories/mfsa2018-01\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_mozilla_prdts_detect_macosx.nasl\");\n script_mandatory_keys(\"Mozilla/Firefox/MacOSX/Version\");\n\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE)) exit(0);\nffVer = infos['version'];\nffPath = infos['location'];\n\nif(version_is_less(version:ffVer, test_version:\"57.0.4\"))\n{\n report = report_fixed_ver(installed_version:ffVer, fixed_version:\"57.0.4\", install_path:ffPath);\n security_message(data:report);\n exit(0);\n}\n\nexit(99);\n", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2020-01-27T18:33:52", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-5753", "CVE-2017-5754", "CVE-2017-5715"], "description": "The remote host is missing an update for the Huawei EulerOS\n ", "modified": "2020-01-23T00:00:00", "published": "2020-01-23T00:00:00", "id": "OPENVAS:1361412562311220181236", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220181236", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2018-1236)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2018.1236\");\n script_version(\"2020-01-23T15:42:05+0000\");\n script_cve_id(\"CVE-2017-5715\", \"CVE-2017-5753\", \"CVE-2017-5754\");\n script_tag(name:\"cvss_base\", value:\"4.7\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:C/I:N/A:N\");\n script_tag(name:\"last_modification\", value:\"2020-01-23 15:42:05 +0000 (Thu, 23 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-23 11:18:24 +0000 (Thu, 23 Jan 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2018-1236)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROSVIRT-2\\.5\\.0\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2018-1236\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2018-1236\");\n script_xref(name:\"URL\", value:\"http://developer.huawei.com/ict/en/performance_update\");\n script_xref(name:\"URL\", value:\"https://developer.huawei.com/ict/en/site-euleros/article/switch\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'kernel' package(s) announced via the EulerOS-SA-2018-1236 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The recent speculative execution CVEs address three potential attacks across a wide variety of architectures and hardware platforms.\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The nature of these vulnerabilities and their fixes introduces the possibility of reduced performance on patched systems. The performance impact depends on the hardware and the applications in place.\n\nThe first two variants abuse speculative execution to perform bounds-check bypass (CVE-2017-5753), or by utilizing branch target injection (CVE-2017-5715) to cause kernel code at an address under attacker control to execute speculatively. Collectively these are known as 'Spectre'.\n\nVariant CVE-2017-5715 fixes require CPU microcode to update.And advise to contact hardware vendors to receive the appropriate microcode for your processor.\n\nThe third variant (CVE-2017-5754) relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. Researchers have called this exploit 'Meltdown'.\n\nNote1: Upgrade and performance specifications, please see the references.\n\nNote2: Description of microcode and security patches switches, please see the references.\");\n\n script_tag(name:\"affected\", value:\"'kernel' package(s) on Huawei EulerOS Virtualization 2.5.0.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROSVIRT-2.5.0\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~3.10.0~327.61.59.66_28\", rls:\"EULEROSVIRT-2.5.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~3.10.0~327.61.59.66_28\", rls:\"EULEROSVIRT-2.5.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~3.10.0~327.61.59.66_28\", rls:\"EULEROSVIRT-2.5.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-tools\", rpm:\"kernel-tools~3.10.0~327.61.59.66_28\", rls:\"EULEROSVIRT-2.5.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-tools-libs\", rpm:\"kernel-tools-libs~3.10.0~327.61.59.66_28\", rls:\"EULEROSVIRT-2.5.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-tools-libs-devel\", rpm:\"kernel-tools-libs-devel~3.10.0~327.61.59.66_28\", rls:\"EULEROSVIRT-2.5.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"perf\", rpm:\"perf~3.10.0~327.61.59.66_28\", rls:\"EULEROSVIRT-2.5.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"python-perf\", rpm:\"python-perf~3.10.0~327.61.59.66_28\", rls:\"EULEROSVIRT-2.5.0\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2020-01-27T18:34:55", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-5753", "CVE-2017-5754", "CVE-2017-5715"], "description": "The remote host is missing an update for the Huawei EulerOS\n ", "modified": "2020-01-23T00:00:00", "published": "2020-01-23T00:00:00", "id": "OPENVAS:1361412562311220181002", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220181002", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2018-1002)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2018.1002\");\n script_version(\"2020-01-23T15:42:05+0000\");\n script_cve_id(\"CVE-2017-5715\", \"CVE-2017-5753\", \"CVE-2017-5754\");\n script_tag(name:\"cvss_base\", value:\"4.7\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:C/I:N/A:N\");\n script_tag(name:\"last_modification\", value:\"2020-01-23 15:42:05 +0000 (Thu, 23 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-23 11:07:58 +0000 (Thu, 23 Jan 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2018-1002)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROS-2\\.0SP1\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2018-1002\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2018-1002\");\n script_xref(name:\"URL\", value:\"http://developer.huawei.com/ict/en/performance_update_2.1\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'kernel' package(s) announced via the EulerOS-SA-2018-1002 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The recent speculative execution CVEs address three potential attacks across a wide variety of architectures and hardware platforms.\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The nature of these vulnerabilities and their fixes introduces the possibility of reduced performance on patched systems. The performance impact depends on the hardware and the applications in place.\n\nThe first two variants abuse speculative execution to perform bounds-check bypass (CVE-2017-5753), or by utilizing branch target injection (CVE-2017-5715) to cause kernel code at an address under attacker control to execute speculatively. Collectively these are known as 'Spectre'.\n\nVariant CVE-2017-5715 fixes require CPU microcode to update.And advise to contact hardware vendors to receive the appropriate microcode for your processor.\n\nThe third variant (CVE-2017-5754) relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. Researchers have called this exploit 'Meltdown'.\n\nNote: Upgrade and performance specifications, please see the references.\");\n\n script_tag(name:\"affected\", value:\"'kernel' package(s) on Huawei EulerOS V2.0SP1.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROS-2.0SP1\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~3.10.0~229.49.1.170\", rls:\"EULEROS-2.0SP1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~3.10.0~229.49.1.170\", rls:\"EULEROS-2.0SP1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debuginfo\", rpm:\"kernel-debuginfo~3.10.0~229.49.1.170\", rls:\"EULEROS-2.0SP1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debuginfo-common-x86_64\", rpm:\"kernel-debuginfo-common-x86_64~3.10.0~229.49.1.170\", rls:\"EULEROS-2.0SP1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~3.10.0~229.49.1.170\", rls:\"EULEROS-2.0SP1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~3.10.0~229.49.1.170\", rls:\"EULEROS-2.0SP1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-tools\", rpm:\"kernel-tools~3.10.0~229.49.1.170\", rls:\"EULEROS-2.0SP1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-tools-libs\", rpm:\"kernel-tools-libs~3.10.0~229.49.1.170\", rls:\"EULEROS-2.0SP1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"perf\", rpm:\"perf~3.10.0~229.49.1.170\", rls:\"EULEROS-2.0SP1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"python-perf\", rpm:\"python-perf~3.10.0~229.49.1.170\", rls:\"EULEROS-2.0SP1\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-05-29T18:33:20", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-5753", "CVE-2017-5754", "CVE-2017-5715"], "description": "The remote host is missing an update for the ", "modified": "2019-03-13T00:00:00", "published": "2018-01-23T00:00:00", "id": "OPENVAS:1361412562310843424", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310843424", "type": "openvas", "title": "Ubuntu Update for linux USN-3541-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_3541_1.nasl 14140 2019-03-13 12:26:09Z cfischer $\n#\n# Ubuntu Update for linux USN-3541-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.843424\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-01-23 07:37:53 +0100 (Tue, 23 Jan 2018)\");\n script_cve_id(\"CVE-2017-5753\", \"CVE-2017-5715\", \"CVE-2017-5754\");\n script_tag(name:\"cvss_base\", value:\"4.7\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:C/I:N/A:N\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Ubuntu Update for linux USN-3541-1\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"Jann Horn discovered that microprocessors\n utilizing speculative execution and branch prediction may allow unauthorized\n memory reads via sidechannel attacks. This flaw is known as Spectre. A local\n attacker could use this to expose sensitive information, including kernel\n memory. This update provides mitigations for the i386 (CVE-2017-5753 only),\n amd64, ppc64el, and s390x architectures. (CVE-2017-5715, CVE-2017-5753)\n USN-3523-1 mitigated CVE-2017-5754 (Meltdown) for the amd64 architecture in\n Ubuntu 17.10. This update provides the corresponding mitigations for the ppc64el\n architecture. Original advisory details: Jann Horn discovered that\n microprocessors utilizing speculative execution and indirect branch prediction\n may allow unauthorized memory reads via sidechannel attacks. This flaw is known\n as Meltdown. A local attacker could use this to expose sensitive information,\n including kernel memory. (CVE-2017-5754)\");\n script_tag(name:\"affected\", value:\"linux on Ubuntu 17.10\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n\n script_xref(name:\"USN\", value:\"3541-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-3541-1/\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU17\\.10\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU17.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.13.0-31-generic\", ver:\"4.13.0-31.34\", rls:\"UBUNTU17.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.13.0-31-lowlatency\", ver:\"4.13.0-31.34\", rls:\"UBUNTU17.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-generic\", ver:\"4.13.0.31.33\", rls:\"UBUNTU17.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-lowlatency\", ver:\"4.13.0.31.33\", rls:\"UBUNTU17.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"Please\", ver:\"note that fully mitigating CVE-2017-5715 (Spectre Variant 2)\", rls:\"UBUNTU17.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"in\", ver:\"virtual environments, hypervisor updates. On i386 and amd64\", rls:\"UBUNTU17.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kernel\", ver:\"mitigations. Ubuntu is working with Intel and AMD to provide\", rls:\"UBUNTU17.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"contact\", ver:\"the vendor to identify necessary firmware updates. Ubuntu\", rls:\"UBUNTU17.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"self-hosted\", ver:\"virtual environments in coordination with upstream QEMU.\", rls:\"UBUNTU17.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"CPU\", ver:\"features to virtual machines.\", rls:\"UBUNTU17.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-05-29T18:33:26", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-5753", "CVE-2017-5754", "CVE-2017-5715"], "description": "Check the version of kernel", "modified": "2019-03-08T00:00:00", "published": "2018-01-05T00:00:00", "id": "OPENVAS:1361412562310882822", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310882822", "type": "openvas", "title": "CentOS Update for kernel CESA-2018:0008 centos6", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_CESA-2018_0008_kernel_centos6.nasl 14058 2019-03-08 13:25:52Z cfischer $\n#\n# CentOS Update for kernel CESA-2018:0008 centos6\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.882822\");\n script_version(\"$Revision: 14058 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-08 14:25:52 +0100 (Fri, 08 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-01-05 23:54:55 +0100 (Fri, 05 Jan 2018)\");\n script_cve_id(\"CVE-2017-5753\", \"CVE-2017-5715\", \"CVE-2017-5754\");\n script_tag(name:\"cvss_base\", value:\"4.7\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:C/I:N/A:N\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"CentOS Update for kernel CESA-2018:0008 centos6\");\n script_tag(name:\"summary\", value:\"Check the version of kernel\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"The kernel packages contain the Linux\nkernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\nAn industry-wide issue was found in the way many modern microprocessor\ndesigns have implemented speculative execution of instructions (a commonly\nused performance optimization). There are three primary variants of the\nissue which differ in the way the speculative execution can be exploited.\n\nNote: This issue is present in hardware and cannot be fully fixed via\nsoftware update. The updated kernel packages provide software mitigation\nfor this hardware issue at a cost of potential performance penalty. Please\nrefer to References section for further information about this issue and\nthe performance impact.\n\nIn this update mitigations for x86-64 architecture are provided.\n\nVariant CVE-2017-5753 triggers the speculative execution by performing a\nbounds-check bypass. It relies on the presence of a precisely-defined\ninstruction sequence in the privileged code as well as the fact that memory\naccesses may cause allocation into the microprocessor's data cache even for\nspeculatively executed instructions that never actually commit (retire). As\na result, an unprivileged attacker could use this flaw to cross the syscall\nboundary and read privileged memory by conducting targeted cache\nside-channel attacks. (CVE-2017-5753, Important)\n\nVariant CVE-2017-5715 triggers the speculative execution by utilizing\nbranch target injection. It relies on the presence of a precisely-defined\ninstruction sequence in the privileged code as well as the fact that memory\naccesses may cause allocation into the microprocessor's data cache even for\nspeculatively executed instructions that never actually commit (retire). As\na result, an unprivileged attacker could use this flaw to cross the syscall\nand guest/host boundaries and read privileged memory by conducting targeted\ncache side-channel attacks. (CVE-2017-5715, Important)\n\nVariant CVE-2017-5754 relies on the fact that, on impacted microprocessors,\nduring speculative execution of instruction permission faults, exception\ngeneration triggered by a faulting access is suppressed until the\nretirement of the whole instruction block. In a combination with the fact\nthat memory accesses may populate the cache even when the block is being\ndropped and never committed (executed), an unprivileged local attacker\ncould use this flaw to read privileged (kernel space) memory by conducting\ntargeted cache side-channel attacks. (CVE-2017-5754, Important)\n\nNote: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64\nmicroprocessors are not affected by this issue.\n\nRed Hat would like to thank Google Project Zero for reporting these issues.\");\n script_tag(name:\"affected\", value:\"kernel on CentOS 6\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n\n script_xref(name:\"CESA\", value:\"2018:0008\");\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2018-January/022701.html\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS6\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS6\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.32~696.18.7.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-abi-whitelists\", rpm:\"kernel-abi-whitelists~2.6.32~696.18.7.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.32~696.18.7.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.32~696.18.7.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.32~696.18.7.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.32~696.18.7.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-firmware\", rpm:\"kernel-firmware~2.6.32~696.18.7.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~2.6.32~696.18.7.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"perf\", rpm:\"perf~2.6.32~696.18.7.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"python-perf\", rpm:\"python-perf~2.6.32~696.18.7.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2020-06-08T23:06:04", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-5753", "CVE-2017-5754", "CVE-2017-5715"], "description": "This host is missing an important security\n update according to Microsoft KB4073291.", "modified": "2020-06-04T00:00:00", "published": "2018-01-22T00:00:00", "id": "OPENVAS:1361412562310812740", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310812740", "type": "openvas", "title": "Microsoft Windows Speculative Execution Side-Channel Vulnerabilities (KB4073291)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Microsoft Windows Speculative Execution Side-Channel Vulnerabilities (KB4073291)\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.812740\");\n script_version(\"2020-06-04T11:13:22+0000\");\n script_cve_id(\"CVE-2017-5753\", \"CVE-2017-5715\", \"CVE-2017-5754\");\n script_bugtraq_id(102371, 102378, 102376);\n script_tag(name:\"cvss_base\", value:\"4.7\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:C/I:N/A:N\");\n script_tag(name:\"last_modification\", value:\"2020-06-04 11:13:22 +0000 (Thu, 04 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2018-01-22 12:24:05 +0530 (Mon, 22 Jan 2018)\");\n script_name(\"Microsoft Windows Speculative Execution Side-Channel Vulnerabilities (KB4073291)\");\n\n script_tag(name:\"summary\", value:\"This host is missing an important security\n update according to Microsoft KB4073291.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple errors leading to 'speculative execution\n side-channel attacks' that affect many modern processors and operating systems\n including Intel, AMD, and ARM.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n to read the content of memory across a trusted boundary and can therefore lead\n to information disclosure.\");\n\n script_tag(name:\"affected\", value:\"Microsoft Windows 10 Version 1709 for 32-bit Systems.\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/help/4073291\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"smb_reg_service_pack.nasl\");\n script_require_ports(139, 445);\n script_mandatory_keys(\"SMB/WindowsVersion\");\n\n exit(0);\n}\n\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(hotfix_check_sp(win10:1) <= 0){\n exit(0);\n}\n\nsysPath = smb_get_system32root();\nif(!sysPath ){\n exit(0);\n}\n\nexeVer = fetch_file_version(sysPath:sysPath, file_name:\"Ntoskrnl.exe\");\nif(!exeVer){\n exit(0);\n}\n\nif(version_in_range(version:exeVer, test_version:\"10.0.16299.0\", test_version2:\"10.0.16299.200\"))\n{\n report = 'File checked: ' + sysPath + \"\\Ntoskrnl.exe\" + '\\n' +\n 'File version: ' + exeVer + '\\n' +\n 'Vulnerable range: 10.0.16299.0 - 10.0.16299.200\\n' ;\n security_message(data:report);\n exit(0);\n}\nexit(0);\n", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-05-29T18:33:40", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-5753", "CVE-2017-5754", "CVE-2017-5715"], "description": "The remote host is missing an update for the ", "modified": "2018-11-23T00:00:00", "published": "2018-01-05T00:00:00", "id": "OPENVAS:1361412562310812398", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310812398", "type": "openvas", "title": "RedHat Update for kernel RHSA-2018:0008-01", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_RHSA-2018_0008-01_kernel.nasl 12497 2018-11-23 08:28:21Z cfischer $\n#\n# RedHat Update for kernel RHSA-2018:0008-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.812398\");\n script_version(\"$Revision: 12497 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-23 09:28:21 +0100 (Fri, 23 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2018-01-05 23:54:14 +0100 (Fri, 05 Jan 2018)\");\n script_cve_id(\"CVE-2017-5753\", \"CVE-2017-5715\", \"CVE-2017-5754\");\n script_tag(name:\"cvss_base\", value:\"4.7\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:C/I:N/A:N\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"RedHat Update for kernel RHSA-2018:0008-01\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"The kernel packages contain the Linux\n kernel, the core of any Linux operating system. Security Fix(es): An\n industry-wide issue was found in the way many modern microprocessor designs have\n implemented speculative execution of instructions (a commonly used performance\n optimization). There are three primary variants of the issue which differ in the\n way the speculative execution can be exploited. Note: This issue is present in\n hardware and cannot be fully fixed via software update. The updated kernel\n packages provide software mitigation for this hardware issue at a cost of\n potential performance penalty. Please refer to References section for further\n information about this issue and the performance impact. In this update\n mitigations for x86-64 architecture are provided. Variant CVE-2017-5753 triggers\n the speculative execution by performing a bounds-check bypass. It relies on the\n presence of a precisely-defined instruction sequence in the privileged code as\n well as the fact that memory accesses may cause allocation into the\n microprocessor's data cache even for speculatively executed instructions that\n never actually commit (retire). As a result, an unprivileged attacker could use\n this flaw to cross the syscall boundary and read privileged memory by conducting\n targeted cache side-channel attacks. (CVE-2017-5753, Important) Variant\n CVE-2017-5715 triggers the speculative execution by utilizing branch target\n injection. It relies on the presence of a precisely-defined instruction sequence\n in the privileged code as well as the fact that memory accesses may cause\n allocation into the microprocessor's data cache even for speculatively executed\n instructions that never actually commit (retire). As a result, an unprivileged\n attacker could use this flaw to cross the syscall and guest/host boundaries and\n read privileged memory by conducting targeted cache side-channel attacks.\n (CVE-2017-5715, Important) Variant CVE-2017-5754 relies on the fact that, on\n impacted microprocessors, during speculative execution of instruction permission\n faults, exception generation triggered by a faulting access is suppressed until\n the retirement of the whole instruction block. In a combination with the fact\n that memory accesses may populate the cache even when the block is being dropped\n and never committed (executed), an unprivileged local attacker could use this\n flaw to read privileged (kernel space) memory by conducting targeted cache\n side-channel attacks. (CVE-2017-5754, Important) Note: CVE-2017-5754 affects\n Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by\n this issue. Red Hat would like to thank Google Project Zero for reporting these\n issues.\");\n script_tag(name:\"affected\", value:\"kernel on Red Hat Enterprise Linux Desktop (v. 6),\n Red Hat Enterprise Linux Server (v. 6),\n Red Hat Enterprise Linux Workstation (v. 6)\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n\n script_xref(name:\"RHSA\", value:\"2018:0008-01\");\n script_xref(name:\"URL\", value:\"https://www.redhat.com/archives/rhsa-announce/2018-January/msg00007.html\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\", re:\"ssh/login/release=RHENT_6\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"RHENT_6\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.32~696.18.7.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.32~696.18.7.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-debuginfo\", rpm:\"kernel-debug-debuginfo~2.6.32~696.18.7.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.32~696.18.7.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debuginfo\", rpm:\"kernel-debuginfo~2.6.32~696.18.7.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debuginfo-common-i686\", rpm:\"kernel-debuginfo-common-i686~2.6.32~696.18.7.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.32~696.18.7.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~2.6.32~696.18.7.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"perf\", rpm:\"perf~2.6.32~696.18.7.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"perf-debuginfo\", rpm:\"perf-debuginfo~2.6.32~696.18.7.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"python-perf-debuginfo\", rpm:\"python-perf-debuginfo~2.6.32~696.18.7.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-abi-whitelists\", rpm:\"kernel-abi-whitelists~2.6.32~696.18.7.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.32~696.18.7.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-firmware\", rpm:\"kernel-firmware~2.6.32~696.18.7.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debuginfo-common-x86_64\", rpm:\"kernel-debuginfo-common-x86_64~2.6.32~696.18.7.el6\", rls:\"RHENT_6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-05-29T18:33:24", "bulletinFamily": "scanner", "cvelist": ["CVE-2017-5753", "CVE-2017-5754", "CVE-2017-5715"], "description": "The remote host is missing an update for the ", "modified": "2019-03-13T00:00:00", "published": "2018-01-23T00:00:00", "id": "OPENVAS:1361412562310843423", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310843423", "type": "openvas", "title": "Ubuntu Update for linux USN-3540-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_3540_1.nasl 14140 2019-03-13 12:26:09Z cfischer $\n#\n# Ubuntu Update for linux USN-3540-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.843423\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-01-23 07:37:45 +0100 (Tue, 23 Jan 2018)\");\n script_cve_id(\"CVE-2017-5753\", \"CVE-2017-5715\", \"CVE-2017-5754\");\n script_tag(name:\"cvss_base\", value:\"4.7\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:C/I:N/A:N\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Ubuntu Update for linux USN-3540-1\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"Jann Horn discovered that microprocessors\n utilizing speculative execution and branch prediction may allow unauthorized\n memory reads via sidechannel attacks. This flaw is known as Spectre. A local\n attacker could use this to expose sensitive information, including kernel\n memory. This update provides mitigations for the i386 (CVE-2017-5753 only),\n amd64, ppc64el, and s390x architectures. (CVE-2017-5715, CVE-2017-5753)\n USN-3522-1 mitigated CVE-2017-5754 (Meltdown) for the amd64 architecture in\n Ubuntu 16.04 LTS. This update provides the corresponding mitigations for the\n ppc64el architecture. Original advisory details: Jann Horn discovered that\n microprocessors utilizing speculative execution and indirect branch prediction\n may allow unauthorized memory reads via sidechannel attacks. This flaw is known\n as Meltdown. A local attacker could use this to expose sensitive information,\n including kernel memory. (CVE-2017-5754)\");\n script_tag(name:\"affected\", value:\"linux on Ubuntu 16.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n\n script_xref(name:\"USN\", value:\"3540-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-3540-1/\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU16\\.04 LTS\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU16.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.4.0-1049-aws\", ver:\"4.4.0-1049.58\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.4.0-112-generic\", ver:\"4.4.0-112.135\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.4.0-112-generic-lpae\", ver:\"4.4.0-112.135\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.4.0-112-lowlatency\", ver:\"4.4.0-112.135\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.4.0-112-powerpc-e500mc\", ver:\"4.4.0-112.135\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.4.0-112-powerpc-smp\", ver:\"4.4.0-112.135\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.4.0-112-powerpc64-emb\", ver:\"4.4.0-112.135\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.4.0-112-powerpc64-smp\", ver:\"4.4.0-112.135\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.4.0-9023-euclid\", ver:\"4.4.0-9023.24\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-aws\", ver:\"4.4.0.1049.51\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-euclid\", ver:\"4.4.0.9023.24\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-generic\", ver:\"4.4.0.112.118\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-generic-lpae\", ver:\"4.4.0.112.118\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-lowlatency\", ver:\"4.4.0.112.118\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-powerpc-e500mc\", ver:\"4.4.0.112.118\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-powerpc-smp\", ver:\"4.4.0.112.118\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-powerpc64-emb\", ver:\"4.4.0.112.118\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-powerpc64-smp\", ver:\"4.4.0.112.118\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"Please\", ver:\"note that fully mitigating CVE-2017-5715 (Spectre Variant 2)\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"in\", ver:\"virtual environments, hypervisor updates. On i386 and amd64\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"kernel\", ver:\"mitigations. Ubuntu is working with Intel and AMD to provide\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"contact\", ver:\"the vendor to identify necessary firmware updates. Ubuntu\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"self-hosted\", ver:\"virtual environments in coordination with upstream QEMU.\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"CPU\", ver:\"features to virtual machines.\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}], "ubuntu": [{"lastseen": "2020-07-02T11:37:49", "bulletinFamily": "unix", "cvelist": ["CVE-2017-5753", "CVE-2017-5754", "CVE-2017-5715"], "description": "It was discovered that speculative execution performed by modern CPUs \ncould leak information through a timing side-channel attack, and that \nthis could be exploited in web browser JavaScript engines. If a user were \ntricked in to opening a specially crafted website, an attacker could \npotentially exploit this to obtain sensitive information from other \ndomains, bypassing same-origin restrictions. (CVE-2017-5715, \nCVE-2017-5753, CVE-2017-5754).", "edition": 5, "modified": "2018-01-05T00:00:00", "published": "2018-01-05T00:00:00", "id": "USN-3516-1", "href": "https://ubuntu.com/security/notices/USN-3516-1", "title": "Firefox vulnerabilities", "type": "ubuntu", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2020-07-08T23:37:39", "bulletinFamily": "unix", "cvelist": ["CVE-2017-5753", "CVE-2017-5754", "CVE-2017-5715"], "description": "USNS 3541-1 and 3523-1 provided mitigations for Spectre and Meltdown \n(CVE-2017-5715, CVE-2017-5753, CVE-2017-5754) for the i386, amd64, \nand ppc64el architectures in Ubuntu 17.10. This update provides \nthe corresponding mitigations for the arm64 architecture. Original \nadvisory details:\n\nJann Horn discovered that microprocessors utilizing speculative execution \nand indirect branch prediction may allow unauthorized memory reads via \nsidechannel attacks. This flaw is known as Meltdown. A local attacker could \nuse this to expose sensitive information, including kernel memory. \n(CVE-2017-5754)\n\nJann Horn discovered that microprocessors utilizing speculative execution \nand branch prediction may allow unauthorized memory reads via sidechannel \nattacks. This flaw is known as Spectre. A local attacker could use this to \nexpose sensitive information, including kernel memory. (CVE-2017-5715, \nCVE-2017-5753)", "edition": 6, "modified": "2018-03-15T00:00:00", "published": "2018-03-15T00:00:00", "id": "USN-3597-1", "href": "https://ubuntu.com/security/notices/USN-3597-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2020-07-02T11:45:20", "bulletinFamily": "unix", "cvelist": ["CVE-2017-5753", "CVE-2017-5754", "CVE-2017-5715"], "description": "USN-3597-1 fixed vulnerabilities in the Linux kernel for Ubuntu 17.10. \nThis update provides the corresponding updates for the Linux Hardware \nEnablement (HWE) kernel from Ubuntu 17.10 for Ubuntu 16.04 LTS.\n\nUSNS 3541-2 and 3523-2 provided mitigations for Spectre and Meltdown \n(CVE-2017-5715, CVE-2017-5753, CVE-2017-5754) for the i386, amd64, \nand ppc64el architectures for Ubuntu 16.04 LTS. This update provides \nthe corresponding mitigations for the arm64 architecture. Original \nadvisory details:\n\nJann Horn discovered that microprocessors utilizing speculative execution \nand indirect branch prediction may allow unauthorized memory reads via \nsidechannel attacks. This flaw is known as Meltdown. A local attacker could \nuse this to expose sensitive information, including kernel memory. \n(CVE-2017-5754)\n\nJann Horn discovered that microprocessors utilizing speculative execution \nand branch prediction may allow unauthorized memory reads via sidechannel \nattacks. This flaw is known as Spectre. A local attacker could use this to \nexpose sensitive information, including kernel memory. (CVE-2017-5715, \nCVE-2017-5753)", "edition": 5, "modified": "2018-03-15T00:00:00", "published": "2018-03-15T00:00:00", "id": "USN-3597-2", "href": "https://ubuntu.com/security/notices/USN-3597-2", "title": "Linux kernel (HWE) vulnerabilities", "type": "ubuntu", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2020-07-08T23:39:55", "bulletinFamily": "unix", "cvelist": ["CVE-2017-5753", "CVE-2017-5754", "CVE-2017-5715"], "description": "Jann Horn discovered that microprocessors utilizing speculative \nexecution and branch prediction may allow unauthorized memory \nreads via sidechannel attacks. This flaw is known as Spectre. A \nlocal attacker could use this to expose sensitive information, \nincluding kernel memory. This update provides mitigations for the \ni386 (CVE-2017-5753 only), amd64, ppc64el, and s390x architectures. \n(CVE-2017-5715, CVE-2017-5753)\n\nUSN-3523-1 mitigated CVE-2017-5754 (Meltdown) for the amd64 \narchitecture in Ubuntu 17.10. This update provides the corresponding \nmitigations for the ppc64el architecture. Original advisory details:\n\nJann Horn discovered that microprocessors utilizing speculative \nexecution and indirect branch prediction may allow unauthorized memory \nreads via sidechannel attacks. This flaw is known as Meltdown. A local \nattacker could use this to expose sensitive information, including \nkernel memory. (CVE-2017-5754)", "edition": 5, "modified": "2018-01-23T00:00:00", "published": "2018-01-23T00:00:00", "id": "USN-3541-1", "href": "https://ubuntu.com/security/notices/USN-3541-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2020-07-15T01:30:34", "bulletinFamily": "unix", "cvelist": ["CVE-2017-5753", "CVE-2017-5754", "CVE-2017-5715"], "description": "USN-3540-1 addressed vulnerabilities in the Linux kernel for Ubuntu \n16.04 LTS. This update provides the corresponding updates for the \nLinux Hardware Enablement (HWE) kernel from Ubuntu 16.04 LTS for \nUbuntu 14.04 LTS.\n\nJann Horn discovered that microprocessors utilizing speculative \nexecution and branch prediction may allow unauthorized memory \nreads via sidechannel attacks. This flaw is known as Spectre. A \nlocal attacker could use this to expose sensitive information, \nincluding kernel memory. This update provides mitigations for the \ni386 (CVE-2017-5753 only), amd64, ppc64el, and s390x architectures. \n(CVE-2017-5715, CVE-2017-5753)\n\nUSN-3522-2 mitigated CVE-2017-5754 (Meltdown) for the amd64 \narchitecture in the Linux Hardware Enablement (HWE) kernel from Ubuntu \n16.04 LTS for Ubuntu 14.04 LTS. This update provides the corresponding \nmitigations for the ppc64el architecture. Original advisory details:\n\nJann Horn discovered that microprocessors utilizing speculative \nexecution and indirect branch prediction may allow unauthorized memory \nreads via sidechannel attacks. This flaw is known as Meltdown. A local \nattacker could use this to expose sensitive information, including \nkernel memory. (CVE-2017-5754)", "edition": 7, "modified": "2018-01-23T00:00:00", "published": "2018-01-23T00:00:00", "id": "USN-3540-2", "href": "https://ubuntu.com/security/notices/USN-3540-2", "title": "Linux kernel (Xenial HWE) vulnerabilities", "type": "ubuntu", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}], "securelist": [{"lastseen": "2018-05-15T21:13:49", "bulletinFamily": "blog", "cvelist": ["CVE-2017-5715", "CVE-2017-5753", "CVE-2017-5754"], "description": "\n\n## Targeted attacks and malware campaigns\n\n### Skygofree: sophisticated mobile surveillance\n\nIn January, we uncovered a sophisticated mobile implant that provides attackers with remote control of infected Android devices. The malware, called [Skygofree](<https://securelist.com/skygofree-following-in-the-footsteps-of-hackingteam/83603/>) (after one of the domains it uses), is a targeted cyber-surveillance tool that has been in development since 2014. The malware is spread by means of spoofed web pages that mimic leading mobile providers. The campaign is ongoing and our telemetry indicates that there have been several victims, all in Italy. We feel confident that the developer of Skygofree is an Italian IT company that works on surveillance solutions.\n\n[](<https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/05/07110447/180507-malware-report-q1-18-1.png>)\n\nThe latest version of Skygofree includes functionality that has so far not been seen in the wild. Features include the ability to eavesdrop on conversations when the victim moves into a specific location; using Accessibility Services to capture WhatsApp messages and the ability to force an infected device to Wi-Fi networks controlled by the attackers. The malware includes multiple exploits for root access and is capable of stealing pictures and videos, capturing call records, SMS, geo-location, calendar events and business-related data stored in the device's memory. The Skygofree implant puts itself in the list of 'protected apps', so that it doesn't get switched off when the screen is off (this is to work around a battery-saving technique that has been implemented by one of the top device vendors.)\n\nOur investigation also uncovered several spyware tools for Windows that form an implant for stealing sensitive data from a target computer. The version we found was created at the start of 2017: at the moment, we do not know if this implant has been used in the wild.\n\nSince then we have also found a version for iOS that uses a rogue [MDM](<https://en.wikipedia.org/wiki/Mobile_device_management>) (Mobile Device Management) server in order to infect devices.\n\n### Olympic Destroyer\u2026 but who did the 'destroying'?\n\nThe issue of attribution was thrown into sharp relief following the malware attack on the Olympic infrastructure just before the opening of the games in February. [Olympic Destroyer](<https://securelist.com/olympicdestroyer-is-here-to-trick-the-industry/84295/>) shut down display monitors, killed Wi-Fi and took down the Olympics web site \u2013 preventing visitors from to printing tickets. The attack also affected other organizations in the region \u2013 for example, ski gates and ski lifts were disabled at several South Korean ski resorts.\n\nOlympic Destroyer is a network worm, the main purpose of which is to deliver and start a wiper payload that tries to destroy files on remote network shares in the following 60 minutes. In the meantime, the main module collects user passwords from the browser and Windows storage and crafts a new generation of the worm that contains old and freshly-collected compromised credentials. This new generation worm is pushed to accessible local network computers and starts using the PsExec tool, drawing on the stolen credentials and current user privileges. Once the wiper has run for 60 minutes it cleans Windows event logs, resets backups, deletes shadow copies from the file system, disables the recovery item in the Windows boot menu, disables all services on the system and reboots the computer. Those files on the network shares that it was able to wipe within 60 minutes remain destroyed. The malware doesn't use any persistence and even contains protection against recurring reinfection.\n\n[](<https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/05/07110500/180507-malware-report-q1-18-2.png>)\n\nOne of the most notable aspects of this incident was the 'attribution hell' that followed. In the days after the attack, research teams and media companies around the world variously attributed the attack to Russia, China and North Korea \u2013 based on a number of features previously attributed to cyber-espionage and sabotage groups allegedly based in these countries or working for the governments of these countries.\n\nOur own researchers were also trying to understand which group was behind the attack. At one stage during our research, we discovered something that seemed to indicate that the Lazarus group was behind the attack. We found a unique trace left by the attackers that exactly matched a previously known Lazarus malware component. However, the lack of obvious motive and inconsistencies with known Lazarus TTPs (tactics, techniques and procedures) that we found during our on-site investigation at a compromised facility in South Korea led us to look again at this artefact. When we did so, we discovered that the set of features didn't match the code \u2013 it had been forged to perfectly match the fingerprint used by Lazarus. So we concluded that the 'fingerprint' was a very sophisticated false flag, intentionally placed inside the malware in order to give threat hunters the impression that they had found a 'smoking gun' and diverting them from a more accurate attribution.\n\nThe problems associated with attribution must be taken seriously. Given how politicised cyberspace has recently become, incorrect attribution could lead to severe consequences; and it's possible that threat actors might try to manipulate the opinion of the security community in order to influence the geo-political agenda.\n\n### Sofacy turns eastwards\n\nSofacy (aka APT28, Fancy Bear and Tsar Team) is a highly active and prolific cyber-espionage group that Kaspersky Lab has been tracking for many years. In February, we published an [overview of Sofacy activities in 2017](<https://securelist.com/a-slice-of-2017-sofacy-activity/83930/>), revealing a gradual moved away from NATO-related targets at the start of 2017, towards targets in the Middle East, Central Asia and beyond. Sofacy uses spear-phishing and watering-hole attacks to steal information, including account credentials, sensitive communications and documents. This threat actor also makes use of zero-day vulnerabilities to deploy its malware\n\nSofacy uses different tools for different target profiles. Early in 2017, the group's 'Dealer's Choice' campaign was used to target military and diplomatic organizations (mainly in NATO countries and Ukraine).\n\n[](<https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/05/07110512/180507-malware-report-q1-18-3.png>)\n\nLater in the year, the group used other tools from its arsenal, 'Zebrocy' and 'SPLM', to target a broader range of organizations, including science and engineering centers and press services, with more of a focus on Central Asia and the Far East.\n\n[](<https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/05/07110525/180507-malware-report-q1-18-4.png>)\n\nSophisticated threat actors such as Sofacy continually develop the tools they use. The group maintains a high level of operational security and focuses on making its malware hard to detect. In the case of groups such as Sofacy, once any signs of their activity have been found in a network, it's important to review logins and unusual administrator access on systems, thoroughly scan and sandbox incoming attachments, and maintain two-factor authentication for services such as e-mail and VPN access. The use of [APT intelligence reports](<https://www.kaspersky.co.uk/enterprise-security/apt-intelligence-reporting>), threat hunting tools such as [YARA](<https://en.wikipedia.org/wiki/YARA>) and advanced detection solutions such as [KATA](<https://www.kaspersky.co.uk/enterprise-security/anti-targeted-attack-platform>) (Kaspersky Anti Targeted Attack Platform) will help you to understand their targeting and provide powerful ways of detecting their activities.\n\nOur research shows that Sofacy is not the only threat actor operating in the Far East and this sometimes results in a target [overlap between very different threat actors](<https://securelist.com/masha-and-these-bears/84311/>). We have seen cases where Sofacy's Zebrocy malware has competed for access to victim's computers with the Russian-speaking Mosquito Turla clusters; and where its SPLM backdoor has competed with the traditional Turla and Chinese-speaking Danti attacks. The shared targets included government administration, technology, science and military-related organizations in or from Central Asia.\n\nThe most intriguing overlap is probably that between Sofacy and the English-speaking threat actor behind The Lamberts. The connection was discovered after researchers detected the presence of Sofacy on a server that threat intelligence had previously identified as compromised by Grey Lambert malware. The server belongs to a Chinese conglomerate that designs and manufactures aerospace and air defense technologies. However, in this case the original SPLM delivery vector remains unknown. This raises a number of hypothetical possibilities, including the fact that Sofacy could be using a new and as yet undetected exploit or a new strain of its backdoor, or that Sofacy somehow managed to harness Grey Lambert's communication channels to download its malware. It could even be a false flag, planted during the previous Lambert infection. We think that the most likely answer is that an unknown new PowerShell script or legitimate but vulnerable web app was exploited to load and execute the SPLM code.\n\n### Slingshot: a route[r] into the network\n\nOne of the presentations at this year's Kaspersky [Security Analyst Summit](<https://sas.kaspersky.com/>) was a report on a sophisticated cyber-espionage platform that has targeted victims in the Middle East and Africa since 2012.\n\n[Slingshot](<https://securelist.com/apt-slingshot/84312/>) uses an unusual (and, as far as we know, unique) attack vector. Many of the victims were attacked by means of compromised MikroTik routers. The exact method for compromising the routers is not clear, but the attackers have found a way to add a malicious DLL to the device. This DLL is a downloader for other malicious files that are then stored on the router. When a system administrator logs in to configure the router, the router's management software downloads and runs a malicious module on the administrator's computer.\n\nSlingshot loads a number of modules onto the victim's computer, including two huge and powerful ones: Cahnadr, a kernel mode module, and GollumApp, a user mode module. The two modules are connected and support each other in gathering information, persistence and data exfiltration. GollumApp is the most sophisticated of the modules: it contains nearly 1,500 user-code functions and provides most of the routines for persistence, file system control and C2 (Command-and-Control) communications. Cahnadr (also known as NDriver) contains low-level routines for network, IO operations and so on. Its kernel-mode program is able to execute malicious code without crashing the whole file system or causing a blue screen \u2013 a remarkable achievement. Cahnadr, written in pure C language, provides full access to the hard drive and operating memory, notwithstanding device security restrictions, and carries out integrity control of various system components to avoid debugging and security detection.\n\nSlingshot incorporates a number of techniques to help it evade detection. These include encrypting all strings in its modules, calling system services directly in order to bypass security-product hooks, using a number of anti-debugging techniques and selecting which process to inject depending on the installed and running security solution processes.\n\n**Further information on target**ed** attack activity in the first quarter of 2018 can be found in the **[**APT trends report for Q1 2018.**](<https://securelist.com/apt-trends-report-q1-2018/85280/>)\n\n## Malware stories\n\n### A Spectre is haunting Europe \u2013 and anywhere else with vulnerable CPUs\n\nTwo severe vulnerabilities affecting Intel CPUs were reported early in 2018. Dubbed 'Meltdown' and 'Spectre', they respectively allow an attacker to read memory from any process and from its own process. The vulnerabilities have been around since at least 2011.\n\nRumours of a new attack on Intel CPUs emerged at the start of December 2017 when e-mails on the [LKML](<https://en.wikipedia.org/wiki/Linux_kernel_mailing_list>) (Linux kernel mailing list) appeared about adding the [KAISER](<https://en.wikipedia.org/wiki/Kernel_page-table_isolation>) patches to the Linux kernel. These patches, designed to separate the user address space from the kernel address space, were originally intended to 'close all hardware side channels on kernel address information'. It was the impact of this seemingly drastic measure, with its clear performance impact, that had prompted the rumours.\n\nThis attack, now known as Meltdown (CVE-2017-5754), is able to read data from any process on the host system. While code execution is required, this can be obtained in various ways \u2013 for example, through a software bug or by visiting a malicious website that loads JavaScript code that executes the Meltdown attack. This means that all the data residing in memory (passwords, encryption keys, PINs, etc.) could be read if the vulnerability is exploited properly. Meltdown affects most Intel CPUs and some ARM CPUs.\n\nVendors were quick to publish patches for the most popular operating systems. The Microsoft update, released on 3 January, was not compatible with all anti-virus programs \u2013 possibly resulting in a BSoD (Blue Screen of Death) on incompatible systems. So updates could only be installed if an anti-virus product had first set a specific registry key, to indicate that there were no compatibility problems.\n\nSpectre (CVE-2017-5753 and CVE-2017-5715) is slightly different. Unlike Meltdown, this attack also works on other architectures (such as AMD and ARM). Also, Spectre is only able to read the memory space of the exploited process, and not that of any process. More importantly, aside from some counter-measures in some browsers, no universal solution is readily available for Spectre.\n\nIt became clear in the weeks following the reports of the vulnerabilities that they are not easily fixable. Spectre in particular opened new ways of exploitation that might affect different software in the months and years to come. Most of the released patches have reduced the attack surface, mitigating against known ways of exploiting them, but do not eradicate it completely. Since the problem is fundamental to the working of the vulnerable CPUs, it's likely that vendors will have to deal with new ways of exploiting the vulnerabilities for years to come.\n\n### O smart new world\u2026\n\nThese days we're surrounded by smart devices. This includes everyday household objects such as TVs, smart meters, thermostats, baby monitors and children's toys. But it also includes cars, medical devices, CCTV cameras and parking meters. We're even seeing the emergence of smart cities. However, this offers a greater attack surface to anyone looking to take advantage of security weaknesses \u2013 for whatever purpose. Securing traditional computers is difficult. But things are more problematic with the Internet of Things, where lack of standardization leaves developers able to ignore security, or to consider it as an afterthought. There are plenty of examples to illustrate this.\n\nWe've looked before at vulnerabilities in smart devices around the home. But some of our researchers recently explored the possibility that a [smart hub might be vulnerable to attack](<https://securelist.com/iot-hack-how-to-break-a-smart-home-again/84092/>). A smart hub lets you control the operation of other smart devices in the home, receiving information and issuing commands. Smart hubs might be controlled through a touch screen, or through a mobile app or web interface. If it's vulnerable, it would potentially provide a single point of failure. While the smart hub our researchers investigated didn't contain significant vulnerabilities, there were logical mistakes that were enough to allow our researchers to obtain remote access.\n\nResearchers at Kaspersky Lab ICS CERT recently [checked a popular smart camera](<https://securelist.com/somebodys-watching-when-cameras-are-more-than-just-smart/84309/>), to see how well protected it is from hackers. Smart cameras are now part of everyday life. Many now connect to the cloud, allowing someone to monitor what's happening at a remote location \u2013to check on pets, for security surveillance, etc. The model our researchers investigated is marketed as an all-purpose tool \u2013 suitable for use as a baby monitor, or as part of a security system. The camera is able to see in the dark, follow a moving object, stream footage to a smartphone or tablet and play back sound through a built-in speaker. Unfortunately, the camera turned out to have 13 vulnerabilities \u2013 almost as many as it has features \u2013 that could allow an attacker to change the administrator password, execute arbitrary code on the device, build a botnet of compromised cameras or stop it functioning completely.\n\nBefore buying any connected device, it's important to keep security in mind.\n\n * Consider if you really need the device. If you do, check the functions available and disable any that you don't need, to reduce your attack surface.\n * Look online for information about any vulnerabilities that have been reported.\n * Check to see if it's possible to update the firmware on the device.\n * Always change the default password and replace it with a unique, complex password.\n * Don't share serial numbers, IP addresses and other sensitive data relating to the device online.\n\nYou can use the [free Kaspersky IoT Scanner](<https://www.kaspersky.com/blog/kaspersky-iot-scanner/18449/>) to check your Wi-Fi network and tell you if the devices connected to it are safe.\n\nPotential problems are not limited to consumer devices. Recently, Ido Naor, a researcher from our Global Research and Analysis Team and Amihai Neiderman, then at Azimuth Security, [discovered a vulnerability in an automation device for a gas station](<https://securelist.com/expensive-gas/83542/>). This device was directly connected to the Internet and was responsible for managing every component of the station, including fuel dispensers and payment terminals. Even more alarming, the web interface for the device was accessible with default credentials. Further investigation revealed that it was possible to shut down all fueling systems, cause fuel a leakage, change the price, circumvent the payment terminal (in order to steal money), capture vehicle license plates and driver identities, execute code on the controller unit and even move freely across the gas station network.\n\nIt's no less important for vendors to improve their security approach to ensure that security is considered when products are being designed. Kaspersky Lab, as a member of the ITU-T Study Group 20, was a contributor to the development of [Recommendation ITU-T T.4806](<https://www.itu.int/ITU-T/recommendations/rec.aspx?rec=13391&lang=en>), designed to classify security issues, examine potential threats and determine how cyber-security measures can support the safe execution of IoT systems tasks. This applies mostly to safety-critical IoT systems such as industrial automation, automotive systems, transportation, smart cities, and wearable and standalone medical devices.\n\n### IoT-medicine under siege\n\nTechnology is driving improvements in healthcare. It has the power to transform the quality and reduce the cost of health and care services. It can also give patients and citizens more control over their care, empower carers and support the development of new medicines and treatments. However, new healthcare technologies and mobile working practices are producing more data than ever before, at the same time providing more opportunities for data to be lost or stolen. We've highlighted the issues several times over the last few years \u2013 for example, in the articles '[Hospitals are under attack in 2016](<https://securelist.com/hospitals-are-under-attack-in-2016/74249/>)', '[The mistakes of smart medicine](<https://securelist.com/the-mistakes-of-smart-medicine/77855/>)' and '[Connected medicine and its diagnosis](<https://securelist.com/connected-medicine-and-its-diagnosis/81857/>)'.\n\nThe number of medical data breaches continues to increase:\n\n[](<https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/05/07110535/180507-malware-report-q1-18-5.png>)\n\nOver the last year we've continued to track the activities of cybercriminals, looking at how they penetrate medical networks, how they find data on publicly available medical resources and how they exfiltrate it. This includes open ports:\n\n[](<https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/05/07110543/180507-malware-report-q1-18-6.png>)\n\nAnd the services that sit behind them:\n\n[](<https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/05/07110553/180507-malware-report-q1-18-7.png>)\n\nMore than 60 per cent of medical organizations had some kind of malware on their computers:\n\n[](<https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/05/07110602/180507-malware-report-q1-18-8.png>)\n\nWe saw even more attacks on organizations closely connected to hospitals, clinics and doctors \u2013 that is, in the pharmaceutical industry:\n\n[](<https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/05/07110611/180507-malware-report-q1-18-9.png>)\n\nIt's vital that medical facilities remove all nodes that process personal medical data, update software and remove applications that are no longer needed, and do not connect expensive medical equipment to the main LAN. You can find more detailed tips [here](<https://securelist.com/connected-medicine-and-its-diagnosis/81857/>).\n\n### Crypto-currency mining is the new black\n\nIn the legitimate economy, capital tends to flow into areas where it will be most profitable. It's no different with cybercrime. Malware development is focused in areas that are likely to be more lucrative. So it's no surprise that, as crypto-currencies become a mainstream feature of society, we've seen a [growth in the number of malicious crypto-currency miners](<https://securelist.com/mining-is-the-new-black/84232/>). In 2017, we blocked malicious [miners](<https://securelist.com/threats/mining-cryptocurrency-glossary/ ?utm_source=securelist&utm_medium=blog&utm_campaign=termin-explanation>) on the computers of 2.7 million Kaspersky Lab customers \u2013 compared to 1.87 million in 2016. This is now beginning to eclipse ransomware as a way of making money illegally.\n\n[](<https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/05/07110622/180507-malware-report-q1-18-10.png>)\n\nAs the name suggests, crypto-currency miners are programs designed to hijack the victim's CPU in order to mine crypto-currencies. Like ransomware, the business model is simple: infect victim's computer, use the processing power of their [CPU](<https://en.wikipedia.org/wiki/Central_processing_unit>) or [GPU](<https://en.wikipedia.org/wiki/Graphics_processing_unit>) to generate coins and earn real-world money through legal exchanges and transactions. Unlike ransomware, it's not obvious to the victim that they are infected \u2013 most people seldom use most of their computer's processing power; and miners harness the 70 to 80 per cent that is not being used for anything else.\n\nCrypto-miners are installed \u2013 on the computers of consumers and businesses alike \u2013 alongside adware, cracked games and pirated content. It's becoming easy for cybercriminals to create miners, because of ready to use partner programs, open mining pools and miner-builders. Another method is web mining, where cybercriminals insert a script into a compromised web site that mines crypto-currencies while the victim browses the site. Other criminal groups are more selective, using exploits to install miners on the servers of large companies, rather than trying to infect lots of individuals.\n\nSome of the ways cybercriminals install malicious miners in the network of corporate victims are very sophisticated, resembling the methods of APT attackers. Our researchers identified a case where the attackers used a process-hollowing technique. The infection starts with the download of a potentially unwanted application (PUA) that contains the miner. This miner installer drops the legitimate Windows utility 'msiexec' with a random name, which downloads and executes a malicious module from a remote server. The next step is to install a malicious scheduler task that drops the body of the miner. This executes the legitimate system process and uses a process-hollowing technique whereby the legitimate process code is switched for malicious code. A special system critical flag is set for this new process: if the victim tries to kill this process, Windows reboots.\n\n[](<https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/05/07110631/180507-malware-report-q1-18-11.png>) \n[](<https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/05/07110639/180507-malware-report-q1-18-12.png>)\n\nUsing such techniques, we estimate that mining botnets generated more than $7,000,000 in the second half of 2017.\n\nYou can find tips on securing businesses from malicious miners [here](<https://www.kaspersky.com/blog/miners-threaten-your-business/21482/>).\n\n### Our data in their hands\n\nPersonal data is valuable. This is evident from the regular news reports of data breaches. These include the [theft of huge amounts of data](<https://www.reuters.com/article/us-under-armour-databreach/under-armour-says-150-million-myfitnesspal-accounts-breached-idUSKBN1H532W>) and the [re-use of stolen credentials](<http://www.theregister.co.uk/2018/04/11/great_western_rail_password_reset/>). However, the recent [scandal involving the use, by Cambridge Analytica, of Facebook data](<https://www.theguardian.com/commentisfree/2018/apr/16/how-many-people-data-cambridge-analytica-facebook>) is a reminder that personal information is not just valuable to cybercriminals.\n\nIn many cases, personal data is the price people pay to obtain a product or service \u2013 'free' browsers, 'free' e-mail accounts, 'free' social network accounts, etc. But not always. Increasingly, we're surrounded by smart devices that are capable of gathering details on the minutiae of our lives. Earlier this year, one [journalist turned her apartment into a smart home in order to measure how much data was being collected by the firms that made the devices](<http://www.bbc.co.uk/news/technology-43747421>). Since we generally pay for such devices, the harvesting of data can hardly be seen as the price we pay for the benefits they bring in these cases.\n\nThe issues surrounding security and privacy of data continue to make headlines, not least as we approach 25 May, 2018 and the implementation of the EU General Data Protection Regulation. It will, of course, be interesting to see what impact the legislation has. But we should not forget that we should all consider what data we share, with whom, and how it might be used. It's vital to take steps to secure our data, by using unique, complex passwords for each account and by using two-factor authentication where it's available.", "modified": "2018-05-14T10:00:08", "published": "2018-05-14T10:00:08", "id": "SECURELIST:7CF4DDEB1B5407DAA24EC25BAA7A9654", "href": "https://securelist.com/it-threat-evolution-q1-2018/85469/", "type": "securelist", "title": "IT threat evolution Q1 2018", "cvss": {"score": 4.7, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:COMPLETE/I:NONE/A:NONE/"}}], "qualysblog": [{"lastseen": "2019-01-23T20:50:13", "bulletinFamily": "blog", "cvelist": ["CVE-2017-5715", "CVE-2017-5753", "CVE-2017-5754"], "description": "UPDATE 1/4/2018: Qualys has released several QIDs for detecting missing patches for these vulnerabilities. \nUPDATE 1/5/2018: [Pre-built AssetView dashboards](<https://blog.qualys.com/technology/2018/01/05/visualizing-spectre-meltdown-impact-and-remediation-progress>) to visualize impact and remediation progress.\n\nVulnerabilities potentially impacting all major processor vendors were [disclosed today](<https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html>) by Google Project Zero. These vulnerabilities have been named [Meltdown](<https://meltdownattack.com/>) (CVE-2017-5754) and [Spectre](<https://spectreattack.com/>) (CVE-2017-5753 & CVE-2017-5715). Organizations should inventory their systems by processor type, apply vendor patches as they become available, and track their progress. This article describes how Qualys can help in all three areas. \n\n\n### Overview\n\nMeltdown allows any application to access all system memory, including memory allocated for the kernel. Mitigation for this vulnerability will require operating system patches and potentially firmware updates. Patches for this vulnerability may have a performance impact on systems. So far, only Intel chips and one ARM processor have been shown to be vulnerable. ARM has also discovered [another variant](<https://developer.arm.com/support/security-update>) (3a), which is similar to Meltdown and impacts several more of their processors.\n\nSpectre allows an application to force another application to access arbitrary portions of its memory, which can then be read through a side channel. This vulnerability will require microcode updates in order to fully mitigate, in addition to software patches. According to Google Project Zero, this vulnerability impacts Intel, AMD, and ARM chips.\n\n### Mitigations\n\nMicrosoft has [issued patches](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002>) for all supported versions of Windows. Microsoft has also issued a [guidance document](<https://support.microsoft.com/en-us/help/4073119/windows-client-guidance-for-it-pros-to-protect-against-speculative-exe>) for mitigations on client devices, and [another](<https://support.microsoft.com/en-us/help/4072698/windows-server-guidance-to-protect-against-the-speculative-execution>) for Windows servers. Please note that the patches released by Microsoft may be [incompatible](<https://support.microsoft.com/en-us/help/4072699/important-information-regarding-the-windows-security-updates-released>) with certain antivirus software.\n\nMicrocode updates have been [released by Intel](<https://newsroom.intel.com/news-releases/intel-issues-updates-protect-systems-security-exploits/>) to mitigate Spectre, and several Linux distributions have packaged the microcode in standard OS patches. It is not yet known if Microsoft will release microcode updates via Windows Update. Hardware vendors are expected to release the new microcode in the form of BIOS updates.\n\nMacOS 10.13.2 mitigates some of the disclosed vulnerabilities, but MacOS 10.13.3 will enhance or complete these mitigations.\n\nProcessor vendor links: \n[https://newsroom.intel.com/news/intel-responds-to-security-research-findings/ \n](<https://newsroom.intel.com/news/intel-responds-to-security-research-findings/>)[https://www.amd.com/en/corporate/speculative-execution \n](<https://www.amd.com/en/corporate/speculative-execution>)[https://developer.arm.com/support/security-update](<https://developer.arm.com/support/security-update>)\n\nOther software vendor patches: \n[https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html \n](<https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html>)<https://access.redhat.com/security/vulnerabilities/speculativeexecution>[ \n](<https://access.redhat.com/security/vulnerabilities/speculativeexecution>)<https://www.suse.com/support/kb/doc/?id=7022512> \n\n\n### Customers with Qualys Vulnerability Management\n\nQualys has released several QIDs that detect missing patches for these vulnerabilities across several operating systems. A list of currently-released QIDs is being maintained in this [Qualys Support article](<https://qualys.secure.force.com/articles/How_To/000002746>). The QIDs are supported by both authenticated scanning and the [Qualys Cloud Agent](<https://www.qualys.com/cloud-agent/>).\n\nTo determine processor type, you can search the results of these QIDs:\n\n * QID 43113 : Processor Information for Windows Target System\n * QID 43110 : Apple Macintosh Processor Architecture\n * QID 115048 : Processor Information for Unix Target\n * QID 45177 : Processor Information for Solaris Target\n\nThe [Qualys Cloud Agent](<https://www.qualys.com/cloud-agent/>) can be used to determine processor types by searching with AssetView on the processors.description field like this:\n \n \n processors.description:intel or processors.description:amd\n\nThe results can also be grouped by processor type:\n\n\n\n### Get Started Now\n\nTo start detecting and protecting against critical vulnerabilities, get a [Qualys Suite trial](<https://www.qualys.com/forms/trials/suite?utm_source=blog&utm_medium=website&utm_campaign=demand-gen&utm_term=petya-q2-2017&utm_content=trial&leadsource=344554400>). All features described in this article are available in the trial.", "modified": "2018-01-04T02:17:43", "published": "2018-01-04T02:17:43", "id": "QUALYSBLOG:C9F2432F760D960CF69CDC55D87263A8", "href": "https://blog.qualys.com/securitylabs/2018/01/03/processor-vulnerabilities-meltdown-and-spectre", "type": "qualysblog", "title": "Processor Vulnerabilities \u2013 Meltdown and Spectre", "cvss": {"score": 4.7, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:COMPLETE/I:NONE/A:NONE/"}}, {"lastseen": "2019-01-23T20:50:13", "bulletinFamily": "blog", "cvelist": ["CVE-2017-5715", "CVE-2017-5753", "CVE-2017-5754"], "description": "IT departments and tech vendors continued grappling with Spectre and Meltdown this week, as Intel pulled its glitchy patches and the U.S. Congress questioned the vulnerability disclosures' timing and scope.\n\nSpectre and Meltdown aren't typical vulnerabilities for a number of reasons, and as a result, they've proven problematic to deal with. Intel, whose products are the most impacted, has had a particularly rocky time crafting its firmware updates for mitigating the bugs.\n\nAfter receiving multiple complaints from customers, in particular data center operators, that the firmware updates for Broadwell and Haswell CPUs were causing systems to unexpectedly reboot, Intel on Monday [finally deep-sixed them](<https://www.theverge.com/2018/1/22/16919426/intel-advises-pause-deployment-of-spectre-patch>).\n\n\"We recommend that OEMs, cloud service providers, system manufacturers, software vendors and end users stop deployment of current versions, as they may introduce higher than expected reboots and other unpredictable system behavior,\" Navin Shenoy, executive vice president and general manager of Intel's Data Center Group, [wrote](<https://newsroom.intel.com/news/root-cause-of-reboot-issue-identified-updated-guidance-for-customers-and-partners/>) in a blog post.\n\nThe silver lining is that, according to Shenoy, Intel has discovered the \"root cause\" for the firmware's problems, and is actively developing new updates that it's already testing.\n\nMeanwhile, the U.S. Congress' House Energy and Commerce Committee [said on Wednesday](<https://energycommerce.house.gov/news/letter/letter-tech-companies-meltdown-spectre-vulnerabilities/>) it wants to know why a small group of tech vendors kept the information about Spectre and Meltdown secret for months -- between the vulnerabilities' discovery in June and their public disclosure on Jan. 3rd.\n\nThe [committee sent letters](<https://energycommerce.house.gov/wp-content/uploads/2018/01/Meltdown-Spectre-Letters.pdf>) to the CEOs of Apple, Amazon, AMD, ARM, Google, Intel and Microsoft, stating that \"this situation has shown the need for additional scrutiny regarding multi-party coordinated vulnerability disclosures.\"\n\n[](<https://energycommerce.house.gov/wp-content/uploads/2018/01/Meltdown-Spectre-Letters.pdf>)_Congress wants to know why several major tech companies kept Spectre and Meltdown secret for months._\n\nThe letter goes on to say that \"cybersecurity is a collective responsibility,\" and that it's no longer limited to the IT industry, given that now there are Internet-connected products in many other sectors, including utilities, healthcare and manufacturing.\n\nSigned by U.S. Rep. Greg Walden, a Republican from Oregon and committee chairman, and by three other members, the letter asks, among other things, why the information was kept confidential, which company or companies proposed this information embargo, and when was the US-CERT (United States Computer Emergency Readiness Team) notified.\n\nThe CEOs, which have until Feb. 7 to respond, also must say whether they took into account the [potential negative impacts of the information embargo](<http://www.zdnet.com/article/meltdown-spectre-why-were-flaws-kept-secret-from-industry-demand-lawmakers/>) on critical infrastructure sectors and on individual companies that were kept in the dark.\n\n### The Lowdown on Meltdown and Spectre\n\nThe main reasons that set Meltdown and Spectre apart from most vulnerabilities are that they're [hardware flaws](<http://www.zdnet.com/article/spectre-and-meltdown-insecurity-at-the-heart-of-modern-cpu-design/>), and that their scope is massive, affecting most Intel CPUs released in the past 20 years, as well as a smaller quantity of ARM and AMD CPUs.\n\nMeltdown (CVE-2017-5754) provides access to all physical memory, including kernel memory, via a user mode, ring 3 process, so that \"any process running in the system can access all the contents of physical memory,\" as Qualys Product Management Director Jimmy Graham [said recently](<https://blog.qualys.com/news/2018/01/18/meltdown-and-spectre-arent-business-as-usual>) during a [webcast](<https://www.qualys.com/webcasts/avoid-meltdown-from-the-spectre/?utm_source=blog&utm_medium=website&utm_campaign=demand-gen&utm_term=cpu-vulns-q1-2018&utm_content=webcast&leadsource=344564522&_ga=2.6893298.1521544503.1516629975-480546418.1484260199>).\n\nAttackers could steal passwords, grab private keys and do whatever necessary to escalate their system privileges to administrator levels. \"Anything that can be stored in memory can be accessed through Meltdown,\" Graham said.\n\nMeanwhile, Spectre (CVE-2017-5753, CVE-2017-5715) impacts Intel, AMD, and ARM CPUs by abusing branch prediction and speculative execution, resulting in data leakage from compromised processes. \"An attacker process on a system can access the memory contents of other process, and can include kernel memory in some circumstances,\" Graham said.\n\n### Tips, Best Practices and Resources\n\nGraham offered the following recommendations for managing the Spectre and Meltdown mitigation process.\n\n * Detect vulnerable assets using [Qualys Vulnerability Management](<https://www.qualys.com/apps/vulnerability-management/>) authenticated scans or with [Qualys Cloud Agents](<https://www.qualys.com/cloud-agent/>). It's crucial to have a clear idea of how many impacted systems are in your environment, which vulnerabilities you have, and which patches have been applied.\n * Prioritize patching e\ufb00orts based on asset risk and exposure. If you can't install the microcode patches because they're problematic or non-existent at this point, focus on the OS and browser patches. \"For workstation type devices, I'd focus on patching the underlying OS, because performance concerns are not as great, compared to servers, and patch the browsers as well to start enabling some of these mitigations,\" Graham said.\n * Test and test again. \"Everything needs to be tested. These patches are not simple software patches that we've seen previously. These are fundamental changes to how the kernel is treated in Linux and in Windows,\" he said.\n * Tests should go beyond simply verifying that updates and patches they've been successfully installed. You must test workloads on servers. \"You don't want to be blindly installing these patches on very critical database systems without testing them with some kind of load,\" Graham said.\n * Make sure third-party antivirus software is up to date.\n * Install browser patches for workstation type-devices.\n * Patch virtual systems such as Xen and VMWare.\n * Patch Windows workstations and servers with the most recent January patches.\n * Install microcode packages for Linux and BIOS updates for Windows\n\nQualys now has[ more than 75 QIDs](<https://qualys.secure.force.com/articles/How_To/000002746>) to determine the patch state for Spectre and Meltdown. Qualys provides both agentless scanning and agent-based detections, so you can use the most appropriate method for any given IT asset.\n\nIn addition, Qualys recently rolled out a [pre-built Spectre/Meltdown Dashboard](<https://blog.qualys.com/technology/2018/01/05/visualizing-spectre-meltdown-impact-and-remediation-progress>) to give you visibility into the remediation progress. It can be downloaded from [the Qualys Community site](<https://community.qualys.com/docs/DOC-6318?_ga=2.205535891.1692265757.1516114034-480546418.1484260199>).\n\n\n\nYou can also find detailed and illustrated instructions on how to create Qualys Search Lists, Scan Option Profiles, Remediation Tracking and Patch Reports for Spectre and Meltdown [in this article](<https://community.qualys.com/docs/DOC-6331>) published to our community site by Debra M. Fezza Reed, Qualys' Product Manager for Reporting.\n\nGraham's [webcast](<https://www.qualys.com/webcasts/avoid-meltdown-from-the-spectre/?utm_source=blog&utm_medium=website&utm_campaign=demand-gen&utm_term=cpu-vulns-q1-2018&utm_content=webcast&leadsource=344564522&_ga=2.6893298.1521544503.1516629975-480546418.1484260199>) also includes a demo of the new Spectre/Meltdown dashboard, and his answers to questions from the audience.", "modified": "2018-01-26T15:16:00", "published": "2018-01-26T15:16:00", "id": "QUALYSBLOG:D893D4DFB7141FDAD0BE869440074392", "href": "https://blog.qualys.com/news/2018/01/26/meltdown-spectre-intel-nixes-patches-tech-ceos-questioned-on-information-blackout", "type": "qualysblog", "title": "Meltdown/Spectre: Intel Nixes Patches, Tech CEOs Questioned on Information Blackout", "cvss": {"score": 4.7, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:COMPLETE/I:NONE/A:NONE/"}}], "redhat": [{"lastseen": "2019-08-13T18:45:44", "bulletinFamily": "unix", "cvelist": ["CVE-2017-5715", "CVE-2017-5753", "CVE-2017-5754"], "description": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: cpu: speculative execution branch target injection (s390-only) (CVE-2017-5715, Important)\n\n* hw: cpu: speculative execution bounds-check bypass (s390 and powerpc) (CVE-2017-5753, Important)\n\n* hw: cpu: speculative execution permission faults handling (powerpc-only) (CVE-2017-5754)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fixes:\n\n* If a fibre channel (FC) switch was powered down and then powered on again, the SCSI device driver stopped permanently the SCSI device's request queue. Consequently, the FC port login failed, leaving the port state as \"Bypassed\" instead of \"Online\", and users had to reboot the operating system. This update fixes the driver to avoid the permanent stop of the request queue. As a result, SCSI device now continues working as expected after power cycling the FC switch. (BZ#1519857)\n\n* Previously, on final close or unlink of a file, the find_get_pages() function in the memory management sometimes found no pages even if there were some pages left to save. Consequently, a kernel crash occurred when attempting to enter the unlink() function. This update fixes the find_get_pages() function in the memory management code to not return 0 too early. As a result, the kernel no longer crashes due to this behavior.(BZ#1527811)\n\n* Using IPsec connections under a heavy load could previously lead to a network performance degradation, especially when using the aesni-intel module. This update fixes the issue by making the cryptd queue length configurable so that it can be increased to prevent an overflow and packet drop. As a result, using IPsec under a heavy load no longer reduces network performance. (BZ#1527802)\n\n* Previously, a deadlock in the bnx2fc driver caused all adapters to block and the SCSI error handler to become unresponsive. As a result, data transferring through the adapter was sometimes blocked. This update fixes bnx2fc, and data transferring through the adapter is no longer blocked due to this behavior. (BZ#1523783)\n\n* If an NFSv3 client mounted a subdirectory of an exported file system, a directory entry to the mount hosting the export was incorrectly held even after clearing the cache. Consequently, attempts to unmount the subdirectory with the umount command failed with the EBUSY error. With this update, the underlying source code has been fixed, and the unmount operation now succeeds as expected in the described situation. (BZ#1535938)\n\nUsers of kernel are advised to upgrade to these updated packages, which fix these bugs. The system must be rebooted for this update to take effect.", "modified": "2018-06-07T18:22:00", "published": "2018-03-13T21:31:28", "id": "RHSA-2018:0512", "href": "https://access.redhat.com/errata/RHSA-2018:0512", "type": "redhat", "title": "(RHSA-2018:0512) Important: kernel security and bug fix update", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-08-13T18:47:15", "bulletinFamily": "unix", "cvelist": ["CVE-2017-5715", "CVE-2017-5753", "CVE-2017-5754"], "description": "The rhev-hypervisor7 package provides a Red Hat Enterprise Virtualization Hypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor is a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes everything necessary to run and manage virtual machines: A subset of the Red Hat Enterprise Linux operating environment and the Red Hat Enterprise Virtualization Agent.\n\nSecurity Fix(es):\n\nAn industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited.\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty. Please refer to References section for further information about this issue and the performance impact.\n\nVariant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5753, Important)\n\nVariant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important)\n\nVariant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754, Important)\n\nNote: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.\n\nRed Hat would like to thank Google Project Zero for reporting these issues.", "modified": "2018-01-05T20:40:16", "published": "2018-01-05T20:35:57", "id": "RHSA-2018:0046", "href": "https://access.redhat.com/errata/RHSA-2018:0046", "type": "redhat", "title": "(RHSA-2018:0046) Important: rhev-hypervisor7 security update", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-08-13T18:46:57", "bulletinFamily": "unix", "cvelist": ["CVE-2017-5715", "CVE-2017-5753", "CVE-2017-5754"], "description": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\nAn industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited.\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty. Please refer to References section for further information about this issue and the performance impact.\n\nIn this update mitigations for x86-64 architecture are provided.\n\nVariant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5753, Important)\n\nVariant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important)\n\nVariant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754, Important)\n\nNote: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.\n\nRed Hat would like to thank Google Project Zero for reporting these issues.", "modified": "2018-01-04T21:24:31", "published": "2018-01-04T21:02:23", "id": "RHSA-2018:0022", "href": "https://access.redhat.com/errata/RHSA-2018:0022", "type": "redhat", "title": "(RHSA-2018:0022) Important: kernel security update", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-05-29T14:34:26", "bulletinFamily": "unix", "cvelist": ["CVE-2017-5715", "CVE-2017-5753", "CVE-2017-5754"], "description": "The kernel packages contain the Linux kernel, the core of any Linux operating system. CloudForms virtual machines include a copy of the Linux Kernel.\n\nSecurity Fix(es):\n\nAn industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited.\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty. Please refer to References section for further information about this issue and the performance impact.\n\nIn this update mitigations for x86-64 architecture are provided.\n\nVariant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5753, Important)\n\nVariant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important)\n\nVariant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754, Important)\n\nNote: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.\n\nRed Hat would like to thank Google Project Zero for reporting these issues.", "modified": "2018-01-16T02:33:52", "published": "2018-01-16T02:33:25", "id": "RHSA-2018:0091", "href": "https://access.redhat.com/errata/RHSA-2018:0091", "type": "redhat", "title": "(RHSA-2018:0091) Important: Red Hat CloudForms 4.5 security update", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-08-13T18:46:39", "bulletinFamily": "unix", "cvelist": ["CVE-2017-5715", "CVE-2017-5753", "CVE-2017-5754"], "description": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\nAn industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited.\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty. Please refer to References section for further information about this issue and the performance impact.\n\nIn this update mitigations for x86-64 architecture are provided.\n\nVariant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5753, Important)\n\nVariant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important)\n\nVariant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754, Important)\n\nNote: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.\n\nRed Hat would like to thank Google Project Zero for reporting these issues.", "modified": "2018-01-04T03:42:21", "published": "2018-01-04T03:33:58", "id": "RHSA-2018:0010", "href": "https://access.redhat.com/errata/RHSA-2018:0010", "type": "redhat", "title": "(RHSA-2018:0010) Important: kernel security update", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-08-13T18:45:05", "bulletinFamily": "unix", "cvelist": ["CVE-2017-5715", "CVE-2017-5753", "CVE-2017-5754"], "description": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\nAn industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited.\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty. Please refer to References section for further information about this issue and the performance impact.\n\nIn this update, mitigations for x86 (CVE-2017-5753) and x86-64 (CVE-2017-5753, CVE-2017-5715, and CVE-2017-5754) architectures are provided.\n\nVariant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5753, Important)\n\nVariant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important)\n\nVariant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754, Important)\n\nNote: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.\n\nRed Hat would like to thank Google Project Zero for reporting these issues.", "modified": "2019-01-23T15:53:30", "published": "2018-01-04T03:31:17", "id": "RHSA-2018:0008", "href": "https://access.redhat.com/errata/RHSA-2018:0008", "type": "redhat", "title": "(RHSA-2018:0008) Important: kernel security update", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-08-13T18:46:11", "bulletinFamily": "unix", "cvelist": ["CVE-2017-5715", "CVE-2017-5753", "CVE-2017-5754"], "description": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\nAn industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited.\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty. Please refer to References section for further information about this issue and the performance impact.\n\nIn this update mitigations for x86-64 architecture are provided.\n\nVariant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5753, Important)\n\nVariant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important)\n\nVariant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754, Important)\n\nNote: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.\n\nRed Hat would like to thank Google Project Zero for reporting these issues.", "modified": "2018-06-07T18:14:46", "published": "2018-01-04T21:01:58", "id": "RHSA-2018:0021", "href": "https://access.redhat.com/errata/RHSA-2018:0021", "type": "redhat", "title": "(RHSA-2018:0021) Important: kernel-rt security update", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-08-13T18:45:27", "bulletinFamily": "unix", "cvelist": ["CVE-2017-5715", "CVE-2017-5753", "CVE-2017-5754"], "description": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\nAn industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited.\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty. Please refer to References section for further information about this issue and the performance impact.\n\nIn this update mitigations for x86-64 architecture are provided.\n\nVariant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5753, Important)\n\nVariant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important)\n\nVariant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754, Important)\n\nNote: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.\n\nRed Hat would like to thank Google Project Zero for reporting these issues.", "modified": "2018-01-04T03:46:07", "published": "2018-01-04T03:33:10", "id": "RHSA-2018:0009", "href": "https://access.redhat.com/errata/RHSA-2018:0009", "type": "redhat", "title": "(RHSA-2018:0009) Important: kernel security update", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-08-13T18:45:44", "bulletinFamily": "unix", "cvelist": ["CVE-2017-5715", "CVE-2017-5753", "CVE-2017-5754"], "description": "The ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks.\n\nSecurity Fix(es):\n\nAn industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited.\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty. Please refer to References section for further information about this issue and the performance impact.\n\nVariant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5753, Important)\n\nVariant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important)\n\nVariant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754, Important)\n\nNote: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.\n\nRed Hat would like to thank Google Project Zero for reporting these issues.", "modified": "2018-01-05T20:37:28", "published": "2018-01-05T20:36:05", "id": "RHSA-2018:0047", "href": "https://access.redhat.com/errata/RHSA-2018:0047", "type": "redhat", "title": "(RHSA-2018:0047) Important: redhat-virtualization-host security update", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-09-05T08:47:48", "bulletinFamily": "unix", "cvelist": ["CVE-2017-5715", "CVE-2017-5753", "CVE-2017-5754"], "description": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\nAn industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited.\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty. Please refer to References section for further information about this issue and the performance impact.\n\nIn this update mitigations for IBM zSeries (S390), x86, and x86-64 architectures are provided.\n\n* Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5753, Important, S390, x86, and x86-64)\n\n* Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important, S390)\n\n* Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754, Important, x86-64)\n\nRed Hat would like to thank Google Project Zero for reporting these issues.", "modified": "2019-09-05T11:37:01", "published": "2018-02-09T17:32:30", "id": "RHSA-2018:0292", "href": "https://access.redhat.com/errata/RHSA-2018:0292", "type": "redhat", "title": "(RHSA-2018:0292) Important: kernel security update", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}], "suse": [{"lastseen": "2018-01-17T00:53:11", "bulletinFamily": "unix", "cvelist": ["CVE-2017-5753", "CVE-2017-5754", "CVE-2017-5715"], "description": "The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various\n security and bugfixes.\n\n This update is only provided as a fix update for IBM Z platform.\n\n - CVE-2017-5753 / "Spectre Attack": IBM Z fixes were included but not\n enabled in the previous update. This update enables those fixes.\n - CVE-2017-5715 / "Spectre Attack": IBM Z fixes were already included in\n the previous update. A bugfix for the patches has been applied on top.\n - CVE-2017-5754: The IBM Z architecture is not affected by the "Meltdown"\n attack.\n\n", "edition": 1, "modified": "2018-01-16T21:08:19", "published": "2018-01-16T21:08:19", "href": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00043.html", "id": "SUSE-SU-2018:0113-1", "title": "Security update for the Linux Kernel (important)", "type": "suse", "cvss": {"score": 4.7, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:COMPLETE/I:NONE/A:NONE/"}}, {"lastseen": "2018-01-17T00:53:11", "bulletinFamily": "unix", "cvelist": ["CVE-2017-5753", "CVE-2017-5754", "CVE-2017-5715"], "description": "The SUSE Linux Enterprise 12 SP1 LTSS kernel was updated to receive\n various security and bugfixes.\n\n This update is only provided as a fix update for IBM Z platform.\n\n - CVE-2017-5753 / "Spectre Attack": IBM Z fixes were included but not\n enabled in the previous update. This update enables those fixes.\n - CVE-2017-5715 / "Spectre Attack": IBM Z fixes were already included in\n the previous update. A bugfix for the patches has been applied on top.\n - CVE-2017-5754: The IBM Z architecture is not affected by the "Meltdown"\n attack.\n\n", "edition": 1, "modified": "2018-01-16T21:08:59", "published": "2018-01-16T21:08:59", "href": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00044.html", "id": "SUSE-SU-2018:0114-1", "title": "Security update for the Linux Kernel (important)", "type": "suse", "cvss": {"score": 4.7, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:COMPLETE/I:NONE/A:NONE/"}}, {"lastseen": "2018-01-11T22:52:40", "bulletinFamily": "unix", "cvelist": ["CVE-2017-5753", "CVE-2017-5754", "CVE-2017-5715"], "description": "The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various\n security and bugfixes.\n\n This update is only provided as a fix update for IBM Z platform.\n\n - CVE-2017-5753 / "Spectre Attack": IBM Z fixes were included but not\n enabled in the previous update. This update enables those fixes.\n - CVE-2017-5715 / "Spectre Attack": IBM Z fixes were already included in\n the previous update. A bugfix for the patches has been applied on top.\n - CVE-2017-5754: The IBM Z architecture is not affected by the "Meltdown"\n attack.\n\n", "edition": 1, "modified": "2018-01-11T18:10:26", "published": "2018-01-11T18:10:26", "href": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00034.html", "id": "SUSE-SU-2018:0069-1", "type": "suse", "title": "Security update for the Linux Kernel (important)", "cvss": {"score": 4.7, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:COMPLETE/I:NONE/A:NONE/"}}, {"lastseen": "2018-01-22T18:53:35", "bulletinFamily": "unix", "cvelist": ["CVE-2017-5753", "CVE-2017-5754", "CVE-2017-5715"], "description": "The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive\n various security and bugfixes.\n\n This update is only provided as a fix update for IBM Z platform.\n\n - CVE-2017-5753 / "Spectre Attack": IBM Z fixes were included but not\n enabled in the previous update. This update enables those fixes.\n - CVE-2017-5715 / "Spectre Attack": IBM Z fixes were already included in\n the previous update. A bugfix for the patches has been applied on top.\n - CVE-2017-5754: The IBM Z architecture is not affected by the "Meltdown"\n attack.\n\n", "edition": 1, "modified": "2018-01-22T15:08:49", "published": "2018-01-22T15:08:49", "href": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00051.html", "id": "SUSE-SU-2018:0171-1", "title": "Security update for the Linux Kernel (important)", "type": "suse", "cvss": {"score": 4.7, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:COMPLETE/I:NONE/A:NONE/"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:39:29", "bulletinFamily": "unix", "cvelist": ["CVE-2017-5753", "CVE-2017-5754", "CVE-2017-5715"], "description": "kernel-uek\n[4.1.12-94.7.8]\n- x86/pti/efi: broken conversion from efi to kernel page table (Pavel Tatashin) [Orabug: 27378087] [Orabug: 27352353] {CVE-2017-5754}\n- x86/spec: Always set IBRS to guest value on VMENTER and host on VMEXIT (redux) (Konrad Rzeszutek Wilk) [Orabug: 27378074] \n- x86/IBRS: Make sure we restore MSR_IA32_SPEC_CTRL to a valid value (Boris Ostrovsky) [Orabug: 27378063] \n- x86/IBRS/IBPB: Set sysctl_ibrs/ibpb_enabled properly (Boris Ostrovsky) [Orabug: 27378035] \n- x86/spec_ctrl: Add missing 'lfence' when IBRS is not supported. (Konrad Rzeszutek Wilk) [Orabug: 27345388] {CVE-2017-5715}\n- x86/entry_64: TRACE_IRQS_OFF before re-enabling. (Jamie Iles) [Orabug: 27345388] {CVE-2017-5715}\n- ptrace: remove unlocked RCU dereference. (Jamie Iles) [Orabug: 27345388] {CVE-2017-5715}\n- x86/ia32: Adds code hygiene for 32bit SYSCALL instruction entry. (Konrad Rzeszutek Wilk) [Orabug: 27345388] {CVE-2017-5715}\n- x86/ia32: dont save registers on audit call (Konrad Rzeszutek Wilk) [Orabug: 27345388] {CVE-2017-5715}\n- x86/spec/ia32: Sprinkle IBRS and RSB at the 32-bit SYSCALL (Konrad Rzeszutek Wilk) [Orabug: 27345388] {CVE-2017-5715}\n- x86/ia32: Move STUFF_RSB And ENABLE_IBRS (Konrad Rzeszutek Wilk) [Orabug: 27345388] {CVE-2017-5715}\n[4.1.12-94.7.7]\n- x86/spec: Always set IBRS to guest value on VMENTER and host on VMEXIT. (Konrad Rzeszutek Wilk) [Orabug: 27365568] {CVE-2017-5715}\n- x86/ia32: save and clear registers on syscall. (Jamie Iles) [Orabug: 27364707] {CVE-2017-5754}\n- x86/IBRS: Save current status of MSR_IA32_SPEC_CTRL (Boris Ostrovsky) [Orabug: 27364720] \n- pti: Rename X86_FEATURE_KAISER to X86_FEATURE_PTI (Pavel Tatashin) [Orabug: 27358615] {CVE-2017-5754}\n- x86/spec_ctrl: Add missing IBRS_DISABLE (Konrad Rzeszutek Wilk) \n- Make use of ibrs_inuse consistent. (Jun Nakajima) \n- x86/kvm: Set IBRS on VMEXIT if guest disabled it. (Konrad Rzeszutek Wilk) \n- Re-introduce clearing of r12-15, rbp, rbx (Kris Van Hees) [Orabug: 27345388] {CVE-2017-5715}\n- x86: more ibrs/pti fixes (Pavel Tatashin) [Orabug: 27358615] {CVE-2017-5754}\n- x86/spec: Actually do the check for in_use on ENABLE_IBRS (Konrad Rzeszutek Wilk) {CVE-2017-5715}\n- kvm: svm: Expose the CPUID.0x80000008 ebx flag. (Konrad Rzeszutek Wilk) {CVE-2017-5715}\n- x86/spec_ctrl: Provide the sysfs version of the ibrs_enabled (Konrad Rzeszutek Wilk) {CVE-2017-5715}\n- x86: Use better #define for FEATURE_ENABLE_IBRS and 0 (Konrad Rzeszutek Wilk) {CVE-2017-5715}\n- x86: Instead of 0x2, 0x4, and 0x1 use #defines. (Konrad Rzeszutek Wilk) {CVE-2017-5715}\n- kpti: Disable when running under Xen PV (Konrad Rzeszutek Wilk) [Orabug: 27358615] {CVE-2017-5754}\n- x86: Dont ENABLE_IBRS in nmi when we are still running on user cr3 (Konrad Rzeszutek Wilk) {CVE-2017-5715}\n- x86/enter: Use IBRS on syscall and interrupts - fix ia32 path (Konrad Rzeszutek Wilk) {CVE-2017-5715}\n- x86: Fix spectre/kpti integration (Konrad Rzeszutek Wilk) [Orabug: 27358615] {CVE-2017-5754}\n- PTI: unbreak EFI old_memmap (Jiri Kosina) [Orabug: 27358615] {CVE-2017-5754}\n- KAISER KABI tweaks. (Martin K. Petersen) [Orabug: 27358615] {CVE-2017-5754}\n- x86/ldt: fix crash in ldt freeing. (Jamie Iles) [Orabug: 27358615] {CVE-2017-5754}\n- x86/entry: Define 'cpu_current_top_of_stack' for 64-bit code (Denys Vlasenko) [Orabug: 27358615] {CVE-2017-5754}\n- x86/entry: Remove unused 'kernel_stack' per-cpu variable (Denys Vlasenko) [Orabug: 27358615] {CVE-2017-5754}\n- x86/entry: Stop using PER_CPU_VAR(kernel_stack) (Denys Vlasenko) [Orabug: 27358615] {CVE-2017-5754}\n- kaiser: Set _PAGE_NX only if supported (Guenter Roeck) [Orabug: 27358615] {CVE-2017-5754}\n- x86/vdso: Get pvclock data from the vvar VMA instead of the fixmap (Andy Lutomirski) [Orabug: 27358615] {CVE-2017-5754}\n- KPTI: Report when enabled (Kees Cook) [Orabug: 27358615] {CVE-2017-5754}\n- KPTI: Rename to PAGE_TABLE_ISOLATION (Kees Cook) [Orabug: 27358615] {CVE-2017-5754}\n- x86/kaiser: Move feature detection up (Borislav Petkov) [Orabug: 27358615] {CVE-2017-5754}\n- x86/kaiser: Reenable PARAVIRT (Borislav Petkov) [Orabug: 27358615] {CVE-2017-5754}\n- x86/paravirt: Dont patch flush_tlb_single (Thomas Gleixner) [Orabug: 27358615] {CVE-2017-5754}\n- kaiser: kaiser_flush_tlb_on_return_to_user() check PCID (Hugh Dickins) [Orabug: 27358615] {CVE-2017-5754}\n- kaiser: asm/tlbflush.h handle noPGE at lower level (Hugh Dickins) [Orabug: 27358615] {CVE-2017-5754}\n- kaiser: drop is_atomic arg to kaiser_pagetable_walk() (Hugh Dickins) [Orabug: 27358615] {CVE-2017-5754}\n- kaiser: use ALTERNATIVE instead of x86_cr3_pcid_noflush (Hugh Dickins) [Orabug: 27358615] {CVE-2017-5754}\n- x86/kaiser: Check boottime cmdline params (Borislav Petkov) [Orabug: 27358615] {CVE-2017-5754}\n- x86/kaiser: Rename and simplify X86_FEATURE_KAISER handling (Borislav Petkov) [Orabug: 27358615] {CVE-2017-5754}\n- kaiser: add 'nokaiser' boot option, using ALTERNATIVE (Hugh Dickins) [Orabug: 27358615] {CVE-2017-5754}\n- kaiser: fix unlikely error in alloc_ldt_struct() (Hugh Dickins) [Orabug: 27358615] {CVE-2017-5754}\n- kaiser: _pgd_alloc() without __GFP_REPEAT to avoid stalls (Hugh Dickins) [Orabug: 27358615] {CVE-2017-5754}\n- kaiser: paranoid_entry pass cr3 need to paranoid_exit (Hugh Dickins) [Orabug: 27358615] {CVE-2017-5754}\n- kaiser: x86_cr3_pcid_noflush and x86_cr3_pcid_user (Hugh Dickins) [Orabug: 27358615] {CVE-2017-5754}\n- kaiser: PCID 0 for kernel and 128 for user (Hugh Dickins) [Orabug: 27358615] {CVE-2017-5754}\n- kaiser: load_new_mm_cr3() let SWITCH_USER_CR3 flush user (Hugh Dickins) [Orabug: 27358615] {CVE-2017-5754}\n- kaiser: enhanced by kernel and user PCIDs (Dave Hansen) [Orabug: 27358615] {CVE-2017-5754}\n- kaiser: vmstat show NR_KAISERTABLE as nr_overhead (Hugh Dickins) [Orabug: 27358615] {CVE-2017-5754}\n- kaiser: delete KAISER_REAL_SWITCH option (Hugh Dickins) [Orabug: 27358615] {CVE-2017-5754}\n- kaiser: name that 0x1000 KAISER_SHADOW_PGD_OFFSET (Hugh Dickins) [Orabug: 27358615] {CVE-2017-5754}\n- kaiser: cleanups while trying for gold link (Hugh Dickins) [Orabug: 27358615] {CVE-2017-5754}\n- kaiser: kaiser_remove_mapping() move along the pgd (Hugh Dickins) [Orabug: 27358615] {CVE-2017-5754}\n- kaiser: tidied up kaiser_add/remove_mapping slightly (Hugh Dickins) [Orabug: 27358615] {CVE-2017-5754}\n- kaiser: tidied up asm/kaiser.h somewhat (Hugh Dickins) [Orabug: 27358615] {CVE-2017-5754}\n- kaiser: ENOMEM if kaiser_pagetable_walk() NULL (Hugh Dickins) [Orabug: 27358615] {CVE-2017-5754}\n- kaiser: fix perf crashes (Hugh Dickins) [Orabug: 27358615] {CVE-2017-5754}\n- kaiser: fix regs to do_nmi() ifndef CONFIG_KAISER (Hugh Dickins) [Orabug: 27358615] {CVE-2017-5754}\n- kaiser: KAISER depends on SMP (Hugh Dickins) [Orabug: 27358615] {CVE-2017-5754}\n- kaiser: fix build and FIXME in alloc_ldt_struct() (Hugh Dickins) [Orabug: 27358615] {CVE-2017-5754}\n- kaiser: stack map PAGE_SIZE at THREAD_SIZE-PAGE_SIZE (Hugh Dickins) [Orabug: 27358615] {CVE-2017-5754}\n- kaiser: do not set _PAGE_NX on pgd_none (Hugh Dickins) [Orabug: 27358615] {CVE-2017-5754}\n- kaiser: merged update (Dave Hansen) [Orabug: 27358615] {CVE-2017-5754}\n- KAISER: Kernel Address Isolation (Richard Fellner) [Orabug: 27358615] {CVE-2017-5754}\n- x86/boot: Add early cmdline parsing for options with arguments (Tom Lendacky) [Orabug: 27358615] {CVE-2017-5754}\n- x86/mm/64: Fix reboot interaction with CR4.PCIDE (Andy Lutomirski) [Orabug: 27358615] {CVE-2017-5754}\n- x86/mm: Enable CR4.PCIDE on supported systems (Andy Lutomirski) [Orabug: 27358615] {CVE-2017-5754}\n- x86/mm: Add the 'nopcid' boot option to turn off PCID (Andy Lutomirski) [Orabug: 27358615] {CVE-2017-5754}\n- x86/mm: Disable PCID on 32-bit kernels (Andy Lutomirski) [Orabug: 27358615] {CVE-2017-5754}\n- x86/mm: Remove the UP asm/tlbflush.h code, always use the (formerly) SMP code (Andy Lutomirski) [Orabug: 27358615] {CVE-2017-5754}\n- x86/mm: Reimplement flush_tlb_page() using flush_tlb_mm_range() (Andy Lutomirski) [Orabug: 27358615] {CVE-2017-5754}\n- x86/mm: Make flush_tlb_mm_range() more predictable (Andy Lutomirski) [Orabug: 27358615] {CVE-2017-5754}\n- x86/mm: Remove flush_tlb() and flush_tlb_current_task() (Andy Lutomirski) [Orabug: 27358615] {CVE-2017-5754}\n- x86/vm86/32: Switch to flush_tlb_mm_range() in mark_screen_rdonly() (Andy Lutomirski) [Orabug: 27358615] {CVE-2017-5754}\n- x86/irq: Do not substract irq_tlb_count from irq_call_count (Aaron Lu) [Orabug: 27358615] {CVE-2017-5754}\n- sched/core: Idle_task_exit() shouldnt use switch_mm_irqs_off() (Andy Lutomirski) [Orabug: 27358615] {CVE-2017-5754}\n- ARM: Hide finish_arch_post_lock_switch() from modules (Steven Rostedt) [Orabug: 27358615] {CVE-2017-5754}\n- x86/mm, sched/core: Turn off IRQs in switch_mm() (Andy Lutomirski) [Orabug: 27358615] {CVE-2017-5754}\n- x86/mm, sched/core: Uninline switch_mm() (Andy Lutomirski) [Orabug: 27358615] {CVE-2017-5754}\n- x86/mm: Build arch/x86/mm/tlb.c even on !SMP (Andy Lutomirski) [Orabug: 27358615] {CVE-2017-5754}\n- sched/core: Add switch_mm_irqs_off() and use it in the scheduler (Andy Lutomirski) [Orabug: 27358615] {CVE-2017-5754}\n- mm/mmu_context, sched/core: Fix mmu_context.h assumption (Ingo Molnar) [Orabug: 27358615] {CVE-2017-5754}\n- x86/mm: If INVPCID is available, use it to flush global mappings (Andy Lutomirski) [Orabug: 27358615] {CVE-2017-5754}\n- x86/mm: Add a 'noinvpcid' boot option to turn off INVPCID (Andy Lutomirski) [Orabug: 27358615] {CVE-2017-5754}\n- x86/mm: Fix INVPCID asm constraint (Borislav Petkov) [Orabug: 27358615] {CVE-2017-5754}\n- x86/mm: Add INVPCID helpers (Andy Lutomirski) [Orabug: 27358615] {CVE-2017-5754}\n[4.1.12-94.7.6]\n- x86/ibrs: Remove 'ibrs_dump' and remove the pr_debug (Konrad Rzeszutek Wilk) [Orabug: 27351275] \n- kABI: Revert kABI: Make the boot_cpu_data look normal (Konrad Rzeszutek Wilk) {CVE-2017-5715}\n[4.1.12-94.7.5]\n- userns: prevent speculative execution (Elena Reshetova) [Orabug: 27345402] {CVE-2017-5753}\n- udf: prevent speculative execution (Elena Reshetova) [Orabug: 27345402] {CVE-2017-5753}\n- net: mpls: prevent speculative execution (Elena Reshetova) [Orabug: 27345402] {CVE-2017-5753}\n- fs: prevent speculative execution (Elena Reshetova) [Orabug: 27345402] {CVE-2017-5753}\n- ipv6: prevent speculative execution (Elena Reshetova) [Orabug: 27345402] {CVE-2017-5753}\n- ipv4: prevent speculative execution (Elena Reshetova) [Orabug: 27345402] {CVE-2017-5753}\n- Thermal/int340x: prevent speculative execution (Elena Reshetova) [Orabug: 27345402] {CVE-2017-5753}\n- cw1200: prevent speculative execution (Elena Reshetova) [Orabug: 27345402] {CVE-2017-5753}\n- qla2xxx: prevent speculative execution (Elena Reshetova) [Orabug: 27345402] {CVE-2017-5753}\n- p54: prevent speculative execution (Elena Reshetova) [Orabug: 27345402] {CVE-2017-5753}\n- carl9170: prevent speculative execution (Elena Reshetova) [Orabug: 27345402] {CVE-2017-5753}\n- uvcvideo: prevent speculative execution (Elena Reshetova) [Orabug: 27345402] {CVE-2017-5753}\n- bpf: prevent speculative execution in eBPF interpreter (Elena Reshetova) [Orabug: 27345402] {CVE-2017-5753}\n- locking/barriers: introduce new observable speculation barrier (Elena Reshetova) [Orabug: 27345402] {CVE-2017-5753}\n- x86/cpu/AMD: Remove now unused definition of MFENCE_RDTSC feature (Elena Reshetova) [Orabug: 27345402] {CVE-2017-5753}\n- x86/cpu/AMD: Make the LFENCE instruction serialized (Elena Reshetova) [Orabug: 27345402] {CVE-2017-5753}\n- kABI: Make the boot_cpu_data look normal. (Konrad Rzeszutek Wilk) [Orabug: 27345388] {CVE-2017-5715}\n- kernel.spec: Require the new microcode_ctl. (Konrad Rzeszutek Wilk) [Orabug: 27345388] {CVE-2017-5715} {CVE-2017-5715}\n- x86/microcode/AMD: Add support for fam17h microcode loading (Tom Lendacky) [Orabug: 27345388] {CVE-2017-5715}\n- x86/spec_ctrl: Disable if running as Xen PV guest. (Konrad Rzeszutek Wilk) [Orabug: 27345388] {CVE-2017-5715}\n- Set IBPB when running a different VCPU (Dave Hansen) [Orabug: 27345388] {CVE-2017-5715}\n- Clear the host registers after setbe (Jun Nakajima) [Orabug: 27345388] {CVE-2017-5715}\n- Use the ibpb_inuse variable. (Jun Nakajima) [Orabug: 27345388] {CVE-2017-5715}\n- KVM: x86: add SPEC_CTRL to MSR and CPUID lists (Andrea Arcangeli) [Orabug: 27345388] {CVE-2017-5715}\n- kvm: vmx: add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD (Paolo Bonzini) [Orabug: 27345388] {CVE-2017-5715}\n- Use the 'ibrs_inuse' variable. (Jun Nakajima) [Orabug: 27345388] {CVE-2017-5715}\n- kvm: svm: add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD (Andrea Arcangeli) [Orabug: 27345388] {CVE-2017-5715}\n- x86/svm: Set IBPB when running a different VCPU (Paolo Bonzini) [Orabug: 27345388] {CVE-2017-5715}\n- x86/kvm: Pad RSB on VM transition (Tim Chen) [Orabug: 27345388] {CVE-2017-5715}\n- x86/cpu/AMD: Add speculative control support for AMD (Tom Lendacky) [Orabug: 27345388] {CVE-2017-5715}\n- x86/microcode: Recheck IBRS and IBPB feature on microcode reload (Tim Chen) [Orabug: 27345388] {CVE-2017-5715}\n- x86: Move IBRS/IBPB feature detection to scattered.c (Tim Chen) [Orabug: 27345388] {CVE-2017-5715}\n- x86/spec_ctrl: Add lock to serialize changes to ibrs and ibpb control (Tim Chen) [Orabug: 27345388] {CVE-2017-5715}\n- x86/spec_ctrl: Add sysctl knobs to enable/disable SPEC_CTRL feature (Konrad Rzeszutek Wilk) [Orabug: 27345388] {CVE-2017-5715}\n- x86/kvm: clear registers on VM exit (Tom Lendacky) [Orabug: 27345388] {CVE-2017-5715}\n- x86/kvm: Set IBPB when switching VM (Tim Chen) [Orabug: 27345388] {CVE-2017-5715}\n- *INCOMPLETE* x86/syscall: Clear unused extra registers on syscall entrance (Konrad Rzeszutek Wilk) [Orabug: 27345388] {CVE-2017-5715}\n- x86/entry: Stuff RSB for entry to kernel for non-SMEP platform (Konrad Rzeszutek Wilk) [Orabug: 27345388] {CVE-2017-5715}\n- x86/mm: Only set IBPB when the new thread cannot ptrace current thread (Konrad Rzeszutek Wilk) [Orabug: 27345388] {CVE-2017-5715}\n- x86/mm: Set IBPB upon context switch (Tim Chen) [Orabug: 27345388] {CVE-2017-5715}\n- x86/idle: Disable IBRS when offlining cpu and re-enable on wakeup (Tim Chen) [Orabug: 27345388] {CVE-2017-5715}\n- x86/idle: Disable IBRS entering idle and enable it on wakeup (Tim Chen) [Orabug: 27345388] {CVE-2017-5715}\n- x86/spec_ctrl: save IBRS MSR value in paranoid_entry (Andrea Arcangeli) [Orabug: 27345388] {CVE-2017-5715}\n- *Scaffolding* x86/spec_ctrl: Add sysctl knobs to enable/disable SPEC_CTRL feature (Tim Chen) [Orabug: 27345388] {CVE-2017-5715}\n- x86/enter: Use IBRS on syscall and interrupts (Tim Chen) [Orabug: 27345388] {CVE-2017-5715}\n- x86: Add macro that does not save rax, rcx, rdx on stack to disable IBRS (Tim Chen) [Orabug: 27345388] {CVE-2017-5715}\n- x86/enter: MACROS to set/clear IBRS and set IBP (Tim Chen) [Orabug: 27345388] {CVE-2017-5715}\n- x86/feature: Report presence of IBPB and IBRS control (Tim Chen) [Orabug: 27345388] {CVE-2017-5715}\n- x86: Add STIBP feature enumeration (Konrad Rzeszutek Wilk) [Orabug: 27345388] {CVE-2017-5715}\n- x86/cpufeature: Add X86_FEATURE_IA32_ARCH_CAPS and X86_FEATURE_IBRS_ATT (Konrad Rzeszutek Wilk) [Orabug: 27345388] {CVE-2017-5715}\n- x86/feature: Enable the x86 feature to control (Tim Chen) [Orabug: 27345388] {CVE-2017-5715}\n[4.1.12-94.7.4]\n- KVM: nVMX: Fix loss of L2s NMI blocking state (Wanpeng Li) [Orabug: 27062526] \n- KVM: nVMX: track NMI blocking state separately for each VMCS (Paolo Bonzini) [Orabug: 27062526] \n- KVM: VMX: require virtual NMI support (Paolo Bonzini) [Orabug: 27062526] \n- KVM: nVMX: Fix the NMI IDT-vectoring handling (Wanpeng Li) [Orabug: 27062526] \n- netlink: allow to listen 'all' netns (Nicolas Dichtel) [Orabug: 27098332] \n- netlink: rename private flags and states (Nicolas Dichtel) [Orabug: 27098332] \n- netns: use a spin_lock to protect nsid management (Nicolas Dichtel) [Orabug: 27098332] \n- netns: notify new nsid outside __peernet2id() (Nicolas Dichtel) [Orabug: 27098332] \n- netns: rename peernet2id() to peernet2id_alloc() (Nicolas Dichtel) [Orabug: 27098332] \n- netns: always provide the id to rtnl_net_fill() (Nicolas Dichtel) [Orabug: 27098332] \n- netns: returns always an id in __peernet2id() (Nicolas Dichtel) [Orabug: 27098332]", "edition": 72, "modified": "2018-01-19T00:00:00", "published": "2018-01-19T00:00:00", "id": "ELSA-2018-4012", "href": "http://linux.oracle.com/errata/ELSA-2018-4012.html", "title": "Unbreakable Enterprise kernel security update", "type": "oraclelinux", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}], "thn": [{"lastseen": "2018-01-27T09:17:18", "bulletinFamily": "info", "cvelist": ["CVE-2017-5753", "CVE-2017-5754", "CVE-2017-5715"], "description": "[](<https://4.bp.blogspot.com/-5FFuHggfEjk/Wk3IqVSdzhI/AAAAAAAAvYQ/QMuOUldwtrUZX1b2LM5XwOuyMppCgVfugCLcBGAs/s1600/meltdown-spectre-kernel-vulnerability.png>)\n\nUnlike the [initial reports](<https://thehackernews.com/2018/01/intel-kernel-vulnerability.html>) suggested about Intel chips being vulnerable to some severe \u2018memory leaking\u2019 flaws, full technical details about the vulnerabilities have now been emerged, which revealed that almost every modern processor since 1995 is vulnerable to the issues. \n \nDisclosed today by [Google Project Zero](<https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html>), the vulnerabilities potentially impact all major CPUs, including those from AMD, ARM, and Intel\u2014threatening almost all PCs, laptops, tablets, and smartphones, regardless of manufacturer or operating system. \n \nThese hardware vulnerabilities have been categorized into [two attacks](<https://meltdownattack.com/>), named **Meltdown** (CVE-2017-5754) and **Spectre** (CVE-2017-5753 and CVE-2017-5715), which could allow attackers to steal sensitive data which is currently processed on the computer. \n \nBoth attacks take advantage of a feature in chips known as \"speculative execution,\" a technique used by most modern CPUs to optimize performance. \n\n\n> \"In order to improve performance, many CPUs may choose to speculatively execute instructions based on assumptions that are considered likely to be true. During speculative execution, the processor is verifying these assumptions; if they are valid, then the execution continues. If they are invalid, then the execution is unwound, and the correct execution path can be started based on the actual conditions,\" Project Zero says.\n\nTherefore, it is possible for such speculative execution to have \"side effects which are not restored when the CPU state is unwound and can lead to information disclosure,\" which can be accessed using side-channel attacks. \n \n\n\n### Meltdown Attack\n\nThe first issue, Meltdown ([paper](<https://meltdownattack.com/meltdown.pdf>)), allows attackers to read not only kernel memory but also the entire physical memory of the target machines, and therefore all secrets of other programs and the operating system. \n \n\n\n> \u201cMeltdown is a related microarchitectural attack which exploits out-of-order execution in order to leak the target\u2019s physical memory.\u201d\n\n \nMeltdown uses speculative execution to break the isolation between user applications and the operating system, allowing any application to access all system memory, including memory allocated for the kernel. \n \n\n\n> \u201cMeltdown exploits a privilege escalation vulnerability specific to Intel processors, due to which speculatively executed instructions can bypass memory protection.\u201d\n\n \nNearly all desktop, laptop, and cloud computers affected by Meltdown. \n \n\n\n### Spectre Attack\n\n[](<https://3.bp.blogspot.com/-1yTiPu0uT10/Wk3DFbBm1SI/AAAAAAAAvYA/cTh_hcFW4BsPElNE559D-1CaoQ5rR8TWwCLcBGAs/s1600/exploit-for-spectre-vulnerability.png>)\n\nThe second problem, Spectre ([paper](<https://spectreattack.com/spectre.pdf>)), is not easy to patch and will haunt people for quite some time since this issue requires changes to processor architecture in order to fully mitigate. \n \nSpectre attack breaks the isolation between different applications, allowing the attacker-controlled program to trick error-free programs into leaking their secrets by forcing them into accessing arbitrary portions of its memory, which can then be read through a side channel. \n \nSpectre attacks can be used to leak information from the kernel to user programs, as well as from virtualization hypervisors to guest systems. \n\n\n> \u201cIn addition to violating process isolation boundaries using native code, Spectre attacks can also be used to violate browser sandboxing, by mounting them via portable JavaScript code. We wrote a JavaScript program that successfully reads data from the address space of the browser process running it.\u201d the paper explains.\n\n \n\n\n> \u201cKAISER patch, which has been widely applied as a mitigation to the Meltdown attack, does not protect against Spectre.\u201d\n\n \nAccording to researchers, this vulnerability impacts almost every system, including desktops, laptops, cloud servers, as well as smartphones\u2014powered by Intel, AMD, and ARM chips. \n \n\n\n### What You Should Do: Mitigations And Patches\n\n \nMany vendors have security patches available for one or both of these attacks. \n\n\n * **Windows \u2014** Microsoft has issued an out-of-band patch update for Windows 10, while other versions of Windows will be patched on the traditional Patch Tuesday on January 9, 2018\n * **MacOS \u2014** Apple had already fixed most of these security holes in macOS High Sierra 10.13.2 last month, but MacOS 10.13.3 will enhance or complete these mitigations.\n * **Linux \u2014** Linux kernel developers have also released patches by implementing kernel page-table isolation (KPTI) to move the kernel into an entirely separate address space.\n * **Android \u2014** Google has released security patches for Pixel/Nexus users as part of the Android January security patch update. Other users have to wait for their device manufacturers to release a compatible security update.\n\n \n\n\n#### **Mitigations for Chrome Users**\n\n \n\n\nSince this exploit can be executed through the website, Chrome users can turn on Site Isolation feature on their devices to mitigate these flaws.\n\n \n\n\nHere's how to turn Site Isolation on Windows, Mac, Linux, Chrome OS or Android:\n\n * Copy **_chrome://flags/#enable-site-per-process_** and paste it into the URL field at the top of your Chrome web browser, and then hit the Enter key.\n * Look for Strict Site Isolation, then click the box labeled Enable.\n * Once done, hit **_Relaunch Now_** to relaunch your Chrome browser.\n\nThere is no single fix for both the attacks since each requires protection independently.\n", "modified": "2018-01-04T07:13:07", "published": "2018-01-03T19:34:00", "id": "THN:788E9312DDA39D9A09855DF379A0FD4D", "href": "https://thehackernews.com/2018/01/meltdown-spectre-vulnerability.html", "type": "thn", "title": "Meltdown and Spectre CPU Flaws Affect Intel, ARM, AMD Processors", "cvss": {"score": 4.7, "vector": "AV:LOCAL/AC:MEDIUM/Au:NONE/C:COMPLETE/I:NONE/A:NONE/"}}], "paloalto": [{"lastseen": "2019-05-29T23:19:22", "bulletinFamily": "software", "cvelist": ["CVE-2017-5753", "CVE-2017-5754", "CVE-2017-5715"], "description": "Palo Alto Networks is aware of recent vulnerability disclosures, known as Meltdown and Spectre, that affect modern CPU architectures. At this time, our findings show that these vulnerabilities pose no increased risk to Palo Alto Networks PAN-OS devices. (CVE-2017-5715, CVE-2017-5753, and CVE-2017-5754). This security advisory will be updated as more information becomes available or if there are changes in the impact of these vulnerabilities.\n", "edition": 4, "modified": "2018-01-11T00:00:00", "published": "2018-01-04T00:00:00", "id": "PAN-SA-2018-0001", "href": "https://securityadvisories.paloaltonetworks.com/Home/Detail/120", "title": "Information about Meltdown and Spectre findings", "type": "paloalto", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}], "nvidia": [{"lastseen": "2021-02-02T18:46:18", "bulletinFamily": "software", "cvelist": ["CVE-2017-5715", "CVE-2017-5753", "CVE-2017-5754"], "description": "### Bulletin Summary\n\nNVIDIA is providing an initial security update to mitigate aspects of Google Project Zero's January 3, 2018, publication of novel information disclosure attacks that combine CPU speculative execution with known side channels.\n\nNVIDIA believes SHIELD Tablet GPU hardware is immune to the reported security issue. SHIELD Tablet integrates an Arm (CPU) processor that may, in certain circumstances, benefit from software mitigations to reduce the risk of the exploits identified in the Google Project Zero disclosure. For more information, refer to the [Arm Security Update](<https://developer.arm.com/support/security-update>).\n\nThis bulletin addresses NVIDIA software updates for SHIELD Tablet to mitigate aspects of the potential Arm CPU vulnerabilities.\n\nThese potential vulnerabilities have three known variants:\n\n * **Variant 1 (CVE-2017-5753)**: Software mitigations for the Arm CPU issue are provided with the security update included in this bulletin. NVIDIA expects to work together with its ecosystem partners as future updates are released to further strengthen mitigations for the potentially affected CPU.\n\n * **Variant 2 (CVE-2017-5715)**: Software mitigations for the Arm CPU issue are provided with the security update included in this bulletin. NVIDIA expects to work together with its ecosystem partners as future updates are released to further strengthen mitigations for the potentially affected CPU.\n\n * **Variant 3 (CVE-2017-5754)**: NVIDIA believes that SHIELD Tablet is not vulnerable to this variant.\n\n * **Variant 3a (CVE-2017-5754)**: Based on [Arm's Security Update](<https://developer.arm.com/support/security-update>), NVIDIA believes that SHIELD Tablet does not need software mitigations for this variant.\n\nFor updates and additional information, actively monitor the [NVIDIA Product Security](<http://www.nvidia.com/security>) page.\n\n### Vulnerability Details\n\nThe following sections summarize the potential vulnerabilities. Descriptions are as published on [MITRE](<https://cwe.mitre.org/>) and risk assessments follow [CVSS](<https://www.first.org/cvss/user-guide>).\n\n#### CVE-2017-5753\n\nComputer systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to unauthorized code with local user access via a side-channel analysis.\n\nCVSS Base Score: 8.2 \nCVSS Vector: CVSS:3.0/[AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N](<https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N>)\n\n#### CVE-2017-5715\n\nComputer systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to unauthorized code with local user access via a side-channel analysis.\n\nCVSS Base Score: 8.2 \nCVSS Vector: CVSS:3.0/[AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N](<https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N>)\n\n#### CVE-2017-5754\n\nComputer systems with microprocessors utilizing speculative execution may allow unauthorized disclosure of information to unauthorized code with local user access via a side-channel analysis of the data cache.\n\nCVSS Base Score: 7.9 \nCVSS Vector: CVSS:3.0/[AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N](<https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N>)\n\n_NVIDIA's risk assessment is based on an average of risk across a diverse set of installed systems and may not represent the true risk of your local installation. NVIDIA recommends consulting a security or IT professional to evaluate the risk of your specific configuration. NVIDIA doesn't know of any exploits to these issues at this time._\n\n### Updated Products\n\n**Product** | **Integrated CPU** | **OS** \n---|---|--- \nSHIELD Tablet Software | Arm Cortex-A15 processor | Android\n", "modified": "2018-03-22T09:05:00", "published": "2018-01-04T00:00:00", "id": "NVIDIA:4614", "href": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614", "type": "nvidia", "title": "Security Bulletin: NVIDIA SHIELD Tablet Security Updates for CPU Speculative Side Channel Vulnerabilities", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2021-01-22T16:26:43", "bulletinFamily": "software", "cvelist": ["CVE-2017-5715", "CVE-2017-5753", "CVE-2017-5754"], "description": "### Bulletin Summary\n\nNVIDIA is providing an initial security update to mitigate aspects of Google Project Zero\u2019s January 3, 2018 publication of novel information disclosure attacks that combine CPU speculative execution with known side channels.\n\nNVIDIA's core business is GPU computing.\n\n**We believe our GPU hardware is immune to the reported security issue. As for our driver software, we are providing updates to help mitigate the CPU security issue.**\n\nThe vulnerability has three known variants:\n\n * **Variant 1 (CVE-2017-5753)**: CPU mitigations are provided with the security update included in this bulletin. NVIDIA expects to work together with its ecosystem partners on future updates to further strengthen mitigations for affected CPUs.\n * **Variant 2 (CVE-2017-5715)**: NVIDIA\u2019s initial analysis indicates that NVIDIA software running on affected CPUs may require further updates. NVIDIA expects to work together with its ecosystem partners on this variant.\n * **Variant 3 (CVE-2017-5754)**: At this time, NVIDIA has no reason to believe that NVIDIA software is vulnerable to this variant when running on affected CPUs.\n\nFor updates and additional information, actively monitor the [NVIDIA Product Security](<https://www.nvidia.com/product-security>) page.\n\n### Vulnerability Details\n\nThe following sections summarize the vulnerabilities. Descriptions are as published on [MITRE](<https://cwe.mitre.org/>) and risk assessments follow [CVSS](<https://www.first.org/cvss/user-guide>).\n\n#### CVE-2017-5753\n\nComputer systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.\n\nCVSS Base Score: 8.2 \nCVSS Vector: CVSS:3.0/[AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N](<https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N>)\n\n#### CVE-2017-5715\n\nComputer systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.\n\nCVSS Base Score: 8.2 \nCVSS Vector: CVSS:3.0/[AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N](<https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N>)\n\n#### CVE-2017-5754\n\nComputer systems with microprocessors utilizing speculative execution may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.\n\nCVSS Base Score: 7.9 \nCVSS Vector: CVSS:3.0/[AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N](<https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N>)\n\n_NVIDIA\u2019s risk assessment is based on an average of risk across a diverse set of installed systems and may not represent the true risk of your local installation. NVIDIA recommends consulting a security or IT professional to evaluate the risk of your specific configuration._\n\n### Updated Products\n\n**Product** | **OS** \n---|--- \nGeForce, Quadro, NVS Driver Software | Windows, Linux, FreeBSD, Solaris \nTesla Driver Software | Windows, Linux \nGRID Driver Software | Windows, Windows Server with Hyper-V, Linux, Citrix XenServer, VMware vSphere, and Red Hat KVM\n", "modified": "2018-02-14T10:34:00", "published": "2018-01-04T00:00:00", "id": "NVIDIA:4611", "href": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611", "type": "nvidia", "title": "Security Bulletin: NVIDIA Driver Security Updates for CPU Speculative Side Channel Vulnerabilities", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2021-02-22T16:27:32", "bulletinFamily": "software", "cvelist": ["CVE-2017-5715", "CVE-2017-5753", "CVE-2017-5754"], "description": "### Bulletin Summary\n\nNVIDIA is providing an initial security update to mitigate aspects of Google Project Zero's January 3, 2018 publication of novel information disclosure attacks that combine CPU speculative execution with known side channels.\n\nNVIDIA's core business is GPU computing.\n\n**NVIDIA believes our GPU hardware is immune to the reported security issue. As for our driver software, we are providing updates to help mitigate the CPU security issue. You can find information about the driver software updates in [Security Bulletin 4611](<http://nvidia.custhelp.com/app/answers/detail/a_id/4611>).**\n\nThis bulletin addresses updates for NVIDIA GeForce Experience (GFE) software to help mitigate potential CPU security vulnerabilities.\n\nThe potential vulnerabilities have three known variants:\n\n * **Variant 1 (CVE-2017-5753)**: Software mitigations for the CPU issue are provided with the security update included in this bulletin. NVIDIA expects to work together with its ecosystem partners as future updates are released to further strengthen mitigations for the potentially affected CPUs.\n\n * **Variant 2 (CVE-2017-5715)**: NVIDIA's initial analysis indicates that GFE running on potentially affected CPUs may require further updates. NVIDIA expects to work together with its ecosystem partners as they release future updates for this variant.\n\n * **Variant 3 (CVE-2017-5754)**: NVIDIA believes that GFE is not vulnerable to this variant.\n\nFor updates and additional information, actively monitor the [NVIDIA Product Security](<https://www.nvidia.com/product-security>) page.\n\n### Vulnerability Details\n\nThe following sections summarize the potential vulnerabilities. Descriptions are as published on [MITRE](<https://cwe.mitre.org/>) and risk assessments follow [CVSS](<https://www.first.org/cvss/user-guide>).\n\n#### CVE-2017-5753\n\nComputer systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to unauthorized code with local user access via a side-channel analysis.\n\nCVSS Base Score: 8.2 \nCVSS Vector: CVSS:3.0/[AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N](<https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N>)\n\n#### CVE-2017-5715\n\nComputer systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to unauthorized code with local user access via a side-channel analysis.\n\nCVSS Base Score: 8.2 \nCVSS Vector: CVSS:3.0/[AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N](<https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N>)\n\n#### CVE-2017-5754\n\nComputer systems with microprocessors utilizing speculative execution may allow unauthorized disclosure of information to unauthorized code with local user access via a side-channel analysis of the data cache.\n\nCVSS Base Score: 7.9 \nCVSS Vector: CVSS:3.0/[AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N](<https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N>)\n\n_NVIDIA's risk assessment is based on an average of risk across a diverse set of installed systems and may not represent the true risk of your local installation. NVIDIA recommends consulting a security or IT professional to evaluate the risk of your specific configuration._\n\n### Updated Products\n\n**Product** | **Operating System** \n---|--- \nGeForce Experience (GFE) Software | Windows\n", "modified": "2018-01-18T17:09:00", "published": "2018-01-09T00:00:00", "id": "NVIDIA:4610", "href": "http://nvidia.custhelp.com/app/answers/detail/a_id/4610", "type": "nvidia", "title": "Security Bulletin: NVIDIA GeForce Experience (GFE) Security Updates for CPU Speculative Side Channel Vulnerabilities", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}], "virtuozzo": [{"lastseen": "2019-11-05T11:27:51", "bulletinFamily": "unix", "cvelist": ["CVE-2017-5753", "CVE-2017-5754", "CVE-2017-5715"], "description": "This update provides a new Virtuozzo Containers for Linux 4.7 and Server Bare Metal 5.0 kernel 2.6.32-04