ID

VAR-202006-0241


CVE

CVE-2020-0543


TITLE

Debian Security Advisory 4698-1

Trust: 0.1

sources: PACKETSTORM: 168855

DESCRIPTION

Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. Intel 06_3DH and Intel 06_9EH are both a central processing unit (CPU) product of Intel Corporation of the United States. Security vulnerabilities exist in several Intel products. The following products and versions are affected: Intel Celeron 1000M; Celeron 1005M; Celeron 1007U; Celeron 1019Y; Celeron 1020m, etc. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-4698-1 security@debian.org https://www.debian.org/security/ Ben Hutchings June 09, 2020 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : linux CVE ID : CVE-2019-2182 CVE-2019-5108 CVE-2019-19319 CVE-2019-19462 CVE-2019-19768 CVE-2019-20806 CVE-2019-20811 CVE-2020-0543 CVE-2020-2732 CVE-2020-8428 CVE-2020-8647 CVE-2020-8648 CVE-2020-8649 CVE-2020-9383 CVE-2020-10711 CVE-2020-10732 CVE-2020-10751 CVE-2020-10757 CVE-2020-10942 CVE-2020-11494 CVE-2020-11565 CVE-2020-11608 CVE-2020-11609 CVE-2020-11668 CVE-2020-12114 CVE-2020-12464 CVE-2020-12652 CVE-2020-12653 CVE-2020-12654 CVE-2020-12770 CVE-2020-13143 Debian Bug : 952660 Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. CVE-2019-2182 Hanjun Guo and Lei Li reported a race condition in the arm64 virtual memory management code, which could lead to an information disclosure, denial of service (crash), or possibly privilege escalation. CVE-2019-5108 Mitchell Frank of Cisco discovered that when the IEEE 802.11 (WiFi) stack was used in AP mode with roaming, it would trigger roaming for a newly associated station before the station was authenticated. An attacker within range of the AP could use this to cause a denial of service, either by filling up a switching table or by redirecting traffic away from other stations. CVE-2019-19319 Jungyeon discovered that a crafted filesystem can cause the ext4 implementation to deallocate or reallocate journal blocks. A user permitted to mount filesystems could use this to cause a denial of service (crash), or possibly for privilege escalation. CVE-2019-19462 The syzbot tool found a missing error check in the 'relay' library used to implement various files under debugfs. A local user permitted to access debugfs could use this to cause a denial of service (crash) or possibly for privilege escalation. CVE-2019-19768 Tristan Madani reported a race condition in the blktrace debug facility that could result in a use-after-free. A local user able to trigger removal of block devices could possibly use this to cause a denial of service (crash) or for privilege escalation. CVE-2019-20806 A potential null pointer dereference was discovered in the tw5864 media driver. The security impact of this is unclear. CVE-2019-20811 The Hulk Robot tool found a reference-counting bug in an error path in the network subsystem. The security impact of this is unclear. CVE-2020-0543 Researchers at VU Amsterdam discovered that on some Intel CPUs supporting the RDRAND and RDSEED instructions, part of a random value generated by these instructions may be used in a later speculative execution on any core of the same physical CPU. Depending on how these instructions are used by applications, a local user or VM guest could use this to obtain sensitive information such as cryptographic keys from other users or VMs. This vulnerability can be mitigated by a microcode update, either as part of system firmware (BIOS) or through the intel-microcode package in Debian's non-free archive section. This kernel update only provides reporting of the vulnerability and the option to disable the mitigation if it is not needed. CVE-2020-2732 Paulo Bonzini discovered that the KVM implementation for Intel processors did not properly handle instruction emulation for L2 guests when nested virtualization is enabled. This could allow an L2 guest to cause privilege escalation, denial of service, or information leaks in the L1 guest. CVE-2020-8428 Al Viro discovered a potential use-after-free in the filesystem core (vfs). A local user could exploit this to cause a denial of service (crash) or possibly to obtain sensitive information from the kernel. CVE-2020-8647, CVE-2020-8649 The Hulk Robot tool found a potential MMIO out-of-bounds access in the vgacon driver. A local user permitted to access a virtual terminal (/dev/tty1 etc.) on a system using the vgacon driver could use this to cause a denial of service (crash or memory corruption) or possibly for privilege escalation. CVE-2020-8648 The syzbot tool found a race condition in the the virtual terminal driver, which could result in a use-after-free. A local user permitted to access a virtual terminal could use this to cause a denial of service (crash or memory corruption) or possibly for privilege escalation. CVE-2020-9383 Jordy Zomer reported an incorrect range check in the floppy driver which could lead to a static out-of-bounds access. A local user permitted to access a floppy drive could use this to cause a denial of service (crash or memory corruption) or possibly for privilege escalation. CVE-2020-10711 Matthew Sheets reported NULL pointer dereference issues in the SELinux subsystem while receiving CIPSO packet with null category. A remote attacker can take advantage of this flaw to cause a denial of service (crash). Note that this issue does not affect the binary packages distributed in Debian as CONFIG_NETLABEL is not enabled. CVE-2020-10732 An information leak of kernel private memory to userspace was found in the kernel's implementation of core dumping userspace processes. CVE-2020-10751 Dmitry Vyukov reported that the SELinux subsystem did not properly handle validating multiple messages, which could allow a privileged attacker to bypass SELinux netlink restrictions. CVE-2020-10757 Fan Yang reported a flaw in the way mremap handled DAX hugepages, allowing a local user to escalate their privileges CVE-2020-10942 It was discovered that the vhost_net driver did not properly validate the type of sockets set as back-ends. A local user permitted to access /dev/vhost-net could use this to cause a stack corruption via crafted system calls, resulting in denial of service (crash) or possibly privilege escalation. CVE-2020-11494 It was discovered that the slcan (serial line CAN) network driver did not fully initialise CAN headers for received packets, resulting in an information leak from the kernel to user-space or over the CAN network. CVE-2020-11565 Entropy Moe reported that the shared memory filesystem (tmpfs) did not correctly handle an "mpol" mount option specifying an empty node list, leading to a stack-based out-of-bounds write. If user namespaces are enabled, a local user could use this to cause a denial of service (crash) or possibly for privilege escalation. CVE-2020-11608, CVE-2020-11609, CVE-2020-11668 It was discovered that the ov519, stv06xx, and xirlink_cit media drivers did not properly validate USB device descriptors. A physically present user with a specially constructed USB device could use this to cause a denial-of-service (crash) or possibly for privilege escalation. CVE-2020-12114 Piotr Krysiuk discovered a race condition between the umount and pivot_root operations in the filesystem core (vfs). A local user with the CAP_SYS_ADMIN capability in any user namespace could use this to cause a denial of service (crash). CVE-2020-12464 Kyungtae Kim reported a race condition in the USB core that can result in a use-after-free. It is not clear how this can be exploited, but it could result in a denial of service (crash or memory corruption) or privilege escalation. CVE-2020-12652 Tom Hatskevich reported a bug in the mptfusion storage drivers. An ioctl handler fetched a parameter from user memory twice, creating a race condition which could result in incorrect locking of internal data structures. A local user permitted to access /dev/mptctl could use this to cause a denial of service (crash or memory corruption) or for privilege escalation. CVE-2020-12653 It was discovered that the mwifiex WiFi driver did not sufficiently validate scan requests, resulting a potential heap buffer overflow. A local user with CAP_NET_ADMIN capability could use this to cause a denial of service (crash or memory corruption) or possibly for privilege escalation. CVE-2020-12654 It was discovered that the mwifiex WiFi driver did not sufficiently validate WMM parameters received from an access point (AP), resulting a potential heap buffer overflow. A malicious AP could use this to cause a denial of service (crash or memory corruption) or possibly to execute code on a vulnerable system. CVE-2020-12770 It was discovered that the sg (SCSI generic) driver did not correctly release internal resources in a particular error case. A local user permitted to access an sg device could possibly use this to cause a denial of service (resource exhaustion). CVE-2020-13143 Kyungtae Kim reported a potential heap out-of-bounds write in the USB gadget subsystem. A local user permitted to write to the gadget configuration filesystem could use this to cause a denial of service (crash or memory corruption) or potentially for privilege escalation. For the oldstable distribution (stretch), these problems have been fixed in version 4.9.210-1+deb9u1. This version also fixes some related bugs that do not have their own CVE IDs, and a regression in the macvlan driver introduced in the previous point release (bug #952660). We recommend that you upgrade your linux packages. For the detailed security status of linux please refer to its security tracker page at: https://security-tracker.debian.org/tracker/linux Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAl7f5blfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0Sh5RAAmfLUcD69AFSfY6hVPLCvTHS0gVYHUk57NSP7vHaUqQPWXMv4lV6pJ1sp I6sB7tuDW8MWERVy9lBuZrLhnhlhAfqhzkJ+F/yh6ze703QCf1mMoHBAI44yXGtB fZDV2vxreXpJ4LfoBfGP2+yFiJXBBCRASgyNEtiBoHYG0yt1gfqXP5OjlaRJ5p1I yElJ5Uj0MkclVj3nbupUmPs7V/2o4tPavOgTyLplTHTDfOMkK1Z86M0fUfh7fS97 ffwJutFObQuxrkO/2vtzTvaXPnqHh5DUIEQzq5xKhK10+GUlkppqHvId1c//0krF Wd1gZc2RXLkREQShh21BUaI2XxRTcOw7f6Nmz2QnwN/Q/dXGeWeCjPUGslna3BQs d/pToA0OpbFNxkNKsbg+ovzMrB9C9aP03aDpSztbf/ZLReR+yOf74s9ypdeadGLC qKmHcFRWP25ct/ZOxNnTquEwd2NT6qDc9Iu6VNdXb2ndRz1zFU/OZlZ3oEPkrCIp FxJ+j8jpMFJsluE09UjAxH4AhyNAPjPcCr3M+fkgG+WPgzxSHdKComDN06O53iVi kWbN/AQPXiLlWHuKpCWbS87dZUyT1K1Wf+7mJbsAUfrrd+1mgWSHTRw1QNii74CR bD91B+70LVu2UCKKxtnOIJ3+iUiUwBNPYw70B0cc3vZTv9O7q7k= =WzfN -----END PGP SIGNATURE----- . The microcode update for HEDT and Xeon CPUs with signature 0x50654 which was reverted in DSA 4565-2 is now included again with a fixed release. The upstream update for Skylake-U/Y (signature 0x406e3) had to be excluded from this update due to reported hangs on boot. CVE-2019-3016 It was discovered that the KVM implementation for x86 did not always perform TLB flushes when needed, if the paravirtualised TLB flush feature was enabled. CVE-2020-12768 A bug was discovered in the KVM implementation for AMD processors, which could result in a memory leak. Summary: An update for microcode_ctl is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux BaseOS E4S (v. 8.0) - x86_64 3. Description: Security Fix(es): * hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543) * hw: L1D Cache Eviction Sampling (CVE-2020-0549) * hw: Vector Register Data Sampling (CVE-2020-0548) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fixes: * Update Intel CPU microcode to microcode-20200609 release: - Addition of 06-4d-08/0x01 (AVN B0/C0) microcode at revision 0x12d; - Addition of 06-55-06/0xbf (CLX-SP B0) microcode at revision 0x4002f01; - Addition of 06-7a-08/0x01 (GLK R0) microcode at revision 0x16; - Update of 06-2d-06/0x6d (SNB-E/EN/EP C1/M0) microcode from revision 0x61f up to 0x621; - Update of 06-2d-07/0x6d (SNB-E/EN/EP C2/M1) microcode (in intel-06-2d-07/intel-ucode/06-2d-07) from revision 0x718 up to 0x71a; - Update of 06-3c-03/0x32 (HSW C0) microcode from revision 0x27 up to 0x28; - Update of 06-3d-04/0xc0 (BDW-U/Y E0/F0) microcode from revision 0x2e up to 0x2f; - Update of 06-45-01/0x72 (HSW-U C0/D0) microcode from revision 0x25 up to 0x26; - Update of 06-46-01/0x32 (HSW-H C0) microcode from revision 0x1b up to 0x1c; - Update of 06-47-01/0x22 (BDW-H/Xeon E3 E0/G0) microcode from revision 0x21 up to 0x22; - Update of 06-4e-03/0xc0 (SKL-U/Y D0) microcode from revision 0xd4 up to 0xdc; - Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000150 up to 0x1000157; - Update of 06-55-04/0xb7 (SKX-SP H0/M0/U0, SKX-D M1) microcode (in intel-06-55-04/intel-ucode/06-55-04) from revision 0x2000064 up to 0x2006906; - Update of 06-55-07/0xbf (CLX-SP B1) microcode from revision 0x500002b up to 0x5002f01; - Update of 06-5e-03/0x36 (SKL-H/S R0/N0) microcode from revision 0xd4 up to 0xdc; - Update of 06-7a-01/0x01 (GLK B0) microcode from revision 0x2e up to 0x32; - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x46 up to 0x78; - Update of 06-8e-09/0x10 (AML-Y22 H0) microcode from revision 0xc6 up to 0xd6; - Update of 06-8e-09/0xc0 (KBL-U/Y H0) microcode from revision 0xc6 up to 0xd6; - Update of 06-8e-0a/0xc0 (CFL-U43e D0) microcode from revision 0xc6 up to 0xd6; - Update of 06-8e-0b/0xd0 (WHL-U W0) microcode from revision 0xc6 up to 0xd6; - Update of 06-8e-0c/0x94 (AML-Y42 V0, CML-Y42 V0, WHL-U V0) microcode from revision 0xc6 up to 0xd6; - Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode from revision 0xc6 up to 0xd6; - Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E3 U0) microcode from revision 0xc6 up to 0xd6; - Update of 06-9e-0b/0x02 (CFL-S B0) microcode from revision 0xc6 up to 0xd6; - Update of 06-9e-0c/0x22 (CFL-H/S P0) microcode from revision 0xae up to 0xd6; - Update of 06-9e-0d/0x22 (CFL-H R0) microcode from revision 0xc6 up to 0xd6. - Update of 06-a6-00/0x80 (CML-U 6+2 A0) from revision 0xc6 up to 0xca. * Do not update 06-4e-03 (SKL-U/Y) and 06-5e-03 (SKL-H/S/Xeon E3 v5) to revision 0xdc, use 0xd6 by default. * Enable 06-2d-07 (SNB-E/EN/EP) caveat by default. * Add 06-55-04 (SKL-X/W) caveat, enable it by default. * Update stale posttrans dependency, add triggers for proper handling of the debug kernel flavour along with kernel-rt. * Avoid find being SIGPIPE'd on early "grep -q" exit in the dracut script. * Re-generate initramfs not only for the currently running kernel, but for several recently installed kernels as well. * Change the URL to point to the GitHub repository since the microcode download section at Intel Download Center does not exist anymore. * Avoid temporary file creation, used for here-documents in check_caveats. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1788786 - CVE-2020-0548 hw: Vector Register Data Sampling 1788788 - CVE-2020-0549 hw: L1D Cache Eviction Sampling 1827165 - CVE-2020-0543 hw: Special Register Buffer Data Sampling (SRBDS) 1848438 - [rhel-8.0.0] skylake (06-4e-03) microcode update hangs 1848501 - [rhel-8.0.0] Package microcode-20200609 release 6. Package List: Red Hat Enterprise Linux BaseOS E4S (v. 8.0): Source: microcode_ctl-20180807a-2.20200609.1.el8_0.src.rpm x86_64: microcode_ctl-20180807a-2.20200609.1.el8_0.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2020-0543 https://access.redhat.com/security/cve/CVE-2020-0548 https://access.redhat.com/security/cve/CVE-2020-0549 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/solutions/5142691 https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXvmchtzjgjWX9erEAQhpSg/+ID0RjbWf8T2Y73wrULmADARhxV4taH3B AS27Psqo6eBLEDyCFWFdARN+yWJT551sN4LHHqc4ixa0fCVtAbk7ZeugNOqtHIgx nhwmr/T9/TQi+AjvNhcQWnExOnDLPb+xyqQtQl4+nDHMljnxPuxzeu7yKigXgRX1 szUP0PdzC8uzJvZZ+IplGBPcgiEUdnTFMBbbdttaDzzdCeBy5J+myzQ6wdBJBTgM 03nWspMPWObgFwm1QBoBphTkL21X+vUSTy116TwAgCp1laZ0cd3giG/dEKzzGFKQ ZOvcmnDKRN5WNNJBlb4CnJBkU4MRV6WC4iEU+ur4EIsMnJmTcjTj/oH6bltjVbur eD05wgeejS7gUBdIMNpr158QkMTgORyfOk3EesNlDdG4gpKoUG+Ckfs0KhcjFM+z LHlk8PAM0GjcUKDYlZ+07mOi8e0yHFAG9KQOOwBWDNTXJ7U++UcxvrGFAbNatnnJ OfTm6C3dUbsTzeebyTvM1kHqcYexD9CYLMI2A0nsifDzLjqwqj3xYqMDqKFTcsx/ 3SLUhXC6isrmNJeWvxUU4/VFUPhddAfE3Q1zJBzM4oDCcGdVvq+7KEFzxj1rVydX xU5XRD4M8YWFmhMJxH+dH5mgsErdGT80Rw5fgv21oPbNpsqrsvZUHg83Nd+IqjEu D/8HdxJn3Pw\xd815 -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . Description: The microcode_ctl packages provide microcode updates for Intel. ========================================================================= Ubuntu Security Notice USN-4385-1 June 09, 2020 intel-microcode vulnerabilities ========================================================================= A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS - Ubuntu 19.10 - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS - Ubuntu 14.04 ESM Summary: Several security issues were fixed in Intel Microcode. Software Description: - intel-microcode: Processor microcode for Intel CPUs Details: It was discovered that memory contents previously stored in microarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY read operations on Intel client and Xeon E3 processors may be briefly exposed to processes on the same or different processor cores. (CVE-2020-0543) It was discovered that on some Intel processors, partial data values previously read from a vector register on a physical core may be propagated into unused portions of the store buffer. (CVE-2020-0548) It was discovered that on some Intel processors, data from the most recently evicted modified L1 data cache (L1D) line may be propagated into an unused (invalid) L1D fill buffer. (CVE-2020-0549) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS: intel-microcode 3.20200609.0ubuntu0.20.04.0 Ubuntu 19.10: intel-microcode 3.20200609.0ubuntu0.19.10.0 Ubuntu 18.04 LTS: intel-microcode 3.20200609.0ubuntu0.18.04.0 Ubuntu 16.04 LTS: intel-microcode 3.20200609.0ubuntu0.16.04.0 Ubuntu 14.04 ESM: intel-microcode 3.20200609.0ubuntu0.14.04.0 After a standard system update you need to reboot your computer to make all the necessary changes. Summary: Updated microcode_ctl packages that fix several security bugs and add various enhancements are now available

Trust: 1.98

sources: NVD: CVE-2020-0543 // VULHUB: VHN-161977 // PACKETSTORM: 168855 // PACKETSTORM: 168851 // PACKETSTORM: 168852 // PACKETSTORM: 158237 // PACKETSTORM: 163924 // PACKETSTORM: 163954 // PACKETSTORM: 158005 // PACKETSTORM: 158183 // PACKETSTORM: 158198 // PACKETSTORM: 158355 // PACKETSTORM: 163863

AFFECTED PRODUCTS

vendor:intelmodel:core i3-3217uescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8120scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6600tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1245 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7007uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4010yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7210uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4010uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 4405yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3560yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 3765uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g5400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5675cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8100scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3240scope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:19.10

Trust: 1.0

vendor:intelmodel:core i7-8705gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium a1018 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1125c v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6310uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1270 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3900tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3120mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 1037uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3450tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-9850hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3220tscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc627escope:ltversion:25.02.06

Trust: 1.0

vendor:intelmodel:core i7-8569uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 1000mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1505l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7820hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2124scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3229yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m5-6y54scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4430sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4030uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7920hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7300uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2146gscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc427dscope:eqversion:*

Trust: 1.0

vendor:intelmodel:xeon e3-1505m v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6600scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2184gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7567uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1280 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3470scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6820hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2286mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8709gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6300uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core 4205uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4130scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1225 v2scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc477e proscope:ltversion:21.01.14

Trust: 1.0

vendor:intelmodel:core i7-7700tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7320tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6510uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m-5y10cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3840qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7100uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 3865uscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic itp1000scope:ltversion:23.01.08

Trust: 1.0

vendor:intelmodel:celeron 2957uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 1020mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6100escope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3689yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1265l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4402ecscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3517uescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4250uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3520mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8400hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7442eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1225 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8700kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1245 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2174gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1285l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8400bscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 3965yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3570kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4700ecscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-9600kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4160tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5350uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7y75scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m3-7y30scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1501l v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6567uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3439yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3570scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6870hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1286 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g1620tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4030yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4258uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4702mqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1220 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-9400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3220tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1585l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6300scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4100mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1268l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5700hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4590tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3555lescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4770sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1290 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1246 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1275 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3930tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8300tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8350kscope:eqversion: -

Trust: 1.0

vendor:mcafeemodel:threat intelligence exchange serverscope:lteversion:2.3.1

Trust: 1.0

vendor:intelmodel:pentium g5400tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1271 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4750hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3900tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3360mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8130uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-10510uscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc627dscope:eqversion:*

Trust: 1.0

vendor:intelmodel:core i7-3612qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g5500scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic field pg m6scope:ltversion:26.01.07

Trust: 1.0

vendor:intelmodel:xeon e3-1505l v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4288uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4810mqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4370scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 927uescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m-5y70scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1275 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1545m v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4350uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3260scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1258l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2276mescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4005uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-5015uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7440eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7102escope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8600kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4570rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-8950hkscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 2981uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4020yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6100hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3350pscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3920scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5575rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1240l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 5305uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m-5y10scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3610mescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1105c v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3610qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2244gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1220 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-5010uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g4900scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1105cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1270 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1281 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1515m v5scope:eqversion: -

Trust: 1.0

vendor:opensusemodel:leapscope:eqversion:15.1

Trust: 1.0

vendor:intelmodel:celeron 1020escope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7500scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2124gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4500uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-5005uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3635qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7400tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5750hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4360scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7101tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1225 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4500scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4790tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6100uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8300hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-9700kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4712mqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7600uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4785tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7360uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2234scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8020scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4300uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3317uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4540scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g5600scope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:18.04

Trust: 1.0

vendor:intelmodel:core m7-6y75scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4520scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4360tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3430scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6110uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6650uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3217uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 725cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6440eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4012yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5950hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4860hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8259uscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc427escope:ltversion:21.01.14

Trust: 1.0

vendor:intelmodel:xeon e3-1505m v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6360uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3320mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4200uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7167uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3340mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m-5y10ascope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3420tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8100tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 1019yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3765uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4710hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3225scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4400tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3210mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium gold 6405uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4670rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4600uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1245 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3210scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8700bscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1278l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7560uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3667uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6400tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8670tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3825uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g2140 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g5500tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6267uscope:eqversion: -

Trust: 1.0

vendor:mcafeemodel:threat intelligence exchange serverscope:gteversion:2.0.0

Trust: 1.0

vendor:intelmodel:celeron g1610scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7260uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4670kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5775cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-9600kfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4760hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7500tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m3-6y30scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1230 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6820hkscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6500scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4770rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4400tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1558l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6500tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3902escope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3250tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1240 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2276gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4278uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5650uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3240tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3340sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4210yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7110uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3450scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic field pg m5scope:ltversion:22.01.08

Trust: 1.0

vendor:intelmodel:core i5-4690sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8400tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6100scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3205uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8265uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g1820tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6500uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6700tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7y57scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3940xmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8700tscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc677dscope:eqversion:*

Trust: 1.0

vendor:intelmodel:celeron 2980uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3920tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4158uscope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:20.04

Trust: 1.0

vendor:intelmodel:core i9-9900kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3460scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1501m v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2284gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3556uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5350scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7020uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1220l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6820eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3227uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g2120t v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4210hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1578l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4590scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3920xmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3770kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3558uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4570scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4770tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7120scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4220yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1280 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8700scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8100hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2278gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4300yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4900mqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5850hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g4920scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4370tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-9880hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3250scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6120tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2226gescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1245 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1230l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m5-6y57scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8809gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8420scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g2030 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m-5y51scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1220 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4690tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6822eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g2100t v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4100uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1286l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6100tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-9900kfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 2129y v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1225 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8250uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1260l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 2030m v2scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc527gscope:ltversion:1.4.0

Trust: 1.0

vendor:intelmodel:core 9750hfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3570tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3450sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m3-8100yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core 4410yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6500tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 1405 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3560mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6320tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3330scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6700tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2126gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8557uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4330tscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc847dscope:eqversion:*

Trust: 1.0

vendor:intelmodel:pentium g5420scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1240 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g2010 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3770tscope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.0

vendor:intelmodel:pentium g2130 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8210yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3230mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7300hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1235 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1241 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3250scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g1850scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10210yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 1017uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4670scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3220scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc477escope:ltversion:21.01.14

Trust: 1.0

vendor:intelmodel:core i3-4110mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8850hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4308uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8550scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4130tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4500tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7200uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 1047uescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3615qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5600uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-5157uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1240 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7267uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3632qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3470sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6660uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4120uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4202yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 2020m v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 2955uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3260tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2288gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-i3-8100hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7700hqscope:eqversion: -

Trust: 1.0

vendor:opensusemodel:leapscope:eqversion:15.2

Trust: 1.0

vendor:intelmodel:celeron g3940scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3612qescope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 2127u v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3820qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2186mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3537uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8500tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4770hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4170scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4770kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7510uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4440sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1125cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4150tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4350scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core 4415yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6300tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3440scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3380mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1575m v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5257uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2134scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1280 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3340scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4590sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3770scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6770hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6350hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1235l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8420tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4440scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4260uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5557uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8500bscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7700scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4765tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6120scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7700kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2276mlscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 3755uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4710mqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7500uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-2115cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4025uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g2020 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7100escope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2176mscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc547gscope:ltversion:r1.28.0

Trust: 1.0

vendor:intelmodel:celeron g1840scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4150scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8145uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4670sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6260uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4722hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4790sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7740xscope:eqversion: -

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:31

Trust: 1.0

vendor:intelmodel:core i5-10210uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7600tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3900scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-9980hkscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic field pg m4scope:eqversion:*

Trust: 1.0

vendor:intelmodel:celeron g1840tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4570sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g4950scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g1610tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6287uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6600uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3450scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4210uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7440hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3610qescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3615qescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4460scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g4900tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4980hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 3955uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4558uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1220 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2278gelscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2224gscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc647escope:ltversion:25.02.06

Trust: 1.0

vendor:intelmodel:core 8269uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3805uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-9400hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7820hkscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3550sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5200uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2254mescope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:intelmodel:xeon e3-1270scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3115cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3240scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4670tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7660uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1535m v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g1630scope:eqversion: -

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:32

Trust: 1.0

vendor:intelmodel:core i5-3475sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7600scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6200uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1226 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1280 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3330sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core 9300hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8565uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4700eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6700scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium b925cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2236scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7120tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 4405uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1265lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3470tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4170tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4702ecscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3420scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1275l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium b915cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6920hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8670scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8510yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4578uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4700hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-9700kfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3460tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g5420tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2144gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2136scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7101escope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7600kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4870hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3240tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2224scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3120mescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7820eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3540mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1275 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-10510yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4200yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4330scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4520tscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc647dscope:eqversion:*

Trust: 1.0

vendor:intelmodel:core m-5y3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 2970mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1285 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8600scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5550uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8706gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 1007uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4790scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8559uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4700mqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4690scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2274gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3550scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3258scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-9400fscope:eqversion: -

Trust: 1.0

vendor:mcafeemodel:threat intelligence exchange serverscope:eqversion:3.0.0

Trust: 1.0

vendor:intelmodel:core i5-3437uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4702hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7340scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3517uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2276mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3770sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6210uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4712hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6700hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6100tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6320scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4550uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4460tscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc827dscope:eqversion:*

Trust: 1.0

vendor:intelmodel:core i3-6167uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5287uscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc847escope:ltversion:25.02.06

Trust: 1.0

vendor:intelmodel:celeron g1820scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1585 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1230 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3570sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8305gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g2120 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2246gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1270 v2scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc3000 smartscope:ltversion:1.b

Trust: 1.0

vendor:intelmodel:core i5-6442eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4800mqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5250uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8650uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7640xscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2278gescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8310yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8650kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6440hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6300hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3440tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1240l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6560uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1268l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8650scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1276 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1240 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1230 v5scope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:16.04

Trust: 1.0

vendor:intelmodel:core i3-3130mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1220l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g4930scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3110mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8750hscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc347escope:eqversion:*

Trust: 1.0

vendor:intelmodel:core i5-10310yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4570tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g2020t v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1231 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3720qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3687uscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simotion p320-4escope:eqversion:*

Trust: 1.0

vendor:intelmodel:pentium g3470scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3561yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6600kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1230 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5850eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4910mqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3630qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8500scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3427uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1565l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6700kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6970hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8200yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8365uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4430scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7500uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4960hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7130uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g1830scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4350tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8560uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g1620scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3665uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2176gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 3965uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8550uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m-5y71scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8600tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4720hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1285 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 1005mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3337uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1275 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8109uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10110yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7100hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 4415uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1265l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 2117u v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7y54scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4610yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-5006uscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simotion p320-4sscope:eqversion:*

Trust: 1.0

vendor:intelmodel:core 5405uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8300scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1285 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4510uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3339yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5700eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2186gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4770scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8665uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4420tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2254mlscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc677escope:ltversion:25.02.06

Trust: 1.0

vendor:intelmodel:core i5-4302yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3245scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3740qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4460sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3250tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4160scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2226gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8350uscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc477dscope:eqversion:*

Trust: 1.0

vendor:intelmodel:core i3-8000tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5775rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4650uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3930escope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4950hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4420scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1535m v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7287uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3215uscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc547escope:eqversion:*

Trust: 1.0

vendor:intelmodel:celeron 3855uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4850hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1221 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8500yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g2030t v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4340scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5500uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5675rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4771scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3220scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-5020uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6102escope:eqversion: -

Trust: 1.0

sources: NVD: CVE-2020-0543

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-0543
value: MEDIUM

Trust: 1.0

VULHUB: VHN-161977
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2020-0543
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-161977
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-0543
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 1.8
impactScore: 3.6
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-161977 // NVD: CVE-2020-0543

PROBLEMTYPE DATA

problemtype:CWE-459

Trust: 1.1

problemtype:CWE-200

Trust: 0.1

sources: VULHUB: VHN-161977 // NVD: CVE-2020-0543

THREAT TYPE

local

Trust: 0.1

sources: PACKETSTORM: 158005

EXTERNAL IDS

db:NVDid:CVE-2020-0543

Trust: 2.2

db:MCAFEEid:SB10318

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2020/07/14/5

Trust: 1.1

db:SIEMENSid:SSA-534763

Trust: 1.1

db:PACKETSTORMid:158183

Trust: 0.2

db:PACKETSTORMid:158198

Trust: 0.2

db:PACKETSTORMid:158005

Trust: 0.2

db:PACKETSTORMid:158237

Trust: 0.2

db:PACKETSTORMid:158355

Trust: 0.2

db:PACKETSTORMid:157993

Trust: 0.1

db:PACKETSTORMid:158015

Trust: 0.1

db:PACKETSTORMid:168421

Trust: 0.1

db:PACKETSTORMid:158010

Trust: 0.1

db:PACKETSTORMid:158189

Trust: 0.1

db:PACKETSTORMid:157997

Trust: 0.1

db:PACKETSTORMid:158008

Trust: 0.1

db:PACKETSTORMid:158039

Trust: 0.1

db:PACKETSTORMid:158250

Trust: 0.1

db:PACKETSTORMid:158238

Trust: 0.1

db:PACKETSTORMid:158197

Trust: 0.1

db:PACKETSTORMid:158190

Trust: 0.1

db:CNNVDid:CNNVD-202006-630

Trust: 0.1

db:VULHUBid:VHN-161977

Trust: 0.1

db:PACKETSTORMid:168855

Trust: 0.1

db:PACKETSTORMid:168851

Trust: 0.1

db:PACKETSTORMid:168852

Trust: 0.1

db:PACKETSTORMid:163924

Trust: 0.1

db:PACKETSTORMid:163954

Trust: 0.1

db:PACKETSTORMid:163863

Trust: 0.1

sources: VULHUB: VHN-161977 // PACKETSTORM: 168855 // PACKETSTORM: 168851 // PACKETSTORM: 168852 // PACKETSTORM: 158237 // PACKETSTORM: 163924 // PACKETSTORM: 163954 // PACKETSTORM: 158005 // PACKETSTORM: 158183 // PACKETSTORM: 158198 // PACKETSTORM: 158355 // PACKETSTORM: 163863 // NVD: CVE-2020-0543

REFERENCES

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00320.html

Trust: 1.2

url:https://cert-portal.siemens.com/productcert/pdf/ssa-534763.pdf

Trust: 1.1

url:http://www.openwall.com/lists/oss-security/2020/07/14/5

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00025.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html

Trust: 1.1

url:https://usn.ubuntu.com/4385-1/

Trust: 1.1

url:https://usn.ubuntu.com/4387-1/

Trust: 1.1

url:https://usn.ubuntu.com/4388-1/

Trust: 1.1

url:https://usn.ubuntu.com/4389-1/

Trust: 1.1

url:https://usn.ubuntu.com/4390-1/

Trust: 1.1

url:https://usn.ubuntu.com/4391-1/

Trust: 1.1

url:https://usn.ubuntu.com/4392-1/

Trust: 1.1

url:https://usn.ubuntu.com/4393-1/

Trust: 1.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-0543

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/nqzmoshltbbiecennxa6m7dn5feed4ki/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/grfc7uapkaffh5wx3amdubvhlkyqa2nz/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/dt2vkdmq3i37nbnj256a2exr7ojhxxkz/

Trust: 1.0

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10318

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/t5oum24zc43g4idt3jucihjtsdxjsk6y/

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2020-0549

Trust: 0.9

url:https://nvd.nist.gov/vuln/detail/cve-2020-0548

Trust: 0.9

url:https://access.redhat.com/security/team/contact/

Trust: 0.7

url:https://access.redhat.com/security/cve/cve-2020-0549

Trust: 0.7

url:https://access.redhat.com/security/cve/cve-2020-0543

Trust: 0.7

url:https://bugzilla.redhat.com/):

Trust: 0.7

url:https://access.redhat.com/security/team/key/

Trust: 0.7

url:https://access.redhat.com/security/cve/cve-2020-0548

Trust: 0.7

url:https://access.redhat.com/articles/11258

Trust: 0.7

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.4

url:https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling

Trust: 0.4

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.4

url:https://access.redhat.com/solutions/5142691

Trust: 0.4

url:https://www.debian.org/security/faq

Trust: 0.3

url:https://www.debian.org/security/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-8696

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-24511

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-8698

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-24512

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-24512

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-24489

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-24489

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-8698

Trust: 0.3

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.3

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-8695

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-8695

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-8696

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-24511

Trust: 0.3

url:https://security-tracker.debian.org/tracker/linux

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-10732

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-10757

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-10751

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-10711

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-19462

Trust: 0.2

url:https://kc.mcafee.com/corporate/index?page=content&amp;id=sb10318

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/dt2vkdmq3i37nbnj256a2exr7ojhxxkz/

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/grfc7uapkaffh5wx3amdubvhlkyqa2nz/

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/nqzmoshltbbiecennxa6m7dn5feed4ki/

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/t5oum24zc43g4idt3jucihjtsdxjsk6y/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-19768

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-10942

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-11494

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-19319

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-20811

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-2182

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-20806

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-5108

Trust: 0.1

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00329.html

Trust: 0.1

url:https://security-tracker.debian.org/tracker/intel-microcode

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-12464

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-3016

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-12768

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-12770

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-12114

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-13143

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:2757

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:3255

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:3323

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/intel-microcode/3.20200609.0ubuntu0.20.04.0

Trust: 0.1

url:https://usn.ubuntu.com/4385-1

Trust: 0.1

url:https://wiki.ubuntu.com/securityteam/knowledgebase/srbds

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/intel-microcode/3.20200609.0ubuntu0.19.10.0

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/intel-microcode/3.20200609.0ubuntu0.16.04.0

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/intel-microcode/3.20200609.0ubuntu0.18.04.0

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:2677

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:2706

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:2842

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:3176

Trust: 0.1

sources: VULHUB: VHN-161977 // PACKETSTORM: 168855 // PACKETSTORM: 168851 // PACKETSTORM: 168852 // PACKETSTORM: 158237 // PACKETSTORM: 163924 // PACKETSTORM: 163954 // PACKETSTORM: 158005 // PACKETSTORM: 158183 // PACKETSTORM: 158198 // PACKETSTORM: 158355 // PACKETSTORM: 163863 // NVD: CVE-2020-0543

CREDITS

Red Hat

Trust: 0.7

sources: PACKETSTORM: 158237 // PACKETSTORM: 163924 // PACKETSTORM: 163954 // PACKETSTORM: 158183 // PACKETSTORM: 158198 // PACKETSTORM: 158355 // PACKETSTORM: 163863

SOURCES

db:VULHUBid:VHN-161977
db:PACKETSTORMid:168855
db:PACKETSTORMid:168851
db:PACKETSTORMid:168852
db:PACKETSTORMid:158237
db:PACKETSTORMid:163924
db:PACKETSTORMid:163954
db:PACKETSTORMid:158005
db:PACKETSTORMid:158183
db:PACKETSTORMid:158198
db:PACKETSTORMid:158355
db:PACKETSTORMid:163863
db:NVDid:CVE-2020-0543

LAST UPDATE DATE

2025-09-30T02:26:19.335000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-161977date:2022-04-28T00:00:00
db:NVDid:CVE-2020-0543date:2024-11-21T04:53:42.440

SOURCES RELEASE DATE

db:VULHUBid:VHN-161977date:2020-06-15T00:00:00
db:PACKETSTORMid:168855date:2020-06-28T19:12:00
db:PACKETSTORMid:168851date:2020-06-28T19:12:00
db:PACKETSTORMid:168852date:2020-06-28T19:12:00
db:PACKETSTORMid:158237date:2020-06-29T15:29:15
db:PACKETSTORMid:163924date:2021-08-27T19:22:22
db:PACKETSTORMid:163954date:2021-08-31T15:43:48
db:PACKETSTORMid:158005date:2020-06-10T15:06:11
db:PACKETSTORMid:158183date:2020-06-23T14:59:57
db:PACKETSTORMid:158198date:2020-06-23T21:19:20
db:PACKETSTORMid:158355date:2020-07-07T16:19:47
db:PACKETSTORMid:163863date:2021-08-17T15:19:34
db:NVDid:CVE-2020-0543date:2020-06-15T14:15:11.207