ID

VAR-201911-1619


CVE

CVE-2018-12207


TITLE

Ubuntu Security Notice USN-4185-2

Trust: 0.1

sources: PACKETSTORM: 155307

DESCRIPTION

Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access. Both Microsoft Windows and Microsoft Windows Server are products of Microsoft Corporation. Microsoft Windows is an operating system for personal devices. Microsoft Windows Server is a server operating system. A denial of service vulnerability exists in Microsoft Windows and Windows Server due to the program's improper handling of objects in memory. An attacker could exploit this vulnerability by logging on to an affected system and running a specially crafted application to cause the targeted system to become unresponsive. The following products and versions are affected: Microsoft Windows 10, Windows 10 Version 1607, Windows 10 Version 1709, Windows 10 Version 1803, Windows 10 Version 1809, Windows 10 Version 1903, Windows 7 SP1, Windows 8.1, Windows RT 8.1, Windows Server 2008 R2 SP1, Windows Server 2012, Windows Server 2012 R2, Windows Server 2016, Windows Server 2019, Windows Server version 1803, Windows Server version 1903. (CVE-2019-17052) Ori Nimron discovered that the IEEE 802.15.4 Low-Rate Wireless network protocol implementation in the Linux kernel did not properly perform permissions checks. (CVE-2019-17055) Ori Nimron discovered that the Near field Communication (NFC) network protocol implementation in the Linux kernel did not properly perform permissions checks. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. 8) - x86_64 3. Description: This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. Bugs fixed (https://bugzilla.redhat.com/): 1782199 - CVE-2019-19339 kpatch: hw: incomplete fix for CVE-2018-12207 6. In addition this update provides mitigations for the "TSX Asynchronous Abort" speculative side channel attack. Note that this will be the last security update for Xen in the oldstable distribution; upstream support for the 4.8.x branch ended by the end of December 2019. ========================================================================== Ubuntu Security Notice USN-4183-1 November 13, 2019 linux, linux-aws, linux-azure, linux-gcp, linux-kvm, linux-oracle, linux-raspi2 vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 19.10 Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-azure: Linux kernel for Microsoft Azure Cloud systems - linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems - linux-kvm: Linux kernel for cloud environments - linux-oracle: Linux kernel for Oracle Cloud systems - linux-raspi2: Linux kernel for Raspberry Pi 2 Details: Stephan van Schaik, Alyssa Milburn, Sebastian \xd6sterlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida, Giorgi Maisuradze, Moritz Lipp, Michael Schwarz, Daniel Gruss, and Jo Van Bulck discovered that Intel processors using Transactional Synchronization Extensions (TSX) could expose memory contents previously stored in microarchitectural buffers to a malicious process that is executing on the same CPU core. A local attacker could use this to expose sensitive information. (CVE-2019-11135) It was discovered that the Intel i915 graphics chipsets allowed userspace to modify page table entries via writes to MMIO from the Blitter Command Streamer and expose kernel memory information. A local attacker could use this to expose sensitive information or possibly elevate privileges. (CVE-2018-12207) It was discovered that the Intel i915 graphics chipsets could cause a system hang when userspace performed a read from GT memory mapped input output (MMIO) when the product is in certain low power states. (CVE-2019-0154) Jann Horn discovered a reference count underflow in the shiftfs implementation in the Linux kernel. (CVE-2019-15791) Jann Horn discovered a type confusion vulnerability in the shiftfs implementation in the Linux kernel. (CVE-2019-15792) Jann Horn discovered that the shiftfs implementation in the Linux kernel did not use the correct file system uid/gid when the user namespace of a lower file system is not in the init user namespace. A local attacker could use this to possibly bypass DAC permissions or have some other unspecified impact. (CVE-2019-15793) It was discovered that a buffer overflow existed in the 802.11 Wi-Fi configuration interface for the Linux kernel when handling beacon settings. (CVE-2019-16746) Nico Waisman discovered that a buffer overflow existed in the Realtek Wi-Fi driver for the Linux kernel when handling Notice of Absence frames. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-17666) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 19.10: linux-image-5.3.0-1006-oracle 5.3.0-1006.7 linux-image-5.3.0-1007-aws 5.3.0-1007.8 linux-image-5.3.0-1007-azure 5.3.0-1007.8 linux-image-5.3.0-1007-kvm 5.3.0-1007.8 linux-image-5.3.0-1008-gcp 5.3.0-1008.9 linux-image-5.3.0-1012-raspi2 5.3.0-1012.14 linux-image-5.3.0-22-generic 5.3.0-22.24 linux-image-5.3.0-22-generic-lpae 5.3.0-22.24 linux-image-5.3.0-22-lowlatency 5.3.0-22.24 linux-image-5.3.0-22-snapdragon 5.3.0-22.24 linux-image-aws 5.3.0.1007.9 linux-image-azure 5.3.0.1007.25 linux-image-gcp 5.3.0.1008.9 linux-image-generic 5.3.0.22.26 linux-image-generic-lpae 5.3.0.22.26 linux-image-gke 5.3.0.1008.9 linux-image-kvm 5.3.0.1007.9 linux-image-lowlatency 5.3.0.22.26 linux-image-oracle 5.3.0.1006.7 linux-image-raspi2 5.3.0.1012.9 linux-image-snapdragon 5.3.0.22.26 linux-image-virtual 5.3.0.22.26 Please note that mitigating the TSX (CVE-2019-11135) and i915 (CVE-2019-0154) issues requires corresponding microcode and graphics firmware updates respectively. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. CVE-2018-12207 It was discovered that on Intel CPUs supporting hardware virtualisation with Extended Page Tables (EPT), a guest VM may manipulate the memory management hardware to cause a Machine Check Error (MCE) and denial of service (hang or crash). The guest triggers this error by changing page tables without a TLB flush, so that both 4 KB and 2 MB entries for the same virtual address are loaded into the instruction TLB (iTLB). This update implements a mitigation in KVM that prevents guest VMs from loading 2 MB entries into the iTLB. This will reduce performance of guest VMs. Further information on the mitigation can be found at <https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/multihit.html> or in the linux-doc-4.9 or linux-doc-4.19 package. A qemu update adding support for the PSCHANGE_MC_NO feature, which allows to disable iTLB Multihit mitigations in nested hypervisors will be provided via DSA 4566-1. Intel's explanation of the issue can be found at <https://software.intel.com/security-software-guidance/insights/deep-dive-machine-check-error-avoidance-page-size-change-0>. CVE-2019-0154 Intel discovered that on their 8th and 9th generation GPUs, reading certain registers while the GPU is in a low-power state can cause a system hang. A local user permitted to use the GPU can use this for denial of service. This update mitigates the issue through changes to the i915 driver. The affected chips (gen8 and gen9) are listed at <https://en.wikipedia.org/wiki/List_of_Intel_graphics_processing_units#Gen8>. CVE-2019-0155 Intel discovered that their 9th generation and newer GPUs are missing a security check in the Blitter Command Streamer (BCS). A local user permitted to use the GPU could use this to access any memory that the GPU has access to, which could result in a denial of service (memory corruption or crash), a leak of sensitive information, or privilege escalation. This update mitigates the issue by adding the security check to the i915 driver. The affected chips (gen9 onward) are listed at <https://en.wikipedia.org/wiki/List_of_Intel_graphics_processing_units#Gen9>. CVE-2019-11135 It was discovered that on Intel CPUs supporting transactional memory (TSX), a transaction that is going to be aborted may continue to execute speculatively, reading sensitive data from internal buffers and leaking it through dependent operations. Intel calls this "TSX Asynchronous Abort" (TAA). For CPUs affected by the previously published Microarchitectural Data Sampling (MDS) issues (CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091), the existing mitigation also mitigates this issue. For processors that are vulnerable to TAA but not MDS, this update disables TSX by default. This mitigation requires updated CPU microcode. An updated intel-microcode package (only available in Debian non-free) will be provided via DSA 4565-1. The updated CPU microcode may also be available as part of a system firmware ("BIOS") update. Further information on the mitigation can be found at <https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html> or in the linux-doc-4.9 or linux-doc-4.19 package. Intel's explanation of the issue can be found at <https://software.intel.com/security-software-guidance/insights/deep-dive-intel-transactional-synchronization-extensions-intel-tsx-asynchronous-abort>. For the oldstable distribution (stretch), these problems have been fixed in version 4.9.189-3+deb9u2. For the stable distribution (buster), these problems have been fixed in version 4.19.67-2+deb10u2. For the detailed security status of linux please refer to its security tracker page at: https://security-tracker.debian.org/tracker/linux Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAl3LBMVfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0RtSg//aBsENrrs5mbCKYxt6Lm1hVdxdmz+9TbgZkxU+lQ0XEfge4wQUCa8KhJh os4qGuDXh5q/2VkNMa+cUCyHCyxxl3qv4rCsm+MxG1Rd4Hy4JoKt4heJgi5hXW9A qhOQ5+rHb0OeoPM9BCduTi37h+mLS4ItRz30n3+3B2+VC0tj+iV2nOZJmC0WMEiq LrqeDm39pa6DqKBAExdYT/TCyKLsngMHoIGorWVPXdJP1/xmrH2gU0W3L7k5KJPz apeCi4E3H9bjRh8Be5SeT3zDoEaiiNn/sHHkLDeAryFMuwilekxFaYocbW/0CEIH kWRMkC+uq1KfQfBDSxIOsH8yq8n+zQ12XJ0YiiqEKg6ErabWz5rCaVHyPWvdh0Ny mezs99PkQ7mUkjAUVzIfz2Rq6VByOCdfuT/GvPL7rUtIJYRdqYkWBI8t/hVlrnDq yR+X7vQZWm5wb3+Jiz/sA6TqgDvKSgk1+tUfBmqI9sh1wWNKSSYee0b81BLLubs3 IInPlgW2Lp+IsA3CVKKQNTNMWZkuNyPZH2UGpZV45otazcLPrrdNtt52x4gvIJ/W lizVpb2BOpTpoeEXNYlEDCjwcrW9f1FkVztwMgz3J6eb9pHjieFuGO9vOxcP7li3 FNJbGhaUUZa8BfjsQgBwFSwVXRr212zK9yv0UHnLRJo4l0I3xC0=YZWL -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security update Advisory ID: RHSA-2019:3841-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2019:3841 Issue date: 2019-11-12 CVE Names: CVE-2018-12207 CVE-2019-0154 CVE-2019-11135 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support, and Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server AUS (v. 7.2) - noarch, x86_64 Red Hat Enterprise Linux Server E4S (v. 7.2) - noarch, x86_64 Red Hat Enterprise Linux Server Optional AUS (v. 7.2) - x86_64 Red Hat Enterprise Linux Server Optional E4S (v. 7.2) - x86_64 Red Hat Enterprise Linux Server Optional TUS (v. 7.2) - x86_64 Red Hat Enterprise Linux Server TUS (v. 7.2) - noarch, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207) * hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135) * hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1646768 - CVE-2018-12207 hw: Machine Check Error on Page Size Change (IPU) 1724393 - CVE-2019-0154 hw: Intel GPU Denial Of Service while accessing MMIO in lower power state 1753062 - CVE-2019-11135 hw: TSX Transaction Asynchronous Abort (TAA) 6. Package List: Red Hat Enterprise Linux Server AUS (v. 7.2): Source: kernel-3.10.0-327.82.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-327.82.2.el7.noarch.rpm kernel-doc-3.10.0-327.82.2.el7.noarch.rpm x86_64: kernel-3.10.0-327.82.2.el7.x86_64.rpm kernel-debug-3.10.0-327.82.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-327.82.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-327.82.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.82.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.82.2.el7.x86_64.rpm kernel-devel-3.10.0-327.82.2.el7.x86_64.rpm kernel-headers-3.10.0-327.82.2.el7.x86_64.rpm kernel-tools-3.10.0-327.82.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.82.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-327.82.2.el7.x86_64.rpm perf-3.10.0-327.82.2.el7.x86_64.rpm perf-debuginfo-3.10.0-327.82.2.el7.x86_64.rpm python-perf-3.10.0-327.82.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.82.2.el7.x86_64.rpm Red Hat Enterprise Linux Server E4S (v. 7.2): Source: kernel-3.10.0-327.82.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-327.82.2.el7.noarch.rpm kernel-doc-3.10.0-327.82.2.el7.noarch.rpm x86_64: kernel-3.10.0-327.82.2.el7.x86_64.rpm kernel-debug-3.10.0-327.82.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-327.82.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-327.82.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.82.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.82.2.el7.x86_64.rpm kernel-devel-3.10.0-327.82.2.el7.x86_64.rpm kernel-headers-3.10.0-327.82.2.el7.x86_64.rpm kernel-tools-3.10.0-327.82.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.82.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-327.82.2.el7.x86_64.rpm perf-3.10.0-327.82.2.el7.x86_64.rpm perf-debuginfo-3.10.0-327.82.2.el7.x86_64.rpm python-perf-3.10.0-327.82.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.82.2.el7.x86_64.rpm Red Hat Enterprise Linux Server TUS (v. 7.2): Source: kernel-3.10.0-327.82.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-327.82.2.el7.noarch.rpm kernel-doc-3.10.0-327.82.2.el7.noarch.rpm x86_64: kernel-3.10.0-327.82.2.el7.x86_64.rpm kernel-debug-3.10.0-327.82.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-327.82.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-327.82.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.82.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.82.2.el7.x86_64.rpm kernel-devel-3.10.0-327.82.2.el7.x86_64.rpm kernel-headers-3.10.0-327.82.2.el7.x86_64.rpm kernel-tools-3.10.0-327.82.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.82.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-327.82.2.el7.x86_64.rpm perf-3.10.0-327.82.2.el7.x86_64.rpm perf-debuginfo-3.10.0-327.82.2.el7.x86_64.rpm python-perf-3.10.0-327.82.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.82.2.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional AUS (v. 7.2): x86_64: kernel-debug-debuginfo-3.10.0-327.82.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.82.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.82.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.82.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-327.82.2.el7.x86_64.rpm perf-debuginfo-3.10.0-327.82.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.82.2.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional E4S (v. 7.2): x86_64: kernel-debug-debuginfo-3.10.0-327.82.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.82.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.82.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.82.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-327.82.2.el7.x86_64.rpm perf-debuginfo-3.10.0-327.82.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.82.2.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional TUS (v. 7.2): x86_64: kernel-debug-debuginfo-3.10.0-327.82.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-327.82.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-327.82.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-327.82.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-327.82.2.el7.x86_64.rpm perf-debuginfo-3.10.0-327.82.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-327.82.2.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2018-12207 https://access.redhat.com/security/cve/CVE-2019-0154 https://access.redhat.com/security/cve/CVE-2019-11135 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/vulnerabilities/ifu-page-mce https://access.redhat.com/solutions/tsx-asynchronousabort https://access.redhat.com/solutions/i915-graphics 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2019 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXcsdGtzjgjWX9erEAQhzBQ//Sjgws2dy8r4xW9FjiYP34QhxBm5PYfhT zqERPadTm6cdb/qvhogXyLeuPZIgFAalz00SscHRGykyFaBk0ZCa0qrMCc9DiuWG SE/uzCsJ6S6ZFeyDs5nG804I9WcafQN6EMCJwjzobzHPnLq/10DSls+NPrZcdM/R 9eybeJ1E1oA0O2VMLbSLVwhV8mQ5IzejOwiUntvn320ozR1SsdgPOZCjP+r8Libq W8O6ADd40mtmSLrQl5aZWzo4MStW+0mVF5MKt65i7SASN344SQWOKZxdqGucC9mw oqfD02T25r4l61YTWjXCbefUZPDB+BaK/PiM6SVT3zhH/7KepxHJbjw0ARDhZ4Ny Jh4Wz+ZkvuPLc3U5jog8mzEOU/Wnh7LESwWRFA21zx73trf9jZ6231XiEQL8IiPO etXYe8Fv6oWcvJpx6jRQ88fco9/UiA0XGBwjuGiFUPXaSVLpBpnf/Gp3wXcEn6kf E35wuE6yHIcKdvPMvVHgAV8Kf1CVvwj709TgnfPOAHNEfY16vlsBPUhmbgErgsdO MZTHH/A7eG08T1+fbdUc6/oJ+967SicPUJXwvLWqX+pdeyj13jnDVQlkKdpQLckN XKR6LBzoWnxWgWZLiNw7wD5naxU6M3jcAxgTE87TrAsPS1+k3jeRwXl0+AHOtS7Z Rxkt0z//xYk= =Vh4k -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . 7.5) - ppc64, ppc64le, x86_64 3

Trust: 1.89

sources: NVD: CVE-2018-12207 // VULHUB: VHN-122143 // PACKETSTORM: 155307 // PACKETSTORM: 155284 // PACKETSTORM: 155697 // PACKETSTORM: 155956 // PACKETSTORM: 155303 // PACKETSTORM: 155280 // PACKETSTORM: 155293 // PACKETSTORM: 155418 // PACKETSTORM: 155289 // PACKETSTORM: 155286

AFFECTED PRODUCTS

vendor:intelmodel:xeon e3-1268l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-3245mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6100scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-4809 v3scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:lteversion:14.1.2

Trust: 1.0

vendor:intelmodel:xeon e3120scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon l7555scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silver 4209tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon ec5539scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon x3350scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon x3330scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:11.5.2

Trust: 1.0

vendor:intelmodel:core i5-5257uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7260uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8300hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon d-1523nscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon d-2191scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon x3460scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8559uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m3-8100yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w3520scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2186gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-1035g4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7520scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip link controllerscope:lteversion:14.1.2

Trust: 1.0

vendor:intelmodel:core i9-7960xscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-2275scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon 3070scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-1035g7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium gold g5400tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g4950scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3930scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon l5408scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:11.5.2

Trust: 1.0

vendor:intelmodel:xeon silver 4215scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7440scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7800xscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-1650 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon d-1520scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3930escope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-10510uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2670 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-9960x x-seriesscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-4820 v4scope:eqversion: -

Trust: 1.0

vendor:redhatmodel:enterprise linux server eusscope:eqversion:7.6

Trust: 1.0

vendor:intelmodel:pentium gold g5500tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-9350kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6262vscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5557uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5220scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1220 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1241 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2278gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5430scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-8880 v2scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:lteversion:12.1.5

Trust: 1.0

vendor:intelmodel:xeon d-1539scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2699 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-10920x x-seriesscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-8893 v2scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:12.1.0

Trust: 1.0

vendor:intelmodel:xeon e5-2698 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6252scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5640scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-8870 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-3265mscope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:13.1.0

Trust: 1.0

vendor:intelmodel:xeon e5-4660 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2470 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5\+8400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon 3060scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:lteversion:12.1.5

Trust: 1.0

vendor:intelmodel:xeon 3065scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2176gscope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:lteversion:12.1.5

Trust: 1.0

vendor:intelmodel:xeon e-2144gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7440hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon x5272scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8750hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon l5508scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:lteversion:15.0.1

Trust: 1.0

vendor:intelmodel:xeon 7120mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2174gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-4880 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7320scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-2175scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5649scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1231 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium gold g5500scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1505m v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon d-2143itscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon x5365scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:lteversion:13.1.3

Trust: 1.0

vendor:intelmodel:xeon e5-2430l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e6510scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon l3110scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6770hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-8890 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4627 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6240yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7530scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon x5650scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7340scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4669 v4scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip link controllerscope:lteversion:15.0.1

Trust: 1.0

vendor:intelmodel:xeon l5618scope:eqversion: -

Trust: 1.0

vendor:f5model:big-iq centralized managementscope:lteversion:5.4.0

Trust: 1.0

vendor:intelmodel:xeon e5-4660 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-9300hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7420scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon l5240scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon lv 5128scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip application security managerscope:lteversion:14.1.2

Trust: 1.0

vendor:intelmodel:celeron g1830scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon d-1571scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3110scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7320scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m-5y10ascope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-4850 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2667 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2630l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon l5640scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5218tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2695 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8350uscope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip link controllerscope:lteversion:13.1.3

Trust: 1.0

vendor:intelmodel:xeon e5-4620 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1558l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon d-1518scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon d-1521scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon 7140mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7540scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon l5410scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-8880l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2618l v4scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:15.0.0

Trust: 1.0

vendor:intelmodel:core i7-9700scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:11.5.2

Trust: 1.0

vendor:intelmodel:core i7-10510yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8270scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8705gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2407 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2697 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium gold 4415uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon lc3528scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2650l v4scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:lteversion:12.1.5

Trust: 1.0

vendor:intelmodel:xeon x5550scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1240 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1220 v5scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:lteversion:11.6.5

Trust: 1.0

vendor:intelmodel:core i7-5700hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1225 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon l7345scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-4830 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8100tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon d-1637scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2608l v4scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:15.0.0

Trust: 1.0

vendor:intelmodel:xeon e5-2660 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon l5506scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2244gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7450scope:eqversion: -

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.7

Trust: 1.0

vendor:intelmodel:xeon 3050scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3900tescope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:lteversion:11.6.5

Trust: 1.0

vendor:intelmodel:xeon e7-4850 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g4920scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2697 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5450scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2146gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4640 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7500uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon x5677scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2276gscope:eqversion: -

Trust: 1.0

vendor:oraclemodel:solarisscope:eqversion:11

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:lteversion:12.1.5

Trust: 1.0

vendor:intelmodel:xeon l3426scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6254scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-9750hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-9500scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6240scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon 5160scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-3225scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon l3014scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2620 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon 7110mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3902escope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8250uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon l5318scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w3690scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip application security managerscope:lteversion:15.0.1

Trust: 1.0

vendor:intelmodel:xeon silver 4216scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:lteversion:14.1.2

Trust: 1.0

vendor:intelmodel:core i3-6100uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-9920x x-seriesscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-2265scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon l5518scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon d-2161iscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6230nscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2450l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-2195scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1225 v6scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip application security managerscope:lteversion:13.1.3

Trust: 1.0

vendor:intelmodel:core i3-9300scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2134scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon l3360scope:eqversion: -

Trust: 1.0

vendor:opensusemodel:leapscope:eqversion:15.1

Trust: 1.0

vendor:intelmodel:core i7-6820hkscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon ec5549scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon x5482scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon d-1553nscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2667 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon l5238scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-2235scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2687w v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m-5y71scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8350kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6248scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:11.5.2

Trust: 1.0

vendor:intelmodel:xeon e3-1535m v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon x5460scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8260lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon d-2123itscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon x7460scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon d-1622scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m-5y10scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:14.1.0

Trust: 1.0

vendor:intelmodel:xeon e5-4655 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon d-1533nscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-9300tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10210uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8276mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6222vscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8565uscope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:lteversion:11.6.5

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:13.1.0

Trust: 1.0

vendor:intelmodel:core m-5y70scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2620 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-5020uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7820hkscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon 5050scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7287uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2637 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1226 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4650 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7100uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5310scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5950hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon x5660scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4607 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5550uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2690 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1281 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1265l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g4900scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6238tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-4860 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon lv 5148scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5645scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:lteversion:15.0.1

Trust: 1.0

vendor:intelmodel:xeon e7-8870 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5220scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:15.0.0

Trust: 1.0

vendor:intelmodel:xeon l5609scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-1005g1scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3900escope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-9850hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-8880 v3scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:15.0.0

Trust: 1.0

vendor:intelmodel:celeron g1610scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1230 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1280 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2420 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8256scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2603 v2scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip analyticsscope:lteversion:12.1.5

Trust: 1.0

vendor:intelmodel:xeon 7020scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon 5130scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon x5672scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:lteversion:13.1.3

Trust: 1.0

vendor:intelmodel:xeon w-3265scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g1630scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2650 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1575m v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6252nscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silver 4208scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:14.1.0

Trust: 1.0

vendor:intelmodel:core i5-5287uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon x3440scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7700scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon x5690scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium gold g5600scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2630 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2630l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-2880 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5215mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2124scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:12.1.0

Trust: 1.0

vendor:intelmodel:core i5-8259uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-8880 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon x7542scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:lteversion:12.1.5

Trust: 1.0

vendor:intelmodel:core i3-7300scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon lc5528scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1270 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8086kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-1660 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g1820tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2695 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon l5215scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2603 v4scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:14.1.0

Trust: 1.0

vendor:intelmodel:xeon e5-4627 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5220sscope:eqversion: -

Trust: 1.0

vendor:redhatmodel:openshift container platformscope:eqversion:4.2

Trust: 1.0

vendor:intelmodel:core i7-8550uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5504scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6970hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-4820 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon d-2177ntscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon x7550scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-3275mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3930tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-1630 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1585l v5scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip link controllerscope:lteversion:12.1.5

Trust: 1.0

vendor:intelmodel:xeon gold 6238scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon l5320scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon lv 5138scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2643 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m-5y31scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon 7130mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7920hqscope:eqversion: -

Trust: 1.0

vendor:f5model:big-iq centralized managementscope:eqversion:7.0.0

Trust: 1.0

vendor:intelmodel:xeon e5-2660 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2286gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-1065g7scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g4932escope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon x5260scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2697a v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium gold g5620scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w5590scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1245 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7100scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5530scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8269uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6300hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w3670scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2609 v4scope:eqversion: -

Trust: 1.0

vendor:redhatmodel:enterprise linux server eusscope:eqversion:8.1

Trust: 1.0

vendor:intelmodel:xeon e5472scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:lteversion:14.1.2

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:13.1.0

Trust: 1.0

vendor:intelmodel:xeon ec5509scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1265l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g1840scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:13.1.0

Trust: 1.0

vendor:intelmodel:xeon e5507scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8130uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon d-2146ntscope:eqversion: -

Trust: 1.0

vendor:f5model:big-iq centralized managementscope:gteversion:5.2.0

Trust: 1.0

vendor:intelmodel:xeon e7430scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g4930escope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1565l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon 7140nscope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:lteversion:12.1.5

Trust: 1.0

vendor:intelmodel:xeon gold 5218scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon d-1541scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2680 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5240scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5205scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7360uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7820xscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8280mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon x3480scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip analyticsscope:lteversion:11.6.5

Trust: 1.0

vendor:intelmodel:xeon 5120scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:15.0.0

Trust: 1.0

vendor:intelmodel:xeon platinum 8280lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon l5520scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4667 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2104gscope:eqversion: -

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.6

Trust: 1.0

vendor:intelmodel:xeon e7-8890 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m-5y51scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6267uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2687w v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5250uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8500bscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon 7110nscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon x5270scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3920scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-8890 v4scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:12.1.0

Trust: 1.0

vendor:intelmodel:xeon l5630scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:15.0.0

Trust: 1.0

vendor:intelmodel:core i5-7400tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon x3220scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7600scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g1610tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7660uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1220l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon d-1649nscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5750hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon d-2163itscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-9700kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon 5060scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8706gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-4830 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-3275scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:15.0.0

Trust: 1.0

vendor:intelmodel:core i5-8200yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2650 v2scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:14.1.0

Trust: 1.0

vendor:intelmodel:xeon e5-1620 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon x7350scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon d-2173itscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon x5675scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5320scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon 3040scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:lteversion:15.0.1

Trust: 1.0

vendor:intelmodel:core i3-10110yscope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:14.1.0

Trust: 1.0

vendor:intelmodel:xeon ec3539scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon x5560scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7167uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-4820 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon d-2142itscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-3245scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon 5150scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6226scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-5010uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-9100tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4627 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4610 v2scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:lteversion:11.6.5

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:lteversion:14.1.2

Trust: 1.0

vendor:intelmodel:xeon e7-8870 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2609 v2scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:lteversion:13.1.3

Trust: 1.0

vendor:intelmodel:xeon w5580scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 9222scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon d-1623nscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1260l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon l5335scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w3680scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g1820tscope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:12.1.0

Trust: 1.0

vendor:intelmodel:xeon e7-2870 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7500tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon 5030scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon d-2183itscope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:lteversion:11.6.5

Trust: 1.0

vendor:intelmodel:xeon x3230scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:11.5.2

Trust: 1.0

vendor:intelmodel:xeon l5638scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2648l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-2850 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon x3470scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:13.1.0

Trust: 1.0

vendor:intelmodel:xeon e5-2697 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon x5680scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8276lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4628l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5520scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-4809 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-8893 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon d-1602scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon x5470scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1270 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon d-2187ntscope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:12.1.0

Trust: 1.0

vendor:intelmodel:xeon e3-1285l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7567uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-8867 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2224scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8260scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2450 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon d-2166ntscope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:13.1.0

Trust: 1.0

vendor:intelmodel:xeon e-2288gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8400tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5215scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-2125scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5607scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium gold 4417uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1240l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g4930scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2650l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon d-2145ntscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8500yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-8850 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium gold g5420tscope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:13.1.0

Trust: 1.0

vendor:intelmodel:core i9-7920xscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10310yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon d-1557scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7267uscope:eqversion: -

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:30

Trust: 1.0

vendor:intelmodel:core i7-8809gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8400bscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7\+8700scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3930tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-4809 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon x5450scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-8867 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5217scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-9600scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-10710uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g1620tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6242scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2683 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5420scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon d-1527scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:lteversion:15.0.1

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.7

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:15.0.0

Trust: 1.0

vendor:intelmodel:xeon e5-1680 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium gold 4425yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon x3320scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7300tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2680 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 9221scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:14.1.0

Trust: 1.0

vendor:intelmodel:core i5-6287uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w3565scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2640 v3scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:lteversion:13.1.3

Trust: 1.0

vendor:intelmodel:xeon e5-2690 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8100scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5603scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon x5687scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-4870 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-1650 v2scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:lteversion:11.6.5

Trust: 1.0

vendor:intelmodel:xeon platinum 8276scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon x5667scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5500uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1240l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4640 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1245 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 9242scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2226gscope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:11.5.2

Trust: 1.0

vendor:intelmodel:xeon e5-2680 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2660 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon 7130nscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2699a v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7330scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon l3406scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1220 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w3580scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w3550scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-2155scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8700bscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6240mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2620 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4669 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon lc3518scope:eqversion: -

Trust: 1.0

vendor:f5model:enterprise managerscope:eqversion:3.1.1

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:31

Trust: 1.0

vendor:intelmodel:core i7-6567uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon x3360scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2603 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon 7030scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8709gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5215lscope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:14.1.0

Trust: 1.0

vendor:intelmodel:xeon e7-4830 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6234scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7210scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip analyticsscope:lteversion:14.1.2

Trust: 1.0

vendor:intelmodel:xeon e5-2623 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4603 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6230tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon l5430scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6167uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon d-1633nscope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:12.1.0

Trust: 1.0

vendor:intelmodel:xeon d-1513nscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-2295scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5410scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7700kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7600kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6100hscope:eqversion: -

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:intelmodel:xeon l5530scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2667 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2136scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon 5070scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:12.1.0

Trust: 1.0

vendor:intelmodel:xeon 5110scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5540scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2695 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-9700tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon x3380scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-8880l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silver 4214scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10210yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8260yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon d-1577scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7560uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-3223scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon d-1537scope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:intelmodel:core i9-9900x x-seriesscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-8891 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4655 v4scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:13.1.0

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:15.0.0

Trust: 1.0

vendor:intelmodel:pentium gold g5400scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip access policy managerscope:gteversion:11.5.2

Trust: 1.0

vendor:intelmodel:core i7-6560uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-2225scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-8855 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2124gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5\+8500scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w3570scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-9100scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2640 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6500uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-4850 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1275 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-9600tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g1820scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon d-1559scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-8895 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8300scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium gold g5420scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2650l v3scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:gteversion:11.5.2

Trust: 1.0

vendor:intelmodel:xeon e5630scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w3540scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-5157uscope:eqversion: -

Trust: 1.0

vendor:f5model:big-iq centralized managementscope:gteversion:6.0.0

Trust: 1.0

vendor:intelmodel:xeon bronze 3204scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 9282scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-1680 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-10940x x-seriesscope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:lteversion:14.1.2

Trust: 1.0

vendor:intelmodel:core i3-7100hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1230l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5620scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2403 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8253scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon l7445scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon 7041scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:lteversion:14.1.2

Trust: 1.0

vendor:intelmodel:core i3-8300tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2698 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4650 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1505m v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon x3370scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-8891 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon d-1567scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon x3450scope:eqversion: -

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:7.0

Trust: 1.0

vendor:f5model:big-ip analyticsscope:lteversion:15.0.1

Trust: 1.0

vendor:intelmodel:pentium gold 5405uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-1630 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-7980xescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon silver 4210scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6350hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1276 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2630 v2scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:lteversion:14.1.2

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:lteversion:11.6.5

Trust: 1.0

vendor:intelmodel:xeon gold 6244scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1246 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-1620 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2440 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g4900tscope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:15.0.0

Trust: 1.0

vendor:intelmodel:xeon e-2246gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon lv 5133scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2637 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2640 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-7900xscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1275 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5775cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5503scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5440scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip analyticsscope:lteversion:13.1.3

Trust: 1.0

vendor:intelmodel:xeon e7-8860 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6870hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5506scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2234scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5405scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6260uscope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:14.1.0

Trust: 1.0

vendor:f5model:big-ip application security managerscope:lteversion:12.1.5

Trust: 1.0

vendor:intelmodel:xeon e3-1535m v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon x5570scope:eqversion: -

Trust: 1.0

vendor:redhatmodel:openshift container platformscope:eqversion:4.1

Trust: 1.0

vendor:intelmodel:pentium gold g5600tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-4890 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-1650 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-9500tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon x5670scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip link controllerscope:lteversion:11.6.5

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:13.1.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server eusscope:eqversion:7.7

Trust: 1.0

vendor:intelmodel:celeron g1620scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:12.1.0

Trust: 1.0

vendor:intelmodel:xeon e5-1660 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5200uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7350kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4610a v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2670 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8268scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon d-1653nscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7310scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium gold 4410yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon x5647scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon lv 5113scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2126gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2643 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-1620 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6238lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2683 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8145uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2643 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1585 v5scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:gteversion:12.1.0

Trust: 1.0

vendor:intelmodel:xeon e5-2630l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5218nscope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:lteversion:15.0.1

Trust: 1.0

vendor:intelmodel:core i5-7300hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-1035g1scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-8893 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6700hqscope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:lteversion:15.0.1

Trust: 1.0

vendor:intelmodel:xeon gold 5222scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2687w v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6240lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium gold 6405uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon d-2141iscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-2135scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5218bscope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:lteversion:13.1.3

Trust: 1.0

vendor:intelmodel:core i3-7100tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6246scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m3-6y54scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4620 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8260mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2628l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-2133scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:lteversion:15.0.1

Trust: 1.0

vendor:intelmodel:celeron g1840tscope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:lteversion:13.1.3

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:gteversion:12.1.0

Trust: 1.0

vendor:intelmodel:xeon e3-1285 v4scope:eqversion: -

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.6

Trust: 1.0

vendor:intelmodel:core i9-9980xescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1225 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-9400hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7600tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1230 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-3175xscope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip analyticsscope:gteversion:11.5.2

Trust: 1.0

vendor:intelmodel:xeon d-1528scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8109uscope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:lteversion:14.1.2

Trust: 1.0

vendor:intelmodel:xeon x7560scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1545m v5scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip global traffic managerscope:gteversion:11.5.2

Trust: 1.0

vendor:f5model:big-ip application security managerscope:gteversion:13.1.0

Trust: 1.0

vendor:intelmodel:core i3-10110uscope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip advanced firewall managerscope:lteversion:13.1.3

Trust: 1.0

vendor:intelmodel:xeon e5-2637 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2224gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-1660 v2scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:lteversion:12.1.5

Trust: 1.0

vendor:intelmodel:xeon silver 4214yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2699 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon x6550scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip local traffic managerscope:gteversion:14.1.0

Trust: 1.0

vendor:intelmodel:celeron g3900tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7820hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w3530scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon 7040scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m3-6y30scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7700hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5606scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6230scope:eqversion: -

Trust: 1.0

vendor:f5model:big-iq centralized managementscope:lteversion:6.1.0

Trust: 1.0

vendor:intelmodel:celeron g1850scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m3-7y30scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3950scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip application security managerscope:lteversion:11.6.5

Trust: 1.0

vendor:intelmodel:core i9-9940x x-seriesscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-2223scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4657l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon 7120nscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 5220tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon d-1540scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon x3430scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6200uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-8891 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-2245scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium gold 4415yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5350hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m-5y10cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7700tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon 5140scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon d-1531scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon d-1627scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-2145scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon x5472scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-2255scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-9400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7200uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g4930tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4667 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2623 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2430 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2690 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon d-1543nscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon d-1529scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon d-1548scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-10980xescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-10900x x-seriesscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8305gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon lc5518scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon x5355scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon x3210scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1515m v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1240 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7500scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-8860 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-5015uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4640 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-4610 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5335scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon gold 6238mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon l7545scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:lteversion:15.0.1

Trust: 1.0

vendor:intelmodel:xeon e5-4650 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1280 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-9600kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1275 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon w-2123scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5502scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5462scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2658 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-7940xscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-9320scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2630 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-9400tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon 7150nscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5345scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3900scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon 5080scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-8857 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon 5063scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-5005uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1271 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8650uscope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip policy enforcement managerscope:lteversion:13.1.3

Trust: 1.0

vendor:intelmodel:xeon e5-4620 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1235l v5scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip link controllerscope:gteversion:12.1.0

Trust: 1.0

vendor:intelmodel:xeon l5420scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e5-2650 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon platinum 8280scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon l7455scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8265uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7220scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip domain name systemscope:gteversion:15.0.0

Trust: 1.0

vendor:intelmodel:xeon x5492scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e7-2890 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2274gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e6540scope:eqversion: -

Trust: 1.0

vendor:f5model:big-ip fraud protection servicescope:lteversion:11.6.5

Trust: 1.0

vendor:f5model:big-ip application acceleration managerscope:gteversion:11.5.2

Trust: 1.0

vendor:intelmodel:core i5-7y54scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5850hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon l5310scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon 5040scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2236scope:eqversion: -

Trust: 1.0

sources: NVD: CVE-2018-12207

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-12207
value: MEDIUM

Trust: 1.0

VULHUB: VHN-122143
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-12207
severity: MEDIUM
baseScore: 4.9
vectorString: AV:L/AC:L/AU:N/C:N/I:N/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-122143
severity: MEDIUM
baseScore: 4.9
vectorString: AV:L/AC:L/AU:N/C:N/I:N/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-12207
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.0
impactScore: 4.0
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-122143 // NVD: CVE-2018-12207

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.1

sources: VULHUB: VHN-122143 // NVD: CVE-2018-12207

THREAT TYPE

local

Trust: 0.2

sources: PACKETSTORM: 155307 // PACKETSTORM: 155303

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-122143

EXTERNAL IDS

db:NVDid:CVE-2018-12207

Trust: 2.1

db:PACKETSTORMid:155280

Trust: 0.2

db:PACKETSTORMid:155293

Trust: 0.2

db:PACKETSTORMid:155303

Trust: 0.2

db:PACKETSTORMid:155697

Trust: 0.2

db:PACKETSTORMid:155418

Trust: 0.2

db:PACKETSTORMid:155289

Trust: 0.2

db:PACKETSTORMid:155307

Trust: 0.2

db:PACKETSTORMid:155286

Trust: 0.2

db:PACKETSTORMid:155284

Trust: 0.2

db:PACKETSTORMid:155283

Trust: 0.1

db:PACKETSTORMid:155314

Trust: 0.1

db:PACKETSTORMid:155331

Trust: 0.1

db:PACKETSTORMid:155290

Trust: 0.1

db:PACKETSTORMid:155287

Trust: 0.1

db:PACKETSTORMid:155278

Trust: 0.1

db:PACKETSTORMid:155288

Trust: 0.1

db:PACKETSTORMid:155285

Trust: 0.1

db:PACKETSTORMid:155335

Trust: 0.1

db:PACKETSTORMid:155279

Trust: 0.1

db:PACKETSTORMid:155405

Trust: 0.1

db:PACKETSTORMid:155847

Trust: 0.1

db:PACKETSTORMid:155843

Trust: 0.1

db:PACKETSTORMid:155292

Trust: 0.1

db:PACKETSTORMid:155291

Trust: 0.1

db:PACKETSTORMid:156058

Trust: 0.1

db:PACKETSTORMid:155332

Trust: 0.1

db:PACKETSTORMid:155333

Trust: 0.1

db:PACKETSTORMid:155294

Trust: 0.1

db:PACKETSTORMid:155318

Trust: 0.1

db:PACKETSTORMid:155304

Trust: 0.1

db:PACKETSTORMid:155282

Trust: 0.1

db:PACKETSTORMid:155309

Trust: 0.1

db:PACKETSTORMid:155424

Trust: 0.1

db:PACKETSTORMid:155305

Trust: 0.1

db:CNNVDid:CNNVD-201911-694

Trust: 0.1

db:VULHUBid:VHN-122143

Trust: 0.1

db:PACKETSTORMid:155956

Trust: 0.1

sources: VULHUB: VHN-122143 // PACKETSTORM: 155307 // PACKETSTORM: 155284 // PACKETSTORM: 155697 // PACKETSTORM: 155956 // PACKETSTORM: 155303 // PACKETSTORM: 155280 // PACKETSTORM: 155293 // PACKETSTORM: 155418 // PACKETSTORM: 155289 // PACKETSTORM: 155286 // NVD: CVE-2018-12207

REFERENCES

url:https://access.redhat.com/errata/rhsa-2019:3936

Trust: 1.2

url:https://seclists.org/bugtraq/2020/jan/21

Trust: 1.1

url:https://www.debian.org/security/2020/dsa-4602

Trust: 1.1

url:https://security.gentoo.org/glsa/202003-56

Trust: 1.1

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html

Trust: 1.1

url:https://www.oracle.com/security-alerts/cpujul2020.html

Trust: 1.1

url:https://access.redhat.com/errata/rhsa-2019:3916

Trust: 1.1

url:https://access.redhat.com/errata/rhsa-2019:3941

Trust: 1.1

url:https://access.redhat.com/errata/rhsa-2020:0026

Trust: 1.1

url:https://access.redhat.com/errata/rhsa-2020:0028

Trust: 1.1

url:https://access.redhat.com/errata/rhsa-2020:0204

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00042.html

Trust: 1.1

url:https://usn.ubuntu.com/4186-2/

Trust: 1.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-12207

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/i5wwpw4bszddw7vhu427xtvxv7rooffw/

Trust: 1.0

url:https://support.f5.com/csp/article/k17269881?utm_source=f5support&amp%3butm_medium=rss

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/izyatwnughrbg6i3tc24yhp5y3j7i6kh/

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2019-11135

Trust: 0.9

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.6

url:https://bugzilla.redhat.com/):

Trust: 0.6

url:https://access.redhat.com/security/team/key/

Trust: 0.6

url:https://access.redhat.com/security/vulnerabilities/ifu-page-mce

Trust: 0.6

url:https://access.redhat.com/security/team/contact/

Trust: 0.6

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2018-12207

Trust: 0.5

url:https://access.redhat.com/solutions/tsx-asynchronousabort

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2019-11135

Trust: 0.5

url:https://access.redhat.com/articles/11258

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2019-0154

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2019-0154

Trust: 0.3

url:https://access.redhat.com/solutions/i915-graphics

Trust: 0.3

url:https://wiki.ubuntu.com/securityteam/knowledgebase/taa_mcepsc_i915

Trust: 0.2

url:https://www.debian.org/security/faq

Trust: 0.2

url:https://www.debian.org/security/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-0155

Trust: 0.2

url:https://support.f5.com/csp/article/k17269881?utm_source=f5support&amp;amp;utm_medium=rss

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/i5wwpw4bszddw7vhu427xtvxv7rooffw/

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/izyatwnughrbg6i3tc24yhp5y3j7i6kh/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-17056

Trust: 0.1

url:https://usn.ubuntu.com/4185-1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-17054

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-17055

Trust: 0.1

url:https://usn.ubuntu.com/4185-2

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-17053

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-17052

Trust: 0.1

url:https://access.redhat.com/articles/2974891

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2019:3860

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2019:4245

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-19339

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-19339

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-17350

Trust: 0.1

url:https://security-tracker.debian.org/tracker/xen

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-17342

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-18424

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-11091

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-18422

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-18423

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-17344

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-19579

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-17343

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-12126

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-17348

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-17349

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-18420

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-17345

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-12127

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-17347

Trust: 0.1

url:https://xenbits.xen.org/xsa/advisory-305.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-17346

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-18421

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-19577

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-18425

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-17340

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-17341

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-12130

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-19578

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-15792

Trust: 0.1

url:https://usn.ubuntu.com/4183-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/5.3.0-1007.8

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/5.3.0-1008.9

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/5.3.0-1006.7

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-15791

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/5.3.0-1007.8

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-15793

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/5.3.0-1007.8

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/5.3.0-22.24

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-16746

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-17666

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi2/5.3.0-1012.14

Trust: 0.1

url:https://software.intel.com/security-software-guidance/insights/deep-dive-machine-check-error-avoidance-page-size-change-0>.

Trust: 0.1

url:https://en.wikipedia.org/wiki/list_of_intel_graphics_processing_units#gen8>.

Trust: 0.1

url:https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html>

Trust: 0.1

url:https://en.wikipedia.org/wiki/list_of_intel_graphics_processing_units#gen9>.

Trust: 0.1

url:https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/multihit.html>

Trust: 0.1

url:https://security-tracker.debian.org/tracker/linux

Trust: 0.1

url:https://software.intel.com/security-software-guidance/insights/deep-dive-intel-transactional-synchronization-extensions-intel-tsx-asynchronous-abort>.

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2019:3840

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2019:3841

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2019:3838

Trust: 0.1

sources: VULHUB: VHN-122143 // PACKETSTORM: 155307 // PACKETSTORM: 155284 // PACKETSTORM: 155697 // PACKETSTORM: 155956 // PACKETSTORM: 155303 // PACKETSTORM: 155280 // PACKETSTORM: 155293 // PACKETSTORM: 155418 // PACKETSTORM: 155289 // PACKETSTORM: 155286 // NVD: CVE-2018-12207

CREDITS

Red Hat

Trust: 0.6

sources: PACKETSTORM: 155284 // PACKETSTORM: 155697 // PACKETSTORM: 155293 // PACKETSTORM: 155418 // PACKETSTORM: 155289 // PACKETSTORM: 155286

SOURCES

db:VULHUBid:VHN-122143
db:PACKETSTORMid:155307
db:PACKETSTORMid:155284
db:PACKETSTORMid:155697
db:PACKETSTORMid:155956
db:PACKETSTORMid:155303
db:PACKETSTORMid:155280
db:PACKETSTORMid:155293
db:PACKETSTORMid:155418
db:PACKETSTORMid:155289
db:PACKETSTORMid:155286
db:NVDid:CVE-2018-12207

LAST UPDATE DATE

2025-02-22T19:52:15.355000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-122143date:2020-07-15T00:00:00
db:NVDid:CVE-2018-12207date:2024-11-21T03:44:45.313

SOURCES RELEASE DATE

db:VULHUBid:VHN-122143date:2019-11-14T00:00:00
db:PACKETSTORMid:155307date:2019-11-13T17:16:03
db:PACKETSTORMid:155284date:2019-11-12T21:49:19
db:PACKETSTORMid:155697date:2019-12-17T15:39:16
db:PACKETSTORMid:155956date:2020-01-15T17:22:12
db:PACKETSTORMid:155303date:2019-11-13T17:15:23
db:PACKETSTORMid:155280date:2019-11-12T21:45:25
db:PACKETSTORMid:155293date:2019-11-12T21:51:40
db:PACKETSTORMid:155418date:2019-11-20T22:22:22
db:PACKETSTORMid:155289date:2019-11-12T21:50:38
db:PACKETSTORMid:155286date:2019-11-12T21:50:01
db:NVDid:CVE-2018-12207date:2019-11-14T20:15:11.133