ID

VAR-202006-0241


CVE

CVE-2020-0543


TITLE

Multiple Intel Product Information Disclosure Vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-202006-630

DESCRIPTION

Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. Intel 06_3DH and Intel 06_9EH are both a central processing unit (CPU) product of Intel Corporation of the United States. Security vulnerabilities exist in several Intel products. The following products and versions are affected: Intel Celeron 1000M; Celeron 1005M; Celeron 1007U; Celeron 1019Y; Celeron 1020m, etc. ========================================================================= Ubuntu Security Notice USN-4391-1 June 10, 2020 linux, linux-aws, linux-kvm vulnerabilities ========================================================================= A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 16.04 LTS - Ubuntu 14.04 ESM Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-kvm: Linux kernel for cloud environments - linux-lts-xenial: Linux hardware enablement kernel from Xenial for Trusty Details: It was discovered that the ext4 file system implementation in the Linux kernel did not properly handle setxattr operations in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-19319) It was discovered that memory contents previously stored in microarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY read operations on Intel client and Xeon E3 processors may be briefly exposed to processes on the same or different processor cores. A local attacker could use this to expose sensitive information. (CVE-2020-0543) Piotr Krysiuk discovered that race conditions existed in the file system implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2020-12114) It was discovered that the USB susbsystem's scatter-gather implementation in the Linux kernel did not properly take data references in some situations, leading to a use-after-free. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2020-12464) It was discovered that the DesignWare SPI controller driver in the Linux kernel contained a race condition. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2020-12769) It was discovered that the exit signaling implementation in the Linux kernel contained an integer overflow. A local attacker could use this to cause a denial of service (arbitrary application crash). (CVE-2020-12826) Xiumei Mu discovered that the IPSec implementation in the Linux kernel did not properly encrypt IPv6 traffic in some situations. An attacker could use this to expose sensitive information. (CVE-2020-1749) Dmitry Vyukov discovered that the SELinux netlink security hook in the Linux kernel did not validate messages in some situations. A privileged attacker could use this to bypass SELinux netlink restrictions. (CVE-2020-10751) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 LTS: linux-image-4.4.0-1075-kvm 4.4.0-1075.82 linux-image-4.4.0-1109-aws 4.4.0-1109.120 linux-image-4.4.0-184-generic 4.4.0-184.214 linux-image-4.4.0-184-generic-lpae 4.4.0-184.214 linux-image-4.4.0-184-lowlatency 4.4.0-184.214 linux-image-4.4.0-184-powerpc-e500mc 4.4.0-184.214 linux-image-4.4.0-184-powerpc-smp 4.4.0-184.214 linux-image-4.4.0-184-powerpc64-emb 4.4.0-184.214 linux-image-4.4.0-184-powerpc64-smp 4.4.0-184.214 linux-image-aws 4.4.0.1109.113 linux-image-generic 4.4.0.184.190 linux-image-generic-lpae 4.4.0.184.190 linux-image-kvm 4.4.0.1075.73 linux-image-lowlatency 4.4.0.184.190 linux-image-powerpc-e500mc 4.4.0.184.190 linux-image-powerpc-smp 4.4.0.184.190 linux-image-powerpc64-emb 4.4.0.184.190 linux-image-powerpc64-smp 4.4.0.184.190 linux-image-virtual 4.4.0.184.190 Ubuntu 14.04 ESM: linux-image-4.4.0-1073-aws 4.4.0-1073.77 linux-image-4.4.0-184-generic 4.4.0-184.214~14.04.1 linux-image-4.4.0-184-generic-lpae 4.4.0-184.214~14.04.1 linux-image-4.4.0-184-lowlatency 4.4.0-184.214~14.04.1 linux-image-4.4.0-184-powerpc-e500mc 4.4.0-184.214~14.04.1 linux-image-4.4.0-184-powerpc-smp 4.4.0-184.214~14.04.1 linux-image-4.4.0-184-powerpc64-emb 4.4.0-184.214~14.04.1 linux-image-4.4.0-184-powerpc64-smp 4.4.0-184.214~14.04.1 linux-image-aws 4.4.0.1073.70 linux-image-generic-lpae-lts-xenial 4.4.0.184.161 linux-image-generic-lts-xenial 4.4.0.184.161 linux-image-lowlatency-lts-xenial 4.4.0.184.161 linux-image-powerpc-e500mc-lts-xenial 4.4.0.184.161 linux-image-powerpc-smp-lts-xenial 4.4.0.184.161 linux-image-powerpc64-emb-lts-xenial 4.4.0.184.161 linux-image-powerpc64-smp-lts-xenial 4.4.0.184.161 linux-image-virtual-lts-xenial 4.4.0.184.161 Please note that the mitigation for CVE-2020-0543 requires a processor microcode update to be applied, either from your system manufacturer or via the intel-microcode package. The kernel update for this issue provides the ability to disable the mitigation and to report vulnerability status. After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: microcode_ctl security, bug fix and enhancement update Advisory ID: RHSA-2020:2771-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2020:2771 Issue date: 2020-06-30 CVE Names: CVE-2020-0543 CVE-2020-0548 CVE-2020-0549 ==================================================================== 1. Summary: An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.4 Advances Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server AUS (v. 7.4) - x86_64 Red Hat Enterprise Linux Server E4S (v. 7.4) - x86_64 Red Hat Enterprise Linux Server TUS (v. 7.4) - x86_64 3. Description: Security Fix(es): * hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543) * hw: L1D Cache Eviction Sampling (CVE-2020-0549) * hw: Vector Register Data Sampling (CVE-2020-0548) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Update Intel CPU microcode to microcode-20200609 release: - Update of 06-2d-06/0x6d (SNB-E/EN/EP C1/M0) microcode from revision 0x61f up to 0x621; - Update of 06-2d-07/0x6d (SNB-E/EN/EP C2/M1) microcode from revision 0x718 up to 0x71a; - Update of 06-3c-03/0x32 (HSW C0) microcode from revision 0x27 up to 0x28; - Update of 06-3d-04/0xc0 (BDW-U/Y E0/F0) microcode from revision 0x2e up to 0x2f; - Update of 06-45-01/0x72 (HSW-U C0/D0) microcode from revision 0x25 up to 0x26; - Update of 06-46-01/0x32 (HSW-H C0) microcode from revision 0x1b up to 0x1c; - Update of 06-47-01/0x22 (BDW-H/Xeon E3 E0/G0) microcode from revision 0x21 up to 0x22; - Update of 06-4e-03/0xc0 (SKL-U/Y D0) microcode from revision 0xd6 up to 0xdc; - Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000151 up to 0x1000157; - Update of 06-55-04/0xb7 (SKX-SP H0/M0/U0, SKX-D M1) microcode (in intel-06-55-04/intel-ucode/06-55-04) from revision 0x2000065 up to 0x2006906; - Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x400002c up to 0x4002f01; - Update of 06-55-07/0xbf (CLX-SP B1) microcode from revision 0x500002c up to 0x5002f01; - Update of 06-5e-03/0x36 (SKL-H/S R0/N0) microcode from revision 0xd6 up to 0xdc; - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x46 up to 0x78; - Update of 06-8e-09/0x10 (AML-Y22 H0) microcode from revision 0xca up to 0xd6; - Update of 06-8e-09/0xc0 (KBL-U/Y H0) microcode from revision 0xca up to 0xd6; - Update of 06-8e-0a/0xc0 (CFL-U43e D0) microcode from revision 0xca up to 0xd6; - Update of 06-8e-0b/0xd0 (WHL-U W0) microcode from revision 0xca up to 0xd6; - Update of 06-8e-0c/0x94 (AML-Y42 V0, CML-Y42 V0, WHL-U V0) microcode from revision 0xca up to 0xd6; - Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode from revision 0xca up to 0xd6; - Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E3 U0) microcode from revision 0xca up to 0xd6; - Update of 06-9e-0b/0x02 (CFL-S B0) microcode from revision 0xca up to 0xd6; - Update of 06-9e-0c/0x22 (CFL-H/S P0) microcode from revision 0xca up to 0xd6; - Update of 06-9e-0d/0x22 (CFL-H R0) microcode from revision 0xca up to 0xd6. * Do not update 06-4e-03 (SKL-U/Y) and 06-5e-03 (SKL-H/S/Xeon E3 v5) to revision 0xdc, use 0xd6 by default. * Enable 06-2d-07 (SNB-E/EN/EP) caveat by default. * Enable 06-55-04 (SKL-SP/X/W) caveat by default. * Avoid find being SIGPIPE'd on early "grep -q" exit in the dracut script. * Re-generate initramfs not only for the currently running kernel, but for several recently installed kernels as well. * Change the URL in the intel-microcode2ucode.8 to point to the GitHub repository since the microcode download section at Intel Download Center does not exist anymore. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1788786 - CVE-2020-0548 hw: Vector Register Data Sampling 1788788 - CVE-2020-0549 hw: L1D Cache Eviction Sampling 1827165 - CVE-2020-0543 hw: Special Register Buffer Data Sampling (SRBDS) 1849061 - [rhel-7.4.z] Enable SNB-EP caveat by default 6. Package List: Red Hat Enterprise Linux Server AUS (v. 7.4): Source: microcode_ctl-2.1-22.32.el7_4.src.rpm x86_64: microcode_ctl-2.1-22.32.el7_4.x86_64.rpm microcode_ctl-debuginfo-2.1-22.32.el7_4.x86_64.rpm Red Hat Enterprise Linux Server E4S (v. 7.4): Source: microcode_ctl-2.1-22.32.el7_4.src.rpm x86_64: microcode_ctl-2.1-22.32.el7_4.x86_64.rpm microcode_ctl-debuginfo-2.1-22.32.el7_4.x86_64.rpm Red Hat Enterprise Linux Server TUS (v. 7.4): Source: microcode_ctl-2.1-22.32.el7_4.src.rpm x86_64: microcode_ctl-2.1-22.32.el7_4.x86_64.rpm microcode_ctl-debuginfo-2.1-22.32.el7_4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2020-0543 https://access.redhat.com/security/cve/CVE-2020-0548 https://access.redhat.com/security/cve/CVE-2020-0549 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/solutions/5142691 https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXvsshdzjgjWX9erEAQgX/A/+JMPvZ7Yd2pxBU4uxBjmUx6B2pNMLLn0V HJnb8yuhEjZI5dcG1Dt3Uo/rNXV7iNFX2SQxjUV7MSL0JNJp6PfuJB2tyN4X80cZ 399yb47HJdLcnX2B0fB11FxNF4+cgf4qsGKx+5RX80CDFkwAsjVe5CvoLV9Mi77B fWNlbeccJCEEN9P+v9fpozf13eD8mucqCoWZIRhFRJJgohO2Q+szz9oZRGMXHI2O hI3IbWXj26jovWgvj0Kscy17YyqccMDgOlOXhTR4KtP3vw5F5ebVrsBOh1P36K4l rUeux8tAWhJnSlt9IX+Fw8YFA/aiVZWEhyxsOGCBDYA4YwhHpBoZG4jwEEnpG8qI YKcYm/Q1mq4cZs0nlyuFEebqaItO+x06T//hWvdaYgUXnORDADxurSs+UJoykbkW DxAIqA2oldF/QJp/1vMTwPqJSLxt+0BOXtSBKaFw9YXRql8dxLkY0ItD+UUAzs8R nV8YK8t+owpGShIsk13BmMYi7FEcqUK8U/KSYpW96Qw4GP+RM2lddewEI9mpZnqg kVjS0xZ2fKIkbVNHnMlGx3PhVcJznhpj1UEbz3fwNgambSMofBPfbEBBtQxv8sDG Z0bl4NjqZVQxSyHLEEx1sAiXpJZXRTuxL/uRpZLFVxFvkglIC4ZLT6DHl2pJKQqx WnZ1F8Y/iFA=CtiE -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . Summary: Updated microcode_ctl packages that fix several security bugs and add various enhancements are now available. Description: The microcode_ctl packages provide microcode updates for Intel

Trust: 1.53

sources: NVD: CVE-2020-0543 // VULHUB: VHN-161977 // PACKETSTORM: 163966 // PACKETSTORM: 158009 // PACKETSTORM: 158013 // PACKETSTORM: 158250 // PACKETSTORM: 158197 // PACKETSTORM: 163993

AFFECTED PRODUCTS

vendor:intelmodel:core i3-3217uescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8120scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6600tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1245 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7007uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4010yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7210uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4010uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 4405yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3560yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 3765uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g5400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5675cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8100scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3240scope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:19.10

Trust: 1.0

vendor:intelmodel:core i7-8705gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium a1018 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1125c v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6310uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1270 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3900tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3120mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 1037uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3450tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-9850hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3220tscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc627escope:ltversion:25.02.06

Trust: 1.0

vendor:intelmodel:core i7-8569uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 1000mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1505l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7820hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2124scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3229yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m5-6y54scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4430sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4030uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7920hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7300uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2146gscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc427dscope:eqversion:*

Trust: 1.0

vendor:intelmodel:xeon e3-1505m v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6600scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2184gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7567uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1280 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3470scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6820hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2286mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8709gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6300uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core 4205uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4130scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1225 v2scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc477e proscope:ltversion:21.01.14

Trust: 1.0

vendor:intelmodel:core i7-7700tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7320tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6510uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m-5y10cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3840qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7100uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 3865uscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic itp1000scope:ltversion:23.01.08

Trust: 1.0

vendor:intelmodel:celeron 2957uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 1020mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6100escope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3689yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1265l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4402ecscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3517uescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4250uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3520mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8400hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7442eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1225 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8700kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1245 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2174gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1285l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8400bscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 3965yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3570kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4700ecscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-9600kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4160tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5350uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7y75scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m3-7y30scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1501l v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6567uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3439yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3570scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6870hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1286 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g1620tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4030yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4258uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4702mqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1220 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-9400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3220tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1585l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6300scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4100mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1268l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5700hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4590tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3555lescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4770sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1290 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1246 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1275 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3930tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8300tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8350kscope:eqversion: -

Trust: 1.0

vendor:mcafeemodel:threat intelligence exchange serverscope:lteversion:2.3.1

Trust: 1.0

vendor:intelmodel:pentium g5400tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1271 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4750hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3900tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3360mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8130uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-10510uscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc627dscope:eqversion:*

Trust: 1.0

vendor:intelmodel:core i7-3612qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g5500scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic field pg m6scope:ltversion:26.01.07

Trust: 1.0

vendor:intelmodel:xeon e3-1505l v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4288uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4810mqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4370scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 927uescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m-5y70scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1275 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1545m v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4350uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3260scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1258l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2276mescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4005uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-5015uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7440eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7102escope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8600kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4570rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-8950hkscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 2981uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4020yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6100hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3350pscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3920scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5575rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1240l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 5305uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m-5y10scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3610mescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1105c v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3610qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2244gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1220 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-5010uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g4900scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1105cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1270 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1281 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1515m v5scope:eqversion: -

Trust: 1.0

vendor:opensusemodel:leapscope:eqversion:15.1

Trust: 1.0

vendor:intelmodel:celeron 1020escope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7500scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2124gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4500uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-5005uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3635qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7400tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5750hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4360scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7101tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1225 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4500scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4790tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6100uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8300hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-9700kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4712mqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7600uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4785tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7360uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2234scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8020scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4300uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3317uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4540scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g5600scope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:18.04

Trust: 1.0

vendor:intelmodel:core m7-6y75scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4520scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4360tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3430scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6110uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6650uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3217uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 725cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6440eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4012yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5950hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4860hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8259uscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc427escope:ltversion:21.01.14

Trust: 1.0

vendor:intelmodel:xeon e3-1505m v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6360uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3320mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4200uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7167uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3340mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m-5y10ascope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3420tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8100tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 1019yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3765uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4710hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3225scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4400tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3210mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium gold 6405uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4670rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4600uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1245 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3210scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8700bscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1278l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7560uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3667uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6400tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8670tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3825uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g2140 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g5500tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6267uscope:eqversion: -

Trust: 1.0

vendor:mcafeemodel:threat intelligence exchange serverscope:gteversion:2.0.0

Trust: 1.0

vendor:intelmodel:celeron g1610scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7260uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4670kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5775cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-9600kfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4760hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7500tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m3-6y30scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1230 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6820hkscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6500scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4770rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4400tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1558l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6500tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3902escope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3250tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1240 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2276gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4278uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5650uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3240tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3340sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4210yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7110uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3450scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic field pg m5scope:ltversion:22.01.08

Trust: 1.0

vendor:intelmodel:core i5-4690sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8400tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6100scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3205uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8265uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g1820tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6500uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6700tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7y57scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3940xmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8700tscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc677dscope:eqversion:*

Trust: 1.0

vendor:intelmodel:celeron 2980uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3920tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4158uscope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:20.04

Trust: 1.0

vendor:intelmodel:core i9-9900kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3460scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1501m v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2284gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3556uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5350scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7020uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1220l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6820eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3227uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g2120t v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4210hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1578l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4590scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3920xmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3770kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3558uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4570scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4770tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7120scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4220yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1280 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8700scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8100hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2278gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4300yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4900mqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5850hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g4920scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4370tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-9880hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3250scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6120tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2226gescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1245 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1230l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m5-6y57scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8809gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8420scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g2030 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m-5y51scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1220 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4690tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6822eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g2100t v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4100uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1286l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6100tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-9900kfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 2129y v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1225 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8250uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1260l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 2030m v2scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc527gscope:ltversion:1.4.0

Trust: 1.0

vendor:intelmodel:core 9750hfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3570tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3450sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m3-8100yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core 4410yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6500tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 1405 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3560mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6320tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3330scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6700tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2126gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8557uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4330tscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc847dscope:eqversion:*

Trust: 1.0

vendor:intelmodel:pentium g5420scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1240 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g2010 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3770tscope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.0

vendor:intelmodel:pentium g2130 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8210yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3230mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7300hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1235 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1241 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3250scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g1850scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10210yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 1017uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4670scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3220scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc477escope:ltversion:21.01.14

Trust: 1.0

vendor:intelmodel:core i3-4110mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8850hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4308uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8550scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4130tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4500tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7200uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 1047uescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3615qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5600uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-5157uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1240 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7267uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3632qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3470sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6660uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4120uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4202yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 2020m v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 2955uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3260tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2288gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-i3-8100hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7700hqscope:eqversion: -

Trust: 1.0

vendor:opensusemodel:leapscope:eqversion:15.2

Trust: 1.0

vendor:intelmodel:celeron g3940scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3612qescope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 2127u v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3820qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2186mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3537uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8500tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4770hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4170scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4770kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7510uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4440sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1125cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4150tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4350scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core 4415yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6300tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3440scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3380mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1575m v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5257uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2134scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1280 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3340scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4590sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3770scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6770hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6350hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1235l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8420tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4440scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4260uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5557uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8500bscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7700scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4765tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6120scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7700kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2276mlscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 3755uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4710mqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7500uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-2115cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4025uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g2020 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7100escope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2176mscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc547gscope:ltversion:r1.28.0

Trust: 1.0

vendor:intelmodel:celeron g1840scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4150scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8145uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4670sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6260uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4722hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4790sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7740xscope:eqversion: -

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:31

Trust: 1.0

vendor:intelmodel:core i5-10210uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7600tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3900scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-9980hkscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic field pg m4scope:eqversion:*

Trust: 1.0

vendor:intelmodel:celeron g1840tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4570sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g4950scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g1610tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6287uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6600uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3450scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4210uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7440hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3610qescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3615qescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4460scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g4900tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4980hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 3955uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4558uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1220 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2278gelscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2224gscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc647escope:ltversion:25.02.06

Trust: 1.0

vendor:intelmodel:core 8269uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3805uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-9400hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7820hkscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3550sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5200uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2254mescope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:intelmodel:xeon e3-1270scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3115cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3240scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4670tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7660uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1535m v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g1630scope:eqversion: -

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:32

Trust: 1.0

vendor:intelmodel:core i5-3475sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7600scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6200uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1226 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1280 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3330sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core 9300hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8565uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4700eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6700scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium b925cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2236scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7120tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 4405uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1265lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3470tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4170tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4702ecscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3420scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1275l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium b915cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6920hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8670scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8510yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4578uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4700hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-9700kfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3460tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g5420tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2144gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2136scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7101escope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7600kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4870hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3240tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2224scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3120mescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7820eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3540mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1275 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-10510yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4200yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4330scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4520tscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc647dscope:eqversion:*

Trust: 1.0

vendor:intelmodel:core m-5y3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 2970mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1285 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8600scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5550uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8706gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 1007uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4790scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8559uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4700mqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4690scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2274gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3550scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3258scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-9400fscope:eqversion: -

Trust: 1.0

vendor:mcafeemodel:threat intelligence exchange serverscope:eqversion:3.0.0

Trust: 1.0

vendor:intelmodel:core i5-3437uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4702hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7340scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3517uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2276mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3770sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6210uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4712hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6700hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6100tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6320scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4550uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4460tscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc827dscope:eqversion:*

Trust: 1.0

vendor:intelmodel:core i3-6167uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5287uscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc847escope:ltversion:25.02.06

Trust: 1.0

vendor:intelmodel:celeron g1820scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1585 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1230 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3570sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8305gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g2120 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2246gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1270 v2scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc3000 smartscope:ltversion:1.b

Trust: 1.0

vendor:intelmodel:core i5-6442eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4800mqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5250uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8650uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7640xscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2278gescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8310yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8650kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6440hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6300hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3440tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1240l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6560uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1268l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8650scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1276 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1240 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1230 v5scope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:16.04

Trust: 1.0

vendor:intelmodel:core i3-3130mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1220l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g4930scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3110mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8750hscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc347escope:eqversion:*

Trust: 1.0

vendor:intelmodel:core i5-10310yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4570tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g2020t v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1231 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3720qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3687uscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simotion p320-4escope:eqversion:*

Trust: 1.0

vendor:intelmodel:pentium g3470scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3561yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6600kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1230 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5850eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4910mqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3630qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8500scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3427uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1565l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6700kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6970hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8200yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8365uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4430scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7500uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4960hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7130uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g1830scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4350tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8560uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g1620scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3665uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2176gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 3965uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8550uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m-5y71scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8600tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4720hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1285 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 1005mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3337uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1275 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8109uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10110yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7100hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 4415uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1265l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 2117u v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7y54scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4610yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-5006uscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simotion p320-4sscope:eqversion:*

Trust: 1.0

vendor:intelmodel:core 5405uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8300scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1285 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4510uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3339yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5700eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2186gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4770scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8665uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4420tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2254mlscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc677escope:ltversion:25.02.06

Trust: 1.0

vendor:intelmodel:core i5-4302yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3245scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3740qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4460sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3250tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4160scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2226gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8350uscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc477dscope:eqversion:*

Trust: 1.0

vendor:intelmodel:core i3-8000tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5775rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4650uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3930escope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4950hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4420scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1535m v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7287uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3215uscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc547escope:eqversion:*

Trust: 1.0

vendor:intelmodel:celeron 3855uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4850hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1221 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8500yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g2030t v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4340scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5500uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5675rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4771scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3220scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-5020uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6102escope:eqversion: -

Trust: 1.0

sources: NVD: CVE-2020-0543

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-0543
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-202006-630
value: MEDIUM

Trust: 0.6

VULHUB: VHN-161977
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2020-0543
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-161977
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-0543
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 1.8
impactScore: 3.6
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-161977 // CNNVD: CNNVD-202006-630 // NVD: CVE-2020-0543

PROBLEMTYPE DATA

problemtype:CWE-459

Trust: 1.1

problemtype:CWE-200

Trust: 0.1

sources: VULHUB: VHN-161977 // NVD: CVE-2020-0543

THREAT TYPE

local

Trust: 0.8

sources: PACKETSTORM: 158009 // PACKETSTORM: 158013 // CNNVD: CNNVD-202006-630

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-202006-630

PATCH

title:Multiple Intel Product security vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=121405

Trust: 0.6

sources: CNNVD: CNNVD-202006-630

EXTERNAL IDS

db:NVDid:CVE-2020-0543

Trust: 2.3

db:MCAFEEid:SB10318

Trust: 1.7

db:OPENWALLid:OSS-SECURITY/2020/07/14/5

Trust: 1.7

db:SIEMENSid:SSA-534763

Trust: 1.7

db:PACKETSTORMid:158250

Trust: 0.8

db:PACKETSTORMid:158015

Trust: 0.7

db:PACKETSTORMid:168421

Trust: 0.7

db:PACKETSTORMid:158198

Trust: 0.7

db:PACKETSTORMid:157997

Trust: 0.7

db:PACKETSTORMid:158039

Trust: 0.7

db:PACKETSTORMid:158355

Trust: 0.7

db:PACKETSTORMid:158238

Trust: 0.7

db:CNNVDid:CNNVD-202006-630

Trust: 0.7

db:PACKETSTORMid:163993

Trust: 0.7

db:AUSCERTid:ESB-2022.4642

Trust: 0.6

db:AUSCERTid:ESB-2020.2181

Trust: 0.6

db:AUSCERTid:ESB-2020.2181.2

Trust: 0.6

db:AUSCERTid:ESB-2021.2721

Trust: 0.6

db:AUSCERTid:ESB-2020.3420

Trust: 0.6

db:AUSCERTid:ESB-2021.2797

Trust: 0.6

db:AUSCERTid:ESB-2020.3063

Trust: 0.6

db:AUSCERTid:ESB-2020.2739

Trust: 0.6

db:AUSCERTid:ESB-2020.3108

Trust: 0.6

db:AUSCERTid:ESB-2020.2018

Trust: 0.6

db:AUSCERTid:ESB-2021.2945

Trust: 0.6

db:AUSCERTid:ESB-2020.3043

Trust: 0.6

db:AUSCERTid:ESB-2020.2181.3

Trust: 0.6

db:AUSCERTid:ESB-2021.2672

Trust: 0.6

db:AUSCERTid:ESB-2022.6539

Trust: 0.6

db:AUSCERTid:ESB-2020.2057

Trust: 0.6

db:AUSCERTid:ESB-2020.2500

Trust: 0.6

db:AUSCERTid:ESB-2021.1565

Trust: 0.6

db:AUSCERTid:ESB-2020.2048

Trust: 0.6

db:AUSCERTid:ESB-2020.2330

Trust: 0.6

db:AUSCERTid:ESB-2020.3080

Trust: 0.6

db:AUSCERTid:ESB-2020.3485

Trust: 0.6

db:AUSCERTid:ESB-2021.2905

Trust: 0.6

db:PACKETSTORMid:163772

Trust: 0.6

db:PACKETSTORMid:163863

Trust: 0.6

db:PACKETSTORMid:163757

Trust: 0.6

db:ICS CERTid:ICSA-20-252-07

Trust: 0.6

db:CS-HELPid:SB2021083127

Trust: 0.6

db:CS-HELPid:SB2021081125

Trust: 0.6

db:CS-HELPid:SB2021080915

Trust: 0.6

db:CS-HELPid:SB2021081834

Trust: 0.6

db:LENOVOid:LEN-30043

Trust: 0.6

db:PACKETSTORMid:158197

Trust: 0.2

db:PACKETSTORMid:157993

Trust: 0.1

db:PACKETSTORMid:158183

Trust: 0.1

db:PACKETSTORMid:158010

Trust: 0.1

db:PACKETSTORMid:158189

Trust: 0.1

db:PACKETSTORMid:158008

Trust: 0.1

db:PACKETSTORMid:158005

Trust: 0.1

db:PACKETSTORMid:158237

Trust: 0.1

db:PACKETSTORMid:158190

Trust: 0.1

db:VULHUBid:VHN-161977

Trust: 0.1

db:PACKETSTORMid:163966

Trust: 0.1

db:PACKETSTORMid:158009

Trust: 0.1

db:PACKETSTORMid:158013

Trust: 0.1

sources: VULHUB: VHN-161977 // PACKETSTORM: 163966 // PACKETSTORM: 158009 // PACKETSTORM: 158013 // PACKETSTORM: 158250 // PACKETSTORM: 158197 // PACKETSTORM: 163993 // CNNVD: CNNVD-202006-630 // NVD: CVE-2020-0543

REFERENCES

url:https://cert-portal.siemens.com/productcert/pdf/ssa-534763.pdf

Trust: 1.7

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00320.html

Trust: 1.7

url:http://www.openwall.com/lists/oss-security/2020/07/14/5

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00025.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html

Trust: 1.7

url:https://usn.ubuntu.com/4385-1/

Trust: 1.7

url:https://usn.ubuntu.com/4387-1/

Trust: 1.7

url:https://usn.ubuntu.com/4388-1/

Trust: 1.7

url:https://usn.ubuntu.com/4389-1/

Trust: 1.7

url:https://usn.ubuntu.com/4390-1/

Trust: 1.7

url:https://usn.ubuntu.com/4391-1/

Trust: 1.7

url:https://usn.ubuntu.com/4392-1/

Trust: 1.7

url:https://usn.ubuntu.com/4393-1/

Trust: 1.7

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10318

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2020-0543

Trust: 1.2

url:https://access.redhat.com/security/cve/cve-2020-0543

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/nqzmoshltbbiecennxa6m7dn5feed4ki/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/grfc7uapkaffh5wx3amdubvhlkyqa2nz/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/dt2vkdmq3i37nbnj256a2exr7ojhxxkz/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/t5oum24zc43g4idt3jucihjtsdxjsk6y/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/dt2vkdmq3i37nbnj256a2exr7ojhxxkz/

Trust: 0.7

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/grfc7uapkaffh5wx3amdubvhlkyqa2nz/

Trust: 0.7

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/nqzmoshltbbiecennxa6m7dn5feed4ki/

Trust: 0.7

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/t5oum24zc43g4idt3jucihjtsdxjsk6y/

Trust: 0.7

url:https://us-cert.cisa.gov/ics/advisories/icsa-20-252-07

Trust: 0.6

url:https://packetstormsecurity.com/files/163863/red-hat-security-advisory-2021-3176-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/163757/red-hat-security-advisory-2021-3027-01.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021081834

Trust: 0.6

url:https://packetstormsecurity.com/files/158015/ubuntu-security-notice-usn-4392-1.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2057/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2330/

Trust: 0.6

url:https://packetstormsecurity.com/files/158250/red-hat-security-advisory-2020-2771-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/158039/ubuntu-security-notice-usn-4385-2.html

Trust: 0.6

url:https://packetstormsecurity.com/files/157997/red-hat-security-advisory-2020-2433-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2500/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.3080/

Trust: 0.6

url:https://packetstormsecurity.com/files/163772/red-hat-security-advisory-2021-3029-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/168421/ubuntu-security-notice-usn-5617-1.html

Trust: 0.6

url:https://packetstormsecurity.com/files/158198/red-hat-security-advisory-2020-2706-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.3420/

Trust: 0.6

url:https://support.lenovo.com/us/en/product_security/len-30043

Trust: 0.6

url:https://packetstormsecurity.com/files/158238/red-hat-security-advisory-2020-2758-01.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021081125

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021083127

Trust: 0.6

url:https://packetstormsecurity.com/files/163993/red-hat-security-advisory-2021-3364-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2181.2/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.6539

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2905

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2181/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.3108/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2048/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2721

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021080915

Trust: 0.6

url:https://vigilance.fr/vulnerability/intel-processors-information-disclosure-via-special-register-buffer-data-sampling-32486

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2945

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2672

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.3063/

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-has-released-a-unified-extensible-firmware-interface-uefi-fix-in-response-to-an-intel-escalation-of-information-disclosure-vulnerability/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1565

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2797

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2018/

Trust: 0.6

url:https://packetstormsecurity.com/files/158355/red-hat-security-advisory-2020-2842-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2739/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.4642

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2181.3/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.3043/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.3485/

Trust: 0.6

url:https://access.redhat.com/articles/11258

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-0549

Trust: 0.4

url:https://access.redhat.com/security/team/key/

Trust: 0.4

url:https://access.redhat.com/security/team/contact/

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-0549

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-0548

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-0548

Trust: 0.4

url:https://bugzilla.redhat.com/):

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-8696

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-24511

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-8698

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-24512

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-24512

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-24489

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-24489

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-8698

Trust: 0.2

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-8695

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-8695

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-8696

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-24511

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-12114

Trust: 0.2

url:https://wiki.ubuntu.com/securityteam/knowledgebase/srbds

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-12464

Trust: 0.2

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.2

url:https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.2

url:https://access.redhat.com/solutions/5142691

Trust: 0.2

url:https://kc.mcafee.com/corporate/index?page=content&amp;id=sb10318

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:3317

Trust: 0.1

url:https://usn.ubuntu.com/4387-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gke-5.3/5.3.0-1026.28~18.04.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-0067

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-12659

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/5.3.0-1024.26

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/5.3.0-1023.25

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/5.3.0-1023.25

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp-5.3/5.3.0-1026.28~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle-5.3/5.3.0-1024.26~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws-5.3/5.3.0-1023.25~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/5.3.0-59.53

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure-5.3/5.3.0-1028.29~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/5.3.0-1028.29

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-hwe/5.3.0-59.53~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/5.3.0-1026.28

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-19319

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/4.4.0-1075.82

Trust: 0.1

url:https://usn.ubuntu.com/4391-1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-12826

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/4.4.0-184.214

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-12769

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-1749

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-10751

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1109.120

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:2771

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:2707

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:3364

Trust: 0.1

sources: VULHUB: VHN-161977 // PACKETSTORM: 163966 // PACKETSTORM: 158009 // PACKETSTORM: 158013 // PACKETSTORM: 158250 // PACKETSTORM: 158197 // PACKETSTORM: 163993 // CNNVD: CNNVD-202006-630 // NVD: CVE-2020-0543

CREDITS

Red Hat

Trust: 1.0

sources: PACKETSTORM: 163966 // PACKETSTORM: 158250 // PACKETSTORM: 158197 // PACKETSTORM: 163993 // CNNVD: CNNVD-202006-630

SOURCES

db:VULHUBid:VHN-161977
db:PACKETSTORMid:163966
db:PACKETSTORMid:158009
db:PACKETSTORMid:158013
db:PACKETSTORMid:158250
db:PACKETSTORMid:158197
db:PACKETSTORMid:163993
db:CNNVDid:CNNVD-202006-630
db:NVDid:CVE-2020-0543

LAST UPDATE DATE

2024-12-21T21:17:19.069000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-161977date:2022-04-28T00:00:00
db:CNNVDid:CNNVD-202006-630date:2022-12-16T00:00:00
db:NVDid:CVE-2020-0543date:2024-11-21T04:53:42.440

SOURCES RELEASE DATE

db:VULHUBid:VHN-161977date:2020-06-15T00:00:00
db:PACKETSTORMid:163966date:2021-08-31T15:56:51
db:PACKETSTORMid:158009date:2020-06-10T15:08:02
db:PACKETSTORMid:158013date:2020-06-10T15:08:51
db:PACKETSTORMid:158250date:2020-06-30T18:04:33
db:PACKETSTORMid:158197date:2020-06-23T21:18:24
db:PACKETSTORMid:163993date:2021-08-31T16:27:14
db:CNNVDid:CNNVD-202006-630date:2020-06-09T00:00:00
db:NVDid:CVE-2020-0543date:2020-06-15T14:15:11.207